Solved

Red Hat 7.1 Telnet Question

Posted on 2001-06-15
4
391 Views
Last Modified: 2013-12-06
Hello all you Linux gurus out there.

I've installed Red Hat 7.1 on serveral machines now.  I am not able to telnet into any of them.  Is that the way RH 7.1 ships?  If so, how do I enable it so that I can telnet into it?  
My RH 7.0 machines have no such problems.

Thanks.
0
Comment
Question by:Michaelc
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
vsamtani earned 50 total points
Comment Utility
Check the /etc/xinetd.d/telnet file. Specifically look for the line "disable = yes" and if it's there, change it to disable = no and restart xinetd.



0
 
LVL 1

Expert Comment

by:crouchet
Comment Utility
Yes, that is the way RH 7.1 ships. Why? Because a lot of customers were asking them to tighten up security. They did a number of things, getting rid of or disabling some older, less secure programs and telnet was one of those.

Understand that telnet is probably the most wretchedly insecure protocol on the planet. All of it's communications are sent in plain text and all that is needed to view your work is a simple packet sniffer/assembler -- a common tool. When you telnet to a system and log on, that logon and password are available to anyone on your network who cares to look. It's kinda the cyber equivalent of walking around naked.

So what to do if you want to replace telnet? Use SSH. SSH uses strong encryption and secures your entire session starting with the logon itself. A lot of programs can use SSH for their communications protocol. Yes, you do have to learn how to set it up and master a few simple commands, but if you care about security at all SSH is the way to go.

BTW, my suggestion to RH was that they may security a selectable option in 7.1. I suggested profiles such as:

Secure -- Best security, but many protocols and functions are disabled for security reasons.

Normal -- A reasonably secure profile with more protocols and functions available. (basically what we got in 7.1)

Traditional -- Significantly less secure, but leaves many traditional protocols and functions such as telnet available. (like in 6.2)

None -- Passwords and other security features are disabled. WARNING: This creates a VERY insecure machine that is easily attacked from any outside connection. (Windoze users might not notice the difference.)

Custom -- Choose which protocols and functions to enable or disable. (starts from the "Normal" profile)

Maybe we can convince them to do this in their next release.

JC
0
 
LVL 1

Author Comment

by:Michaelc
Comment Utility
Thanks for the info vsamtani.  That worked for me.

Thanks to crouchet also for the additional info.  Security doesn't mean all that much to me at this point but I will definately look into SSH.
0
 
LVL 1

Author Comment

by:Michaelc
Comment Utility
Thanks for the info vsamtani.  That worked for me.

Thanks to crouchet also for the additional info.  Security doesn't mean all that much to me at this point but I will definately look into SSH.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now