- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Telnet logins
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 02:11 AM
04-11-2005 02:11 AM
Problem has arisen : any user attempting to log into server using a telnet session is granted access without requesting a password.
I have shutdown inetd until I have this solved.
I have remove an and all .rhosts files and /etc/hosts.equiv. The system has been rebooted.
Any ideas???
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 02:20 AM
04-11-2005 02:20 AM
Solution/var/adm/inetd.sec and put in this:
telnet deny
so you won't have to shutdown inetd.
Futher is it a trusted system or is it a non trusted system. If it is a non trusted system did you disable the non-password in the security file? if don't fix it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 02:23 AM
04-11-2005 02:23 AM
Re: Telnet logins
There are 2 possibilities here that I can think of;
1) Users have no passwords. If the password field of /etc/passwd is empty, users won't be asked to enter a password.
2) TAC access control is enabled on the server. This works in a similar way to host equivalency for rlogin. Check the telnetd line in /etc/inetd.conf If this contains the parameter -t, TAC is enabled. This is a security problem, as it works based on the UID number of the account, rather than the user name, so equivalence between hosts is not necessarily to the same user ID. This equivalence is based on /etc/hosts.equiv and local .rhosts files, so if you've removed those, it's unlikely to be this that's the problem.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 02:23 AM
04-11-2005 02:23 AM
Re: Telnet logins
any user name?
What do the following commands
grep telnet /etc/services /etc/inetd.conf
ps -ef | grep -e telnet -e ssh
ls -l /var/adm/inetd.sec
grep -v "^#" /var/adm/inetd.sec
what /usr/lbin/telnetd
return?
If you rebooted then most likely inetd restarted.
live free or die
harry d brown jr
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 02:30 AM
04-11-2005 02:30 AM
Re: Telnet logins
You can spot them with netstat -an
You have to terminate those users manually until your security problem is solved.
The inetd.sec file can be used to deny access by ip address if warranted. Once again the effect will not be immediate, just on new sessions.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 03:10 AM
04-11-2005 03:10 AM
Re: Telnet logins
/etc/services:telnet stream tcp nowait root /usr/lbin/telnetd telnetd -b/etc/issue
ps -ef|grep -e telnet -e ssh
eklaus1 3846 3844 8 08:27:22 ? 0:08 sshd: eklaus1@pts/0
root 2506 1 0 06:04:39 ? 0:00 /opt.ssh/sbin/sshd
root 4248 3882 6 10:43:59 pts/0 0:00 grep -e telnet -e ssh
r00t 3844 2506 0 08:27:12 ? 0:01 sshd: eklaus1 [priv]
grep -v "^#" /var/adm/inetd.sec
dtspc allow 127.0.0.1 loopback ese007
I have already shut inetd down using inetd -k.
inetd.conf has been copied from a working 11.0 server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 03:36 AM
04-11-2005 03:36 AM
Re: Telnet logins
grep telnet /etc/services /etc/inetd.conf
because this is VERY wrong:
/etc/services:telnet stream tcp nowait root /usr/lbin/telnetd telnetd -b/etc/issue
It should read:
/etc/services:telnet 23/tcp # Virtual Terminal Protocol
/etc/inetd.conf:telnet stream tcp nowait root /usr/lbin/telnetd telnetd -b /etc/issue
from your output /etc/services has the contents of /etc/inetd.conf - Hopefully just a TYPO of cut & paste
live free or die
harry d brown jr
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 04:17 AM
04-11-2005 04:17 AM
Re: Telnet logins
/etc/services:telnet 23/tcp #Virtual Terminal protocol
/etc/inetd.conf:telnet stream tcp nowait root /usr/lbin/telnetd telnetd -b/etc/issue
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 05:54 AM
04-11-2005 05:54 AM
Re: Telnet logins
We had an abortive effort to install netbackup last week. I never completed.
During that attempt I believe that /etc/pam.conf was over written eliminating the passwd check. This was probably inteded to be temporary.
Upon updating the /etc/pam.conf file with a file from a working system our problem was solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2005 05:55 AM
04-11-2005 05:55 AM