Package: libpam-modules
Version: 1.4.0-9+deb11u1
Followup-For: Bug #583958

This bug has not yet been resolved and is still causing problems in 2023. The
setting for UMASK is not respected for logins on tty as well as via SSH or
SSHFS.  I have spent the last 10 years manually adding this configuration to
the file with every new Debian install:

echo "session optional pam_umask.so usergroups" >> /etc/pam.d/common-session

This line of code is present in most GNU/Linux distributions by default and
solves the problem.


-- System Information:
Debian Release: 11.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-20-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8), LANGUAGE not
set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libpam-modules depends on:
ii  debconf [debconf-2.0]  1.5.77
ii  libaudit1              1:3.0-2
ii  libc6                  2.31-13+deb11u5
ii  libcrypt1              1:4.4.18-4
ii  libdb5.3               5.3.28+dfsg1-0.8
ii  libnsl2                1.3.0-2
ii  libpam-modules-bin     1.4.0-9+deb11u1
ii  libpam0g               1.4.0-9+deb11u1
ii  libselinux1            3.1-3
ii  libtirpc3              1.3.1-1+deb11u1

libpam-modules recommends no packages.

Reply via email to