The Day the Telnet Died
Impact and Nature of the Telnetd Vulnerability
- CVE is in GNU inetutils telnetd (server), not the telnet client nor the generic “telnet protocol” itself.
- Bug: argument injection into
login(1)(e.g.,-f root), giving an unauthenticated root shell. Trivially exploitable once known. - Vulnerable code came from a 2015 commit (variable rename + unsafe
getenvuse) and apparently went unnoticed ~11 years. - Debate over whether this is “just” a serious bug vs a plausible backdoor; no concrete evidence of intent was presented.
- Some are shocked there were no meaningful tests and compare this to broader issues in under-maintained core utilities.
Port 23 Filtering by Backbone / Transit Providers
- GreyNoise shows a step-function collapse in global telnet (port 23) scanner traffic, interpreted as upstream (likely Tier 1) port 23 filtering.
- Unclear if filtering is strictly port-based or protocol-aware; most commenters assume a simple TCP/23 block.
- Some observe classic services (e.g., ASCII Star Wars) failing over IPv4 but still reachable via IPv6, matching this hypothesis.
- Disagreement on whether this is appropriate:
- Pro: pragmatic emergency mitigation for legacy, unpatched systems; analogous to historic blocking of ports 25, 139, etc.
- Con: worrisome precedent for “invisible” control by backbone operators and erosion of end-to-end, net-neutral behavior.
Who Still Uses Telnet / Port 23?
- Modern legitimate use on the public internet is rare and often niche: MUDs/MOOs, BBSes, route-view services, some industrial/embedded gear.
- Long subthread clarifies:
- Many MUD clients and servers actually implement the Telnet protocol (RFC 854 + options), though historically some families did not.
- Many MUDs run on high, unprivileged ports; some still expose port 23 and may now be partially unreachable.
- Telnet client remains widely used as a generic TCP text tool, but many recommend netcat, socat,
openssl s_client, or/dev/tcpinstead. - OS trends: telnet client often removed from base installs (Ubuntu, macOS), provoking pushback from admins who still need it for legacy equipment.
Security Architecture and Responsibility
- Discussion on remote-login design: you still need a privileged component able to
setuidto arbitrary users, even with privilege separation. - Old telnetd model: small daemon + setuid-root
/bin/logininside a PTY; now considered risky because/bin/loginwasn’t written for hostile network input. - OpenSSH highlighted as an example of heavy privilege separation and sandboxing; but many note real-world SSH deployments often disable key checks and 2FA.
Meta: Article Style and AI, and Exploit History
- Several readers feel the article’s tone and structure resemble LLM output (repetitive rhetorical patterns, blended with a song parody), others disagree.
- Some skepticism that such an easy bug really lay unused for 11 years; others note that most “telnet on port 23” devices are not GNU telnetd, so real exposure may have been modest.
- Overall sense: this event marks a symbolic end to telnet’s public-internet era and illustrates how critical flaws can now be mitigated “in the network” before many even notice.