One Linux command per day: Telnet command

Source: Internet
Author: User
Tags aliases nameserver telnet program

Telnet commands are usually used to log on remotely. The Telnet program is a telnet protocol-based Telnet client program. The Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Login service. It provides users with the ability to perform remote host work on the local computer. Use the Telnet program on the end user's computer to connect to the server. End users can enter commands in the Telnet program that run on the server as if they were entered directly on the server's console. The server can be controlled locally. To start a Telnet session, you must enter a user name and password to log on to the server. Telnet is a common way to remotely control a Web server.

However, Telnet is not secure because it transmits messages in plaintext, and many Linux servers do not open the Telnet service, instead using a more secure SSH approach. However, there are still many other systems that may use Telnet to provide remote logins, so it is still necessary to figure out how to use the Telnet client.

The Telnet command can also be used for other purposes, such as determining the status of a remote service, such as determining whether a port on a remote server can be accessed.

1. Command format:

telnet[parameters [Host]

2. Command function:

Perform the Telnet command to open the terminal stage job and log in to the remote host.

3. Command parameters:

#p # Page Header #e#-8 allows the use of 8-bit character data, including input and output.

-a attempts to automatically log in to the remote system.

-b< host aliases > Use aliases to specify the remote host name.

-C does not read the. telnetrc file in the user-specific directory.

-D start the debug mode.

-e< out character > set out character.

-e filters out the off character.

-F The effect of this parameter is the same as specifying the "-F" parameter.

-F with Kerberos V5 authentication, this parameter can be used to upload authentication data from the local host to the remote host.

-k< domain name > When using Kerberos authentication, this parameter allows the remote host to take the specified realm name rather than the domain name of the host.

-K does not automatically log in to the remote host.

-l< User name > Specifies the name of the user to log in to the remote host.

#p # Page Header #e#-l allows output of 8-bit character data.

-n< log Files > specify information about file records.

-R uses a user interface similar to the rlogin directive.

-s< Service Type > set the IP TOS information required for Telnet connection.

-X assumes that the host has the capability to support data encryption and uses it.

-x< Authentication Pattern > Close the specified authentication pattern.

4. Usage examples:

Example 1: Remote server cannot access

Command:

Telnet 192.168.120.206

Output:

#p # Pagination title #e#[[email protected] ~]# telnet 192.168.120.209
Trying 192.168.120.209 ...
Telnet:connect to address 192.168.120.209:no route to host
Telnet:unable to connect-to-remote host:no route to host
[Email protected] ~]#

Description

To handle this scenario:

(1) Verify that the IP address is correct?

(2) Verify that the host IP address is powered on?

(3) If the host has been started, confirm that the routing settings are set correctly? (View using the route command)

(4) If the host has been started, verify that the Telnet service is turned on on the host? (Use the Netstat command to see if TCP port 23 has a listen status line)

(5) If the host has started the Telnet service, confirm that the firewall has released 23 port access? (View with Iptables-save)

#p # pagination Header #e# Instance 2: Domain name cannot be resolved

Command:

Telnet www.baidu.com

Output:

[[Email protected] ~]# Telnet www.baidu.com
Www.baidu.com/telnet:Temporary failure in name resolution
[Email protected] ~]#

Description

To handle this scenario:

(1) Confirm that the domain name is correct

(2) Confirm that the local domain name resolution is correct (NameServer is set correctly in/etc/resolv.conf, if not, you can use nameserver 8.8.8.8)

#p # Pagination Title #e# (3) Confirm that the firewall has released access to the UDP53 port (DNS uses UDP protocol, port 53, Iptables-save view)

Example 3:

Command:

Output:

[[Email protected] ~]# Telnet 192.168.120.206
Trying 192.168.120.206 ...
Telnet:connect to address 192.168.120.206:connection refused
Telnet:unable to connect to remote Host:connection refused
[Email protected] ~]#

Description

Handle this situation:

(1) Verify that the IP address or hostname is correct?

