SlideShare a Scribd company logo
1 of 13
Rlogin/Telnet/SSH 
Team 5 
Lacher, Robert 
Lam, David 
Lentz, Tonnie 
Mazlik, Kyle
Rlogin (Remote Login) 
● Rlogin was introduced in 1983 in the BSD 
● Is a UNIX command that allows users to login to other Unix machines 
○ Rlogin only works on UNIX machines 
● Rlogin uses TCP and port 513 
● Rlogin communicates with Rlogind on the remote host 
● Can login without using password 
● Can cause security issues 
● Rlogin Syntax: rlogin [-l username] host 
Example: rlogin -tommy domain.com
hosts.equiv and .rhosts 
● hosts.equiv file lies in the ROOT directory 
● .rhosts lies in the user’s home directory 
● These files create a hole in system’s security 
● Syntax is the same for both files (Hostname Username) 
○ Examples 
■ + + (Anyone can login) 
■ + Tom (Tom can login from any remote host) 
■ Workstation + (Any user from workstation can login) 
■ Workstation Tom (Tom from workstation can login)
RSH and RCP 
● RSH = remote-shell 
○ Allows users to execute shell commands on the host without logging in. 
● RCP = remote-copy 
○ Allow users to copy from the server to the user's home directory without 
logging in
Telnet 
● Telnet is a simple, text based program in which network protocols are utilized to 
allow a device to remotely access and control another device via the internet. 
● Generally, permission to access another device must be granted by the device's 
administrator or by using log-in credentials. 
● Once connected, Telnet allows the user to enter commands to access programs 
and other services on the remote computer. 
● Accessing e-mail accounts, databases, or simple files are among the many 
examples of how Telnet can be used. 
● It's like a remote control for the internet!
Telnet Origins 
● The term Telnet is short for Telecommunications Network. 
● It was one of the earliest network protocols developed, and is one of the only 
original protocols still in use today. 
● Telnet was developed with the Request for Comments (RFC) in 1969, first 
defined in RFC 97. It continued to be developed throughout the 1970s as many 
modifications needed to be made before it worked properly. 
● The final version, Telnet Protocol Specification, was not finished until several 
years later. It was published as RFC 854 in May 1983.
Examples of Telnet Use: 
● Accessing a server running BBS software and using various features 
● Accessing a server running an MUD and playing games 
● Connecting to a server to run a command line application to check mail 
● Connecting to a Linux server and issuing various Linux commands 
● Connecting to a router to issue configuration commands (commands for Cisco 
IOS, Junos, etc) 
● Connecting to an HTTP server port to issue test HTTP commands
How Telnet is Used: 
● Telnet utilizes a protocol that ensures compatibility between terminal types and 
computers while allowing special features to be used by computers and terminals 
that agree to support them. The protocol is built upon a foundation of three main 
concepts: 
■ The Network Virtual Terminal (NVT) 
■ Options and Option Negotiation 
■ Symmetric Operation
Secure Shell (SSH) Origins 
● Developed in 1995 by Tatu Ylönen, a researcher at the Helsinki University of 
Technology in Finland 
● SSH is a newer protocol than Rlogin and Telnet 
● Designed as a replacement for other insecure remote shells 
○ A shell “is a program that takes your commands from the keyboard and gives them to 
the operating system to perform” 
● Notably, other shells at the time would send information (including passwords) as 
plaintext (Digital NI) 
○ Precursors to SSH include Rlogin and Telnet, which were insecure 
● SSH is considered a high-security protocol. It uses cryptography to protect the 
connection against eavesdropping, hijacking, and other attacks. 
● SSH is a common utility for Unix and Linux systems
What Does SSH Do? 
● SSH is a protocol providing secure remote login and network services 
○ Provides access to remote computers for file transfer, execution of processes, e-mail 
● Authentication protocol 
○ Allows the client to verify server authenticity and to verify itself 
● Public key authentication 
○ Required by both client and server 
○ Client is expected to have two keys generated using encryption algorithms (RSA or DSA) 
○ Client sends public key to server, and if server finds public key in its list of allowed keys then the client encrypts and 
sends packets using its private key along with the public key 
● Password authentication 
○ User provides a username and password. Simplest form 
● Host-based authentication 
○ Client access is restricted to certain hosts 
○ Similar to public key authentication, but server maintains list of hosts and their public keys 
○ Using a public key on another host would not authenticate the client 
● Authentication protocol runs on top of transport layer protocol to provide an authenticated tunnel for the connection 
protocol
SSH Layers and TCP/IP 
● Transport Layer Protocol: Provides server 
authentication, data confidentiality, and data 
integrity with forward secrecy (that is, if a key 
is compromised during one session, the 
knowledge does not affect the security of 
earlier sessions); the transport layer may 
optionally provide compression 
● User Authentication Protocol: Authenticates 
the user to the server 
● Connection Protocol: Multiplexes multiple 
logical communications channels over a 
single underlying SSH connection 
Source: Cisco 
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12- 
4/124_ssh.html
References 
● Rlogin 
○ http://searchnetworking.techtarget.com/definition/rlogin 
○ http://www.computerhope.com/unix/urlogin.htm 
○ http://cc-ipcp.icp.ac.ru/Section1.1.html#1.1 
○ http://wiki.wireshark.org/RLogin 
○ http://searchsoa.techtarget.com/definition/daemon 
○ https://www.ietf.org/rfc/rfc1282.txt 
○ http://foldoc.org/rlogin 
○ https://www.mkssoftware.com/docs/man4/rhosts.4.asp 
○ https://servercheck.in/blog/brief-history-ssh-and-remote-access
References 
● Telnet 
○ Notess, G. R. (1994). Telnet explored. Online, 18(1), 94. 
○ http://www.wisegeek.com/what-is-telnet.htm 
○ http://www.tcpipguide.com/free/t_TelnetOverviewHistoryandStandards.htm 
○ http://telnet.org/ 
○ http://windows.microsoft.com/en-us/windows/telnet-faq#1TC=windows-7 
● SSH 
○ http://docstore.mik.ua/orelly/networking_2ndEd/ssh/ch01_05.htm 
○ http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12- 
4/124_ssh.html 
○ http://www.serverwatch.com/news/print.php/3551081 
○ http://tools.ietf.org/html/rfc4252 
○ http://digital.ni.com/public.nsf/allkb/C49602A79827DDBE86256CE9005757D5 
○ http://cc-ipcp.icp.ac.ru/Section1.2.html 
9/26/14

More Related Content

What's hot (19)

Secure shell
Secure shellSecure shell
Secure shell
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Remote1
Remote1Remote1
Remote1
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
Web Presentation Week11 GroupB
Web Presentation Week11 GroupBWeb Presentation Week11 GroupB
Web Presentation Week11 GroupB
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
By Nithin & group
By Nithin & groupBy Nithin & group
By Nithin & group
 
Telnet
TelnetTelnet
Telnet
 
FILE TRANSFER PROTOCOL BY LAXMI $ Group
FILE TRANSFER PROTOCOL BY LAXMI $ GroupFILE TRANSFER PROTOCOL BY LAXMI $ Group
FILE TRANSFER PROTOCOL BY LAXMI $ Group
 
Socat
SocatSocat
Socat
 
Netcat
NetcatNetcat
Netcat
 
Report on telnet
Report on telnetReport on telnet
Report on telnet
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Webpre2
Webpre2Webpre2
Webpre2
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 
Reverse shell
Reverse shellReverse shell
Reverse shell
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
 

Viewers also liked

Viewers also liked (20)

Divya
DivyaDivya
Divya
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Ch22
Ch22Ch22
Ch22
 
Protocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSHProtocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSH
 
Ch11
Ch11Ch11
Ch11
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshLecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Telnet
TelnetTelnet
Telnet
 
Chap 19 ftp & tftp
Chap 19 ftp & tftpChap 19 ftp & tftp
Chap 19 ftp & tftp
 
Ch13
Ch13Ch13
Ch13
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
SSH
SSHSSH
SSH
 
Telnet
TelnetTelnet
Telnet
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocol
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
Mobile IP Presentation
Mobile IP Presentation Mobile IP Presentation
Mobile IP Presentation
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.
 

Similar to Rlogin Telnet SSH Comparison

Similar to Rlogin Telnet SSH Comparison (20)

Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Ssh
SshSsh
Ssh
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
ip security
ip securityip security
ip security
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Cn file
Cn fileCn file
Cn file
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Internet ports abduilla
Internet ports abduillaInternet ports abduilla
Internet ports abduilla
 
Remote Login
Remote LoginRemote Login
Remote Login
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Remote login.89 to 90
Remote login.89 to 90Remote login.89 to 90
Remote login.89 to 90
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
Linux Servers
Linux ServersLinux Servers
Linux Servers
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Application Layer
Application LayerApplication Layer
Application Layer
 

Recently uploaded

Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 

Recently uploaded (20)

Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 

Rlogin Telnet SSH Comparison

  • 1. Rlogin/Telnet/SSH Team 5 Lacher, Robert Lam, David Lentz, Tonnie Mazlik, Kyle
  • 2. Rlogin (Remote Login) ● Rlogin was introduced in 1983 in the BSD ● Is a UNIX command that allows users to login to other Unix machines ○ Rlogin only works on UNIX machines ● Rlogin uses TCP and port 513 ● Rlogin communicates with Rlogind on the remote host ● Can login without using password ● Can cause security issues ● Rlogin Syntax: rlogin [-l username] host Example: rlogin -tommy domain.com
  • 3. hosts.equiv and .rhosts ● hosts.equiv file lies in the ROOT directory ● .rhosts lies in the user’s home directory ● These files create a hole in system’s security ● Syntax is the same for both files (Hostname Username) ○ Examples ■ + + (Anyone can login) ■ + Tom (Tom can login from any remote host) ■ Workstation + (Any user from workstation can login) ■ Workstation Tom (Tom from workstation can login)
  • 4. RSH and RCP ● RSH = remote-shell ○ Allows users to execute shell commands on the host without logging in. ● RCP = remote-copy ○ Allow users to copy from the server to the user's home directory without logging in
  • 5. Telnet ● Telnet is a simple, text based program in which network protocols are utilized to allow a device to remotely access and control another device via the internet. ● Generally, permission to access another device must be granted by the device's administrator or by using log-in credentials. ● Once connected, Telnet allows the user to enter commands to access programs and other services on the remote computer. ● Accessing e-mail accounts, databases, or simple files are among the many examples of how Telnet can be used. ● It's like a remote control for the internet!
  • 6. Telnet Origins ● The term Telnet is short for Telecommunications Network. ● It was one of the earliest network protocols developed, and is one of the only original protocols still in use today. ● Telnet was developed with the Request for Comments (RFC) in 1969, first defined in RFC 97. It continued to be developed throughout the 1970s as many modifications needed to be made before it worked properly. ● The final version, Telnet Protocol Specification, was not finished until several years later. It was published as RFC 854 in May 1983.
  • 7. Examples of Telnet Use: ● Accessing a server running BBS software and using various features ● Accessing a server running an MUD and playing games ● Connecting to a server to run a command line application to check mail ● Connecting to a Linux server and issuing various Linux commands ● Connecting to a router to issue configuration commands (commands for Cisco IOS, Junos, etc) ● Connecting to an HTTP server port to issue test HTTP commands
  • 8. How Telnet is Used: ● Telnet utilizes a protocol that ensures compatibility between terminal types and computers while allowing special features to be used by computers and terminals that agree to support them. The protocol is built upon a foundation of three main concepts: ■ The Network Virtual Terminal (NVT) ■ Options and Option Negotiation ■ Symmetric Operation
  • 9. Secure Shell (SSH) Origins ● Developed in 1995 by Tatu Ylönen, a researcher at the Helsinki University of Technology in Finland ● SSH is a newer protocol than Rlogin and Telnet ● Designed as a replacement for other insecure remote shells ○ A shell “is a program that takes your commands from the keyboard and gives them to the operating system to perform” ● Notably, other shells at the time would send information (including passwords) as plaintext (Digital NI) ○ Precursors to SSH include Rlogin and Telnet, which were insecure ● SSH is considered a high-security protocol. It uses cryptography to protect the connection against eavesdropping, hijacking, and other attacks. ● SSH is a common utility for Unix and Linux systems
  • 10. What Does SSH Do? ● SSH is a protocol providing secure remote login and network services ○ Provides access to remote computers for file transfer, execution of processes, e-mail ● Authentication protocol ○ Allows the client to verify server authenticity and to verify itself ● Public key authentication ○ Required by both client and server ○ Client is expected to have two keys generated using encryption algorithms (RSA or DSA) ○ Client sends public key to server, and if server finds public key in its list of allowed keys then the client encrypts and sends packets using its private key along with the public key ● Password authentication ○ User provides a username and password. Simplest form ● Host-based authentication ○ Client access is restricted to certain hosts ○ Similar to public key authentication, but server maintains list of hosts and their public keys ○ Using a public key on another host would not authenticate the client ● Authentication protocol runs on top of transport layer protocol to provide an authenticated tunnel for the connection protocol
  • 11. SSH Layers and TCP/IP ● Transport Layer Protocol: Provides server authentication, data confidentiality, and data integrity with forward secrecy (that is, if a key is compromised during one session, the knowledge does not affect the security of earlier sessions); the transport layer may optionally provide compression ● User Authentication Protocol: Authenticates the user to the server ● Connection Protocol: Multiplexes multiple logical communications channels over a single underlying SSH connection Source: Cisco http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12- 4/124_ssh.html
  • 12. References ● Rlogin ○ http://searchnetworking.techtarget.com/definition/rlogin ○ http://www.computerhope.com/unix/urlogin.htm ○ http://cc-ipcp.icp.ac.ru/Section1.1.html#1.1 ○ http://wiki.wireshark.org/RLogin ○ http://searchsoa.techtarget.com/definition/daemon ○ https://www.ietf.org/rfc/rfc1282.txt ○ http://foldoc.org/rlogin ○ https://www.mkssoftware.com/docs/man4/rhosts.4.asp ○ https://servercheck.in/blog/brief-history-ssh-and-remote-access
  • 13. References ● Telnet ○ Notess, G. R. (1994). Telnet explored. Online, 18(1), 94. ○ http://www.wisegeek.com/what-is-telnet.htm ○ http://www.tcpipguide.com/free/t_TelnetOverviewHistoryandStandards.htm ○ http://telnet.org/ ○ http://windows.microsoft.com/en-us/windows/telnet-faq#1TC=windows-7 ● SSH ○ http://docstore.mik.ua/orelly/networking_2ndEd/ssh/ch01_05.htm ○ http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12- 4/124_ssh.html ○ http://www.serverwatch.com/news/print.php/3551081 ○ http://tools.ietf.org/html/rfc4252 ○ http://digital.ni.com/public.nsf/allkb/C49602A79827DDBE86256CE9005757D5 ○ http://cc-ipcp.icp.ac.ru/Section1.2.html 9/26/14