remote telnet without password
Dear friends ,
I want to telnet another server without pressing any "username" and "password" .
I can ftp to another server using following cpmmand :
lflt root:firstname.lastname@example.org. << !
Like the above way, can I telnet remote server ? If it is possible , then plz help me .. ...
You can use ssh instead of telnet, and configure public key authentication. That is the "proper" way to do it.
If you want to incur the wrath of all self-respecting nerds who care about security (and all nerds should care about security), you can write a small script using expect to automate telnet logins and then pass control back to the user.
A typical expect script would look something like this:
So my advice is do not use expect/telnet. Not that I expect you follow this advice (get it? expect? -nevermind)...
I agree, and advice you to stay out of telnet when possible, and moreover never store/write your username/passwords in cleartext to any files nor commands. If it was ok, your Linux would never hide the password you are typing, your Windows would never print asterisks when you're typing a password, and we wouldn't need ssh nor public key authentication.
So, shortly said:
- telnet is easy, but so is ssh - just as easy
- telnet is convenient, you don't need any fancy public keys generated! And anybody who wants can capture the packets you send/receive, and see everything in plain text, your passwords and all
- expect is nice, you can automate your logins - and basically hand over your login information to anyone who is able to break into your account (or in telnet's case just capture the packages with any one of the simple tools freely available on the net, possibly preinstalled on their OS too)
- if you have no valuable information to exchange, you don't need to connect to the other end
- if you do connect to the other end, you have some valuable information you'd like to send or receive, and you wouldn't want everybody to be able to do that; this is why you want to secure the connection, and not use the most unsecure options available
- after configuring ssh it's just as easy to use as telnet (or anything), so there is no sane reason not to do it
The failure of understanding in this case is how much hassle it will be to get another job when their shortcut leads to a security compromise...
I cannot believe anyone is still using telnet. For one, its not enabled by default on any modern system anymore. So you have to be savvy enough to edit your inetd.conf to enable it. If you know this much you should definitely be using openssh (or the ssh server of your choice). If typing passwords is not your thing, setting up public key authentication is ridiculously easy. It's a total of 7-8 commands.
|All times are GMT -5. The time now is 05:53 AM.|