Re: Guest Samba shares

2020-12-10 Thread Keith Bainbridge

On 11/12/20 1:42 pm, Paul M Foster wrote:

For various reasons, I've set the perms on this mount as 777. Anything
on a Raspberry Pi gets mounted in the /media/pi hierarchy by default. I
couldn't see a reason to change it, if I set the permissions
appropriately.


G'day Paul

pi being the default user under raspbian/raspOS. At least with the
recent installer, you are required to give pi a password. It used be
that there was a default password, and you had to know to change that
yourself.

My 2c worth: as you have already set up a personal user, disable auto
log-in to user pi and make sure user pi has a strong password.  Having
user pi available is likely the prime target of any attack, simply
because it used have a default.


Once you start logging in as paul, you'll find that automount USB item
go to /media/paul.



--
Keith Bainbridge

ke1thozgro...@gmx.com



Re: Guest Samba shares

2020-12-10 Thread john doe

On 12/11/2020 5:47 AM, Paul M Foster wrote:

On Thu, Dec 10, 2020 at 10:09:20PM -0500, Stefan Monnier wrote:


Anything on a Raspberry Pi gets mounted in the /media/pi hierarchy
by default.


I'm pretty sure that it's not the case.  It's a matter of the OS you run
on your Pi, not the fact that it's a Raspberry Pi.

IIUC what you're saying is that you're not running plain Debian but some
other OS and that OS uses /media/pi by default mount things.

It's important to clarify those details here, because this is a Debian
mailing-list, so readers like me generally presume that you're using
Debian and not some other (presumably Debian-derivative) OS.


 Stefan



Oops. I sent the reply without the reply. Sorry.

The Raspberry Pi (the server in this case) runs a variant of Debian,
Raspberry Pi OS. Where the disc mounts is an incidental detail. Samba,
whether on Fedora, Arch or Debian, is configured more or less the same
way. Since I've been running Debian alone for the last 20 years, this
seemed to be the best place to ask the question.



For Samba question I would probably ask on the Samba mailing list! :)

--
John Doe



Re: Guest Samba shares

2020-12-10 Thread Paul M Foster
On Thu, Dec 10, 2020 at 10:09:20PM -0500, Stefan Monnier wrote:

> > Anything on a Raspberry Pi gets mounted in the /media/pi hierarchy
> > by default.
> 
> I'm pretty sure that it's not the case.  It's a matter of the OS you run
> on your Pi, not the fact that it's a Raspberry Pi.
> 
> IIUC what you're saying is that you're not running plain Debian but some
> other OS and that OS uses /media/pi by default mount things.
> 
> It's important to clarify those details here, because this is a Debian
> mailing-list, so readers like me generally presume that you're using
> Debian and not some other (presumably Debian-derivative) OS.
> 
> 
> Stefan
> 

Oops. I sent the reply without the reply. Sorry.

The Raspberry Pi (the server in this case) runs a variant of Debian,
Raspberry Pi OS. Where the disc mounts is an incidental detail. Samba,
whether on Fedora, Arch or Debian, is configured more or less the same
way. Since I've been running Debian alone for the last 20 years, this
seemed to be the best place to ask the question.

Paul

-- 
Paul M. Foster
http://noferblatz.com
http://quillandmouse.com



Re: Guest Samba shares

2020-12-10 Thread Paul M Foster
On Thu, Dec 10, 2020 at 10:09:20PM -0500, Stefan Monnier wrote:

> > Anything on a Raspberry Pi gets mounted in the /media/pi hierarchy
> > by default.
> 
> I'm pretty sure that it's not the case.  It's a matter of the OS you run
> on your Pi, not the fact that it's a Raspberry Pi.
> 
> IIUC what you're saying is that you're not running plain Debian but some
> other OS and that OS uses /media/pi by default mount things.
> 
> It's important to clarify those details here, because this is a Debian
> mailing-list, so readers like me generally presume that you're using
> Debian and not some other (presumably Debian-derivative) OS.
> 
> 
> Stefan
> 

-- 
Paul M. Foster
http://noferblatz.com
http://quillandmouse.com



Confirm your subscription for SoulwaterProductions

2020-12-10 Thread SoulwaterProductions
Howdy.

You recently signed up to follow this blog's posts. This means once you confirm 
below, you will receive each new post by email.

To activate, click Confirm Follow. If you believe this is an error, ignore this 
message and nothing more will happen.



Blog Name: SoulwaterProductions
URL: http://soulwaterproductions.com

Confirm Follow: 
https://subscribe.wordpress.com/?key=30364bd404ddb09c361d89176096cfa8&email=debian-user%40lists.debian.org&activate=9a9ea2ca0055bc811d9da351797e1cdd

If you don't want to receive these emails any more:
https://subscribe.wordpress.com/?key=30364bd404ddb09c361d89176096cfa8&email=debian-user%40lists.debian.org

If you want to see all of the blogs and posts you follow on the web in one easy
place, sign up for a WordPress.com account. 
(http://wordpress.com/signup/?ref=lof)


Re: Guest Samba shares

2020-12-10 Thread Stefan Monnier
> Anything on a Raspberry Pi gets mounted in the /media/pi hierarchy
> by default.

I'm pretty sure that it's not the case.  It's a matter of the OS you run
on your Pi, not the fact that it's a Raspberry Pi.

IIUC what you're saying is that you're not running plain Debian but some
other OS and that OS uses /media/pi by default mount things.

It's important to clarify those details here, because this is a Debian
mailing-list, so readers like me generally presume that you're using
Debian and not some other (presumably Debian-derivative) OS.


Stefan



Re: Guest Samba shares

2020-12-10 Thread Paul M Foster
On Fri, Dec 11, 2020 at 01:25:56AM +0100, deloptes wrote:

> Paul M Foster wrote:
> 
> > Any idea why contents are not showing up, and what can be done to remedy
> > this?
> 
> could be permissions on /media/pi/music ?
> 
> I use it here as domain controller - only dedicated users - not sure about
> the guest settings, but the mount point is strange. Somewhere it
> said /media is for the system to mount devices. Looks like your user 'pi'
> owns the stuff. It could be I am wrong.
> 
> Usually you debug in the smb log files. You better look inside and post
> here.
> 

For various reasons, I've set the perms on this mount as 777. Anything
on a Raspberry Pi gets mounted in the /media/pi hierarchy by default. I
couldn't see a reason to change it, if I set the permissions
appropriately.

Paul

-- 
Paul M. Foster
http://noferblatz.com
http://quillandmouse.com



Re: Help with install on old Mac

2020-12-10 Thread Bob McGowan

On 12/5/20 1:47 AM, didier gaumet wrote:

Hello

Disclaimer: I am not familiar with Apple (old or new) hardware

There is the Debian Jessie installation manual for the powerpc architecture:
  https://www.debian.org/releases/jessie/powerpc/index.html.en

the 3.6.1 section could explain why you have difficulties to boot from your 
hard disk:
  
https://www.debian.org/releases/jessie/powerpc/ch03s06.html.en#invoking-openfirmware
but the link indicated to upgrade is broken

http://gnats.netbsd.org/43952 provides an updated link:
  wget 
http://download.info.apple.com/Apple_Support_Area/Apple_Software_Updates/English-North_American/Macintosh/System/Mac_OS_X/System_Disk_Utility.smi.bin

On a side note, NetBSD, FreeBSD and OpenBSD all seem to have present version of 
their OS for the mac powerpc architecture:, NetBSD probably being the most 
advanced and supported (FreeBSD: WIP):
  http://wiki.netbsd.org/ports/macppc/

keep us informed if you have succeeded :-)



Hello Didier,

Thanks for the links.  I too had noticed some of the Debian links were 
broken.


