DebianThis forum is for the discussion of Debian Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I just set SSH up on Ubuntu and made a new account via adduser from another system and i noticed that user can access and get info from any other users home dir, a few people talked about this on IRC also and the security seems very lame.
So is this something you have to edit yourself to change "default permissions" and if so how or is it something that was missed on the latest build?
I think this is more adduser specific problem than distro specific. Depending on the debconf level you've chosen, debconf usually asks when adduser is upgraded if you want system wide readable home directories. This can also be set in Ubuntu at any time running "sudo dpkg-reconfigure adduser" (and you can set the debconf level with "sudo dpkg-reconfigure debconf").
I haven't been running Ubuntu for very long but I've noticed that many potential security issues have been considered in Ubuntu from the point of view of a desktop system and the security settings are generally tighter than in Debian. For example, in Ubuntu CUPS by default listens only to localhost while Debian's CUPS listens to all connections. Of course, Debian is designed to be used in servers as well as on the desktop while Ubuntu is more desktop oriented, so Debian sysadmins are expected to know the potential security issues and to tweak the settings accordingly.
Originally posted by Dead Parrot ...many potential security issues have been considered in Ubuntu from the point of view of a desktop system and the security settings are generally tighter than in Debian. For example, in Ubuntu CUPS by default listens only to localhost while Debian's CUPS listens to all connections. Of course, Debian is designed to be used in servers as well as on the desktop while Ubuntu is more desktop oriented, so Debian sysadmins are expected to know the potential security issues and to tweak the settings accordingly.
This post is not a knock on Debian because it applies to most every distro. This is dead wrong, IMO. Sysadmins should also damn well be expected to know how to *turn stuff on* as much as they are expected to know the security issues, while Joe User might not know how to turn it off or even that he *should* or *could* turn it off. This is the same thing *Windows* gets slammed for - leaving unnecessary services running and ports open and blahblahblah. The distinction between what's a server-type package and what's a desktop-type package should be crystal clear and even if you do select all the server junk, you should have to turn it all on. The box should be locked down to the outside from the start. Instead, people have wide open ports and can't access their sound device or disc drives. It's completely screwed - whether as a desktop *or* a server.
-- Just to clarify, I'm not taking issue with your post, which I think is a very accurate assessment of the situation. I'm just taking issue with the *situation*.
I cannot help but agreeing with digiot. I was just thinking that it is sysadmins who are usually better informed about possible security risks while desktop users are only beginning to realize that it's a dangerous www out there, so they are the ones who are more in need of protection. But that, indeed, is a poor excuse for Debian having less secure default settings than Ubuntu.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.