Geekish-
Hopefully you have read
this link that Engineer previously mentioned.
Since they are Macs, you might want to seek some advice from SS59, who assimilated a high school lab of macs last year when he was a senior. They named the project "The Garden" and they really flew until the end of the school year.
Anyway Macs don't behave as well as Win32 machines at multitasking, so users can notice some performance issues when running RC5. I don't want to scare you away from trying, but prepare for this possibility.
This leaves the use of the client in screen saver mode, like the classic SETI configuration, which is a very good project to consider as well since it is fairly well known.
At our school, it was very easy to convince the net admin (me)
I have run Dnet on nearly every PC in my control. It never causes a lick of trouble, and contributes to various scientific projects at no cost to the school.
As for Proxy issues, let me clarify a couple of terms here. The school probably uses a 'Proxy Server' on a central server that is used for Network Address Translation, filtering of porn sites, caching of popular web pages, and system security. You will almost undoubtedly not be able to get access to this machine.
The 'Personal Proxy' program that many of us talk about here, is like a keyserver on your own private network. It provides a central machine that can be used to bridge firewalls/network permissions and the like in all sorts of various ways. (Adul is a good recent example of this)
If your Macs have internet access at all, we can get the clients to flush directly with a Dnet keyserver or a TA proxy even if the default port 2064 is blocked by a firewall.
Personal proxies can use stats programs that will tip administrators to various computer problems with the herd. MWalkden has been doing some research on this side benefit of DC, and I have used the proxy to detect off line machines just by watching the log files. That is beyond your situation right now however.
One side benefit along these same lines is that the Dnet client has helped in recovering stolen computers. If the computer can connect to the Internet, the IP address is reported in the proxy log files. It can then be traced back to the source.
Good luck
viz