• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
WebSetNet

WebSetNet

Technology News

  • Technology News
    • Mobile
    • Games
  • Internet Marketing
  • System Admin
    • Windows 11
    • Linux
    • Mac & Apple
You are here: Home / Technology News / How Is SSH Different From Telnet?

How Is SSH Different From Telnet?

March 16, 2023 by Martin6

Closeup of a computer screen with PuTTY configuration options visible.

TELNET doesn't have any encryption, so everything is transmitted in plaintext. SSH is encrypted, so it is private and secure. That's why SSH should be used in preference to TELNET.

SSH and TELNET both let you connect to remote, networked computers and to use them as if you’re sitting in front of them. So what’s the difference between these two venerable protocols, and is there really always an advantage to using SSH over TELNET?

TELNET and SSH: The Origin Story

Necessity is the mother of invention. System administrators needed a way to access and manage computers that were physically located elsewhere. If it was impractical or inconvenient for the administrator to position themselves in front of the computer, they needed a way to access the remote computer that allowed them to issue commands just as if they were typing them into that computer.

TELNET, short for teletype over network protocol, was developed in 1969 as the answer to that problem. As long as the remote computer was network accessible, it allowed the administrator, or any other authorized person, to connect to it and use it as if they were physically pressing the keys of the remote keyboard.

SSH was created much later—in 1995—as a direct response to Telnet and other similar solutions. The necessity this time was security. TELNET, rlogin, FTP, and other protocols of that era were designed without any consideration to, or perceived need for, security.

SSH stands for secure shell, so you can see that security was a guiding principle from its inception. Nowadays, SSH has almost entirely replaced TELNET.

TELNET Is a Plaintext Security Nightmare

The big problem with TELNET is it uses plaintext. It doesn’t encrypt any of its traffic, including user names and passwords. Anything it transmits along the network can be captured by packet sniffing and read, with the greatest of ease. This is a security risk even on a local network, unless you’re the only user. Any user can intercept TELNET traffic and obtain login credentials to which they have no right.

If the remote computer is off-site, requiring a connection to be made across the internet to reach it, the problem is magnified immeasurably. TELNET was a product of its time, and to be fair to them, the authors almost certainly didn’t expect people to be using it well over fifty years later, in today’s vastly different IT landscape.

While TELNET deserves its place on the list of important programs that collectively helped bring us to where we are today, it’s not something that we should still be using in today’s world.

How Is SSH Different From TELNET?

On the face of it, TELNET and SSH are two answers to the same problem. They both let you access a terminal window on a remote computer and issue commands to it. But because SSH was developed so much later than TELNET, the problem was more thoroughly understood, and the answer was better engineered.

TELNET was designed with private networks in mind, but SSH was designed to cope with public networks, and the need to maintain privacy and security when transferring data and making remote connections.

TELNET uses port 23 and that port number can’t be changed. By default, SSH uses port 22, but this can be configured and changed. Configuring SSH to use an unobvious port number makes it harder for attackers to identify the SSH port. If SSH port can be identified, it’s a trivial matter to mount a brute-force attack where thousands of passwords harvested from data breaches are tried in turn, by automated software.

Even better, SSH can dispense with passwords altogether. It can use public key encryption to authenticate to remote computers. Passwords are never transmitted at all, because there’s no need to send them to the remote computer. Its data encryption and SSH key authentication mean SSH is able to deliver secure connections and communications over insecure networks like the internet.

In fact, SSH can be used to authenticate with different services, not just remote computers running an SSH server. For example, you can access the GitHub, GitLab, and BitBucket hosted Git repositories using SSH instead of passwords.

Another advantage to using SSH over TELNET is that SSH can do reverse SSH tunneling. This requires the server to establish a connection with the client computer. Until the local user wants to make a connection to the server, the connection is ignored.

When the client wants to connect to the server, the user establishes an SSH connection to their own computer. SSH sends the connection down the already established connection, to the server. This provides a private tunnel inside the already encrypted connection from the server to the client.

The only win for TELNET is it uses less bandwidth. But this isn’t 1969 where bandwidth was scarce, and SSH isn’t exactly a bandwidth hog either.

SSH Has Had Its Problems, Too

Although SSH outdoes TELNET when it comes to security, we have to remember that it is still software, and software can have bugs. Those bugs can lead to vulnerabilities that can be exploited by cybercriminals. Also, encryption standards and algorithms change over time, and get superseded. Like all encryption-based software, as older versions of SSH age, they can become less secure. That’s why it is important to make sure you are using the latest release of SSH.

The version of SSH used in most Linux computers is OpenSSH, an implementation of SSH that builds upon the OpenSSL toolkit and libraries. In 2012, the OpenSSL library accidentally introduced a bug that allowed an attacker to request a response from the SSL server, and to specify how much data to contain in the answer.

They could requests a response of (say) 64KB when the actual response would have needed no more than 64 bytes. The first sequence of bytes in that data would be the genuine, expected response, followed by whatever happened to be in the memory recently used by OpenSSL. What was contained in that data was pot luck, but it could contain sensitive information such as session cookies and passwords, or other information that allowed an attacker to acquire private keys, for example.

Once it was discovered, in 2014, the vulnerability became known as Heartbleed. It was quickly fixed in the software. However the vulnerability doesn’t disappear at that point. The vulnerability is only completely nullified when all computers running the vulnerable software have the fixed version installed. In other words, when the computers have been patched. Because many administrators were slow to react, the uptake of the fixed software was slow.

Also worrying is the two years between 2012 when the bug was introduced and 2014 when it was discovered, and addressed. For those two years, every SSH server running the vulnerable version of OpenSSL was at risk.

To be fair, that happened practically a decade ago, and since then there have been many releases, improvements, bug fixes and code reviews.

RELATED: The Best Ways to Secure Your SSH Server

Should You Use SSH or TELNET?

It’s hard to think of a reason you’d need to use TELNET today. That’s not the same as saying is there any scenario in which it’s safe to use TELNET. In a self-contained network that isn’t connected to the outside world, and you’re sure no one is going to packet-sniff your traffic, you could use TELNET. But there’s no reason to. The security trade-off can’t be justified.

SSH is more secure and more flexible—that’s the advantage to using SSH over TELNET. The OpenSSH implementation is free for all uses including commercial, and is available for all popular operating systems.

Original Article

Related posts:

  1. Complete Guide to Configuring SSH in Ubuntu
  2. How to Port Forward on Your Router
  3. Amazon Alexa Easter eggs: Over 180 funny things to ask Alexa
  4. The ultimate guide to Remote Desktop — control your PC over the internet!
  5. Best Apple MacBook Pro accessories in 2023
  6. Best accessories for HP Dragonfly Pro in 2023
  7. Hogwarts Legacy: How to beat Ranrok in the final boss fight
  8. How to Easily Access Your Home Network From Anywhere
  9. Wild Hearts: Full list of monsters and kemono, with strategy guides and tips
  10. How to Connect to an SSH Server from Windows, macOS, or Linux

Filed Under: Technology News

Primary Sidebar

Popular Posts

  • What Is Shader Compilation and Why Does It Make PC Games Stutter? 2.1k views
  • 3 Ways to Disable GetApps on Xiaomi, Redmi, and Poco Phones Running MIUI 500 views
  • Enable or Disable Adjust for Daylight Saving Time in Windows 10 400 views
  • How To Restore Last Session On Google Chrome 300 views
  • How to Highlight Duplicates in Google Sheets 300 views
  • Exclamation Mark on Network Signal, Mobile Data Not Working? 8 Ways to Fix 300 views
  • How do I enable or disable Alt Gr key on Windows 10 keyboard 300 views
  • How to Block TLS 1.0 and TLS 1.1 in Microsoft Edge and Google Chrome 200 views
  • How to delete Downloaded, Failed & Pending Windows Updates 200 views
  • Dual Booting Ubuntu With Windows 10 Pro With BitLocker Encryption 200 views
  • What is "Workspace Trust" in Visual Studio Code? 200 views
  • How to change Outlook Navigation Pane position 200 views
  • Fix Explorer.exe Application error on Windows 10 200 views
  • LiVES Video Editor 2.8.5 Adds Experimental Wayland Support 200 views
  • Microsoft Store Error 0x80D03805 on Windows 10 200 views
  • Is Outbyte PC Repair Safe? 200 views
  • Will PS5 Play PS4 and PS3 Games? 200 views

Footer

Tags

Amazon android Apple Asus available download: edge feature features first free from galaxy Game games gaming gets google install Intel iPhone launches linux Microsoft more OnePlus phone release released review: samsung series support this Ubuntu update using video watch what will windows with xbox your

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org