In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
On 12.03.2025 06:41 Uhr peter@easthope.ca wrote:
In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
What should it do?
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
telnet offers you to login if a telnet server is running.
As long this connection is only inside your system, this is
secure. If it is going outside, you need to have an underlaying
protocol (IPsec or a VPN tunnel) to avoid eavesdropping, as normal
telnet is not encrypted.
Marco, Richard & all,
In article <20250312170838.7d5b1e1c@ryz.dorfdsl.de>, Marco Moock <mm@dorfdsl.de> wrote:
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
telnet offers you to login if a telnet server is running.
In Debian,
# grep ^telnet /etc/inetd.conf
telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/telnetd -E
/bin/bash
Nobody other than me has an account on the system. I authenticate
after the system boots or when returning after logout. Neither
"telnet localhost" nor "xterm" asks for a password.
As long this connection is only inside your system, this is
secure. If it is going outside, you need to have an underlaying
protocol (IPsec or a VPN tunnel) to avoid eavesdropping, as normal
telnet is not encrypted.
Shorewall is configured to prevent a telnet connection from outside localhost.
So my configuration is unusual but not particularly hazardous?
Marco Moock <mm@dorfdsl.de> wrote:
It gives me
m@ryz:~$ xterm localhost
xterm: No absolute path found for shell: localhost
Is that what you ran?
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
telnet offers you to login if a telnet server is running.
In Debian,
# grep ^telnet /etc/inetd.conf
telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/telnetd -E /bin/bash
Nobody other than me has an account on the system. I authenticate
after the system boots or when returning after logout. Neither "telnet localhost" nor "xterm" asks for a password.
In a Linux X Window System, is "telnet localhost" less secure than
"xterm localhost"? If so, why?
Completely different stuff. xterm just opens a terminal emulator on
your system. telnet connects to a telnet server, usually a remote
system.
If telnet doesn't ask for a password, this is a security problem if
other people (locally or remote) can access the telnet server.
As long as it stays so, it is. But when other people can access it,
they can take over control of your system.
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
A telnetd without a password will allow lateral movement from other
UIDs.
Marco Moock <mm@dorfdsl.de> wrote:
Now a really stupid question: Why do you need a local telnet server?
Isn't xterm, and if needed, su, enough?
Absoutely reasonable to ask. The client side of the communication
does not have xterm or su.
https://en.wikibooks.org/wiki/Oberon/A2
A2 has a secure shell but I tend to use the Oberon subsystem.
Oberon has an old ssh client. Needs major work for compatibility
with the current environment.
... can�ęt the Oberon environment run it directly?
Richard Kettlewell <invalid@invalid.invalid> wrote:
... can’t the Oberon environment run it directly?
Two entities communicate directly. One is the telnet daemon on the
linux host. The other is the telnet client in the Oberon subsystem.
Demonstating in your system is a small execise. Install LinuxA2 and
try it. https://en.wikibooks.org/wiki/Oberon/A2
If you see a way to make the link more direct, please let me know or
edit the wiki.
On 13.03.2025 08:28 Uhr peter@easthope.ca wrote:
Correction: I should have asked, is "telnet localhost" less secure
than "xterm"?
Completely different stuff. xterm just opens a terminal emulator on
your system. telnet connects to a telnet server, usually a remote
system.
They do different things, so it�ęs not clear why you�ęd compare them.
A telnetd without a password will allow lateral movement from other
UIDs.
Richard Kettlewell <invalid@invalid.invalid> wrote:
They do different things, so it’s not clear why you’d compare them.
Screenshots are at https://easthope.ca/XtermVersusTelnet.png .
I recognize that the window frames and fonts differ. Window contents
are similar and functionalities for a user are similar.
A telnetd without a password will allow lateral movement from other
UIDs.
A password is required to log in to the system
and I am the only person with accounts. The root account and a user
account. Please outline how lateralization can happen.
In this case by lateral movement I mean an attacker who has
compromised one UID escalating privilege to another UID. In this
case, it�ęs as simple as �Ĝtelnet localhost�ĝ.
Richard & all,
In article <wwvr030d4ab.fsf@LkoBDZeT.terraraq.uk>,
Richard Kettlewell <invalid@invalid.invalid> wrote:
They do different things, so itâÄs not clear why youâÄd compare them.
Screenshots are at https://easthope.ca/XtermVersusTelnet.png .
I recognize that the window frames and fonts differ. Window contents
are similar and functionalities for a user are similar.
A telnetd without a password will allow lateral movement from other
UIDs.
A password is required to log in to the system and I am the only
person with accounts. The root account and a user account. Please
outline how lateralization can happen.
Thanks, ... P.
Sysop: | DaiTengu |
---|---|
Location: | Appleton, WI |
Users: | 1,030 |
Nodes: | 10 (0 / 10) |
Uptime: | 29:05:16 |
Calls: | 13,346 |
Calls today: | 3 |
Files: | 186,574 |
D/L today: |
4,397 files (1,084M bytes) |
Messages: | 3,357,853 |