I did try a different, smaller, USB stick for the firmware, but it did 
not help.  Plus some of the info from other pages suggested at least one 
partition name might be wrong.  So I decided to follow your suggestion 
to look into the BSD systems.


I chose NetBSD and have successfully installed it.  But again, getting 
the system to boot into it is proving a challenge.


Since I'm now using NetBSD, I'll be taking this conversation over to 
their lists.


But I may ultimately retry getting Linux up on the machine.

We'll see how it goes.

Thanks again,

Bob



Re: Guest Samba shares

2020-12-10 Thread deloptes
Paul M Foster wrote:

> Any idea why contents are not showing up, and what can be done to remedy
> this?

could be permissions on /media/pi/music ?

I use it here as domain controller - only dedicated users - not sure about
the guest settings, but the mount point is strange. Somewhere it
said /media is for the system to mount devices. Looks like your user 'pi'
owns the stuff. It could be I am wrong.

Usually you debug in the smb log files. You better look inside and post
here.





Guest Samba shares

2020-12-10 Thread Paul M Foster
I've got a Pi with a hard drive connected to it with music on it. I've
got SSH configured so I can admin the box headless. I've got FTP
configured so I can upload music. Now I'm working on Samba. My wife has
a Mac which understands Samba. She can scan the LAN on the Mac and see
the music share from the Pi. But she can't see any of the files on it.
I'd like her to be able to download (not upload) files from it without a
login. Here's my smb.conf file, condensed to show only the relevant
parts:

[global]
security = user
   workgroup = mars.lan
   server role = standalone server
   obey pam restrictions = yes
   unix password sync = yes
   passwd program = /usr/bin/passwd %u
   passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* 
%n\n *password\supdated\ssuccessfully* .
   pam password change = yes
   map to guest = bad user
   usershare allow guests = yes
[music]
comment = Music
path = /media/pi/music
browseable = yes
read only = yes
guest ok = yes
guest only = yes

Any idea why contents are not showing up, and what can be done to remedy
this?

Paul

-- 
Paul M. Foster
http://noferblatz.com
http://quillandmouse.com



Major testing issues

2020-12-10 Thread Phillip Susi
I haven't fired up my debian testing vm in a while but I did the other
day and upgraded it and now whenever X starts up, the keyboard dies.
Can't even switch back to a tty.  Booting in multi-user.target works
fine, just not graphical.target.  I thought I'd try to reinstall so I
downloaded the latest testing netinst iso and no matter which item I
choose from the boot menu, the domU just reboots.

I'm not sure how to report this as a proper bug report.



systemd (241-7~deb10u5) + tomcat9 (9.0.39-1~bpo10+1) + override.conf on a Buster 10.7

2020-12-10 Thread Patrice Duroux
Hi,

Before turning mad, any help would be welcome!

On a Buster system, I have created a
/etc/systemd/system/tomcat9.service.d/override.conf file to set a
value for ReadWritePaths.
Using a value such as /home or /src/backup/shared, tomcat9 is starting
fine and using /src/scratch/shared it does not (see the error messages
below).

Here are the commands to check each case:

systemctl daemon-reload
systemctl restart tomcat9

Here are the 'ls' outputs:

$ ls -ld /home /srv/backup /srv/backup/shared /srv/scratch /srv/scratch/shared
drwxr-xr-x 32 root   root  4096 déc.  10 14:32 /home
drwxr-xr-x  9 root   root   136 déc.   8 22:53 /srv/backup
drwxr-xr-x 13 ligmdb ligmusers  240 juin  28 16:51 /srv/backup/shared
drwxr-xr-x  5 root   root66 oct.  22 13:28 /srv/scratch
drwxr-xr-x 10 ligmdb ligmusers  173 juin  28 16:51 /srv/scratch/shared

Here are the 'mount' for those:

imgt2:/srv/data/home on /home type nfs4
(rw,relatime,vers=4.2,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=193.50.6.90,local_lock=none,addr=193.50.6.94)
imgt2:/srv/data/backup2/scratch on /srv/scratch type nfs4
(rw,relatime,vers=4.2,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=193.50.6.90,local_lock=none,addr=193.50.6.94)
imgt2:/srv/data/backup2 on /srv/backup type nfs4
(rw,relatime,vers=4.2,rsize=1048576,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,clientaddr=193.50.6.90,local_lock=none,addr=193.50.6.94)

Thanks,
Patrice

déc. 10 21:20:02 omega systemd[1]: Reloading.
déc. 10 21:20:11 omega systemd[1]: Starting Apache Tomcat 9 Web
Application Server...
-- Subject: L'unité (unit) tomcat9.service a commencé à démarrer
-- Defined-By: systemd
-- Support: https://www.debian.org/support
-- 
-- L'unité (unit) tomcat9.service a commencé à démarrer.
déc. 10 21:20:11 omega systemd[39264]: tomcat9.service: Failed to set
up mount namespacing: No such file or directory
déc. 10 21:20:11 omega systemd[39264]: tomcat9.service: Failed at step
NAMESPACE spawning /usr/libexec/tomcat9/tomcat-update-policy.sh: No
such file or directory
-- Subject: Le processus /usr/libexec/tomcat9/tomcat-update-policy.sh
n'a pas pu être exécuté
-- Defined-By: systemd
-- Support: https://www.debian.org/support
-- 
-- Le processus /usr/libexec/tomcat9/tomcat-update-policy.sh n'a pas
pu être exécuté, et a donc échoué.
-- 
-- Le code d'erreur renvoyé est ERRNO.
déc. 10 21:20:11 omega systemd[1]: tomcat9.service: Control process
exited, code=exited, status=226/NAMESPACE
-- Subject: Unit process exited
-- Defined-By: systemd
-- Support: https://www.debian.org/support
-- 
-- An ExecStartPre= process belonging to unit tomcat9.service has exited.
-- 
-- The process' exit code is 'exited' and its exit status is 226.
déc. 10 21:20:11 omega systemd[1]: tomcat9.service: Failed with result
'exit-code'.
-- Subject: Unit failed
-- Defined-By: systemd
-- Support: https://www.debian.org/support
-- 
-- The unit tomcat9.service has entered the 'failed' state with result
'exit-code'.
déc. 10 21:20:11 omega systemd[1]: Failed to start Apache Tomcat 9 Web
Application Server.
-- Subject: L'unité (unit) tomcat9.service a échoué
-- Defined-By: systemd
-- Support: https://www.debian.org/support
-- 
-- L'unité (unit) tomcat9.service a échoué, avec le résultat failed.



Re: SanDisk USB stick problem

2020-12-10 Thread Michael Stone

On Thu, Dec 10, 2020 at 10:17:41AM +0200, Andrei POPESCU wrote:

On Mi, 09 dec 20, 15:23:44, Celejar wrote:

I'm curious about this because I can't imagine that FUSE performance is
as good as native, so why would automounters pay the performance
penalty of FUSE when native mounting would seem easy enough to do?


The ntfs-3g developers claim there is no significant penalty. Testing
their claims would be difficult though, considering the kernel driver
has limited functionality.


For exfat, at least, the in-kernel driver is noticeably faster. From a 
reasonably fast drive I can get 600-700MByte/s with the kernel driver, 
and 400-500MByte/s with fuse. With a slower drive I can get about 
260MByte/s with kernel, 220MByte/s with fuse. Whether the difference is 
"significant" probably depends on how much data you're transferring and 
how long you're willing to wait.


In the past I've seen much larger differences for actual applications. I 
don't know if the fuse module has gotten faster or my quick copy test 
above doesn't adequately reflect real world performance. YMMV.




Re: SanDisk USB stick problem

2020-12-10 Thread Stefan Monnier
> been implemented by the components in Debian Bullseye. Does seem a
> little perverse though if it should be implemented just after Linux
> gains an exFAT kernel driver, a filesystem that only really exists for
> interoperability between devices (i.e. those that will be removable
> media).

