Solved

telnet on linux

Posted on 2002-07-11
9
433 Views
Last Modified: 2013-12-15
here is a problem i am facing see, see if u can help me......


i had installed linux (red hat 7.0) on a machine and had assigned 192.168.1.100 as ip address to that machine.
  I am not ble to log onto my linux machine from other machine (on
the same network) with Telnet 192.168.1.100.
 but if i write telnet 192.168.1.100 after logging in at linux machine then i am getting login prompt and i am able to login again.
 Xinetd service is running.
 tcp and udp service are also running.
 In /etc/xinetd/telnet file telnet service is enable.
 I am able to ping from linux machine to other PC on the network and vice versa.Ping is working correctly.

If i have to stop and start telnet service manually then how should i proceed.
   
 How should i proceed
   thanks

paramjit singh
0
Comment
Question by:paramibm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 1

Expert Comment

by:smisk
ID: 7146145
It sounds like you have ipchains running to prevent connections from other hosts.  Can you post the results of the following command (as root) :

%> /sbin/ipchains -L
0
 
LVL 1

Expert Comment

by:swapsthegreat
ID: 7146279
when u telnet from other machine, do u get connected and cant login or u dont get connected at all ?

also check hosts.allow and hosts.deny in addition to smisk's suggestion
0
 

Expert Comment

by:81ncpappy
ID: 7159729
Sounds to me like a PAM issue...  If you check the file located at "/etc/pam.d/login" you should see a line near the top that requires all logins be from a secure terminal (meaning the physical console, IE not remote).  If you either delete or comment out this line you should be able to telnet in.  One other solution would be to use SSH, telnet is very bad since it can easily be compromised by sniffing the passwords...

Here is the line to comment out.

#auth       required    /lib/security/pam_securetty.so

Hope this helps.

Nick
0
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

 
LVL 1

Expert Comment

by:ErikKruijswijk
ID: 7169036
AUthorization for a service like telnet, works in a few steps.
1: tcp level, can a service be connected via the network ?
ipchains or later iptables can be configured in such a way that it does not allow a telnet connection from anywhere but the localhost.
To resolve this, you should check your firewall settings to allow tcp port 23.
ipchains -A -p tcp --destination-port 23 -j ACCEPT
iptables -A -p tcp --dport 23 -j ACCEPT

2: computername, specify the computer wich can connect to the service. This is specified in the /etc/hosts.allow and /etc/hosts.deny files.
you can set the hosts.deny file to ALL:ALL. This will deny all systems.
Then, specify in hosts.allow the service:computer
in.telnetd:MYSYSTEM or ALL:MYSYSTEM
Make sure, the systemname MYSYSTEM is known in /etc/hosts

3: PAM enabled services.
You can setup the telnet service to use PAM authentication, so that numerous settings are checked, before access to the service is allowed.
With PAM you can create a file, with "nontelnet users", wich will give access to the telnet service if the username is not found in the "non telnetusers file".

If this is all correctly implemented, you should be able to connect to the telnet service.
BUT, telnet is nice, but it is a very  dangerous service, whereas usernames and passwords are sent over the line in clear text. ssh is a lot safer methode of having a prompt on the remote machine.

Hope this helps.
0
 
LVL 1

Expert Comment

by:bushmannt
ID: 7180466
are you trying to log in with root?  most (sane) distros disallow you from telneting in directly as root, you must log in as joeuser first, and then su root.
0
 

Expert Comment

by:CleanupPing
ID: 9076996
paramibm:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 1

Expert Comment

by:drewber
ID: 9220368
This question has been classified abandoned. I will make a recommendation to the moderators on its resolution in a week or two. I appreciate any comments that would help me to make a recommendation.
 

Unless it is clear to me that the question has been answered I will recommend delete. It is possible that a Grade less than A will be given if no expert makes a case for an A grade. It is assumed that any participant not responding to this request is no longer interested in its final disposition.

 
If the user does not know how to close the question, the options are here:
http://www.experts-exchange.com/help/closing.jsp
 
drewber
0
 
LVL 12

Expert Comment

by:paullamhkg
ID: 10380088
No comment has been added lately, so it's time to clean up this TA.
I will leave the following recommendation for this question in the Cleanup topic area:

PAQ - no points refunded

Please leave any comments here within the next four days.
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

paullamhkg
EE Cleanup Volunteer
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 10420909
PAQed - no points refunded (of 20)

Computer101
E-E Admin
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

rdate is a Linux command and the network time protocol for immediate date and time setup from another machine. The clocks are synchronized by entering rdate with the -s switch (command without switch just checks the time but does not set anything). …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question