On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.
The pattern points toward one or more North American Tier 1 transit providers implementing port 23 filtering
dparticiple@sh.itjust.works 1 day ago
I share the author’s nostalgia for Telnet, as a kid who spent many lost hours trying to telnet into “interesting things” at the dawn of the internet. It is, however, long past time for the protocol to die and force ancient and insecure things to be retired. Thus might just do it.
adespoton@lemmy.ca 1 day ago
But telnet is just a bidirectional TCP connection. You can run any terminal emulation you want over it, and run it on any port you want.
The telnetd service on the other hand… that has no reason to still be internet-facing.
dparticiple@sh.itjust.works 1 day ago
Good point. I was referring more to telnetd as an unencrypted client-server protocol, typically to port 23. Often unauthenticated, ripe for MITM attacks.
That needs to end.
FauxPseudo@lemmy.world 1 day ago
I used to debug POP3 issues by going through sessions one line at a time via telnet. Occasionally HTTP sessions too.
floquant@lemmy.dbzer0.com 9 hours ago
Any reason to pick that over netcat though?