Home Operation and Maintenance Linux Operation and Maintenance Reasons and solutions for failure of telnet to RedHat Linux

Reasons and solutions for failure of telnet to RedHat Linux

Jun 20, 2017 am 09:35 AM
linux redhat telnet fail solve

Reason for failure:

1. The telnet package is not installed. Check whether the telnet package is installed:

[root@vm-rhel root]# rpm -qa telnet
 telnet-0.17-25
Copy after login

means it is installed

2. The telnet package has been installed, but telnet-server has not been installed. Check whether the telnet-server package is installed:

[root@vm-rhel root]# rpm -qa telnet-server
 telnet-server-0.17-25
Copy after login

means it has been installed

3.telnet configuration File problem:

[root@vm-rhel root]# cat /etc/xinetd.d/telnet
# default: on
# description: The telnet server serves telnet sessions; it uses \
#    unencrypted username/password pairs for authentication.
service telnet
{
    flags        = REUSE
    socket_type    = stream        
    wait        = no
    user        = root
    server        = /usr/sbin/in.telnetd
    log_on_failure    += USERID
    disable        = yes 
}
Copy after login

Change the value corresponding to disable to no or comment the line and restart the xinetd daemon: service xinetd restart.

4.Linux firewall reason, check the firewall status:

<br>
Copy after login
Copy after login
Copy after login
Copy after login

[root@vm-rhel root]# service iptables status<br>Table: filter<br>Chain INPUT ( policy ACCEPT)<br>target prot opt ​​source destination <br>RH-Lokkit-0-50-INPUT all -- anywhere anywhere

<br>
Copy after login
Copy after login
Copy after login
Copy after login

Chain FORWARD (policy ACCEPT)<br>target prot opt ​​source destination <br>RH-Lokkit-0-50-INPUT all -- anywhere anywhere

<br>
Copy after login
Copy after login
Copy after login
Copy after login

Chain OUTPUT (policy ACCEPT)<br>target prot opt ​​source destination

<br>
Copy after login
Copy after login
Copy after login
Copy after login

Chain RH-Lokkit-0 -50-INPUT (2 references)<br>target prot opt ​​source destination <br>ACCEPT udp -- 192.168.1.1 anywhere udp spt:domain dpts:1025:65535 <br>ACCEPT tcp -- anywhere anywhere tcp dpt:smtp flags :SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:http flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ftp flags:SYN,RST,ACK /SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN <br>ACCEPT tcp -- anywhere anywhere tcp dpt:telnet flags:SYN,RST,ACK/SYN <br>ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc <br>ACCEPT udp -- anywhere anywhere udp spts:bootps:bootpc dpts:bootps:bootpc <br>ACCEPT all -- anywhere anywhere <br>ACCEPT all -- anywhere anywhere <br>REJECT tcp -- anywhere anywhere tcp dpts:0:1023 flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpt:nfs flags :SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT udp -- anywhere anywhere udp dpts:0:1023 reject-with icmp-port-unreachable <br>REJECT udp -- anywhere anywhere udp dpt :nfs reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpts:x11:6009 flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable <br>REJECT tcp -- anywhere anywhere tcp dpt:xfs flags:SYN,RST,ACK/SYN reject-with icmp-port-unreachable

means it is not closed. If the firewall is closed, there is no need to configure /etc/sysconfig/iptables Add to the configuration file: -A RH-Lokkit-0-50-INPUT -p tcp -m tcp --dport 23 --syn -j ACCEPT.

Close the firewall: service iptables stop (invalid after restart: the firewall starts automatically at boot)

Start the firewall: service iptables start

Restart the firewall: service iptables restart

Disable the firewall from automatically starting at boot: chkconfig iptables off

5. By default, Linux does not allow the root user to log in to the Linux host through telnet. If you want to allow the root user to log in, you can use the following 3 methods:

(1) Modify the /etc/pam.d/login configuration file

RedHat Linux’s restrictions on remote login are reflected in the /etc/pam.d/login file. Just comment out the restrictions.

