LWN: Comments on "Lucky 13: a look at Debian trixie" https://lwn.net/Articles/1033474/ This is a special feed containing comments posted to the individual LWN article titled "Lucky 13: a look at Debian trixie". en-us Sun, 02 Nov 2025 02:36:57 +0000 Sun, 02 Nov 2025 02:36:57 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net sudo user https://lwn.net/Articles/1042203/ https://lwn.net/Articles/1042203/ taladar <div class="FormattedComment"> It is not even just annoying, it also potentially makes it impossible to figure out what the problem is in the first place since most boot failures happen before logging to persistent media is enabled so you need to know what state the initrd based system is in at the time of failure to figure out what went wrong.<br> </div> Thu, 16 Oct 2025 08:24:12 +0000 sudo user https://lwn.net/Articles/1041936/ https://lwn.net/Articles/1041936/ rschroev <div class="FormattedComment"> There are ways around it, but by default you can't login in rescue mode when you didn't set a root password:<br> <p> "Cannot open access to console, the root account is locked.<br> See sulogin(8) man page for more details."<br> <p> AFAIK that's the main reason why people often recommend to set a root password.<br> </div> Tue, 14 Oct 2025 18:11:12 +0000 sudo user https://lwn.net/Articles/1041929/ https://lwn.net/Articles/1041929/ PhilippWendler You just get a shell without password prompt. Tue, 14 Oct 2025 16:17:47 +0000 sudo user https://lwn.net/Articles/1041859/ https://lwn.net/Articles/1041859/ dskoll <p>If you can't log in as root, then you have to fix a broken boot by booting from external rescue media, I guess. Which can be annoying if your machine is remote, but you have a KVM-over-IP box. So I too always set a root password on my machines. Tue, 14 Oct 2025 12:19:58 +0000 sudo user https://lwn.net/Articles/1041856/ https://lwn.net/Articles/1041856/ taladar <div class="FormattedComment"> The main use for a root password is for failed boots, isn't it? How does the sudo setup with a password less root user handle this case? I have never really had a system with a root user without a password.<br> </div> Tue, 14 Oct 2025 11:34:19 +0000 sudo user https://lwn.net/Articles/1040322/ https://lwn.net/Articles/1040322/ josh <div class="FormattedComment"> Ideally, I'd have the default (non-expert) install unconditionally install and enable sudo for the initial admin user, not prompt for a root password at all, and let people who want to have a root password run `passwd root` or graphical equivalent.<br> <p> For an expert-level install, the simplest improvement would be to reorder the prompts. First set up an initial user. If not skipped, prompt for setting up sudo (default yes, skipped and set to no if no initial user). And after that, ask "don't set up a root password (default)"/"use the same password"/"set a different root password", with options disabled depending on previous questions.<br> </div> Wed, 01 Oct 2025 12:50:57 +0000 sudo user https://lwn.net/Articles/1035883/ https://lwn.net/Articles/1035883/ alx.manpages <div class="FormattedComment"> So, would you split the question into two separate questions?<br> <p> - Enter password for root:<br> <p> - Do you want sudo(8) for the main user?<br> <p> (Of course, with more wording than that.)<br> </div> Sun, 31 Aug 2025 05:49:22 +0000 sudo user https://lwn.net/Articles/1035837/ https://lwn.net/Articles/1035837/ josh <div class="FormattedComment"> Yeah, I have a Debian package that installs the configuration I want for sudo (and other packages for other things).<br> </div> Sat, 30 Aug 2025 21:23:04 +0000 stable-backports and stable-updates https://lwn.net/Articles/1035733/ https://lwn.net/Articles/1035733/ cpacejo <div class="FormattedComment"> Indeed, stable-backports is a safer option for those who want "stable, but with specific packages pulled from testing": &lt;<a href="https://wiki.debian.org/Backports">https://wiki.debian.org/Backports</a>&gt;<br> <p> And stable-updates is more conservative still, pulling only from the next point release: &lt;<a href="https://wiki.debian.org/StableUpdates">https://wiki.debian.org/StableUpdates</a>&gt;<br> </div> Fri, 29 Aug 2025 15:51:42 +0000 thanks for the informative article https://lwn.net/Articles/1035598/ https://lwn.net/Articles/1035598/ MKesper <div class="FormattedComment"> There is an "unattended-upgrades" package that can update packages for you for security reasons.<br> It's configurable and can also be disabled, if you decide to do so.