LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-18-2012, 10:21 PM   #1
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Rep: Reputation: 78
Would you leave telnet client installed?


i know my answer. but i would like some feedback. rhel5/6, if you were locking down a system real good and you use ssh v2 only for sysadmin access, would you leave the telnet client installed?

one argument i got to leave telnet client installed was that its used as a diag tool to check if a tcp listener is there on other systems. i gaffed, but its currently an argument. same person also believes having ftp client installed (and telnet client) poses no risk at all.

your take on this?
 
Old 10-18-2012, 11:26 PM   #2
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
A client is exactly that: a client. Since it is a client and not a server it isn't listening on any ports, so why should it be a security risk?
 
1 members found this post helpful.
Old 10-19-2012, 12:05 AM   #3
Wim Sturkenboom
Senior Member
 
Registered: Jan 2005
Location: Roodepoort, South Africa
Distribution: Ubuntu 12.04, Antix19.3
Posts: 3,794

Rep: Reputation: 282Reputation: 282Reputation: 282
These clients only are a security risk for the machine that you connect to, not for the machine that you run them on.

Telnet or ftp into a remote server via the web and passing usernames and passwords in the clear is calling for problems.
And of course if someone downloads malware using ftp and runs it.
 
Old 10-19-2012, 12:27 AM   #4
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
Why should I give a hacker tools to connect with or tools to download malware with? Also, these items may carry undocumented vulnerabilities. If not absolutely needed why should the system have them installed?
 
Old 10-19-2012, 06:01 AM   #5
Reuti
Senior Member
 
Registered: Dec 2004
Location: Marburg, Germany
Distribution: openSUSE 15.2
Posts: 1,339

Rep: Reputation: 260Reputation: 260Reputation: 260
Any user could install it from scratch anyway – clients are only run under the user account. If you want to avoid execution of unauthorized applications, you need to allow only signed binaries. There is a document from IBM about it.
 
Old 10-19-2012, 09:25 AM   #6
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
How exactly does any User download and install software??
 
Old 10-19-2012, 09:38 AM   #7
Basher52
Member
 
Registered: Mar 2004
Location: .SE
Distribution: Arch
Posts: 401

Rep: Reputation: 22
I think Reuti ment on their own machines, not using yours :P
 
Old 10-19-2012, 09:44 AM   #8
Reuti
Senior Member
 
Registered: Dec 2004
Location: Marburg, Germany
Distribution: openSUSE 15.2
Posts: 1,339

Rep: Reputation: 260Reputation: 260Reputation: 260
As Linux_Kidd said “Hacker” on his machine, it was not clear whether there are any users or hackers from the outside world on this machine.

If he is alone on the machine, any installed but not started application won’t affect the security at all.
 
Old 10-19-2012, 09:52 AM   #9
Noway2
Senior Member
 
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125

Rep: Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781Reputation: 781
I have used telnet on several occasions to help troubleshoot a problem or test a new function or feature. While I suppose it is possible to install and remove the client every time I need or wish to perform this function, my concerns about an intruder being able to capitalize on the availability of telnet on a system that they have just broken into is fairly low, and certainly much lower than their getting access in the first place. To me it becomes a matter of weighing the benefit to me versus the potential benefit to an intruder.
 
Old 10-19-2012, 10:54 AM   #10
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by Linux_Kidd View Post
Why should I give a hacker tools to connect with or tools to download malware with? ...
If you are going that route, remove wget, *ftp, lynx , links2 and python.

If a kiddie/script gets on the host, telnet not being there is a non-issue.
 
Old 10-19-2012, 11:03 AM   #11
Reuti
Senior Member
 
Registered: Dec 2004
Location: Marburg, Germany
Distribution: openSUSE 15.2
Posts: 1,339

Rep: Reputation: 260Reputation: 260Reputation: 260
You can also transfer files by a plain ssh conection:
Code:
$ cat mybinary | ssh server "cat > mybinary"
Not to mention a copy/paste from/to any window where the session is run.
 
Old 10-19-2012, 11:59 AM   #12
Wim Sturkenboom
Senior Member
 
Registered: Jan 2005
Location: Roodepoort, South Africa
Distribution: Ubuntu 12.04, Antix19.3
Posts: 3,794

Rep: Reputation: 282Reputation: 282Reputation: 282
Quote:
Originally Posted by Linux_Kidd View Post
Why should I give a hacker tools to connect with or tools to download malware with? Also, these items may carry undocumented vulnerabilities. If not absolutely needed why should the system have them installed?
The hacker must first gain access. After that, any protection is basically useless. As long as you don't run ftp and telnet clients, they are no risk.
 
Old 10-19-2012, 02:50 PM   #13
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
Quote:
Originally Posted by Reuti View Post
As Linux_Kidd said “Hacker” on his machine, it was not clear whether there are any users or hackers from the outside world on this machine.

If he is alone on the machine, any installed but not started application won’t affect the security at all.
Perhaps the idea of "not needed not there" concept has vanished from the world of security?

So what's your stance when there's a zeroday for the telnet client that allows uid's to do things as uid =0 ??? Would you then say "OH, only if it wasn't installed"???
 
Old 10-19-2012, 03:10 PM   #14
Reuti
Senior Member
 
Registered: Dec 2004
Location: Marburg, Germany
Distribution: openSUSE 15.2
Posts: 1,339

Rep: Reputation: 260Reputation: 260Reputation: 260
If a non-suid application suddenly run as uid=0 it’s IMO either a kernel problem or an already faulty/tampered library/loader. So the deeper cause needs to be fixed, but not the single client application (in fact: there may be many of them then).
 
Old 10-19-2012, 07:33 PM   #15
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Original Poster
Rep: Reputation: 78
i am not saying the binary becomes suid, i am saying the telnet binary has a binary flaw that allows privilege escalation, hence, it was not run suid, it was ran as UID >=500 and now the hacker is doing bad things as euid=0

ok, perhaps my Q was to the wrong crowd.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
how to setup thin client just for telnet or ssh client use using boot diskless PXE. hocheetiong Linux - Newbie 3 05-21-2008 07:02 PM
slackware 11.0 -- to leave or not to leave out the 2.4 kernel? aquilolumen Slackware - Installation 7 06-30-2007 07:12 PM
Best Telnet Client? Haggis Linux - Newbie 1 12-29-2004 01:05 PM
What telnet client? rivethead Linux - Software 3 03-25-2004 02:10 PM
What telnet client ? rivethead Linux - Software 5 02-27-2003 12:33 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:01 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration