Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 28 |
Nodes: | 6 (0 / 6) |
Uptime: | 48:10:19 |
Calls: | 422 |
Files: | 1,024 |
Messages: | 90,421 |
They do different things, so itΓ─Ös not clear why youΓ─Öd compare them.
A telnetd without a password will allow lateral movement from other
UIDs.
Richard Kettlewell <invalid@invalid.invalid> wrote:
They do different things, so it’s not clear why you’d compare them.
Screenshots are at https://easthope.ca/XtermVersusTelnet.png .
I recognize that the window frames and fonts differ. Window contents
are similar and functionalities for a user are similar.
A telnetd without a password will allow lateral movement from other
UIDs.
A password is required to log in to the system
and I am the only person with accounts. The root account and a user
account. Please outline how lateralization can happen.
In this case by lateral movement I mean an attacker who has
compromised one UID escalating privilege to another UID. In this
case, itΓ─Ös as simple as Γ─£telnet localhostΓ─¥.
Richard & all,
In article <wwvr030d4ab.fsf@LkoBDZeT.terraraq.uk>,
Richard Kettlewell <invalid@invalid.invalid> wrote:
They do different things, so itâÄs not clear why youâÄd compare them.
Screenshots are at https://easthope.ca/XtermVersusTelnet.png .
I recognize that the window frames and fonts differ. Window contents
are similar and functionalities for a user are similar.
A telnetd without a password will allow lateral movement from other
UIDs.
A password is required to log in to the system and I am the only
person with accounts. The root account and a user account. Please
outline how lateralization can happen.
Thanks, ... P.
In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
On 12.03.2025 06:41 Uhr peter@easthope.ca wrote:
In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
What should it do?
On 13.03.2025 08:28 Uhr peter@easthope.ca wrote:
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
Completely different stuff. xterm just opens a terminal emulator on
your system. telnet connects to a telnet server, usually a remote
system.
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
telnet offers you to login if a telnet server is running.
As long this connection is only inside your system, this is
secure. If it is going outside, you need to have an underlaying
protocol (IPsec or a VPN tunnel) to avoid eavesdropping, as normal
telnet is not encrypted.
Marco, Richard & all,
In article <20250312170838.7d5b1e1c@ryz.dorfdsl.de>, Marco Moock <mm@dorfdsl.de> wrote:
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
telnet offers you to login if a telnet server is running.
In Debian,
# grep ^telnet /etc/inetd.conf
telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/telnetd -E
/bin/bash
Nobody other than me has an account on the system. I authenticate
after the system boots or when returning after logout. Neither
"telnet localhost" nor "xterm" asks for a password.
As long this connection is only inside your system, this is
secure. If it is going outside, you need to have an underlaying
protocol (IPsec or a VPN tunnel) to avoid eavesdropping, as normal
telnet is not encrypted.
Shorewall is configured to prevent a telnet connection from outside localhost.
So my configuration is unusual but not particularly hazardous?
Marco Moock <mm@dorfdsl.de> wrote:
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
telnet offers you to login if a telnet server is running.
In Debian,
# grep ^telnet /etc/inetd.conf
telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/telnetd -E /bin/bash
Nobody other than me has an account on the system. I authenticate
after the system boots or when returning after logout. Neither "telnet localhost" nor "xterm" asks for a password.
In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
Completely different stuff. xterm just opens a terminal emulator on
your system. telnet connects to a telnet server, usually a remote
system.
If telnet doesn't ask for a password, this is a security problem if
other people (locally or remote) can access the telnet server.
As long as it stays so, it is. But when other people can access it,
they can take over control of your system.
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
A telnetd without a password will allow lateral movement from other
UIDs.
Marco Moock <mm@dorfdsl.de> wrote:
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
Absoutely reasonable to ask. The client side of the communication
does not have xterm or su.
https://en.wikibooks.org/wiki/Oberon/A2
A2 has a secure shell but I tend to use the Oberon subsystem.
Oberon has an old ssh client. Needs major work for compatibility
with the current environment.