FWIW, the use of exFAT for filesystems which will basically never be
disconnected is very common in Android devices.


Stefan



Re: VPN ideas

2020-12-10 Thread Celejar
On Thu, 10 Dec 2020 10:47:13 +0200
Andrei POPESCU  wrote:

> On Mi, 09 dec 20, 11:53:20, Celejar wrote:
> > 
> > As to ProtonMail, as we've discussed in the past, I'm sort of tempted,
> > but I'm not willing to give up standards based email, nor am I that
> > interested in running their proprietary (albeit apparently GPL?) bridge
> > application.
> 
> Yes, lack of IMAP/SMTP support is definitely a hassle and the bridge 
> would just ad complexity.
> 
> One thing that is difficult to replace though is their support for 
> encrypted communication with *non*subscribers.

There's apparently Open-Xchange / OX Guard - no idea how well it works
or how easy it is to set up:

https://www.wired.com/2014/09/oxguard/
https://www.oxpedia.org/wiki/index.php?title=AppSuite:Open-Xchange_Installation_Guide_for_Debian_10.0

> This is already off-topic for debian-user so I'll stop here.

This part of the discussion at least is certainly relevant to Debian,
so I'm leaving it here.

Celejar



Re: SanDisk USB stick problem

2020-12-10 Thread Celejar
On Thu, 10 Dec 2020 10:17:41 +0200
Andrei POPESCU  wrote:

> On Mi, 09 dec 20, 15:23:44, Celejar wrote:
> >
> > I'm curious about this because I can't imagine that FUSE performance is
> > as good as native, so why would automounters pay the performance
> > penalty of FUSE when native mounting would seem easy enough to do?
> 
> The ntfs-3g developers claim there is no significant penalty. Testing 
> their claims would be difficult though, considering the kernel driver 
> has limited functionality.

I'm certainly not going to dispute the ntfs-3g developers, but I had
had in mind these comments of Linus Torvald that I had just come across:

"People who think that userspace filesystems are realistic for anything
but toys are just misguided.

fuse works fine if the thing being exported is some random low-use
interface to a fundamentally slow device. But for something like your
root filesystem? Nope. Not going to happen."

https://lkml.org/lkml/2011/6/9/462

Linus sometimes exaggerates, and in any event, external USB storage
devices are (generally) somewhere in between "your root filesystem" and
"some random low-use ..."

A quick search turns up this:

https://www.usenix.org/system/files/conference/fast17/fast17-vangoor.pdf

which I haven't had a chance to read.

Celejar



Re: Permissions on NFS mounts

2020-12-10 Thread Michael Stone

On Thu, Dec 10, 2020 at 04:48:36PM +0300, Reco wrote:

I just like to remind you the original question:

Is there a way to put an account "beyond use", in any way including su,
sudo etc,

*In any way* includes the way I've described above IMO.


So you're asking if there's a way to prevent someone from using sudo to 
do something sudo has been specifically configured to do? Kind of a 
weird question, IMO. If you don't want to allow someone to sudo to a 
particular user then...don't configure sudo to allow them to do that.


Also worth pointing out that having a passwd entry isn't even relevant 
to whether root can setuid. At some point if you've provided enough rope 
then setting a bunch of artificial constraints for the sake of argument 
is just a waste of time.


# id
uid=0(root) gid=0(root) groups=0(root)
# id 1234
id: ‘1234’: no such user
# python3 -c 'import os; os.setuid(1234); os.execl("/bin/bash", "bash")'
$ id
uid=1234 gid=0(root) groups=0(root)



Re: Permissions on NFS mounts

2020-12-10 Thread Michael Stone

On Thu, Dec 10, 2020 at 10:42:36AM -0500, Greg Wooledge wrote:

In the context of the original question, having a consistent set of
local user accounts (name/UID pairs) across all of your systems in
an NFS environment is useful for making sure all files have consistent
ownership.  Even on the systems where, say, charlie will never log in,
seeing that the files in /home/charlie are owned by user "charlie" is
helpful.


It's practically impossible to sync everything on a modern system in the 
presence of dynamically allocated IDs. The best you can hope for is sync 
a certain *range* of IDs and by convention only use IDs in that range 
within NFS exports. If something outside that range happens to sneak 
into the export it'll look weird, but has no real effect on security. 
(If you're using sec=sys on an NFS mount you have no security outside of 
what the client chooses to implement.)


Historically this could be done by being diligent in manually creating 
passwd entries, via yp/nis to distribute a common passwd file, or via 
various configuration management schemes to automate local passwd file 
management. In most normal (heterogenous) environments these did only 
manage a certain range, and trying to sync system users was simply not 
done because it was harder than it was worth.




Re: Permissions on NFS mounts

2020-12-10 Thread Michael Stone

On Wed, Dec 09, 2020 at 03:38:21PM -0500, Paul M Foster wrote:

I have two users on the client: paulf 1000 and nancyf 1001. On the
server, I have two users: pi 1000 and paulf 1001. I can mount the NFS
share from the server to /mnt on my client. But any files belonging to
me (user 1001 on the server) look like they belong to nancy (user 1001
on the client. More importantly, if I copy files to this share from the
client, they will look like they belong to pi (user 1000) on the server.

Is there some way in the /etc/exports file to adjust the parameters so
that files retain my ownership on the server?


Traditional NFS depends on the uid/gid matching across all the systems 
in a tightly controlled local network. Your solution involves changing 
the IDs so they match.


The newer model for NFS depends on cryptographic authentication 
(generally kerberos) of requests rather than assuming that everything is 
trusted and consistently configured. In this model you can have the 
uid/gid be random, but you need a kerberos server.


It is theoretically possible to do uid mapping without the 
authentication component, but that's all disabled by default and I'm not 
sure how current any of the directions or even the code is. You'd need 
to set up static maps in /etc/idmapd.conf and set 
nfs4_disable_idmapping=0 on the nfsd module. Also make sure you're using 
nfs4 and not nfs3. "idmapd.conf" and "nfs4_disable_idmapping" should be 
good google keywords to find instructions.


Depending on your use case you might also find running samba and using 
cifs rather than nfs works better for you. (Or not.) It has a different 
authentication model and interface with its own pros and cons.




Re: Permissions on NFS mounts

2020-12-10 Thread Greg Wooledge
On Thu, Dec 10, 2020 at 03:35:50PM +, Tixy wrote:
> Why would you execute sudo or su on the target machine to change to one
> of these unneeded users, presumably you can do whatever mischief is
> your aim by using the account you are executing su or sudo from. Or by
> changing to another valid user on that machine if you are a legitimate
> user and were trying to cover your tracks.

If you have full sudo access, you're *already* at the top of the food
chain.  You can create a new user and switch to it.  You can delete
users.  You can lock and unlock users.  You can do literally everthing,
because you're the superuser.

Putting additional entries in the passwd file is not a security issue,
unless those entries have guessable passwords, or some other means of
logging in as them from a remote system, or from a different non-root
user account.

Additional entries in passwd are useful for *lots* of things, such as
running a service as a UID that has no other access.  They are not a
reduction in security.  Properly used, they can increase security.

In the context of the original question, having a consistent set of
local user accounts (name/UID pairs) across all of your systems in
an NFS environment is useful for making sure all files have consistent
ownership.  Even on the systems where, say, charlie will never log in,
seeing that the files in /home/charlie are owned by user "charlie" is
helpful.



