Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upDebian Templates: 'su -' asks for password #1128
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
nrgaway
commented
Aug 17, 2015
|
Can a user just not use Otherwise I will let @marmarek answer |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Aug 17, 2015
Member
They can. But what causes confusion for one user, probably accustomed to non-Debian distributions, will cause confusion for another user. If we're lucky, this would be just one more file with one to three lines of code.
|
They can. But what causes confusion for one user, probably accustomed to non-Debian distributions, will cause confusion for another user. If we're lucky, this would be just one more file with one to three lines of code. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
Aug 17, 2015
Member
Debian doesnt have wheel group, but you could create it, add user to it and then uncomment this line in pam.d/su:
auth sufficient pam_wheel.so trust
|
Debian doesnt have wheel group, but you could create it, add user to it and then uncomment this line in pam.d/su: |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Aug 17, 2015
Member
|
Do you think there can be a solution that doesn't require editing a file
/ adding a group? A bit simpler? Just a single drop-in /etc/pam.d/qubes?
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
unman
Aug 17, 2015
Member
I think you have to edit the pam.d/su file.
If you dont want to add a group you could add - auth sufficient pam_permit.so
|
I think you have to edit the pam.d/su file. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Aug 18, 2015
Member
Nice.
Appending to /etc/pam.d/su:
auth sufficient pam_permit.so
Works for me.
|
Nice.
Works for me. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Aug 18, 2015
Member
If this is fine to implement, I could provide a pull request. Using https://packages.debian.org/jessie/config-package-dev. A clean way to create diversions / config packages. That way the Qubes specific file would not cause an interactive dpkg conflict resolution dialog if upstream's /etc/pam.d/su gets updated.
|
If this is fine to implement, I could provide a pull request. Using https://packages.debian.org/jessie/config-package-dev. A clean way to create diversions / config packages. That way the Qubes specific file would not cause an interactive dpkg conflict resolution dialog if upstream's |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Aug 26, 2015
Member
On Fedora template we have simply empty root password (usermod -p '' root), which does the trick. Apparently it doesn't work on Debian,
because pam_unix have nullok_secure option instead of nullok.
Anyway I don't think it can be changed without modifying some file in
/etc/pam.d (either su - as above, or common-auth -
s/nullok_secure/nullok/), so config-package-dev is probably the way to
go.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
On Fedora template we have simply empty root password ( Anyway I don't think it can be changed without modifying some file in Best Regards, |
adrelanos commentedAug 17, 2015
su -asks for password.A user was confused by this:
https://groups.google.com/forum/#!topic/qubes-users/DQwXOrzwdWE
This is specifically confusing in Whonix, because there
~/.bashrctells one, that the default password ischangeme. (That text could be omitted.) Anyhow. This issue equally applies to the Debian templates.Since Qubes allows passwordless sudo anyhow (See: https://github.com/QubesOS/qubes-core-agent-linux/blob/master/misc/qubes.sudoers)... I suggest making
su -passwordless. Or does anything speak against that?Does someone know how to configure
/etc/pam.dor is this TODO research?