oss-sec mailing list archives
Re: Telnetd Vulnerability Report
From: Albert Veli <albert.veli () gmail com>
Date: Thu, 26 Feb 2026 09:30:07 +0100
Hello, On 2/25/26 21:39, Lyndon Nerenberg (VE7TFX/VE6BBM) wrote:
I agree to this, but I can add that telnet remains widely used for login in OT (Operational Technology) environments, including sites running critical infrastructure. While operators often justify this by relying on network isolation, this reasoning breaks down the moment the air gap is bridged.Telnet is "old" because iit is simple and does its job well. It doesn't need all the new shiny knobs people throw at everything, nor does it need to grow HTML5 support. It works as is, and it works well. But if you still use it for remote logins, that's operator error, not a protocol security violation.
Current thread:
- Re: Re: Telnetd Vulnerability Report, (continued)
- Message not available
- Re: Re: Telnetd Vulnerability Report kf503bla (Feb 24)
- Re: Telnetd Vulnerability Report Solar Designer (Feb 24)
- Re: Telnetd Vulnerability Report Lyndon Nerenberg (VE7TFX/VE6BBM) (Feb 24)
- Re: Telnetd Vulnerability Report Vincent Lefevre (Feb 24)
- Message not available
- Re: Telnetd Vulnerability Report kf503bla (Feb 25)
- Re: Telnetd Vulnerability Report Solar Designer (Feb 25)
- Re: Telnetd Vulnerability Report Steffen Nurpmeso (Feb 25)
- Re: Telnetd Vulnerability Report Marco Moock (Feb 25)
- Re: Telnetd Vulnerability Report Steffen Nurpmeso (Feb 25)
- Message not available
- Re: Telnetd Vulnerability Report Lyndon Nerenberg (VE7TFX/VE6BBM) (Feb 25)
- Re: Telnetd Vulnerability Report Albert Veli (Feb 26)
- Re: Telnetd Vulnerability Report Eddie Chapman (Feb 24)
- Re: Telnetd Vulnerability Report Justin Swartz (Feb 24)
- Re: Telnetd Vulnerability Report Eddie Chapman (Feb 24)
- Re: Re: Telnetd Vulnerability Report Marco Moock (Feb 25)
- Re: Re: Telnetd Vulnerability Report Florian Weimer (Feb 26)
