Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
You can use ssh instead of telnet, and configure public key authentication. That is the "proper" way to do it.
If you want to incur the wrath of all self-respecting nerds who care about security (and all nerds should care about security), you can write a small script using expect to automate telnet logins and then pass control back to the user.
A typical expect script would look something like this:
telnet send the login credentials un-encrypted, so anyone who can see network traffic along the route to the remote host can sniff your password with minimal effort. For this reason, telnet should really be avoided whenever possible.
you have to store the username and password in a script. This might seem like no big deal, but it is. Firstly it's a security risk. That password is written to the drive. Someone may get access to the file and read it, or they may get hold of the disk after it is decommissioned, and get the password, even if the drive has been wiped - it is still possible to recover data from "deleted" disks a lot of the time...
A more immediate problem is maintainability. If you write one script to do this, you will probably write another. And another. Sooner or later you end up with dozens of scripts, scattered all over the place, and then... you need to change your password and it is a nightmare to update everything.
So my advice is do not use expect/telnet. Not that I expect you follow this advice (get it? expect? -nevermind)...
I agree, and advice you to stay out of telnet when possible, and moreover never store/write your username/passwords in cleartext to any files nor commands. If it was ok, your Linux would never hide the password you are typing, your Windows would never print asterisks when you're typing a password, and we wouldn't need ssh nor public key authentication.
So, shortly said:
- telnet is easy, but so is ssh - just as easy
- telnet is convenient, you don't need any fancy public keys generated! And anybody who wants can capture the packets you send/receive, and see everything in plain text, your passwords and all
- expect is nice, you can automate your logins - and basically hand over your login information to anyone who is able to break into your account (or in telnet's case just capture the packages with any one of the simple tools freely available on the net, possibly preinstalled on their OS too)
- if you have no valuable information to exchange, you don't need to connect to the other end
- if you do connect to the other end, you have some valuable information you'd like to send or receive, and you wouldn't want everybody to be able to do that; this is why you want to secure the connection, and not use the most unsecure options available
- after configuring ssh it's just as easy to use as telnet (or anything), so there is no sane reason not to do it
- after configuring ssh it's just as easy to use as telnet (or anything), so there is no sane reason not to do it
You're quite right, and yet so many people are reluctant to use it for some reason. I think the usual reason for this is that they are not the admin on one or both machines, and think that if they ask for ssh or sshd to be installed it will be too much hassle.
The failure of understanding in this case is how much hassle it will be to get another job when their shortcut leads to a security compromise...
I cannot believe anyone is still using telnet. For one, its not enabled by default on any modern system anymore. So you have to be savvy enough to edit your inetd.conf to enable it. If you know this much you should definitely be using openssh (or the ssh server of your choice). If typing passwords is not your thing, setting up public key authentication is ridiculously easy. It's a total of 7-8 commands.
Jesus, just answer the [removed] question or shut the [removed] up. No one cares about what a proper system administrator should do. The question is how do you enable telenet without a password in linux. No one gives a [removed] about why you shouldn't.
Jesus, just answer the [removed] question or shut the [removed] up. No one cares about what a proper system administrator should do. The question is how do you enable telenet without a password in linux. No one [removed] a shit about why you shouldn't.
Did you happen to notice that this thread had been closed for TEN YEARS before you reopened it? And the question was answered, and a script was even provided to do what they wanted.
And while YOU may not care, many others come here to actually learn to do what's right. Telnet shouldn't be used in the manner asked for, that's why SSH is around.
Last edited by rtmistler; 08-31-2017 at 07:05 AM.
Reason: Removed copied profanity
Distribution: Debian, Red Hat, Slackware, Fedora, Ubuntu
Posts: 13,602
Rep:
@ernieskaggs Additionally, the behavior and language you exhibited in your first post isn't acceptable at LQ. If you'd like to continue participating here, you'll need to refrain from it moving forward.
So far as I am aware, telnet does not have a "password free" feature. But, ssh does, and it basically does the same thing.
But be aware that you should exclude password-prompting as an option, so that in order to connect you must have an authorized-key and so that ssh will not invite you to enter a password if you don't. To enter, you must possess a key.
(As I have previously mentioned, you should use OpenVPN with tls-auth and unique digital certificates as your outer bastion, allowing reach to "ssh" only if you have successfully passed through the tunnel. This will conceal the existence of the tunnel, presenting to the public a system with "no open ports." Those who possess non-revoked credentials may pass through the secret door easily. All others cannot even discover its existence.)
It's been taken care of and I did not alter your part of the post TB0ne, however please be aware that when you quote a profane post, edits to the original post, which I believe Jeremy did, do not transfer automatically over to the quoted one which resided as part of your post. As a result, a few members cited, quite reasonably, that the offending language needed to be removed from the quote within there.
No biggie, however people should try to be aware of that little detail.
I will add that with a questionable question, such as an incomplete one, or something else, I do find it helpful to quote the poster, because if they edit later, as some people do, it confuses things.
And ernieskaggs, welcome to LQ. Please watch the language in the future, and as you can see, there are open threads sometimes which are years past and updates to them may be helpful, or may not be. Looking forward to seeing you on other discussions which are more current.
It's been taken care of and I did not alter your part of the post TB0ne, however please be aware that when you quote a profane post, edits to the original post, which I believe Jeremy did, do not transfer automatically over to the quoted one which resided as part of your post. As a result, a few members cited, quite reasonably, that the offending language needed to be removed from the quote within there.
No biggie, however people should try to be aware of that little detail.
I will add that with a questionable question, such as an incomplete one, or something else, I do find it helpful to quote the poster, because if they edit later, as some people do, it confuses things.
And ernieskaggs, welcome to LQ. Please watch the language in the future, and as you can see, there are open threads sometimes which are years past and updates to them may be helpful, or may not be. Looking forward to seeing you on other discussions which are more current.
Ahhhh......you are indeed correct, and my apologies. I should have either quick-replied or edited my post. COMPLETELY missed that.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.