[7124] in Kerberos
Re: Telnets and encryption
daemon@ATHENA.MIT.EDU (Darren Reed)
Fri Apr 19 00:48:18 1996
Date: Fri, 19 Apr 1996 14:16:25 +1000
From: darrenr@nabaus.com.au (Darren Reed)
To: kerberos@MIT.EDU, wes@prozac.student.cwru.edu
> From: wes@prozac.student.cwru.edu (Wes Brown)
> Mark Eichin (eichin@cygnus.com) wrote:
> : > Second: The CNS telnet does not seem to encrypt data even when the -x
> : > option is given. I am using their telnetd and everything works fine from
> :
> : telnet doesn't give you a banner *telling* you what it did, in current
> : versions; however, if you do ^] enc status, it should say:
> :
> : telnet> enc stat
> : Currently encrypting output with DES_CFB64
> : Currently decrypting input with DES_CFB64
> :
> : which should be clear (and isn't spoofable the way a normal message
> : would be.) There are some improvements to this (on v5 anyway) in the
> : pipeline.
>
> Upon connecting to one of my machines running the CNS distribution.
>
> telnet> enc stat
> Currently input is clear text.
> Last decryption mode was DES_CFB64
>
> The telnet session was started after the appropriate kinit using the
> command:
> /usr/kerberos/bin/telnet -x -a slowpoke
I don't remember if there was or wasn't another answer, but try using the
-r option in place or conjunction with the others.