frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The Day the Telnet Died

https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
126•pjf•2h ago•57 comments

The Feynman Lectures on Physics (1961-1964)

https://www.feynmanlectures.caltech.edu/
64•rramadass•13h ago•11 comments

The Singularity will occur on a Tuesday

https://campedersen.com/singularity
804•ecto•7h ago•456 comments

Ex-GitHub CEO launches a new developer platform for AI agents

https://entire.io/blog/hello-entire-world/
304•meetpateltech•9h ago•271 comments

The Little Learner: A Straight Line to Deep Learning

https://mitpress.mit.edu/9780262546379/the-little-learner/
70•AlexeyBrin•2d ago•8 comments

How did Windows 95 get permission to put the Weezer video Buddy Holly on the CD?

https://devblogs.microsoft.com/oldnewthing/20260210-00/?p=112052
106•ingve•5h ago•72 comments

The Falkirk Wheel

https://www.scottishcanals.co.uk/visit/canals/visit-the-forth-clyde-canal/attractions/the-falkirk...
40•scapecast•4h ago•15 comments

Tambo 1.0: Open-source toolkit for agents that render React components

https://github.com/tambo-ai/tambo
40•grouchy•4h ago•4 comments

My eighth year as a bootstrapped founder

https://mtlynch.io/bootstrapped-founder-year-8/
120•mtlynch•2d ago•49 comments

Clean-room implementation of Half-Life 2 on the Quake 1 engine

https://code.idtech.space/fn/hl2
323•klaussilveira•13h ago•64 comments

Simplifying Vulkan one subsystem at a time

https://www.khronos.org/blog/simplifying-vulkan-one-subsystem-at-a-time
205•amazari•11h ago•141 comments

Mathematicians disagree on the essential structure of the complex numbers (2024)

https://www.infinitelymore.xyz/p/complex-numbers-essential-structure
145•FillMaths•8h ago•192 comments

Qwen-Image-2.0: Professional infographics, exquisite photorealism

https://qwen.ai/blog?id=qwen-image-2.0
378•meetpateltech•15h ago•159 comments

Show HN: Rowboat – AI coworker that turns your work into a knowledge graph (OSS)

https://github.com/rowboatlabs/rowboat
105•segmenta•8h ago•28 comments

Google handed ICE student journalist's bank and credit card numbers

https://theintercept.com/2026/02/10/google-ice-subpoena-student-journalist/
629•lehi•7h ago•248 comments

A brief history of oral peptides

https://seangeiger.substack.com/p/a-brief-history-of-oral-peptides
73•odedfalik•1d ago•24 comments

Competition is not market validation

https://www.ablg.io/blog/competition-is-not-validation
57•tonioab•9h ago•23 comments

Markdown CLI viewer with VI keybindings

https://github.com/taf2/mdvi
54•taf2•7h ago•21 comments

Show HN: JavaScript-first, open-source WYSIWYG DOCX editor

https://github.com/eigenpal/docx-js-editor
30•thisisjedr•1d ago•3 comments

Show HN: Stripe-no-webhooks – Sync your Stripe data to your Postgres DB

https://github.com/pretzelai/stripe-no-webhooks
46•prasoonds•7h ago•17 comments

Show HN: Distr 2.0 – A year of learning how to ship to customer environments

https://github.com/distr-sh/distr
64•louis_w_gk•12h ago•17 comments

The Evolution of Bengt Betjänt

https://andonlabs.com/blog/evolution-of-bengt
41•lukaspetersson•21h ago•2 comments

Oxide raises $200M Series C

https://oxide.computer/blog/our-200m-series-c
508•igrunert•10h ago•266 comments

Europe's $24T Breakup with Visa and Mastercard Has Begun

https://europeanbusinessmagazine.com/business/europes-24-trillion-breakup-with-visa-and-mastercar...
643•NewCzech•13h ago•557 comments

