TELNETD(8) | System Manager's Manual | TELNETD(8) |
telnetd
— DARPA
telnet protocol server
/usr/sbin/in.telnetd |
[-hnNs ] [-a
authmode] [-D
debugmode] [-L
loginprg] [-S
tos] [-X
authtype] [-edebug ]
[-debug port]
[-z sslopt] |
The telnetd
program is a server which
supports the DARPA telnet interactive communication protocol.
Telnetd
is normally invoked by the internet server
(see inetd(8)) for requests to connect to the telnet port
as indicated by the /etc/services file (see
services(5)). The -debug
option
may be used to start up telnetd
manually, instead of
through inetd(8). If started up this way,
port may be specified to run
telnetd
on an alternate TCP port number.
The telnetd
program accepts the following
options:
-a
authmodetelnetd
has been compiled with support for
authentication, which is not available in the current version. The
following values of authmode are understood:
valid
.-D
debugmodetelnetd
to print out debugging information to the
connection, allowing the user to see what telnetd
is doing. Repeated use of the option arranges composite debug reports.
There are several possible values for debugmode:
options
report
options
information, plus some
additional information about what processing is going on.netdata
telnetd.
ptydata
exercise
-edebug
telnetd
has been compiled with support for
encryption, then the -edebug
option may be used to
enable encryption debugging code.-h
-L
loginprg-n
TCP
keep-alives. Normally
telnetd
enables the TCP keep-alive mechanism to
probe connections that have been idle for some period of time to determine
if the client is still there, so that idle connections from machines that
have crashed or can no longer be reached may be cleaned up.-N
-s
telnetd
is compiled
with support for SecurID cards. It causes the -s
option to be passed on to login(1), and thus is only
useful if login(1) supports the
-s
flag to indicate that only SecurID validated
logins are allowed. This is usually useful for controlling remote logins
from outside of a firewall.-S
tos-X
authtypetelnetd
has been
built with support for the authentication option. It disables the use of
authtype authentication, and can be used to
temporarily disable a specific authentication type without having to
recompile telnetd
.-z
SSL-parametertelnetd
has been
built with SSL (Secure Socket Layer) support.
debug
debug=
log_filessl
-z ssl
nossl,
!ssl
certsok
certrequired
secure
verify=int
cacert=
CA_filecert=
cert_filekey=
key_filecipher=
ciph_listIf the file /etc/issue.net is present,
telnetd
will display its contents before the login
prompt of a telnet session (see issue.net(5)).
Telnetd
operates by allocating a
pseudo-terminal device (see pty(4)) for a client, then
creating a login process which has the slave side of the pseudo-terminal as
stdin
, stdout
, and
stderr
. Telnetd
manipulates
the master side of the pseudo-terminal, implementing the telnet protocol and
passing characters between the remote client and the login process.
When a telnet session is started up,
telnetd
sends telnet options to the client side
indicating a willingness to do the following telnet options, which are
described in more detail below:
DO AUTHENTICATION WILL ENCRYPT DO TERMINAL TYPE DO TSPEED DO XDISPLOC DO NEW-ENVIRON WILL SUPPRESS GO AHEAD DO ECHO DO LINEMODE DO NAWS WILL STATUS DO LFLOW DO TIMING-MARK
The pseudo-terminal allocated to the client is configured to
operate in “cooked” mode, and with
XTABS
CRMOD
enabled (see
tty(4)).
Telnetd
has support for enabling locally
the following telnet options:
LINEMODE
option is enabled, a
WILL ECHO
or WONT ECHO
will be sent to the client to indicate the current state of terminal
echoing. When terminal echo is not desired, a WILL
ECHO
is sent to indicate that telnetd will take care of echoing any
data that needs to be echoed to the terminal, and then nothing is echoed.
When terminal echo is desired, a WONT ECHO
is sent
to indicate that telnetd will not be doing any terminal echoing, so the
client should do any terminal echoing that is needed.IAC GA,
go
ahead, commands.DO TIMING-MARK
command is received, it
is always responded to with a WILL
TIMING-MARK
DO LOGOUT
is received, a
WILL LOGOUT
is sent in response, and the TELNET
session is shut down.telnetd
is compiled with support for
data encryption, and indicates a willingness to decrypt the data
stream.Telnetd
has support for enabling remotely
the following TELNET options:
WILL ECHO.
If a WILL ECHO
is received, a DONT ECHO
will be sent in
response.IAC GA,
the go ahead command.telnetd
is compiled with support for
linemode, and requests that the client do line by line processing.telnetd
is compiled with support for
both linemode and kludge linemode, and the client responded with
WONT LINEMODE.
If the client responds with
WILL TM,
the it is assumed that the client
supports kludge linemode. Note that the [-k
]
option can be used to disable this.telnetd
is compiled with support for
authentication, and indicates a willingness to receive authentication
information for automatic login.telnetd
is compiled with support for
data encryption, and indicates a willingness to decrypt the data
stream./etc/services, /etc/issue.net, /etc/ssl.users
RFC-854
RFC-855
RFC-856
RFC-857
RFC-858
RFC-859
RFC-860
RFC-861
RFC-885
RFC-1073
RFC-1079
RFC-1091
RFC-1096
RFC-1123
RFC-1184
RFC-1372
RFC-1416
RFC-1411
RFC-1412
RFC-1571
RFC-1572
Some TELNET commands are only partially implemented.
Because of bugs in the original 4.2 BSD
telnet(1), telnetd
performs some
dubious protocol exchanges to try to discover if the remote client is, in
fact, a 4.2 BSD telnet(1).
Binary mode has no common interpretation except between similar operating systems (Unix in this case).
The terminal type name received from the remote client is converted to lower case.
Telnetd
never sends TELNET
IAC GA
(go ahead) commands.
The source code is not comprehensible.
December 29, 1996 | Linux NetKit (0.17) |