521:
that you could look and see you genuinely can't hack me with it, versus these things that have a new critical vulnerability whenever the old one expires. That said, I wouldn't be surprised if even the TELNET approach doesn't work against that Tor exploit, because (even if
Snowden has never said a peep about it) I am suspicious that your saved uuencoded kiddie porn would be recognized by your friendly local antivirus program as a "threat", duly reported to their site, and it would upload a "patch" to you to help fix the virus, with predictable results. But I've never heard such a thing in the news ... and doubt I will this time either.
366:
121:
111:
36:
131:
91:
141:
101:
520:
true that TELNET had one clear advantage - it dates back to a time when program was program and data was data. There probably really isn't a special character sequence that indicates the following output should actually be saved and executed to take over your computer. I miss that kind of program
202:
Could the same thing happen to
Knowledge? Absolutely. We follow industry standard best practice in keeping our servers secure, but this is in an industry where "best practice" means running code which is not known to be vulnerable. The more ignorant you are about the code you are running, the more
441:
114:
94:
134:
104:
144:
247:
port 23. If you care about security, maybe you shouldn't. Who knows what vulnerabilities are hidden in the Tor client? Maybe it's best to run the Tor proxy on a separate server in an air-gapped,
280:
lists only a single bug: "The source code is not comprehensible." Well, surely in 33 years at least one person must have comprehended it by now and reviewed it for security, right? Right?
213:
Of course, the tools of the trade are not restricted to law enforcement. Anyone with patience and talent can find and exploit vulnerabilities. So what do you do if you want to learn about
206:
Just about every layer of our software stack has had security vulnerabilities of one kind or another disclosed and fixed, and yet we keep using it, because there is no alternative. And
167:
77:
456:
597:
638:
676:
400:
737:
697:
651:
124:
353:
344:
720:
620:
509:
573:
555:
425:
410:
702:
Where do I submit feature requests? This needs to be more like the old www browser that put after each link and put a table-of-links at the end of every page.
420:
530:
405:
390:
395:
383:
493:
377:
55:
44:
805:
430:
192:
461:
468:
71:
477:
Hmm I feel some of the hardware hasn't been properly battle tested yet. Something a bit more old school might be a better choice:
233:
21:
780:
445:
647:
The temptation to actually download Tor and find if there's anything listening at that onion address is almost overwhelming.
775:
770:
283:
While you admire the pretty colours in your Linux console, you might reflect on the fact that they are brought to you by
765:
670:
682:
199:, the FBI seized control of a web server and then used it to compromise the browsers of visitors to the site.
714:
261:
One is to use old, small, well-tested code, generally recognised to be safe, in the desperate hope that with
760:
365:
49:
35:
17:
303:
611:
server? Or does Tim's refusal to consider "a web gateway to the Telnet server" answer that question? --
262:
591:
277:
276:
The BSD telnet client was written in about 1983, and is available in all major Linux distributions.
284:
248:
188:
544:
217:
but you don't want to expose your computer to complete compromise? Reduce the attack surface:
664:
634:
542:
686:
786:
751:
626:
588:
335:
657:
I thought "manpage" was a typo but the URL seems to suggest that's the correct spelling.—
8:
317:
243:
If you care about privacy, you should access the gateway via the Tor hidden service at
710:
616:
608:
551:
502:
452:
331:
196:
154:
725:
306:
security policy which denies all local access, running as an unprivileged user in a
733:
658:
630:
225:
292:
288:
316:
For more information about connecting and further technical details, please see
694:
648:
489:
480:
799:
569:
526:
516:
This may have comic aspects, but it is well informed and insightful. And it
214:
299:
258:
When it comes to choosing the Telnet client, there are two main approaches.
237:
703:
612:
547:
729:
690:
485:
210:
proves every year that there is no reason to trust our web browsers.
565:
537:
522:
30:
Browse
Knowledge in safety? Use Telnet!: Set your Wayback Machine.
207:
166:
728:
is a reasonable place to put feature requests and bug reports.
323:
P.S.: please don't ask for a web gateway to the Telnet server.
