[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Telnet





On Sat, Dec 2, 2023 at 10:02 AM Marco Moock <mm@dorfdsl.de> wrote:
Am 02.12.2023 um 09:50:00 Uhr schrieb William Torrez Corea:

> sudo telnet 192.168.1.1
> > Trying 192.168.1.1...
> > Connected to 192.168.1.1.
> > Escape character is '^]'.

That means that the telnet connection was successful

> > Telnet connection from 192.168.1.5:55670 refused.

That means that the remote system closed it.
Check the syslog/journalctl and check how telnet is implemented.
Are tcp-wrappers in inetd used?

Show you inetd config and
cat /etc/hosts.allow
cat /etc/hosts.deny

 
cat /etc/hosts.allow

# /etc/hosts.allow: list of hosts that are allowed to access the system.
#                   See the manual pages hosts_access(5) and hosts_options(5).
#
# Example:    ALL: LOCAL @some_netgroup
#             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "rpcbind" for the
# daemon name. See rpcbind(8) and rpc.mountd(8) for further information.
#

cat /etc/hosts.deny

# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
#                  See the manual pages hosts_access(5) and hosts_options(5).
#
# Example:    ALL: some.host.name, .some.domain
#             ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "rpcbind" for the
# daemon name. See rpcbind(8) and rpc.mountd(8) for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
#
# You may wish to enable this to ensure any programs that don't
# validate looked up hostnames still leave understandable logs. In past
# versions of Debian this has been the default.
# ALL: PARANOID




--

With kindest regards, William.

⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org
⠈⠳⣄⠀⠀⠀⠀



Reply to: