You seem to be asking two questions here:
What are we actually using? and What does this?
What I'm actually using is CIFS, in my use-cases POSIX is less important so I haven't had any problems. NFS3 is used in areas where security isn't important, such as my SLES install server. And finally, sshfs/gvfs for simple user-land sharing. Wireline encryption is not deemed needed, so that isn't a meaningful factor for us.
As for the other question, there seems to be six main requirements for what you're looking for:
- Encrypts traffic on the wire.
- Encrypts authentication.
- Posix semantics.
- Strong enforcement of server-based ACLs.
- Is not userland.
- Is actually used.
I suspect points 5 and 6 will be the killers here, but here goes (also, this is the point where a table would be really handy, but markdown/StackExchange doesn't support it).
NFSv3 + IPSec
- Encrypted on the wire, pass
- No encrypted authentication, fail
- Posix semantics, pass
- No strong enforcement of server-based ACLs, fail
- Is not userland, pass
- Is actually used, pass
NFSv4 + Krb + IPSec
- Encrypted on the wire, pass
- Encrypted authentication, pass
- Posix semantics, pass
- Strong enforcement of server-based ACLs, pass
- Is not userland, pass
- Is not actually used, fail
CIFS
- Not encrypted on the wire, fail
- Encrypted authentication
- Posix semantics, pass (Samba & Kernel now, Windows has had a Posix layer since the NT days)
- Strong enforcement of server-based ACLs, pass
- Is not userland, pass
- Is actually used, pass
CIFS + IPSec
- Encrypted on the wire, pass
- Encrypted authentication
- Posix semantics, pass (Samba & Kernel now)
- Strong enforcement of server-based ACLs, pass
- Is not userland, pass
- Is not actually used, fail
SSHFS
- Encrypted on the wire, pass
- Encrypted authentication, pass
- Posix semantics, pass
- Strong enforcement of server-based ACLs, pass
- Is userland, fail
- Is actually used, pass
AFP/NetATalk
- Encrypted on the wire, fail
- Encrypted authentication, pass
- Posix semantics, pass
- Strong enforcement of server-based ACLs, pass
- Is not userland, pass
- Is actually used, fail
And I'm not touching the distributed file-systems out there. There simply isn't one single thing that does it all. Some come close (CIFS) and some are already there but no one uses them (NFS4 + IPSec, CIFS+IPSec). For some reason a secure network filesystem is something that has been subjected to a lot of compromises over the years.