Answer the question
In order to leave comments, you need to log in
How to configure ubuntu server (eg 20.04) the same as proxmox in terms of "security"?
- it's not about how to enable / configure virtualization!
If we take a ready-made iso proxmox for example 7.1, we get a human “security” setting, the so-called. There is no such thing as UAC.
no need to add sudo, no need to repeat the password every n minutes And most importantly in winscp I can edit any files in any folders and even the local terminal executes commands, and not just in putty
Nothing like this is in ubuntu
Question how to configure ubuntu so that it does not drizzle with excessive security? how exactly see above or in proxmox directly.
ps just please on the topic, leave your very important opinion that "security is good" to yourself. I need convenience.
Answer the question
In order to leave comments, you need to log in
Based on the comment...
Proxmox is Debian with a custom kernel. You are NOT expected to do anything EXCEPT from the Web interface.
By default, a user is not created there, only the standard admin user is present (root)
Yes, you yourself should have guessed, because. it is visible in the console.
In order to work as root in the "debian branch" distribution, it is enough
to set the root password
sudo passwd root
then type su enter the root password
That's it, you are under full admin. Only this is abnormal and against the security of linux. Because in this mode, privilege escalation is not requested for programs and a bunch of other things. Plus, you can delete without confirmation, for example, any system folder
And why the hell do you even work as root in Ubuntu then ?? If this is not a test server of course
ps just please on the topic, leave your very important opinion that "security is good" to yourself. I need convenience.
thanks to all.
-I immediately googled that we first correct PermitRootLogin yes, and only then sudo passwd.
-In fact, you have to keep 2 users on Ubuntu. as a root it is convenient to edit everything in winscp. and ncadmin is needed to go through putty and the scripts work.
Root through putty does not go in the normal way. scripts (runonce) start but cannot work. they are not sharpened for root, which is what they write about - and so on through the
ps cycle, but in general I thought that this pseudoUAC can be disabled. but it turns out it's all about who to log in
how to configure ubuntu so that it does not drizzle with excessive security?
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question