<br> I never saw Firefox doing a restart itself, though. It displays a message to restart it myself to be able to continue browsing.<br> <p> <a href="https://packages.debian.org/trixie/unattended-upgrades">https://packages.debian.org/trixie/unattended-upgrades</a><br> </div> Fri, 29 Aug 2025 13:17:38 +0000 TIL about extrepo https://lwn.net/Articles/1035593/ https://lwn.net/Articles/1035593/ kkremitzki <div class="FormattedComment"> It's super nice to be able to bootstrap trust with extrepo. Just for reference here's a list of repos' GPG keys provided by `extrepo-offline-data`:<br> <p> <a href="https://packages.debian.org/trixie/all/extrepo-offline-data/filelist">https://packages.debian.org/trixie/all/extrepo-offline-da...</a><br> </div> Fri, 29 Aug 2025 12:56:46 +0000 sudo user https://lwn.net/Articles/1035567/ https://lwn.net/Articles/1035567/ emorrp1 <div class="FormattedComment"> Worth noting that this phrasing is new for trixie, it used to be even more misleading<br> </div> Fri, 29 Aug 2025 09:26:55 +0000 thanks for the informative article https://lwn.net/Articles/1035564/ https://lwn.net/Articles/1035564/ emorrp1 <div class="FormattedComment"> firefox-esr package is updated, even within a stable release once the previous ESR version drops out of support. That means we can expect v140.3 to be in trixie in late September. <a rel="nofollow" href="https://whattrainisitnow.com/calendar/">https://whattrainisitnow.com/calendar/</a><br> <p> <a rel="nofollow" href="https://tracker.debian.org/pkg/firefox-esr/news/?page=3">https://tracker.debian.org/pkg/firefox-esr/news/?page=3</a> (for the exact dates we got 128.3)<br> <p> If you install from outside of debian (e.g. extrepo) then yes obviously it's cycle will be outside of distro control.<br> </div> Fri, 29 Aug 2025 09:21:43 +0000 testing is for actually testing. unstable is for users who want the bleeding edge https://lwn.net/Articles/1034724/ https://lwn.net/Articles/1034724/ alx.manpages <div class="FormattedComment"> Sounds good! However, I think that qualifies as an expert installation.<br> <p> Recommending testing over unstable, saying that testing is for the bleeding edge and unstable is for the adventurous, that's at least a dangerous recommendation.<br> <p> Such a recommendation would need to come with a disclosure that unstable is safer (even if it might crash more often) and explains how to deal with the security issues in testing.<br> </div> Fri, 22 Aug 2025 07:19:36 +0000 thanks for the informative article https://lwn.net/Articles/1034718/ https://lwn.net/Articles/1034718/ alison <div class="FormattedComment"> While Debian users will indeed notice Firefox package updates, at times I've noticed that Firefox restarts itself when I don't recall a recent update. Perhaps some auto-installed security fix has arrived from Debian.<br> </div> Fri, 22 Aug 2025 04:52:55 +0000 testing is for actually testing. unstable is for users who want the bleeding edge https://lwn.net/Articles/1034715/ https://lwn.net/Articles/1034715/ pabs <div class="FormattedComment"> You can install most unstable packages on testing, and using pinning and a script, auto-install security updates from unstable on testing:<br> <p> <a href="https://wiki.debian.org/DebianTesting#Best_practices_for_Testing_users">https://wiki.debian.org/DebianTesting#Best_practices_for_...</a><br> <p> I have been using this setup for years, it works great.<br> </div> Fri, 22 Aug 2025 03:14:26 +0000 thanks for the informative article https://lwn.net/Articles/1034713/ https://lwn.net/Articles/1034713/ pabs <div class="FormattedComment"> The offline ML-based human-language translation system is still enabled for the Debian builds of Firefox, but it auto-downloads the models though, since Debian doesn't train them, relying on the Mozilla-trained versions.<br> </div> Fri, 22 Aug 2025 03:04:54 +0000 sudo user https://lwn.net/Articles/1034701/ https://lwn.net/Articles/1034701/ alx.manpages <div class="FormattedComment"> <span class="QuotedText">&gt; Or skip the root password when installing, then after installation set a root password.</span><br> <p> Yup, that's an alternative I always thought should be possible.<br> <p> I never tried it, though. Since I know my approach works, it always felt risky to try it in the other way. :)<br> <p> Also, I have a sudoers file that I just cp(1) into /etc/sudoers.d and it works, which is easy. (Although it is painful to install and configure sudo(8) until I actually have sudo(8).)