307:
252:
222:
586:
client. Every session, for the best security. All the best:
270:
177:
232:
Sorry, there are no images, but you don't want them anyway,
180:
was a good start. But to be really secure, it's not enough.
324:
689:
for an nCurses-style
Knowledge interface. A month later,
693:
built this simple scraper + telnet server in Node.js. —
625:
If they need a copy of the source, I recommend using the
266:
184:
334:
is lead platform architect on the parsing team at the
313:
We'll leave the details up to you. Stay safe, folks.
466:If your comment has not appeared here, you can try
681:If you're wondering what it looks like, check out
726:https://github.com/cscott/wikipedia-telnet/issues
221:Wikimedia is pleased to announce the launch of a
797:
298:The other approach is defense in depth. Perhaps
195:this week. In events reminiscent of the famous
251:room, connected only by an optically-isolated
152:
607:Hmm. So how long until Wikimedia provides a
481:https://www.youtube.com/watch?v=X9dpXHnJXaE
749:Make sure we cover what matters to you –
469:
72:Browse Knowledge in safety? Use Telnet!
14:
798:
265:. In this vein you might consider the
582:It's always better to write your own
54:
29:
683:my user page from nearly 5 years ago
564:no, that wasn't supposed to happen!
806:Knowledge Signpost archives 2016-04
27:
364:
203:secure you are. The mind boggles.
165:
56:
34:
28:
817:
451:These comments are automatically
263:enough eyes, all bugs are shallow
302:, with an extremely restrictive
139:
129:
119:
109:
99:
89:
287:code which interprets terminal
462:add the page to your watchlist
13:
1:
437:
325:That really misses the point
269:telnet client, running on a
255:link to your secure laptop.
18:Knowledge:Knowledge Signpost
7:
685:. In August, I created a
10:
822:
738:18:45, 28 April 2016 (UTC)
721:03:17, 27 April 2016 (UTC)
698:03:35, 17 April 2016 (UTC)
273:virtual terminal console.
677:20:11, 4 April 2016 (UTC)
652:10:51, 4 April 2016 (UTC)
639:21:45, 4 April 2016 (UTC)
621:20:25, 3 April 2016 (UTC)
598:19:30, 2 April 2016 (UTC)
574:22:51, 4 April 2016 (UTC)
556:22:38, 4 April 2016 (UTC)
531:14:38, 2 April 2016 (UTC)
510:21:23, 1 April 2016 (UTC)
494:21:05, 1 April 2016 (UTC)
187:'s attacks against the
459:. To follow comments,
369:
245:lgcjxm7fttkqi2zl.onion
234:libpng vulnerabilities
170:
39:
368:
357:"Technology report" →
169:
38:
627:Archie search engine
455:from this article's
336:Wikimedia Foundation
226:gateway to Knowledge
687:Telnet IEG proposal
349:"Technology report"
174:Telnet, circa 1988.
752:leave a suggestion
446:Discuss this story
401:WikiProject report
370:
171:
45:← Back to Contents
40:
719:
718:
601:
470:purging the cache
416:Technology report
291:while running in
197:Operation Onymous
69:Technology report
50:View Latest Issue
813:
789:
754:
730:C. Scott Ananian
708:
707:
673:
667:
661:
596:
585:
541:
508:
505:
473:
471:
465:
444:
426:Knowledge Weekly
411:Featured content
388:
380:
373:
356:
348:
289:escape sequences
246:
157:
143:
142:
133:
132:
123:
122:
113:
112:
103:
102:
93:
92:
62:
60:
58:
821:
820:
816:
815:
814:
812:
811:
810:
796:
795:
794:
793:
792:
791:
790:
785:
783:
778:
773:
768:
763:
