Package: libpam-modules Version: 1.4.0-9+deb11u1 Followup-For: Bug #583958 This bug has not yet been resolved and is still causing problems in 2023. The setting for UMASK is not respected for logins on tty as well as via SSH or SSHFS. I have spent the last 10 years manually adding this configuration to the file with every new Debian install:
echo "session optional pam_umask.so usergroups" >> /etc/pam.d/common-session This line of code is present in most GNU/Linux distributions by default and solves the problem. -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-20-amd64 (SMP w/8 CPU threads) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=es_ES.UTF-8, LC_CTYPE=es_ES.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages libpam-modules depends on: ii debconf [debconf-2.0] 1.5.77 ii libaudit1 1:3.0-2 ii libc6 2.31-13+deb11u5 ii libcrypt1 1:4.4.18-4 ii libdb5.3 5.3.28+dfsg1-0.8 ii libnsl2 1.3.0-2 ii libpam-modules-bin 1.4.0-9+deb11u1 ii libpam0g 1.4.0-9+deb11u1 ii libselinux1 3.1-3 ii libtirpc3 1.3.1-1+deb11u1 libpam-modules recommends no packages.