Index Index for
Section 8
Index Alphabetical
listing for T
Bottom of page Bottom of
page

telnetd(8)

NAME

telnetd - The DARPA telnet protocol server daemon

SYNOPSIS

telnetd [-debug | debug6 [port]] [-D modifier...] [-n] [-x] [-K] [-d auth | enc]

OPTIONS

-debug|debug6 [port] Starts telnetd manually, rather than through inetd, on alternate TCP port number port (if specified). It either creates an IPv4 socket (-debug) or IPv6 socket (-debug6). -D modifier ... Prints out debugging information. This allows telnetd to print out debugging information to the connection, allowing the user to see what telnetd is doing. Valid values for modifier are: options Prints information about negotiation of telnet options. report Prints the same information as options, along with additional processing information. netdata Displays the data stream received by telnetd. ptydata Displays data written to the pty. exercise Not yet implemented. -n Disables reverse lookups of remote host names. This option can prevent login delays and timeouts in an environment where host name resolution is sluggish. -x Encrypts the data transmitted between the local host and the remote host. This option requires that the local and remote hosts be configured to use Kerberos authentication in the same or trusting Kerberos realms. -K Specifies that only Kerberos authenticated connections will be accepted. This option requires that the local and remote hosts be configured to use Kerberos authentication in the same or trusting Kerberos realms. -d [auth | enc] Enables authentication (auth) or encryption (enc) debugging.

DESCRIPTION

The telnetd daemon is a server that supports the DARPA (Defense Advanced Research Projects Agency) standard telnet virtual terminal protocol. The telnetd daemon is invoked by the Internet server (see inetd(8)) normally for requests to connect to the telnet port as indicated by the /etc/services file (see services(4)). Either the -debug option (for IPv4 sockets) or -debug6 option (for IPv6 sockets) may be used, to start up telnetd manually. If the daemon is started up this way, port may be specified to run telnetd on an alternate TCP port number. The telnetd daemon operates by allocating a pseudoterminal device (see pty(7)) for a client, then creating a login process that has the slave side of the pseudoterminal as stdin, stdout, and stderr. The telnetd daemon manipulates the master side of the pseudo-terminal, implementing the telnet protocol and passing characters between the remote client and the login process. When a telnet session is started up, telnetd sends telnet options to the client side, indicating a willingness to do remote echo of characters, to suppress go ahead, to do remote flow control, and to receive terminal type information, terminal speed information, and window size information from the remote client. If the remote client is willing, the remote terminal type is propagated in the environment of the created login process. The pseudoterminal allocated to the client is configured to operate in cooked mode, and with XTABS and CRMOD enabled (see tty(7)). The telnetd daemon is willing to do: echo, binary, suppress go ahead, and timing mark. The telnetd daemon is willing to have the remote client do: line mode, binary, terminal type, terminal speed, window size, toggle flow control, environment, X display location, and suppress go ahead. The telnetd daemon never sends telnet go ahead commands. Note that binary mode has no common interpretation except between similar operating systems (Unix-compatible systems in this case). Note also that the terminal type name received from the remote client is converted to lowercase. The telnet command uses the default Type-of-Service value recommended by RFC1060, which is as follows: telnet Low delay You can configure this value by specifying it in the /etc/iptos file. For more information, see iptos(4). By default, the telnetd daemon starts the login dialog using the login string specified in the message field of the /etc/gettydefs file. If you want to use a customized banner, create an /etc/issue.net or /etc/issue file. The telnetd daemon reads the file that exists and writes its contents over a new telnet connection prior to starting the login dialog. If both files exist, only the /etc/issue.net file is used.

SECURE CONNECTION

The telnetd daemon can use a secure connection. A secure connection is one where the telnetd daemon authenticates a user by using Kerberos. Kerberos is a client/server application that authenticate the client, server, and user, encrypt data, and ensure data integrity and nonrepudiation. See your system administrator to determine if your system is running Kerberos. See Security Administration for more information about Kerberos. Kerberos authenticates by using secret-key cryptography and tickets between Kerberos clients and Kerberos server in the same or trusting Kerberos realms. Once authenticated by Kerberos, users receive a Kerberos Ticket Granting Ticket (TGT). Users with a valid TGT are not prompted for a username or password when the remote host is in the same or trusting Kerberos realm.

CAUTIONS

Some telnet commands are only partially implemented. Because of bugs in the original 4.2BSD telnet command, telnetd performs some dubious protocol exchanges to try to discover if the remote client is, in fact, a 4.2BSD telnet.

FILES

/usr/sbin/telnetd Specifies the command path. /etc/issue.net Specifies the path name for the network issue identification file. /etc/issue Specifies the path name for the issue identification file.

SEE ALSO

Commands: telnet(1) Files: iptos(4), issue(4), issue.net(4) Guides: Security Administration

Index Index for
Section 8
Index Alphabetical
listing for T
Top of page Top of
page