Re: Permissions on NFS mounts

2020-12-10 Thread David Wright
On Thu 10 Dec 2020 at 16:48:36 (+0300), Reco wrote:
> On Thu, Dec 10, 2020 at 03:36:47PM +0200, Andrei POPESCU wrote:
> > At least on Debian sudo has to be explicitly configured to allow a 
> > regular user to use '-u' with another user name. We can only assume the 
> > admin had good reasons to that, possibly on purpose (see below).
> 
> You're correct here, one has to explicitly allow such activity in
> sudoers in Debian and just about any OS I've encountered these years
> (assuming it has sudo, of course).
> 
> I just like to remind you the original question:
> 
> Is there a way to put an account "beyond use", in any way including su,
> sudo etc,
> 
> *In any way* includes the way I've described above IMO.

The original question was almost a textbook example of the X Y problem.

The opening statement says "you'll inevitably end up with situations
where users are created on some of the machines only for the purpose
of keeping the IDs in synch", and that's wrong. So why try to solve it.
Fortunately, this statement reveals X (which would be unreported in a
true textbook example).

Your reminder of the "original question" just quotes part of Mark's
attempted solution to problem Y, namely creating an account that's
barred. The answer to the real "original question" is to avoid
creating those accounts at all—then there's no need to bar them.

Cheers,
David.



Re: Permissions on NFS mounts

2020-12-10 Thread Tixy
On Thu, 2020-12-10 at 16:48 +0300, Reco wrote:
> On Thu, Dec 10, 2020 at 03:36:47PM +0200, Andrei POPESCU wrote:
> > On Jo, 10 dec 20, 13:34:55, Reco wrote:
> > > On Thu, Dec 10, 2020 at 12:07:54PM +0200, Andrei POPESCU wrote:
> > > > On Jo, 10 dec 20, 12:52:56, Reco wrote:
> > > > > On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU
> > > > > wrote:
> > > > > > passwd -l/--lock 
> > > > > 
> > > > > sudo -u  /bin/bash -i
> > > > > 
> > > > > That little trick defeats "locked" account status, an absence
> > > > > of a
> > > > > password and even /usr/sbin/nologin set as a default shell.
> > > > 
> > > > With sudo access one can also unlock the account as well, so
> > > > how is this 
> > > > relevant?
> > > 
> > > Of course it's relevant. The whole point of sudo is to be a
> > > controlled
> > > privilege escalation mechanism.
> > > I.e. you can grant an ordinary user A to execute a certain
> > > binaries with
> > > certain arguments as a different ordinary user B, *and* you do
> > > not have
> > > to provide an ordinary user A an access to root.
> > 
> > At least on Debian sudo has to be explicitly configured to allow a 
> > regular user to use '-u' with another user name. We can only assume
> > the 
> > admin had good reasons to that, possibly on purpose (see below).
> 
> You're correct here, one has to explicitly allow such activity in
> sudoers in Debian and just about any OS I've encountered these years
> (assuming it has sudo, of course).
> 
> I just like to remind you the original question:
> 
> Is there a way to put an account "beyond use", in any way including
> su,
> sudo etc,

Which, IMO, is a rather bogus question in the context that preceded
that question, namely "having unneeded users on a given machine could
be a security threat, at least in the sense that it provides a greater
than necessary attackable surface area"

Why would you execute sudo or su on the target machine to change to one
of these unneeded users, presumably you can do whatever mischief is
your aim by using the account you are executing su or sudo from. Or by
changing to another valid user on that machine if you are a legitimate
user and were trying to cover your tracks.

-- 
Tixy




Re: Select which system to boot while rebooting

2020-12-10 Thread Anssi Saari
PstrfZ  writes:

> On the same machine I need to host three operating systems, all
>  debian-based.  Is it possible to select which system to boot
>  while rebooting? (My intent is then to reboot the selected system
>  by sending the command via SSH)

Yes, I do this a lot in a script which hibernates Debian and reboots the
system to Windows. Part of this process selecting the OS to boot for the
next reboot only. So for my system that command is actually

grub-reboot osprober-chain-5482E5003C6F80FB

The osprober string I dug out from /boot/grub/grub.cfg. The osprober
string handy in that it doesn't change that often while the name of the
OS sometimes does.



Re: Permissions on NFS mounts

2020-12-10 Thread Reco
On Thu, Dec 10, 2020 at 03:36:47PM +0200, Andrei POPESCU wrote:
> On Jo, 10 dec 20, 13:34:55, Reco wrote:
> > On Thu, Dec 10, 2020 at 12:07:54PM +0200, Andrei POPESCU wrote:
> > > On Jo, 10 dec 20, 12:52:56, Reco wrote:
> > > > On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU wrote:
> > > > > 
> > > > > passwd -l/--lock 
> > > > 
> > > > sudo -u  /bin/bash -i
> > > > 
> > > > That little trick defeats "locked" account status, an absence of a
> > > > password and even /usr/sbin/nologin set as a default shell.
> > > 
> > > With sudo access one can also unlock the account as well, so how is this 
> > > relevant?
> > 
> > Of course it's relevant. The whole point of sudo is to be a controlled
> > privilege escalation mechanism.
> > I.e. you can grant an ordinary user A to execute a certain binaries with
> > certain arguments as a different ordinary user B, *and* you do not have
> > to provide an ordinary user A an access to root.
> 
> At least on Debian sudo has to be explicitly configured to allow a 
> regular user to use '-u' with another user name. We can only assume the 
> admin had good reasons to that, possibly on purpose (see below).

You're correct here, one has to explicitly allow such activity in
sudoers in Debian and just about any OS I've encountered these years
(assuming it has sudo, of course).

I just like to remind you the original question:

Is there a way to put an account "beyond use", in any way including su,
sudo etc,

*In any way* includes the way I've described above IMO.


> > Also, passwd(1):
> > 
> >   -l, --lock
> >Note that this does not disable the account. The user may still
> > be able to login using another authentication token (e.g. an SSH key).
> > To disable the account, administrators should use usermod --expiredate 1
> > (this set the account's expire date to Jan 2, 1970).  Users with a
> > locked password are not allowed to change their password.
> 
> As I said, there are limitations, that may or may not be desired, e.g. 
> I'm using the SSH access option, because 'systemctl --user' doesn't work 
> via 'sudo -u' (and it's a remote system anyway).

It can, it's just inconveniencely (sp?) annoying.
I.e. you have to make sure that dbus-daemon is running as a target user
and you have to set DBUS_SESSION_ADDRESS to a right value, and about the
only way to get that right value is to look at
/proc//environ.
Whoever thought it's a good idea to couple systemctl and dbus deserves
something really bad happening to them.

Reco



Re: Permissions on NFS mounts

2020-12-10 Thread Andrei POPESCU
On Jo, 10 dec 20, 13:34:55, Reco wrote:
> On Thu, Dec 10, 2020 at 12:07:54PM +0200, Andrei POPESCU wrote:
> > On Jo, 10 dec 20, 12:52:56, Reco wrote:
> > > On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU wrote:
> > > > 
> > > > passwd -l/--lock 
> > > 
> > > sudo -u  /bin/bash -i
> > > 
> > > That little trick defeats "locked" account status, an absence of a
> > > password and even /usr/sbin/nologin set as a default shell.
> > 
> > With sudo access one can also unlock the account as well, so how is this 
> > relevant?
> 
> Of course it's relevant. The whole point of sudo is to be a controlled
> privilege escalation mechanism.
> I.e. you can grant an ordinary user A to execute a certain binaries with
> certain arguments as a different ordinary user B, *and* you do not have
> to provide an ordinary user A an access to root.

At least on Debian sudo has to be explicitly configured to allow a 
regular user to use '-u' with another user name. We can only assume the 
admin had good reasons to that, possibly on purpose (see below).

It's probably unpractical to consider all ways in which the admin can 
compromise the security of the system.
 
> Also, passwd(1):
> 
>   -l, --lock
>  Note that this does not disable the account. The user may still
> be able to login using another authentication token (e.g. an SSH key).
> To disable the account, administrators should use usermod --expiredate 1
> (this set the account's expire date to Jan 2, 1970).  Users with a
> locked password are not allowed to change their password.

As I said, there are limitations, that may or may not be desired, e.g. 
I'm using the SSH access option, because 'systemctl --user' doesn't work 
via 'sudo -u' (and it's a remote system anyway).

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread tomas
On Thu, Dec 10, 2020 at 10:12:50AM +, Tixy wrote:
> On Thu, 2020-12-10 at 10:56 +0100, to...@tuxteam.de wrote:

> > I think the tencency is to mount untrusted file systems over FUSE,
[...]
> > due to the realisation that file system code wasn't designed with
> > malicious file system images in mind (remember? the time that code
> > got written, you had one hard disk firmly screwed into your beige
> > box computer), and on the hope that something exploding in user
> > space might be less devastating that having it explode in kernel
> > space...
> 
> I can see there is good reasoning in that, perhaps that reasoning has
> been implemented by the components in Debian Bullseye. Does seem a
> little perverse though if it should be implemented just after Linux
> gains an exFAT kernel driver, a filesystem that only really exists for
> interoperability between devices (i.e. those that will be removable
> media).

I'd think exFAT lands as well in libguestfs, where it can be used
by FUSE. Code is, after all, code ;-)

Cheers
 - t


signature.asc
Description: Digital signature


Re: SanDisk USB stick problem

2020-12-10 Thread Greg Wooledge
On Thu, Dec 10, 2020 at 08:15:05PM +1100, David wrote:
> On Thu, 10 Dec 2020 at 19:35, Joe  wrote:
> > On Thu, 10 Dec 2020 08:26:40 + Tixy  wrote:
> 
> > > Sorry, I don't understand what you mean by 'Linux partitions'.
> 
> > Partitions containing Linux filesystems.

That's what we are talking about, yes.

> I understand a 'Linux partition' to be one that has a
> partition ID = 83h as discussed here:

My understanding is ye olde partition type ID numbers are basically
irrelevant comments at this point.  You can set them so that you see a
nice human-readable type name when you run "fdisk -l" or the equivalent,
but it's not actually used for anything.  You could have a Linux ext4
file system on a partition that's marked as type "Microsoft basic data"
or anything else.



Re: Select which system to boot while rebooting

2020-12-10 Thread Joe
On Thu, 10 Dec 2020 10:29:02 +0100 (GMT+01:00)
PstrfZ  wrote:

> On the same machine I need to host three operating systems, all
>  debian-based.  Is it possible to select which system to boot
>  while rebooting? (My intent is then to reboot the selected system
>  by sending the command via SSH)
> 

In addition to the other replies about grub, if your machine uses UEFI
booting, the efibootmgr utility can set the next boot OS, and on some
machines (e.g. not my Acer netbook) can set the default boot OS.

-- 
Joe



Re: Permissions on NFS mounts

2020-12-10 Thread Darac Marjal

On 10/12/2020 09:10, Mark Fletcher wrote:
> On Wed, Dec 09, 2020 at 03:54:10PM -0500, Dan Ritter wrote:
>> Paul M Foster wrote: 
>>> I have two users on the client: paulf 1000 and nancyf 1001. On the
>>> server, I have two users: pi 1000 and paulf 1001. I can mount the NFS
>>> share from the server to /mnt on my client. But any files belonging to
>>> me (user 1001 on the server) look like they belong to nancy (user 1001
>>> on the client. More importantly, if I copy files to this share from the
>>> client, they will look like they belong to pi (user 1000) on the server.
>>>
>>> Is there some way in the /etc/exports file to adjust the parameters so
>>> that files retain my ownership on the server?
>> You're looking for userid mapping, handled by idmapd.
>>
>> Your best long-term solution is to make the userids consistent
>> across machines by making a decision about who will be 1000, 
>> 1001 and 1002, and then changing /etc/passwd and running
>> suitable "chown -R" commands, probably followed by find
>> commands.
>>
>> Debian automatically starts user numbering at 1000, so it's a
>> good idea to have a consistent install username, if you can
>> arrange it.
>>
>
> This brings up an interesting thought. In the situation where you align 
> user IDs across a number of machines for ths purpose, you'll inevitably 
> end up with situations where users are created on some of the machines 
> only for the purpose of keeping the IDs in synch so they can all play 
> nice with the NFS. Left alone, having unneeded users on a given machine 
> could be a security threat, at least in the sense that it provides a 
> greater than necessary attackable surface area. What can be done about 
> that? Obviously one thing would be setting the shell to /dev/null in the 
> password file of those machines that don't need a given user, to prevent 
> interactive logins. What else could be done? Is there a way to put an 
> account "beyond use", in any way including su, sudo etc, while still 
> having the machine recognise the user for being a user and therefore not 
> messing up the mapping of user IDs on shared resources like NFS? In 
> other words, create the sense of "yes this user exists, but they are not 
> welcome here"?

If you're getting to the stage of managing multiple users over multiple
machines, then you probably want to look at a central identity
management solution. That could be as simple as NIS, or OpenLDAP or if
you things a bit more "boxed up", FreeIPA. I have several computers (a
mixture of physical and virtual) at home and just two humans, but
FreeIPA allows us to define our users once (username/password/etc) and
have that user able to log onto any FreeIPA-joined PC. Users can be
added to groups, they can even be granted permissions using the RBAC and
HBAC capabilities of FreeIPA (Role- and Host-base Access Control).





OpenPGP_signature
Description: OpenPGP digital signature


Re: Select which system to boot while rebooting

2020-12-10 Thread didier gaumet
Le jeudi 10 décembre 2020 à 10:50:06 UTC+1, PstrfZ a écrit :
> On the same machine I need to host three operating systems, all 
> debian-based. Is it possible to select which system to boot 
> while rebooting? (My intent is then to reboot the selected system 
> by sending the command via SSH)

Hello,

look at the grub-reboot comand



Re: Select which system to boot while rebooting

2020-12-10 Thread Reco
Hi.

On Thu, Dec 10, 2020 at 01:46:18PM +0300, Reco wrote:
> On Thu, Dec 10, 2020 at 11:12:37AM +0100, to...@tuxteam.de wrote:
> > On Thu, Dec 10, 2020 at 12:00:20PM +0200, Andrei POPESCU wrote:
> > 
> > [...]
> > 
> > > 2. As far as I recall grub1 has a 'grub set-default' or similar command 
> > > that could be used for to change the default for the next boot only[b]. 
> > > Maybe this was re-implemented also in grub2?
> > 
> > It seems so (note version 2.02+... at man page's footer). Since it's
> > short and sweet, I take the liberty to include its man page here, as
> > a special broadcast service :-)
> > 
> > 
> > GRUB-SET-DEFAULT(8)   System Administration Utilities   GRUB-SET-DEFAULT(8)
> 
> Please note that it's required to supply GRUB_DISABLE_SUBMENU=true
> option before using grub-set-default, Debian supports it, but does not
> use it by default.
> Things get really weird with grub-set-default unless you use
> GRUB_DISABLE_SUBMENU=true.

A correction - GRUB_DISABLE_SUBMENU=true should be put into
/etc/default/grub.

Reco



Re: Select which system to boot while rebooting

2020-12-10 Thread Reco
Hi.

On Thu, Dec 10, 2020 at 11:12:37AM +0100, to...@tuxteam.de wrote:
> On Thu, Dec 10, 2020 at 12:00:20PM +0200, Andrei POPESCU wrote:
> 
> [...]
> 
> > 2. As far as I recall grub1 has a 'grub set-default' or similar command 
> > that could be used for to change the default for the next boot only[b]. 
> > Maybe this was re-implemented also in grub2?
> 
> It seems so (note version 2.02+... at man page's footer). Since it's
> short and sweet, I take the liberty to include its man page here, as
> a special broadcast service :-)
> 
> 
> GRUB-SET-DEFAULT(8)   System Administration Utilities   GRUB-SET-DEFAULT(8)

Please note that it's required to supply GRUB_DISABLE_SUBMENU=true
option before using grub-set-default, Debian supports it, but does not
use it by default.
Things get really weird with grub-set-default unless you use
GRUB_DISABLE_SUBMENU=true.