(2) Confirm the port is correct, whether the default 23 port #p# paging title #e#

Example 4: Start the Telnet service

Command:

Service xinetd Restart

Output:

[Email protected] ~]# cd/etc/xinetd.d/
[email protected] xinetd.d]# LL
Total 124
-rw-r--r--1 root root 1157 2011-05-31 Chargen-dgram
-rw-r--r--1 root root 1159 2011-05-31 Chargen-stream
-rw-r--r--1 root root 523 2009-09-04 CVS
-rw-r--r--1 root root 1157 2011-05-31 Daytime-dgram
-rw-r--r--1 root root 1159 2011-05-31 Daytime-stream
-rw-r--r--1 root root 1157 2011-05-31 Discard-dgram
-rw-r--r--1 root root 1159 2011-05-31 Discard-stream
-rw-r--r--1 root root 1148 2011-05-31 Echo-dgram
-rw-r--r--1 root root 1150 2011-05-31 echo-stream#p# page title #e#
-rw-r--r--1 root root 323 2004-09-09 eklogin
-rw-r--r--1 root root 347 2005-09-06 ekrb5-telnet
-rw-r--r--1 root root 326 2004-09-09 gssftp
-rw-r--r--1 root root 310 2004-09-09 klogin
-rw-r--r--1 root root 323 2004-09-09 krb5-telnet
-rw-r--r--1 root root 308 2004-09-09 Kshell
-rw-r--r--1 root root 317 2004-09-09 rsync
-rw-r--r--1 root root 1212 2011-05-31 tcpmux-server
-rw-r--r--1 root root 1149 2011-05-31 Time-dgram
-rw-r--r--1 root root 1150 2011-05-31 Time-stream
[email protected] xinetd.d]# cat krb5-telnet
# Default:off
# description:the kerberized telnet Server accepts normal Telnet sessions, \
# but can also use Kerberos 5 authentication.
Service Telnet
{
Flags = Reuse
Socket_type = Stream
wait = no
user = root
Server =/usr/kerberos/sbin/telnetd
Log_on_failure + = USERID
Disable = yes
}
[[email protected] xinetd.d]# #p # page Title #e#

Description

Configuration parameters, typically configured as follows:

Service Telnet

{

Disable = no #启用

Flags = Reuse #socket可重用

Socket_type = Stream #连接方式为TCP

wait = no #为每个请求启动一个进程

user = root #启动服务的用户为root

Server =/usr/sbin/in.telnetd #要激活的进程 #p # page Header #e#

Log_on_failure + = USERID #登录失败时记录登录用户名

}

If you want to configure the list of clients allowed to log in, join

Only_from = 192.168.0.2 #只允许192.168.0.2 Login

If you want to configure a list of blocked clients, join

No_access = 192.168.0. {2,3,4} #禁止192.168.0.2, 192.168.0.3, 192.168.0.4 Login

If you want to set up an open window, join

Access_times = 9:00-12:00 13:00-17:00 # Only these two hours per day open service (Our office Hours: P)

If you have two IP addresses, one is the IP address of the private network such as 192.168.0.2, one is the IP address of the public network, such as 218.75.74.83, if you want users to login Telnet service only from the private network, then join

bind = 192.168.0.2

The specific meanings and syntax of each configuration item can refer to the Xined profile property description (man xinetd.conf) #p # pagination Title #e#

To configure the port, modify the Services file:

# vi/etc/services

Find the following two sentences

Telnet 23/tcp

Telnet 23/UDP

If there is a # character in front of it, remove it. The default port of Telnet is 23, this port is also the main object of the hacker port scan, so it is better to modify this port, the method is very simple, is to change the number 23, changed to a larger number, such as 61123. Note that the port number below 1024 is the port number reserved by the Internet, so it is best not to use it, and you should be careful not to conflict with the ports of other services.

Start the service:

Service xinetd Restart

Example 5: normal telnet#p# page title #e#

Command:

Telnet 192.168.120.204

Output:

[[Email protected] ~]# Telnet 192.168.120.204
Trying 192.168.120.204 ...
Connected to 192.168.120.204 (192.168.120.204).
Escape character is ' ^] '.

localhost (Linux release 2.6.18-274.18.1.el5 #1 SMP Thu Feb 9 12:45:44 EST 2012) (1)

Login:root
Password:
Login Incorrect

Description

In general, Root is not allowed to telnet, you can log in with a regular account, and then use Su-cut to the root user. #p # pagination Title #e#

Reproduced in: http://www.itxuexiwang.com/a/liunxjishu/2016/0303/209.html?1457083973

One Linux command per day: Telnet command

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.