756:
750:
746:
745:
671:
665:
659:
583:
535:
503:
500:
475:
467:
460:
449:
448:
442:+ Add a comment
440:
436:
435:
434:
421:Recent research
381:
376:
374:
371:
360:
359:
354:
351:
346:
340:
244:
175:
172:
162:
158:
151:
150:
149:
140:
130:
120:
110:
100:
90:
84:
81:
70:
65:
63:
53:
52:
47:
41:
31:
26:
25:
24:
12:
11:
5:
819:
809:
808:
784:
779:
774:
769:
764:
759:
758:
757:
748:
747:
744:
743:
742:
741:
740:
700:
679:
655:
644:
643:
642:
641:
604:
603:
602:
580:
579:
578:
577:
576:
513:
512:
450:
447:
439:
438:
433:
428:
423:
418:
413:
408:
406:Traffic report
403:
398:
393:
391:News and notes
387:
375:
363:
362:
361:
352:
343:
342:
341:
236:will own your
173:
164:
163:
160:
148:
147:
137:
127:
117:
107:
97:
86:
85:
82:
76:
75:
74:
73:
68:
67:
66:
64:
61:
48:
43:
42:
33:
32:
15:
9:
6:
4:
3:
2:
818:
807:
804:
803:
801:
788:
782:
777:
772:
767:
762:
753:
739:
735:
731:
727:
724:
723:
722:
716:
712:
705:
701:
699:
696:
692:
688:
684:
680:
678:
674:
672:contributions
668:
662:
656:
653:
650:
646:
645:
640:
636:
632:
628:
624:
623:
622:
618:
614:
610:
606:
605:
599:
594:
593:
590:
581:
575:
571:
567:
563:
559:
558:
557:
553:
549:
545:
543:
539:
534:
533:
532:
528:
524:
519:
515:
514:
511:
506:
498:
497:
496:
495:
491:
487:
483:
482:
478:
472:
463:
458:
454:
443:
432:
429:
427:
424:
422:
419:
417:
414:
412:
409:
407:
404:
402:
399:
397:
394:
392:
389:
385:
379:
372:In this issue
367:
358:
350:
339:
338:
337:
333:
328:
326:
321:
319:
318:the wiki page
314:
311:
309:
305:
301:
296:
294:
290:
286:
281:
279:
274:
272:
268:
264:
259:
256:
254:
250:
241:
239:
235:
230:
229:
227:
224:
218:
216:
215:dancing mania
211:
209:
204:
200:
198:
194:
190:
186:
181:
179:
168:
161:
156:
146:
138:
136:
128:
126:
118:
116:
108:
106:
98:
96:
88:
87:
79:
59:
51:
46:
37:
23:
19:
587:
561:
517:
484:
479:
476:
415:
396:In the media
384:all comments
378:1 April 2016
332:Tim Starling
330:
329:
322:
315:
312:
297:
282:
275:
260:
257:
242:
231:
220:
219:
212:
205:
201:
182:
176:
159:
155:Tim Starling
57:1 April 2016
787:Suggestions
691:User:cscott
660:Vchimpanzee
631:Praemonitus
453:transcluded
278:Its manpage
193:in the news
189:Tor network
592:Farmbrough
499:Good one!
310:in a VM.
249:soundproof
191:have been
83:Share this
78:Contribute
22:2016-04-01
781:Subscribe
695:Dispenser
649:Lankiveil
457:talk page
800:Category
776:Newsroom
771:Archives
715:contribs
347:Previous
125:LinkedIn
105:Facebook
20: |
704:davidwr
613:llywrch
548:Bawolff
501:-- ] {{
300:JTelnet
208:Pwn2Own
115:Twitter
609:gopher
584:telnet
308:chroot
293:Ring 0
253:RS-232
223:Telnet
135:Reddit
95:E-mail
766:About
486:©Geni
271:Linux
238:phone
178:HTTPS
16:<
761:Home
734:talk
711:talk
666:talk
635:talk
617:talk
589:Rich
570:talk
562:hell
552:talk
527:talk
504:talk
490:talk
431:Blog
355:Next
304:Java
183:The
145:Digg
713:)/(
675:•
566:Wnt
560:Oh
538:Wnt
523:Wnt
267:BSD
185:FBI
153:By
80:—
802::
736:)
669:•
663:•
654:.*
637:)
629:.
619:)
572:)
554:)
546:.
529:)
518:is
507:}}
492:)
345:←
327:.
320:.
295:.
240:.
755:.
732:(
717:)
709:(
706:/
633:(
615:(
600:.
595:,
568:(
550:(
540::
536:@
525:(
488:(
474:.
464:.
386:)
382:(
285:C
228:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.