[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Red Hat 7.1 Telnet Question

Posted on 2001-06-15
4
Medium Priority
?
420 Views
Last Modified: 2013-12-06
Hello all you Linux gurus out there.

I've installed Red Hat 7.1 on serveral machines now.  I am not able to telnet into any of them.  Is that the way RH 7.1 ships?  If so, how do I enable it so that I can telnet into it?  
My RH 7.0 machines have no such problems.

Thanks.
0
Comment
Question by:Michaelc
  • 2
4 Comments
 
LVL 5

Accepted Solution

by:
vsamtani earned 200 total points
ID: 6195543
Check the /etc/xinetd.d/telnet file. Specifically look for the line "disable = yes" and if it's there, change it to disable = no and restart xinetd.



0
 
LVL 1

Expert Comment

by:crouchet
ID: 6195813
Yes, that is the way RH 7.1 ships. Why? Because a lot of customers were asking them to tighten up security. They did a number of things, getting rid of or disabling some older, less secure programs and telnet was one of those.

Understand that telnet is probably the most wretchedly insecure protocol on the planet. All of it's communications are sent in plain text and all that is needed to view your work is a simple packet sniffer/assembler -- a common tool. When you telnet to a system and log on, that logon and password are available to anyone on your network who cares to look. It's kinda the cyber equivalent of walking around naked.

So what to do if you want to replace telnet? Use SSH. SSH uses strong encryption and secures your entire session starting with the logon itself. A lot of programs can use SSH for their communications protocol. Yes, you do have to learn how to set it up and master a few simple commands, but if you care about security at all SSH is the way to go.

BTW, my suggestion to RH was that they may security a selectable option in 7.1. I suggested profiles such as:

Secure -- Best security, but many protocols and functions are disabled for security reasons.

Normal -- A reasonably secure profile with more protocols and functions available. (basically what we got in 7.1)

Traditional -- Significantly less secure, but leaves many traditional protocols and functions such as telnet available. (like in 6.2)

None -- Passwords and other security features are disabled. WARNING: This creates a VERY insecure machine that is easily attacked from any outside connection. (Windoze users might not notice the difference.)

Custom -- Choose which protocols and functions to enable or disable. (starts from the "Normal" profile)

Maybe we can convince them to do this in their next release.

JC
0
 
LVL 1

Author Comment

by:Michaelc
ID: 6196089
Thanks for the info vsamtani.  That worked for me.

Thanks to crouchet also for the additional info.  Security doesn't mean all that much to me at this point but I will definately look into SSH.
0
 
LVL 1

Author Comment

by:Michaelc
ID: 6196180
Thanks for the info vsamtani.  That worked for me.

Thanks to crouchet also for the additional info.  Security doesn't mean all that much to me at this point but I will definately look into SSH.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Suggested Courses
Course of the Month19 days, 9 hours left to enroll

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question