Solved

Telnet customizations ... HOW?

Posted on 1998-06-25
3
207 Views
Last Modified: 2010-04-20
I have seen that telnet can be customized ... and I need to know how. It is not just the greetings or prompts in telnets which I easily can accomplish but in some cases Ihave seen that if you try to connect through telnet to a server it says that we do not process outside hosts and probably will give you some messages too. How this can be done. I understand that they are not turning off telnet daemon but they are just restricting shell access for users outside their domain.

 I run Slackware 2.0.30 ...
 If needed exapmles I will gladly give name of the servers on the Internet that are implementing this kind of trick ...

 .. How I can do this on my Linux ..
 
0
Comment
Question by:mega_tron
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Author Comment

by:mega_tron
ID: 1637401
Edited text of question
0
 
LVL 1

Expert Comment

by:m4rc
ID: 1637402
i dont know.  but it sounds like this is something you could do by either tinkering w/ the source to telnetd, or a perl script that checks the incoming ip addy before passing control on to login.

0
 
LVL 2

Accepted Solution

by:
JYoungman earned 0 total points
ID: 1637403
Edit /etc/issue.net.   Sometimes this is rewritten at boot time by rc.local, so check that.   Servers usually block remote logins either with TCP wrappers (which produce no message) or by putting the required message in the file /etc/nologin.

0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Fine Tune your automatic Updates for Ubuntu / Debian
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question