United States-English |
|
|
HP-UX Reference > Ttelnetd(1M)HP-UX 11i Version 3: February 2007 |
|
NAMEtelnetd — TELNET protocol server SYNOPSIS/usr/lbin/telnetd [-A] [-a authmode] [-b [bannerfile]] [-e] [-f] [-n] [-s] [-t] [-y] [-z] [-TCP_DELAY] DESCRIPTIONThe telnetd daemon executes a server that supports the DARPA standard TELNET virtual terminal protocol. The Internet daemon (inetd) executes telnetd when it receives a service request at the port listed in the services database for telnet using the tcp protocol (see inetd(1M) and services(4)). telnetd operates by allocating a Telnet pseudo-terminal device (see tels(7)) for a client, then creating a login process, which has the slave side of the Telnet pseudo-terminal as stdin, stdout, and stderr. telnetd manipulates the master side of the Telnet pseudo-terminal, implementing the TELNET protocol, and passing characters between the client and login process. When a TELNET session is started up, telnetd sends TELNET options to the client side, indicating a willingness to do remote echo of characters, to suppress go ahead, and to receive terminal speed terminal type, and authentication (if kerberos is enabled) information from the remote client. If the remote client is ready, the remote terminal type is propagated in the environment of the created login process. The pseudo-terminal allocated to the client is configured as a normal terminal for login, with the exception of echoing characters (see tty(7)).
The flow control option permits applications running on a remote host to toggle the flow control on the local host. To toggle flow control for a telnet session programmatically, the application program must first call the tcgetattr function to get the current termios settings. For example, tcgetattr(filedes, &termios_p) Then, the c_iflag of the termios structure must have IXON set(reset) to enable(disable) flow control. Finally, the tcsetattr function call can implement the change. For example, tcsetattr(filedes, TCSANOW, &termios_p) To toggle the flow control interactively, the user can issue a stty command using the input options -ixon to disable, or ixon to enable flow control. See the stty(1) manpage. The terminal speed option permits applications running on a remote host to obtain the terminal speed of the local host session using either ioctl or stty. The telnet server also supports the TAC User ID (also known as the TAC Access Control System, or TACACS User ID) option using which, users telneting to two or more consenting hosts may avoid going through a second login sequence. See the -t option below. To start telnetd from the Internet daemon, the configuration file /etc/inetd.conf must contain an entry as follows: telnet stream tcp nowait root /usr/lbin/telnetd telnetd The above configuration applies only for the IPv4 environment. For telnetd to work in the IPv6 environment, the configuration file /etc/inetd.conf must contain a tcp6 entry as follows:
telnet uses the same files as rlogin to verify participating systems and authorized users, hosts.equiv and .rhosts. (See hosts.equiv(4) and the HP-UX System Administrator's Guide for configuration details.) Optionstelnetd has the following options.
To configure telnetd to use the -TCP_DELAY option, the entry in /etc/inetd.conf would be: telnet stream tcp nowait root /usr/lbin/telnetd telnetd -TCP_DELAY To work in the IPv6 environment using the -TCP_DELAY option, the entry in /etc/inetd.conf would be: telnet stream tcp6 nowait root /usr/lbin/telnetd telnetd -TCP_DELAY
To configure telnetd to have a BUFFERSIZE of 100 bytes and a BUFFERTIMEOUT of 100 ticks, the entry in /etc/inetd.conf would be: telnet stream tcp nowait root /usr/lbin/telnetd telnetd -s100 -z100 To work in the IPv6 environment, the entry in /etc/inetd.conf would be: telnet stream tcp6 nowait root /usr/lbin/telnetd telnetd -s100 -z100
Kerberos-specific OptionsIn Kerberos mode, inetd can start telnetd with the following lines in /etc/inetd.conf: telnet stream tcp nowait root /usr/lbin/telnetd telnetd -A or telnet stream tcp nowait root /usr/lbin/telnetd telnetd -a valid The -A option is used to ensure that non-secure systems are denied access to the server. It overrides any value specified with the -a option except when authmode is debug. See the sis(5) manpage. The -a authmode option specifies what mode is to be used for Kerberos authentication. See the sis(5) manpage. Values for authmode are:
The -f option instructs telnetd to use the normal authentication mode whenever the telnet client communicates NULL type in the authentication option negotiation. By default, the telnet server provides remote execution facilities with authentication based on Kerberos V5. See the sis(5) manpage. DIAGNOSTICSIf any error is encountered by telnetd in establishing the connection, an error message is returned through the connection, after which the connection is closed and the server exits. Any errors generated by the login process or its descendents are passed through as ordinary data. The following diagnostic messages are displayed by telnetd:
WARNINGSThe terminal type name received from the remote client is converted to lowercase. telnetd never sends TELNET go ahead commands. SEE ALSOlogin(1), rlogin(1), stty(1), telnet(1), inetd(1M), inetsvcs_sec(1M), exec(2), ioctl(2), hosts(4), hosts.equiv(4), inetd.conf(4), inetd.sec(4), services(4), sis(5), pty(7), tels(7), tty(7). DOD MIL_STD 1782. RFC 854 for the TELNET protocol specification. |
Printable version | ||
|