Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4459c96c-dabb-4bd8-882c-1f9495972a51@gmail.com>
Date: Thu, 26 Feb 2026 09:30:07 +0100
From: Albert Veli <albert.veli@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Telnetd Vulnerability Report

Hello,

On 2/25/26 21:39, Lyndon Nerenberg (VE7TFX/VE6BBM) wrote:
> Telnet is "old" because iit is simple and does its job well.  It
> doesn't need all the new shiny knobs people throw at everything,
> nor does it need to grow HTML5 support.  It works as is, and it
> works well.  But if you still use it for remote logins, that's
> operator error, not a protocol security violation.
I agree to this, but I can add that telnet remains widely used for login 
in OT (Operational Technology) environments, including sites running 
critical infrastructure. While operators often justify this by relying 
on network isolation, this reasoning breaks down the moment the air gap 
is bridged.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.