You are not logged in. Login Now
 0-18   19-43   44-57        
 
Author Message
cross
Telnetd removal from OpenBSD >= 3.8 and grex. Mark Unseen   Dec 19 14:13 UTC 2005

The new version of OpenBSD (version 3.8 and, presumably, future
releases) have removed the telnet daemon from the distribution.
However, a number of grex users use telnet to connect to grex.
I'd like to see more information about how grex is dealing with
this basic OS change.  Now, it's not terribly hard to just copy
the telnet source code from an older version of OpenBSD, but that's
a step that shouldn't be neglected, and yet there's no mention at
all of this change in grexdoc.  So what's up with it?
57 responses total.
nharmon
response 1 of 57: Mark Unseen   Dec 19 15:48 UTC 2005

The first of Grex's "Security Goals" is "Protecting the privacy of
users." Eliminating Telnet access would certainly be a part of this goal. 
rcurl
response 2 of 57: Mark Unseen   Dec 19 18:39 UTC 2005

Does eliminated telnet including eliminating similar daemons, like SSH? 
CAEN eliminated telnet some months back, but SSH is the replacement. 
nharmon
response 3 of 57: Mark Unseen   Dec 19 19:09 UTC 2005

I don't think eliminating telnet would mean eliminating SSH, since SSH
meets Grex's security goals.
bhoward
response 4 of 57: Mark Unseen   Dec 19 23:47 UTC 2005

Integrating the telnet sources we used is on my short list.  It is
blocked pending some answers to questions I've raised regarding
grexsoft and its reintegration with grexdoc.

We've made good progress since the upgrade cleaning up various loose
ends that never made it into or were not kept updated in grexdoc.  I'd
love to finish off telnetd and grexsoft ASAP.

As for the other question, whether to retire telnetd entirely...I'd
be very happy to do that but it won't fly unless we write up some
very easy-to-understand instructionas for newusers on how to install
and configure PuTTY (or its moral equivalent).  Restricting network
logins to ssh may raise the technical bar too high for some of our
newusers without decent documentation.
gull
response 5 of 57: Mark Unseen   Dec 21 02:58 UTC 2005

I would say either keep telnet around, or find a good SSH Java application and put it on the web page.
nharmon
response 6 of 57: Mark Unseen   Dec 21 03:11 UTC 2005

I vote for the later.
rcurl
response 7 of 57: Mark Unseen   Dec 21 03:15 UTC 2005

When I travel I'm often forced to use Windows machines. I download PuTTY
to them. (You can follow my trail that way.) Why not just include a link
to the PuTTY site on the web page? You don't have to do anything to install
it after downloading. Just run it as an app. 
naftee
response 8 of 57: Mark Unseen   Dec 21 05:01 UTC 2005

putty.ernie.org
twenex
response 9 of 57: Mark Unseen   Dec 21 11:16 UTC 2005

PuTTY might be available in a UNIX compatibility package for MacOS too.
remmers
response 10 of 57: Mark Unseen   Dec 21 13:22 UTC 2005

OS X comes with ssh.  Why would you need PuTTY?

I agree with Bruce's #4, last paragraph.  Re the suggestion in #5 for
browser-embedded SSH - I think that's a cool idea.  There's some
interesting work on using JavaScript and XMLHTTPRequest for that, which
might be a better way to go than Java applets.  See for example
http://anyterm.org/ .
twenex
response 11 of 57: Mark Unseen   Dec 21 13:23 UTC 2005

Oh, it does? some people like GUIs too much.
remmers
response 12 of 57: Mark Unseen   Dec 21 15:13 UTC 2005

Yes, but Darwin is a superb example of Intelligent Design.

<remmers ducks>
twenex
response 13 of 57: Mark Unseen   Dec 21 15:56 UTC 2005

Oh, no. You've done it now, John...
tod
response 14 of 57: Mark Unseen   Dec 27 21:26 UTC 2005

Browser embedded SSH defeats the purpose of SSH key exchange.  Why not
continue using older telnet source rather than shoving "Security Goals" down
the throat of users that may not care that much?
Perhaps requiring SSH of members(i.e. outbound telnet) could meet the security
goals without infringing on the vast array of users?
nharmon
response 15 of 57: Mark Unseen   Dec 27 22:32 UTC 2005

Well, if the users do not agree with the security goals, why don't we
change the goals, and not simply ignore them. :)
bhoward
response 16 of 57: Mark Unseen   Dec 28 00:51 UTC 2005

Todd, how does browser embedded SSH defeat the purpose of SSH key
exchange?
cross
response 17 of 57: Mark Unseen   Dec 28 01:30 UTC 2005

Presumably, the user who logins in via browser embedded SSH is transient
in nature, and not likely to login from the same computer that often.  Then,
they can't tell if the host key changes easily.

The SSH model allows one to test the validity of a host key because it
presumes the keys change rarely and are widely published.  The embedded
browser model does away with some of those assumptions.
tod
response 18 of 57: Mark Unseen   Dec 28 16:09 UTC 2005

In addition to what Dan said, applet based SSH would leave behind information
such as hostname, public host key, username, and possibly even password
(assuming someone before you had loaded the applet on the machine with the
"record" function enabled.)

I'm still not sure how the majority of the userbase would benefit from being
denied telnet unless future versions of Windows(which the majority of Grexers
use) include SSH.
 0-18   19-43   44-57        
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss