Date First Published: 17th March 2022
Topic: Computer Networking
Subtopic: Internet Protocols
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 6/10
Learn more about what Telnet is in this article.
Telnet, short for Teletype Network and sometimes further abbreviated to TN, is an application-layer protocol that provides a command-line interface for communicating with a server or a remote device. It makes use of TCP to transmit data and communicates over port 23. It is necessary for Unix commands to be used in order for Telnet to be used, which is difficult for inexperienced users who are unfamiliar with Unix commands. When users have an account on a Telnet server, HTTP and FTP allows them to request remote files from devices. Telnet is most commonly used by network administrators and developers who need to use specific applications hosted on a server or remote device. Remotely connecting to a device through the use of Telnet is referred to as Telnetting.
When logging into Telnet, a command is typed. The command contains the host and the port number. The command looks like: 'Telnet example.domain.com 23' When this command is typed, the program would ask the user for a username and password and if the credentials are correct, the user will be granted access to the remote server.
Telnet itself is an insecure protocol because all messages are sent in plain text and there are no security mechanisms. Anyone that is monitoring the connection could gain access to this sensitive information since it is unencrypted. However, Telnet has been replaced by SSH (Secure Shell). SSH is much more secure than Telnet because it uses public-key encryption to encrypt messages into ciphertext. SSH works in a similar way to Telnet because it uses remote login and enables devices to communicate with a server or a remote device. As of now, it is highly recommended to use SSH as a more secure option.
Telnet has no security mechanisms. All data that is transferred to computers, including usernames and passwords are sent in plain text, meaning that anyone monitoring the connection could see this information. SSH is the recommended option for enhanced security, since it encrypts transferred data into random characters, making the transferred data unreadable by humans. It is possible that an attacker could intercept the connection and see the credentials by a 'man-in-the-middle-attack'. The main reason why Telnet has no security mechanisms is that it is one of the oldest protocols on the internet. However, it is still used now.
The first version of Telnet resulted in work from ARPANET, the predecessor to the internet. At that time, people were in need of a method of remotely accessing different computers. In response, a team of business and academic researchers created the first idea for the Telnet protocol in 1971, and the first version of Telnet was released in 1983. Telnet has been updated multiple times since then.
TCP/IP Protocol | Application layer | BGP• DHCP • DNS • FTP • HTTP • IMAP • LDAP • MGCP • NNTP • NTP • OSPF • POP • PTP • ONC/RPC • RTP • RTSP • RIP • SIP • SMTP • SNMP • SSH • Telnet • XMPP | Transport layer | TCP • UDP • DCCP • SCTP • RSVP • QUIC | Internet layer | IP • ICMP • NDP • ECN • IGMP. | Link layer | Tunnels • PPP • MAC |
---|
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection