On Thu, 8 Nov 2001, Rodolfo J. Paiz wrote: > At 11/8/2001 05:13 AM -0800, you wrote: > >While I agree that useing SSH over an open network is the way to go, on a > >closed network, > >telnet is just fine. > > By some sources, over 80% of attacks, thefts, sabotages, etc. are internal. > > By my own consulting practices, a *huge* percentage of problems are > internally-caused. > > In kidnapping cases, 95% of attackers had inside information. > > In divorce cases where money is an issue, in over 85% of cases one spouse > is spying or stealing information from the other. > > Yes, you can do it. But really, if SSH works just as well out-of-the-box > and is just as simple, why would you? > > Heck, on my internal network SSH is much *easier*. I set up the right keys, > and now I type one password when logging in then get access to everything, > properly authenticated, transparently. > > Just because a thing *can* be done is often no reason to do it.
Well spoken, Rodolfo. My standard is to only permit telnet to devices that cannot do ssh, yet. And where I work, this is policy and practice. _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list