


Reasons and solutions for failure of telnet to RedHat Linux
Reason for failure:
1. The telnet package is not installed. Check whether the telnet package is installed:
[root@vm-rhel root]# rpm -qa telnet telnet-0.17-25
means it is installed
2. The telnet package has been installed, but telnet-server has not been installed. Check whether the telnet-server package is installed:
[root@vm-rhel root]# rpm -qa telnet-server telnet-server-0.17-25
means it has been installed
3.telnet configuration File problem:
[root@vm-rhel root]# cat /etc/xinetd.d/telnet # default: on # description: The telnet server serves telnet sessions; it uses \ # unencrypted username/password pairs for authentication. service telnet { flags = REUSE socket_type = stream wait = no user = root server = /usr/sbin/in.telnetd log_on_failure += USERID disable = yes }
Change the value corresponding to disable to no or comment the line and restart the xinetd daemon: service xinetd restart.
4.Linux firewall reason, check the firewall status:
<br>
[root@vm-rhel root]# service iptables status<br>Table: filter<br>Chain INPUT ( policy ACCEPT)<br>target prot opt source destination <br>RH-Lokkit-0-50-INPUT all -- anywhere anywhere
<br>
Chain FORWARD (policy ACCEPT)<br>target prot opt source destination <br>RH-Lokkit-0-50-INPUT all -- anywhere anywhere
<br>
Chain OUTPUT (policy ACCEPT)<br>target prot opt source destination
<br>
Chain RH-Lokkit-0 -50-INPUT (2 references)<br>target prot opt source destination <br>ACCEPT udp -- 192.168.1.1 anywhere udp spt:domain dpts:1025:65535 <br>ACCEPT tcp -- anywhere anywhere tcp dpt:smtp flags :SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:http flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ftp flags:SYN,RST,ACK /SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:telnet flags:SYN,RST,ACK/SYN <br>ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc <br>ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc <br>ACCEPT all -- anywhere anywhere <br>ACCEPT all -- anywhere anywhere <br>REJECT tcp -- anywhere anywhere tcp dpts:0:1023 flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpt:nfs flags :SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT udp -- anywhere anywhere udp dpts:0:1023 reject-with icmp-port-unreachable <br>REJECT udp -- anywhere anywhere udp dpt :nfs reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpts:x11:6009 flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpt:xfs flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable
means it is not closed. If the firewall is closed, there is no need to configure /etc/sysconfig/iptables Add to the configuration file: -A RH-Lokkit-0-50-INPUT -p tcp -m tcp --dport 23 --syn -j ACCEPT.
Close the firewall: service iptables stop (invalid after restart: the firewall starts automatically at boot)
Start the firewall: service iptables start
Restart the firewall: service iptables restart
Disable the firewall from automatically starting at boot: chkconfig iptables off
5. By default, Linux does not allow the root user to log in to the Linux host through telnet. If you want to allow the root user to log in, you can use the following 3 methods:
(1) Modify the /etc/pam.d/login configuration file
RedHat Linux’s restrictions on remote login are reflected in the /etc/pam.d/login file. Just comment out the restrictions.
[root@vm-rhel root]# cat /etc/pam.d/login#%PAM-1.0auth required pam_securetty.so auth required pam_stack.so service=system-auth #auth required pam_nologin.so account required pam_stack.so service=system-auth password required pam_stack.so service=system-auth session required pam_stack.so service=system-auth session optional pam_console.so
(2) Remove the /etc/securetty folder
The verification rules are set in the /etc/securetty file, which defines that the root user can only Recorded on the terminal of tty1-tty6, deleting the file or renaming it can avoid the verification rules and enable the root user to remotely log in to the Linux host through telnet.
[root@vm-rhel root]# mv /etc/securetty /etc/securetty.bak
(3) First log in as a normal user, and then switch to the root user
[bboss@vm-rhel bboss]$ su root Password: [root@vm-rhel bboss]#
The above is the detailed content of Reasons and solutions for failure of telnet to RedHat Linux. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



The steps to start a Redis server include: Install Redis according to the operating system. Start the Redis service via redis-server (Linux/macOS) or redis-server.exe (Windows). Use the redis-cli ping (Linux/macOS) or redis-cli.exe ping (Windows) command to check the service status. Use a Redis client, such as redis-cli, Python, or Node.js, to access the server.

The five pillars of the Linux system are: 1. Kernel, 2. System library, 3. Shell, 4. File system, 5. System tools. The kernel manages hardware resources and provides basic services; the system library provides precompiled functions for applications; the shell is the interface for users to interact with the system; the file system organizes and stores data; and system tools are used for system management and maintenance.

There are three ways to view instance names in Oracle: use the "sqlplus" and "select instance_name from v$instance;" commands on the command line. Use the "show instance_name;" command in SQL*Plus. Check environment variables (ORACLE_SID on Linux) through the operating system's Task Manager, Oracle Enterprise Manager, or through the operating system.

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

To start Redis on a Linux system: Install the Redis package. Enable and start the Redis service. Verify that Redis is running. Connect to the Redis server. Advanced options: Configure the Redis server. Set password. Use the systemd unit file.

To uninstall an Oracle database: stop the Oracle service, remove the Oracle instance, delete the Oracle home directory, clear the registry key (Windows only), and delete the environment variables (Windows only). Please back up the data before uninstalling.

Using Docker on Linux can improve development and deployment efficiency. 1. Install Docker: Use scripts to install Docker on Ubuntu. 2. Verify the installation: Run sudodockerrunhello-world. 3. Basic usage: Create an Nginx container dockerrun-namemy-nginx-p8080:80-dnginx. 4. Advanced usage: Create a custom image, build and run using Dockerfile. 5. Optimization and Best Practices: Follow best practices for writing Dockerfiles using multi-stage builds and DockerCompose.

After Oracle is installed, you can use the following steps: Create a database instance. Connect to the database. Create a user. Create a table. Insert data. Query data. Export data. Import data.
