2.2.15 Ensure telnet server services are not in use

Information

The telnet-server package contains the telnet daemon, which accepts connections from users from other systems via the telnet protocol.

The telnet protocol is insecure and unencrypted. The use of an unencrypted transmission medium could allow a user with access to sniff network traffic the ability to steal credentials. The ssh package provides an encrypted session and stronger security.

Solution

Run the following commands to stop telnet.socket and remove the telnet-server package:

# systemctl stop telnet.socket
# dnf remove telnet-server

-OR-

-IF- a package is installed and is required for dependencies:

Run the following commands to stop and mask telnet.socket :

# systemctl stop telnet.socket
# systemctl mask telnet.socket

Impact:

There may be packages that are dependent on the telnet-server package. If the telnet-server package is removed, these dependent packages will be removed as well. Before removing the telnet-server package, review any dependent packages to determine if they are required on the system.

-IF- a dependent package is required: stop and mask the telnet.socket leaving the telnet-server package installed.

See Also

https://workbench.cisecurity.org/benchmarks/15287

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7, CSCv7|2.6, CSCv7|9.2

Plugin: Unix

Control ID: ce51c8e51b4c0b236b4cb5238c46880daa8089ea7ed290c7c357442eb4c3196b