1 .\" Copyright (c) 1983, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)telnetd.8 8.4 (Berkeley) 6/1/94
34 .Dd September 19, 2006
49 .Op Fl r Ns Ar lowpty-highpty
52 .Op Fl L Ar /bin/login
58 command is a server which supports the
62 virtual terminal protocol.
64 is normally invoked by the internet server (see
66 for requests to connect to the
68 port as indicated by the
74 option may be used to start up
76 manually, instead of through
78 If started up this way,
80 may be specified to run
88 command accepts the following options:
89 .Bl -tag -width "-a authmode"
91 This option may be used for specifying what mode should
92 be used for authentication.
93 Note that this option is only useful if
95 has been compiled with support for the
98 There are several valid values for
100 .Bl -tag -width debug
102 Turns on authentication debugging code.
104 Only allow connections when the remote user
105 can provide valid authentication information
106 to identify the remote user,
107 and is allowed access to the specified account
108 without providing a password.
110 Only allow connections when the remote user
111 can provide valid authentication information
112 to identify the remote user.
115 command will provide any additional user verification
116 needed if the remote user is not allowed automatic
117 access to the specified account.
119 Only allow connections that supply some authentication information.
120 This option is currently not supported
121 by any of the existing authentication mechanisms,
122 and is thus the same as specifying
126 Only allow authenticated connections (as with
129 and also logins with one-time passwords (OTPs). This option will call
130 login with an option so that only OTPs are accepted. The user can of
131 course still type secret information at the prompt.
133 This is the default state.
134 Authentication information is not required.
135 If no or insufficient authentication information
136 is provided, then the
138 program will provide the necessary user
141 This disables the authentication code.
142 All user verification will happen through the
148 .It Fl D Ar debugmode
149 This option may be used for debugging purposes.
152 to print out debugging information
153 to the connection, allowing the user to see what
156 There are several possible values for
158 .Bl -tag -width exercise
160 Prints information about the negotiation of
166 information, plus some additional information
167 about what processing is going on.
169 Displays the data stream received by
172 Displays data written to the pty.
174 Has not been implemented yet.
177 require encryption to be turned on (in both direction) by the client
178 and disconnects if the client tries to turn the encryption off (in
181 Disables the printing of host-specific information before
182 login has been completed.
189 keep-alives. Normally
193 keep-alive mechanism to probe connections that
194 have been idle for some period of time to determine
195 if the client is still there, so that idle connections
196 from machines that have crashed or can no longer
197 be reached may be cleaned up.
198 .It Fl r Ar lowpty-highpty
199 This option is only enabled when
203 It specifies an inclusive range of pseudo-terminal devices to
204 use. If the system has sysconf variable
206 configured, the default pty search range is 0 to
208 otherwise, the default range is 0 to 128. Either
212 may be omitted to allow changing
213 either end of the search range. If
215 is omitted, the - character is still required so that
223 This option is used to specify the size of the field
226 structure that holds the remote host name.
227 If the resolved host name is longer than
229 the dotted decimal value will be used instead.
230 This allows hosts with very long host names that
231 overflow this field to still be uniquely identified.
234 indicates that only dotted decimal addresses
235 should be put into the
241 to refuse connections from addresses that
242 cannot be mapped back into a symbolic name
247 This option is only valid if
249 has been built with support for the authentication option.
250 It disables the use of
253 can be used to temporarily disable
254 a specific authentication type without having to recompile
257 Specify pathname to an alternative login program.
261 not warn when a user is trying to login with a cleartext password.
265 operates by allocating a pseudo-terminal device (see
267 for a client, then creating a login process which has
268 the slave side of the pseudo-terminal as
274 manipulates the master side of the pseudo-terminal,
277 protocol and passing characters
278 between the remote client and the login process.
282 session is started up,
286 options to the client side indicating
287 a willingness to do the
290 options, which are described in more detail below:
291 .Bd -literal -offset indent
299 WILL SUPPRESS GO AHEAD
308 The pseudo-terminal allocated to the client is configured
318 has support for enabling locally the following
321 .Bl -tag -width "DO AUTHENTICATION"
329 will be sent to the client to indicate the
330 current state of terminal echoing.
331 When terminal echo is not desired, a
333 is sent to indicate that
335 will take care of echoing any data that needs to be
336 echoed to the terminal, and then nothing is echoed.
337 When terminal echo is desired, a
339 is sent to indicate that
341 will not be doing any terminal echoing, so the
342 client should do any terminal echoing that is needed.
344 Indicates that the client is willing to send a
345 8 bits of data, rather than the normal 7 bits
346 of the Network Virtual Terminal.
348 Indicates that it will not be sending
352 Indicates a willingness to send the client, upon
353 request, of the current status of all
356 .It "WILL TIMING-MARK"
359 command is received, it is always responded
367 is sent in response, and the
369 session is shut down.
373 is compiled with support for data encryption, and
374 indicates a willingness to decrypt
379 has support for enabling remotely the following
382 .Bl -tag -width "DO AUTHENTICATION"
384 Sent to indicate that
386 is willing to receive an 8 bit data stream.
388 Requests that the client handle flow control
391 This is not really supported, but is sent to identify a 4.2BSD
393 client, which will improperly respond with
399 will be sent in response.
400 .It "DO TERMINAL-TYPE"
401 Indicates a desire to be able to request the
402 name of the type of terminal that is attached
403 to the client side of the connection.
405 Indicates that it does not need to receive
407 the go ahead command.
409 Requests that the client inform the server when
410 the window (display) size changes.
411 .It "DO TERMINAL-SPEED"
412 Indicates a desire to be able to request information
413 about the speed of the serial line to which
414 the client is attached.
416 Indicates a desire to be able to request the name
417 of the X windows display that is associated with
420 Indicates a desire to be able to request environment
421 variable information, as described in RFC 1572.
423 Indicates a desire to be able to request environment
424 variable information, as described in RFC 1408.
428 is compiled with support for linemode, and
429 requests that the client do line by line processing.
433 is compiled with support for both linemode and
434 kludge linemode, and the client responded with
436 If the client responds with
438 the it is assumed that the client supports
442 option can be used to disable this.
443 .It "DO AUTHENTICATION"
446 is compiled with support for authentication, and
447 indicates a willingness to receive authentication
448 information for automatic login.
452 is compiled with support for data encryption, and
453 indicates a willingness to decrypt
457 .Bl -tag -width /etc/services -compact
460 (UNICOS systems only)
468 .Bl -tag -compact -width RFC-1572
471 PROTOCOL SPECIFICATION
473 TELNET OPTION SPECIFICATIONS
475 TELNET BINARY TRANSMISSION
479 TELNET SUPPRESS GO AHEAD OPTION
483 TELNET TIMING MARK OPTION
485 TELNET EXTENDED OPTIONS - LIST OPTION
487 TELNET END OF RECORD OPTION
489 Telnet Window Size Option
491 Telnet Terminal Speed Option
493 Telnet Terminal-Type Option
495 Telnet X Display Location Option
497 Requirements for Internet Hosts -- Application and Support
499 Telnet Linemode Option
501 Telnet Remote Flow Control Option
503 Telnet Authentication Option
505 Telnet Authentication: Kerberos Version 4
507 Telnet Authentication: SPX
509 Telnet Environment Option Interoperability Issues
511 Telnet Environment Option
516 commands are only partially implemented.
518 Because of bugs in the original 4.2 BSD
521 performs some dubious protocol exchanges to try to discover if the remote
522 client is, in fact, a 4.2 BSD
526 has no common interpretation except between similar operating systems
529 The terminal type name received from the remote client is converted to