|
|
Message-ID: <20260225165449.GA23380@openwall.com> Date: Wed, 25 Feb 2026 17:54:49 +0100 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: kf503bla@...k.com, "bug-inetutils@....org" <bug-inetutils@....org>, "ron.benyizhak@...ebreach.com" <ron.benyizhak@...ebreach.com>, "simon@...efsson.org" <simon@...efsson.org>, "auerswal@...x-ag.uni-kl.de" <auerswal@...x-ag.uni-kl.de>, "justin.swartz@...ingedge.co.za" <justin.swartz@...ingedge.co.za> Subject: Re: Telnetd Vulnerability Report On Wed, Feb 25, 2026 at 07:46:07AM -0500, kf503bla@...k.com wrote: > telnet is extremely old and just because there is still widespread use of telnet or the daemon, doesn't provide a valid reason to keep using it. these trivial vulnerabilities keep popping up and if you still insist of using telnet, you deserve getting pwned I mostly let these messages through so far (rejecting only one, which had even less value), but as a moderator I declare end of sub-thread now. Further messages on "Who uses telnet anyway?" will be rejected by default, unless they truly add something new. Messages on actual security issues/fixes in telnet are still desirable. Alexander P.S. I first wrote the above in a confusing manner, not clarifying it's only end of sub-thread started by kf503bla, not the entire thread. Corrected now, and I'll only let this corrected message to oss-security.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.