Reco



Re: Permissions on NFS mounts

2020-12-10 Thread Reco
On Thu, Dec 10, 2020 at 12:07:54PM +0200, Andrei POPESCU wrote:
> On Jo, 10 dec 20, 12:52:56, Reco wrote:
> > On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU wrote:
> > > 
> > > passwd -l/--lock 
> > 
> > sudo -u  /bin/bash -i
> > 
> > That little trick defeats "locked" account status, an absence of a
> > password and even /usr/sbin/nologin set as a default shell.
> 
> With sudo access one can also unlock the account as well, so how is this 
> relevant?

Of course it's relevant. The whole point of sudo is to be a controlled
privilege escalation mechanism.
I.e. you can grant an ordinary user A to execute a certain binaries with
certain arguments as a different ordinary user B, *and* you do not have
to provide an ordinary user A an access to root.

Also, passwd(1):

  -l, --lock
   Note that this does not disable the account. The user may still
be able to login using another authentication token (e.g. an SSH key).
To disable the account, administrators should use usermod --expiredate 1
(this set the account's expire date to Jan 2, 1970).  Users with a
locked password are not allowed to change their password.

Reco



Re: running microsoft team on debian 10.3

2020-12-10 Thread Keith Bainbridge

On 9/12/20 3:26 pm, Stefan Monnier wrote:

https://askubuntu.com/questions/889164/use-phone-as-microphone-in-linux


This looks interesting, indeed (tho Plumble is not maintained any more
AFAICT, you might be able to use Mumla instead, also available from F-Droid).


https://www.bytesin.com/how-to-use-your-phone-as-a-webcam-on-windows-linux-and-macos/


AFAICT these are all proprietary software, so I wouldn't recommend them.


 Stefan



Thanks Stefan for the update

Hoping I'm not duplicating - but better than not saying thanks, huh.

--
Keith Bainbridge

ke1thozgro...@gmx.com



Re: SanDisk USB stick problem

2020-12-10 Thread Tixy
On Thu, 2020-12-10 at 10:56 +0100, to...@tuxteam.de wrote:
> On Thu, Dec 10, 2020 at 09:00:39AM +, Tixy wrote:
> > On Thu, 2020-12-10 at 08:53 +, Tixy wrote:
> > > Perhaps your USB stick is formatted with exFAT (which only gained
> > > kernel support this year) and me and Celejar are using older
> > > FAT/VFAT/FAT32 (I am). That would explain our different
> > > experiences
> > > with fuse getting involved.
> > 
> > I just saw from you other replies that you're on Debian unstable,
> > so
> > your kernel does have exFAT support. There must be something more
> > complicated going on then for your system to chose to use fuse to
> > mount
> > the USB stick.
> 
> I think the tencency is to mount untrusted file systems over FUSE,
> due to the realisation that file system code wasn't designed with
> malicious file system images in mind (remember? the time that code
> got written, you had one hard disk firmly screwed into your beige
> box computer), and on the hope that something exploding in user
> space might be less devastating that having it explode in kernel
> space...

I can see there is good reasoning in that, perhaps that reasoning has
been implemented by the components in Debian Bullseye. Does seem a
little perverse though if it should be implemented just after Linux
gains an exFAT kernel driver, a filesystem that only really exists for
interoperability between devices (i.e. those that will be removable
media).

-- 
Tixy



Re: Select which system to boot while rebooting

2020-12-10 Thread tomas
On Thu, Dec 10, 2020 at 12:00:20PM +0200, Andrei POPESCU wrote:

[...]

> 2. As far as I recall grub1 has a 'grub set-default' or similar command 
> that could be used for to change the default for the next boot only[b]. 
> Maybe this was re-implemented also in grub2?

It seems so (note version 2.02+... at man page's footer). Since it's
short and sweet, I take the liberty to include its man page here, as
a special broadcast service :-)


GRUB-SET-DEFAULT(8)   System Administration Utilities   GRUB-SET-DEFAULT(8)

NAME
  grub-set-default - set the saved default boot entry for GRUB

SYNOPSIS
  grub-set-default [OPTION] MENU_ENTRY

DESCRIPTION
  Set the default boot menu entry for GRUB.  This requires setting
  GRUB_DEFAULT=saved in /etc/default/grub.

  -h, --help
print this message and exit

  -V, --version
print the version information and exit

  --boot-directory=DIR
expect GRUB images under the directory DIR/grub instead of the
/boot/grub directory

  MENU_ENTRY is a number, a menu item title or a menu item identifier.

REPORTING BUGS
  Report bugs to .

SEE ALSO
  grub-reboot(8), grub-editenv(1)

  The full documentation for grub-set-default is maintained as a Texinfo
  manual.  If the info and grub-set-default programs are properly installed
  at your site, the command

info grub-set-default

  should give you access to the complete manual.

grub-set-default (GRUB) 2.02+dfsg1-20+deb10u2  July 2020   GRUB-SET-DEFAULT(8)





signature.asc
Description: Digital signature


Re: Permissions on NFS mounts

2020-12-10 Thread Andrei POPESCU
On Jo, 10 dec 20, 12:52:56, Reco wrote:
> On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU wrote:
> > 
> > passwd -l/--lock 
> 
> sudo -u  /bin/bash -i
> 
> That little trick defeats "locked" account status, an absence of a
> password and even /usr/sbin/nologin set as a default shell.

With sudo access one can also unlock the account as well, so how is this 
relevant?

As I already hinted, the 'locked' status has another limitation that may 
or may not be desired, depending on use case.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: Select which system to boot while rebooting

2020-12-10 Thread Andrei POPESCU
On Jo, 10 dec 20, 10:29:02, PstrfZ wrote:
> On the same machine I need to host three operating systems, all
>  debian-based.  Is it possible to select which system to boot
>  while rebooting? (My intent is then to reboot the selected system
>  by sending the command via SSH)
 
1. Change the default in /boot/grub/grup.cfg[a] before rebooting.

2. As far as I recall grub1 has a 'grub set-default' or similar command 
that could be used for to change the default for the next boot only[b]. 
Maybe this was re-implemented also in grub2?

[a] path and filename is from memory, it's been a while since using 
grub2
[b] useful in combination with a cron script to reboot the system after 
some delay, e.g. if one messed up the network configuration for a remote 
system.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread tomas
On Thu, Dec 10, 2020 at 09:00:39AM +, Tixy wrote:
> On Thu, 2020-12-10 at 08:53 +, Tixy wrote:
> > Perhaps your USB stick is formatted with exFAT (which only gained
> > kernel support this year) and me and Celejar are using older
> > FAT/VFAT/FAT32 (I am). That would explain our different experiences
> > with fuse getting involved.
> 
> I just saw from you other replies that you're on Debian unstable, so
> your kernel does have exFAT support. There must be something more
> complicated going on then for your system to chose to use fuse to mount
> the USB stick.

I think the tencency is to mount untrusted file systems over FUSE,
due to the realisation that file system code wasn't designed with
malicious file system images in mind (remember? the time that code
got written, you had one hard disk firmly screwed into your beige
box computer), and on the hope that something exploding in user
space might be less devastating that having it explode in kernel
space...

For a rough impression, cf. e.g. here [1]

It's a timid first step to remove one of those skeletons from beneath
the bed (or a move towards a microkernel, depending on your current
mood ;-)

Cheers

[1] https://lwn.net/ml/linux-kernel/20180523234114.ga3...@thunk.org/

 - t


signature.asc
Description: Digital signature


Re: Permissions on NFS mounts

2020-12-10 Thread Reco
Hi.

On Thu, Dec 10, 2020 at 11:46:02AM +0200, Andrei POPESCU wrote:
> > Left alone, having unneeded users on a given machine could be a 
> > security threat, at least in the sense that it provides a greater than 
> > necessary attackable surface area. What can be done about that? 
> > Obviously one thing would be setting the shell to /dev/null in the 
> > password file of those machines that don't need a given user, to 
> > prevent interactive logins. What else could be done? Is there a way to 
> > put an account "beyond use", in any way including su, sudo etc, while 
> > still having the machine recognise the user for being a user and 
> > therefore not messing up the mapping of user IDs on shared resources 
> > like NFS? In other words, create the sense of "yes this user exists, 
> > but they are not welcome here"?
> 
> passwd -l/--lock 

sudo -u  /bin/bash -i

That little trick defeats "locked" account status, an absence of a
password and even /usr/sbin/nologin set as a default shell.

Reco



Re: Permissions on NFS mounts

2020-12-10 Thread Reco
Hi.

On Thu, Dec 10, 2020 at 09:10:42AM +, Mark Fletcher wrote:
> This brings up an interesting thought. In the situation where you align 
> user IDs across a number of machines for ths purpose, you'll inevitably 
> end up with situations where users are created on some of the machines 
> only for the purpose of keeping the IDs in synch so they can all play 
> nice with the NFS.

But why? useradd has "-u" flag for ages, all that's required is to
supply an appropriate number for uid.
You just create user(s) which are supposed to be on this host with the
needed uid (maybe - gids), and do not create those you don't need.


> Left alone, having unneeded users on a given machine 
> could be a security threat, at least in the sense that it provides a 
> greater than necessary attackable surface area. What can be done about 
> that? Obviously one thing would be setting the shell to /dev/null in the 
> password file of those machines that don't need a given user, to prevent 
> interactive logins.

Current fashion is to use /usr/sbin/nologin for such accounts. But
that's solving the problem one should not have in the first place.

As for sudo and others - there's only proper one solution for such
"unwelcome" users, and it's called userdel.

Reco



Select which system to boot while rebooting

2020-12-10 Thread PstrfZ
On the same machine I need to host three operating systems, all
 debian-based.  Is it possible to select which system to boot
 while rebooting? (My intent is then to reboot the selected system
 by sending the command via SSH)



Re: Permissions on NFS mounts

2020-12-10 Thread Andrei POPESCU
On Jo, 10 dec 20, 09:10:42, Mark Fletcher wrote:
> 
> This brings up an interesting thought. In the situation where you align 
> user IDs across a number of machines for ths purpose, you'll inevitably 
> end up with situations where users are created on some of the machines 
> only for the purpose of keeping the IDs in synch so they can all play 
> nice with the NFS.

adduser --uid 1234 

As far as I know the user creation step can be skipped in the Debian 
Installer, if for any reason uid 1000 is to remain unallocated, 
otherwise just use debootstrap/mmdebstrap instead.

> Left alone, having unneeded users on a given machine could be a 
> security threat, at least in the sense that it provides a greater than 
> necessary attackable surface area. What can be done about that? 
> Obviously one thing would be setting the shell to /dev/null in the 
> password file of those machines that don't need a given user, to 
> prevent interactive logins. What else could be done? Is there a way to 
> put an account "beyond use", in any way including su, sudo etc, while 
> still having the machine recognise the user for being a user and 
> therefore not messing up the mapping of user IDs on shared resources 
> like NFS? In other words, create the sense of "yes this user exists, 
> but they are not welcome here"?

passwd -l/--lock 

See 'man passwd' for details, limitations and alternatives.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: Ipv6, but no Ipv4 after reboot

2020-12-10 Thread Andrei POPESCU
On Jo, 10 dec 20, 11:26:59, Andrei POPESCU wrote:
> On Mi, 09 dec 20, 19:01:55, Dominique Dumont wrote:
> > 
> > After boot, NetworkManager lists 2 eno2 interface:
> > - one created at boot time with Ipv6 and no DNS (even though 
> > /etc/resolv.conf 
> > contains the dns entries given by dhcp)
> > - one configured before which requires Ipv4 
> 
> There can only be one 'eno2' network interface and that is handled by 
> the kernel and udev.
> 
> What you are seeing is two Network Manager "connections" (as in 
> configurations) one with 'connection.interface-name: eno2' and one with 
> 'connection.interface-name: --'.
> 
> This could be the source of your problems. My suggestion would be to 
> delete both connections, and create a new one from scratch.

More in detail, at start Network Manager is using one connection and on 
reconnect the other (compare the 'connection.uuid').

Also, only one of the connections has 'connection.autoconnect: yes' (the 
one without interface name).

> You might want to use some other name for it than 'eno2', e.g. 
> something like 'wired' or 'home'.
> 
> This will prevent any confusion with the interface name (what if it 
> changes?) and it's also easier to distinguish between different 
> configurations, e.g. in case you ever need to have a 'work' connection 
> or so with different settings.

And make troubleshooting easier :)

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: Ipv6, but no Ipv4 after reboot

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 19:01:55, Dominique Dumont wrote:
> 
> After boot, NetworkManager lists 2 eno2 interface:
> - one created at boot time with Ipv6 and no DNS (even though /etc/resolv.conf 
> contains the dns entries given by dhcp)
> - one configured before which requires Ipv4 

There can only be one 'eno2' network interface and that is handled by 
the kernel and udev.

What you are seeing is two Network Manager "connections" (as in 
configurations) one with 'connection.interface-name: eno2' and one with 
'connection.interface-name: --'.

This could be the source of your problems. My suggestion would be to 
delete both connections, and create a new one from scratch.

You might want to use some other name for it than 'eno2', e.g. something 
like 'wired' or 'home'.

This will prevent any confusion with the interface name (what if it 
changes?) and it's also easier to distinguish between different 
configurations, e.g. in case you ever need to have a 'work' connection 
or so with different settings.

Hope this helps,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread David
On Thu, 10 Dec 2020 at 19:35, Joe  wrote:
> On Thu, 10 Dec 2020 08:26:40 + Tixy  wrote:

> > Sorry, I don't understand what you mean by 'Linux partitions'.

> Partitions containing Linux filesystems.

I understand a 'Linux partition' to be one that has a
partition ID = 83h as discussed here:
https://en.wikipedia.org/wiki/Partition_type#PID_83h



Re: Permissions on NFS mounts

2020-12-10 Thread Mark Fletcher
On Wed, Dec 09, 2020 at 03:54:10PM -0500, Dan Ritter wrote:
> Paul M Foster wrote: 
> > I have two users on the client: paulf 1000 and nancyf 1001. On the
> > server, I have two users: pi 1000 and paulf 1001. I can mount the NFS
> > share from the server to /mnt on my client. But any files belonging to
> > me (user 1001 on the server) look like they belong to nancy (user 1001
> > on the client. More importantly, if I copy files to this share from the
> > client, they will look like they belong to pi (user 1000) on the server.
> > 
> > Is there some way in the /etc/exports file to adjust the parameters so
> > that files retain my ownership on the server?
> 
> You're looking for userid mapping, handled by idmapd.
> 
> Your best long-term solution is to make the userids consistent
> across machines by making a decision about who will be 1000, 
> 1001 and 1002, and then changing /etc/passwd and running
> suitable "chown -R" commands, probably followed by find
> commands.
> 
> Debian automatically starts user numbering at 1000, so it's a
> good idea to have a consistent install username, if you can
> arrange it.
> 


This brings up an interesting thought. In the situation where you align 
user IDs across a number of machines for ths purpose, you'll inevitably 
end up with situations where users are created on some of the machines 
only for the purpose of keeping the IDs in synch so they can all play 
nice with the NFS. Left alone, having unneeded users on a given machine 
could be a security threat, at least in the sense that it provides a 
greater than necessary attackable surface area. What can be done about 
that? Obviously one thing would be setting the shell to /dev/null in the 
password file of those machines that don't need a given user, to prevent 
interactive logins. What else could be done? Is there a way to put an 
account "beyond use", in any way including su, sudo etc, while still 
having the machine recognise the user for being a user and therefore not 
messing up the mapping of user IDs on shared resources like NFS? In 
other words, create the sense of "yes this user exists, but they are not 
welcome here"?