<br> </div> Thu, 21 Aug 2025 19:07:11 +0000 TIL about extrepo https://lwn.net/Articles/1034653/ https://lwn.net/Articles/1034653/ tcabot <div class="FormattedComment"> Thank you for mentioning extrepo. It knows about most of the third-party repos that I had been managing ad hoc.<br> <p> </div> Thu, 21 Aug 2025 14:22:40 +0000 thanks for the informative article https://lwn.net/Articles/1034611/ https://lwn.net/Articles/1034611/ jzb <p>If you're getting Firefox ESR from the Debian repositories, then it is updated by the Debian packagers with a number of patches applied. You can examine the patches applied to various versions here: <a href="https://sources.debian.org/patches/firefox-esr/">https://sources.debian.org/patches/firefox-esr/</a>.</p> <p>The new ML features postdate Firefox 128, I believe, so it's unclear right now if they'll turn those off or not. I wouldn't be surprised if they do... If you want current-ish Firefox without some of the AI-type stuff, you might check out <a href="https://lwn.net/Articles/1012453/">LibreWolf or other forks</a>.</p> Thu, 21 Aug 2025 13:59:06 +0000 sudo user https://lwn.net/Articles/1034601/ https://lwn.net/Articles/1034601/ rschroev <div class="FormattedComment"> Or skip the root password when installing, then after installation set a root password.<br> </div> Thu, 21 Aug 2025 12:43:45 +0000 sudo user https://lwn.net/Articles/1034600/ https://lwn.net/Articles/1034600/ Karellen <div class="FormattedComment"> Yeah, I think I missed that for ages too, as it came after 2 or 3 previous walls of text which effectively say "make sure you set a strong password for root". At that point, I was mostly thinking "yes, I know, and I get it, set a strong password for root! Can we get to the input box where I type that in now, please?", and missed that the last one says "actually, you can just use an empty password and we'll do something different! (lol)"<br> </div> Thu, 21 Aug 2025 11:40:11 +0000 testing is for actually testing. unstable is for users who want the bleeding edge https://lwn.net/Articles/1034598/ https://lwn.net/Articles/1034598/ alx.manpages <div class="FormattedComment"> <span class="QuotedText">&gt; Users who prefer to live on the edge will want to run another distribution or follow Debian development by running the testing release that previews the next stable version—Debian 14 ("forky"). Truly adventurous users may take their chances with the unstable ("sid") release.</span><br> <p> This is not recommended. testing is the least secure flavour of Debian, as bug fixes are applied to stable (if appropriate), and also arrive at unstable (Sid) as normal patches, but due to migration policies, they can take months to arrive at testing.<br> <p> See &lt;<a href="https://www.debian.org/doc/manuals/debian-faq/choosing.en.html#s3.1.7">https://www.debian.org/doc/manuals/debian-faq/choosing.en...</a>&gt;.<br> </div> Thu, 21 Aug 2025 11:25:56 +0000 sudo user https://lwn.net/Articles/1034597/ https://lwn.net/Articles/1034597/ alx.manpages <div class="FormattedComment"> Could you please separate it into two questions?<br> <p> I want a root password for login as root,<br> and I also want sudo(8) for my primary account.<br> <p> Which means that with the current installer I currently am forced to set up sudo(8) after installation.<br> </div> Thu, 21 Aug 2025 10:55:52 +0000 thanks for the informative article https://lwn.net/Articles/1034589/ https://lwn.net/Articles/1034589/ alison <div class="FormattedComment"> Although I've run Debian testing for years, I did not know about extrepo and the possibility of flatpak. I'm puzzled by Firefox, which I believed updated itself outside distro control. Is that not true? Chapeau to Debian if they have turned of the new automatically enabled ML features of Firefox.<br> </div> Thu, 21 Aug 2025 04:17:55 +0000 aptly named https://lwn.net/Articles/1034566/ https://lwn.net/Articles/1034566/ josh <div class="FormattedComment"> "aptly named"<br> <p> I see what you did there.<br> </div> Wed, 20 Aug 2025 17:48:46 +0000 sudo user https://lwn.net/Articles/1034565/ https://lwn.net/Articles/1034565/ josh <div class="FormattedComment"> There's a description, but ideally I'd want to switch this around to a yes/no prompt about setting a password, default "no". "Press enter to use the default configuration of an admin account that has sudo access, or choose 'Set a root password' to create a password for the root user to directly log in.