[root@vm-rhel root]# cat /etc/pam.d/login#%PAM-1.0auth       required    pam_securetty.so
auth       required    pam_stack.so service=system-auth
#auth       required    pam_nologin.so
account    required    pam_stack.so service=system-auth
password   required    pam_stack.so service=system-auth
session    required    pam_stack.so service=system-auth
session    optional    pam_console.so
Copy after login

(2) Remove the /etc/securetty folder

The verification rules are set in the /etc/securetty file, which defines that the root user can only Recorded on the terminal of tty1-tty6, deleting the file or renaming it can avoid the verification rules and enable the root user to remotely log in to the Linux host through telnet.

[root@vm-rhel root]# mv /etc/securetty /etc/securetty.bak
Copy after login

(3) First log in as a normal user, and then switch to the root user

[bboss@vm-rhel bboss]$ su root
Password: 
[root@vm-rhel bboss]#
Copy after login

The above is the detailed content of Reasons and solutions for failure of telnet to RedHat Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to start the server with redis How to start the server with redis Apr 10, 2025 pm 08:12 PM

The steps to start a Redis server include: Install Redis according to the operating system. Start the Redis service via redis-server (Linux/macOS) or redis-server.exe (Windows). Use the redis-cli ping (Linux/macOS) or redis-cli.exe ping (Windows) command to check the service status. Use a Redis client, such as redis-cli, Python, or Node.js, to access the server.

The 5 Pillars of Linux: Understanding Their Roles The 5 Pillars of Linux: Understanding Their Roles Apr 11, 2025 am 12:07 AM

The five pillars of the Linux system are: 1. Kernel, 2. System library, 3. Shell, 4. File system, 5. System tools. The kernel manages hardware resources and provides basic services; the system library provides precompiled functions for applications; the shell is the interface for users to interact with the system; the file system organizes and stores data; and system tools are used for system management and maintenance.

How to view instance name of oracle How to view instance name of oracle Apr 11, 2025 pm 08:18 PM

There are three ways to view instance names in Oracle: use the "sqlplus" and "select instance_name from v$instance;" commands on the command line. Use the "show instance_name;" command in SQL*Plus. Check environment variables (ORACLE_SID on Linux) through the operating system's Task Manager, Oracle Enterprise Manager, or through the operating system.

What is Linux actually good for? What is Linux actually good for? Apr 12, 2025 am 12:20 AM

Linux is suitable for servers, development environments, and embedded systems. 1. As a server operating system, Linux is stable and efficient, and is often used to deploy high-concurrency applications. 2. As a development environment, Linux provides efficient command line tools and package management systems to improve development efficiency. 3. In embedded systems, Linux is lightweight and customizable, suitable for environments with limited resources.

How to start linux with redis How to start linux with redis Apr 10, 2025 pm 08:00 PM

To start Redis on a Linux system: Install the Redis package. Enable and start the Redis service. Verify that Redis is running. Connect to the Redis server. Advanced options: Configure the Redis server. Set password. Use the systemd unit file.

Oracle database uninstall tutorial Oracle database uninstall tutorial Apr 11, 2025 pm 06:24 PM

To uninstall an Oracle database: stop the Oracle service, remove the Oracle instance, delete the Oracle home directory, clear the registry key (Windows only), and delete the environment variables (Windows only). Please back up the data before uninstalling.

Using Docker with Linux: A Comprehensive Guide Using Docker with Linux: A Comprehensive Guide Apr 12, 2025 am 12:07 AM

Using Docker on Linux can improve development and deployment efficiency. 1. Install Docker: Use scripts to install Docker on Ubuntu. 2. Verify the installation: Run sudodockerrunhello-world. 3. Basic usage: Create an Nginx container dockerrun-namemy-nginx-p8080:80-dnginx. 4. Advanced usage: Create a custom image, build and run using Dockerfile. 5. Optimization and Best Practices: Follow best practices for writing Dockerfiles using multi-stage builds and DockerCompose.

How to use oracle after installation How to use oracle after installation Apr 11, 2025 pm 07:51 PM

After Oracle is installed, you can use the following steps: Create a database instance. Connect to the database. Create a user. Create a table. Insert data. Query data. Export data. Import data.

See all articles