Mark



Re: SanDisk USB stick problem [solved]

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 19:47:14, Joe wrote:
> 
> I believe a mount point will always be owned by root, regardless of the
> permissions of the underlying directory, 

Nitpick: in the relevant documentation a "mount point" is the underlying 
directory.

You're probably referring to the filesystem's root directory. Its 
permissions are managed the same as any other directory for "native" 
filesystems (ext*, xfs, etc.) and via mount options for FAT and NTFS.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread Tixy
On Thu, 2020-12-10 at 08:53 +, Tixy wrote:
> Perhaps your USB stick is formatted with exFAT (which only gained
> kernel support this year) and me and Celejar are using older
> FAT/VFAT/FAT32 (I am). That would explain our different experiences
> with fuse getting involved.

I just saw from you other replies that you're on Debian unstable, so
your kernel does have exFAT support. There must be something more
complicated going on then for your system to chose to use fuse to mount
the USB stick.

-- 
Tixy



Re: SanDisk USB stick problem

2020-12-10 Thread Tixy
On Thu, 2020-12-10 at 08:35 +, Joe wrote:
> On Thu, 10 Dec 2020 08:26:40 +
> Tixy  wrote:
> 
> 
> > Sorry, I don't understand what you mean by 'Linux partitions'. 
> 
> Partitions containing Linux filesystems.

OK, I guess you really meant filesystems supported by the Linux kernel,
because we're all talking about FAT here which certainly isn't a Linux
filesystems ;-)

Perhaps your USB stick is formatted with exFAT (which only gained
kernel support this year) and me and Celejar are using older
FAT/VFAT/FAT32 (I am). That would explain our different experiences
with fuse getting involved.

-- 
Tixy



Re: VPN ideas

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 11:53:20, Celejar wrote:
> 
> As to ProtonMail, as we've discussed in the past, I'm sort of tempted,
> but I'm not willing to give up standards based email, nor am I that
> interested in running their proprietary (albeit apparently GPL?) bridge
> application.

Yes, lack of IMAP/SMTP support is definitely a hassle and the bridge 
would just ad complexity.

One thing that is difficult to replace though is their support for 
encrypted communication with *non*subscribers.

> > I still have my contacts on Gmail, because of the convenient integration 
> > with Android, though I'd like to migrate those away as well at some 
> > point.

And some of my calendar, will migrate that to ProtonMail as well, as 
soon as the (limited) free calendar is available (currently still in 
beta and only for paying customers).

For the avoidance of doubt, I'm not affiliated with ProtonMail in any 
way, I'm just quite happy with their free services and their stance on 
privacy and freedom (including free software).

> At this point, I pretty much use Gmail only for public list traffic
> (although my other email accounts are also with (other) free services).
> I keep thinging I really should go with either one of the inexpensive,
> dedicated email providers (like Newsguy that John Hasler
> often recommends) or a self-hosting solution (but I'm scared of the
> apparently enormous hassle necessary to ensure reliable delivery, etc.).

Similar thoughts here, though I'm rather interested in Kolab Now.

This is already off-topic for debian-user so I'll stop here.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread Joe
On Thu, 10 Dec 2020 08:26:40 +
Tixy  wrote:


> 
> Sorry, I don't understand what you mean by 'Linux partitions'. 

Partitions containing Linux filesystems.

-- 
Joe



Re: SanDisk USB stick problem

2020-12-10 Thread Tixy
On Wed, 2020-12-09 at 20:34 +, Joe wrote:
> On Wed, 9 Dec 2020 15:23:44 -0500
> Celejar  wrote:
> 
[...]
> > Interesting. I haven't been using automounting, but I just enabled
> > Xfce's native automounting (Thunar / Edit / Preferences / Advanced
> > /
> > Volume Management:Configure / Mount removable drives when hot-
> > plugged)
> > and stuck in a flash drive. It gets mounted and I don't see any
> > FUSE
> > involved:
> > 
> > ~$ mount | grep sdb
> > /dev/sdb on /media//disk type vfat
> > (rw,nosuid,nodev,relatime,uid=1000,gid=1000,fmask=0022,dmask=0022,c
> > odepage=437,iocharset=ascii,shortname=mixed,showexec,utf8,flush,err
> > ors=remount-ro,uhelper=udisks2)
> > 
> > ~$ mount | grep fuse
> > fusectl on /sys/fs/fuse/connections type fusectl
> > (rw,nosuid,nodev,noexec,relatime) portal on /run/user/1000/doc type
> > fuse.portal (rw,nosuid,nodev,relatime,user_id=1000,group_id=1000)
> > 
> > I'm curious about this because I can't imagine that FUSE
> > performance
> > is as good as native, so why would automounters pay the performance
> > penalty of FUSE when native mounting would seem easy enough to do?
> > 
> 
> With a quick trial, it depends on the filesystem. Many of my USB
> sticks
> are FAT for portability, but they get mounted as fuseblk rather than
> fat or vfat.

How are you mounting them? On Buster with LXDE desktop, USB sticks with
FAT filesystems don't get mounted by the GUI using fuse. I.e. my
experience matches Celejar's.

>  Linux partitions are indeed mounted natively.

Sorry, I don't understand what you mean by 'Linux partitions'. The only
two partitioning schemes I'm aware of are MBR and GPT neither of which
are Linux specific. And I can't see how the partitioning scheme would
affect how a FAT filesystem is mounted.

-- 
Tixy 



Re: SanDisk USB stick problem

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 19:10:42, Joe wrote:
> 
> I haven't investigated it thoroughly, but when I have casually checked
> what is mounted, I see that any USB sticks plugged in are on fuse. Xfce
> on sid, no usbmount, automounting done by systemd, by the way.

That is likely to happen for NTFS, because the kernel driver has no (or 
very limited?) write support.

For other filesystems the burden of proof is on you :)

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: SanDisk USB stick problem

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 15:23:44, Celejar wrote:
>
> I'm curious about this because I can't imagine that FUSE performance is
> as good as native, so why would automounters pay the performance
> penalty of FUSE when native mounting would seem easy enough to do?

The ntfs-3g developers claim there is no significant penalty. Testing 
their claims would be difficult though, considering the kernel driver 
has limited functionality.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature


Re: VPN ideas

2020-12-10 Thread Andrei POPESCU
On Mi, 09 dec 20, 19:06:27, Joe wrote:
> 
> It's not more secure, (apart from using wifi only occasionally) but the
> kind of people looking at other peoples' network activities are more
> likely to target public wifi than to sit outside my house. It will
> require significantly more resources and risk to tap into an ISP cable
> than to sit in a cafe somewhere with a laptop (running Linux) and some
> black hat software.

Apparently you are assuming that in order to compromise your internet 
connection (spy, subvert, etc.) one has to physically tap into the cable 
between the ISP and your premises.

As far as I understand (from my limited knowledge of networking and 
security) this would indeed make some (class of) attacks easier, but is 
*not* a strict requirement.

Kind regards,
Andrei
-- 
http://wiki.debian.org/FAQsFromDebianUser


signature.asc
Description: PGP signature