<br> </div> Wed, 20 Aug 2025 17:48:20 +0000 64-bit time_t https://lwn.net/Articles/1034563/ https://lwn.net/Articles/1034563/ cjwatson <div class="FormattedComment"> It's also possibly worth noting that Y2038 isn't only relevant once the current time ticks past that point; it's also relevant for some programs that need to reason about times in the future (expiry dates, calendar items, and so forth).<br> </div> Wed, 20 Aug 2025 16:06:14 +0000 sudo user https://lwn.net/Articles/1034557/ https://lwn.net/Articles/1034557/ rschroev <div class="FormattedComment"> I failed to notice that text as well for a long time, until a comment I saw somewhere made me look better the next time I installed Debian (I tend to install Debian quite regularly in VMs for testing stuff in isolation).<br> </div> Wed, 20 Aug 2025 14:17:53 +0000 sudo user https://lwn.net/Articles/1034556/ https://lwn.net/Articles/1034556/ jzb <div class="FormattedComment"> Thanks all for the corrections - I have amended the article.<br> </div> Wed, 20 Aug 2025 14:14:51 +0000 sudo user https://lwn.net/Articles/1034554/ https://lwn.net/Articles/1034554/ smcv <div class="FormattedComment"> Yes, that is how it works. Reference: <a href="https://salsa.debian.org/installer-team/user-setup/-/blob/master/debian/user-setup-udeb.templates?ref_type=heads">https://salsa.debian.org/installer-team/user-setup/-/blob...</a><br> <p> <span class="QuotedText">&gt; To allow direct password-based access via the 'root' account,</span><br> <span class="QuotedText">&gt; you can set the password for that account here.</span><br> <span class="QuotedText">&gt; .</span><br> <span class="QuotedText">&gt; Alternatively, you can lock the root account's password</span><br> <span class="QuotedText">&gt; by leaving this setting empty, and</span><br> <span class="QuotedText">&gt; instead use the system's initial user account</span><br> <span class="QuotedText">&gt; (which will be set up in the next step)</span><br> <span class="QuotedText">&gt; to gain administrative privileges.</span><br> <span class="QuotedText">&gt; This will be enabled for you</span><br> <span class="QuotedText">&gt; by adding that initial user to the 'sudo' group.</span><br> <p> </div> Wed, 20 Aug 2025 14:11:12 +0000 sudo user https://lwn.net/Articles/1034555/ https://lwn.net/Articles/1034555/ jzb <div class="FormattedComment"> Ah, appears there is text for it and I missed it. Thanks! <br> </div> Wed, 20 Aug 2025 14:11:07 +0000 sudo user https://lwn.net/Articles/1034553/ https://lwn.net/Articles/1034553/ jzb <div class="FormattedComment"> Is that so? I didn't try that, obviously. I'll have to run the install again to see if there's text that informs the user they can do that. If so, I missed it. If there's not, I'll see about submitting a bug report or pull request to add it.<br> </div> Wed, 20 Aug 2025 14:09:54 +0000 sudo user https://lwn.net/Articles/1034552/ https://lwn.net/Articles/1034552/ rschroev <div class="FormattedComment"> You are correct. The installer has some text about it, on the page where it asks for the root password:<br> <p> <span class="QuotedText">&gt; Alternatively, you can lock the root account's password by leaving this setting empty, and instead use the system's initial user account (which will be set up in the next step) to gain administrative privileges. This will be enabled for you by adding that initial user to the 'sudo' group.</span><br> <p> Admittedly it's quite a wall of text.<br> <p> If you do leave the root password empty (and only then) is sudo installed automatically, with a config file that grants sudo access to users in the sudo group, in addition to putting the initial user in that sudo group.<br> </div> Wed, 20 Aug 2025 14:07:26 +0000 sudo user https://lwn.net/Articles/1034550/ https://lwn.net/Articles/1034550/ bluca <div class="FormattedComment"> <span class="QuotedText">&gt; For example, many desktop distributions have eliminated the step of setting a password for the root user—instead, it is generally assumed that the primary user will also be the system administrator, so the default is to give the primary user sudo privileges instead. Debian does not take that approach; in fact, there is no way to give a user sudo privileges during installation. Setting up sudo has to be done manually after the installation is completed.</span><br> <p> It's been a while, but IIRC if you skip setting a root password in the installer, then the created user will be added automatically to the sudo group<br> </div> Wed, 20 Aug 2025 13:54:19 +0000