Show HN: Sol LeWitt-style instruction-based drawings in the browser

https://intervolz.com/sollewitt/
21•intervolz•5h ago•1 comments

Show HN: I built a macOS tool for network engineers – it's called NetViews

https://www.netviews.app
159•n1sni•19h ago•44 comments

Launch HN: Livedocs (YC W22) – An AI-native notebook for data analysis

https://livedocs.com
42•arsalanb•6h ago•17 comments

Show HN: ArtisanForge: Learn Laravel through a gamified RPG adventure

https://artisanforge.online/
8•grazulex•2d ago•0 comments

Show HN: Multimodal perception system for real-time conversation

https://raven.tavuslabs.org
37•mert_gerdan•6h ago•10 comments

I started programming when I was 7. I'm 50 now and the thing I loved has changed

https://www.jamesdrandall.com/posts/the_thing_i_loved_has_changed/
579•jamesrandall•9h ago•491 comments
Open in hackernews

The Day the Telnet Died

https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
121•pjf•2h ago

Comments

adolph•1h ago
The pattern points toward one or more North American Tier 1 transit providers implementing port 23 filtering
RupertSalt•1h ago
Someone attempted to compromise my home router last week using CHARGEN. Can you imagine!
direwolf20•43m ago
Attempted to compromise, or just port scanned?
iberator•1h ago
Stranger article. I wasn't able to get the main point of this article. Strangely written, but hey - I'm nob native by any means.

ps.

telnet SDF.org

just works...

jwpapi•46m ago
it was just ai written thats why.. unexpectedly so from greynoise.
RonanSoleste•1h ago
I still used telnet today (had to). Unsure of the patching here. But its definitely locked down to a subset of internal use only.
pbhjpbhj•49m ago
Embedded? Ancient? What sort of systems are you telnetting into?
Twisol•1h ago
> Someone upstream of a significant chunk of the internet’s transit infrastructure apparently decided telnet traffic isn’t worth carrying anymore. That’s probably the right call.

Does this impact traffic for MUDs at all? I know several MUDs operate on nonstandard Telnet ports, but many still allow connection on port 23. Does this block end-to-end Telnet traffic, or does it only block attempts to access Telnet services on the backbone relays themselves?

MBCook•1h ago
It wasn’t clear from the article but I assumed they were filtering for the attack specifically.

Since Telnet is totally plain text that would absolutely be easy to do right?

wbl•1h ago
Not at interconnect speeds
Mixtape•1h ago
Wouldn't that imply that >80% of all monitored telnet sessions were exploit attempts for the specific CVE in question? Even with the scale of modern botnets, that seems unrealistic for a single vuln that was undisclosed at the time.
RupertSalt•1h ago
Most MUDs do not use Telnet.

MUDs use plaintext TCP protocols that are accessible to a wide range of clients.

The Telnet protocol is well-defined and not completely plaintext. There are in-band signaling methods and negotiations. Telnet is defined to live on 23/tcp as an IANA well-known, privileged, reserved port.

MUDs do none of this. You can usually connect to a MUD using a Telnet client, but most players hate the experience and often deride this method in favor of a dedicated, programmable client.

The fact that MUDs inhabit higher 4-digit ports is an artifact from their beginnings as unprivileged, user-run servers without a standardized protocol or an assigned “well-known port” presence. If you want your MUD to be particularly inaccessible, you could certainly run on port 23 now!

Twisol•1h ago
As a MUD enthusiast of two decades, this is not accurate. Where are you getting this information?

Most MUDs implement RFC 854, and a number of non-standard Telnet option subnegotiation protocols have been adopted for compression (MCCP2), transmission of unrendered data (ATCP, GMCP, ZMP), and even a mechanism for enabling marking up the normal content using XML-style tags (MXP). These telopts build on the subnegotiation facility in standard Telnet, whose designers knew that the base protocol would be insufficient for many needs; there are a great number of IANA-controlled and standardized telopt codes that demonstrate this, and the MUD community has developed extensions using that same mechanism.

> You can usually connect to a MUD using a Telnet client, but most players hate the experience and often deride this method in favor of a dedicated, programmable client.

I think you are confusing "telnet" the program with "telnet" the protocol. I am speaking here of the protocol, defined at base in RFC 854, for which "telnet" the program is but one particularly common implementation. You look at any of those "dedicated, programmable clients" and they will contain an implementation of RFC 854, probably also an implementation of RFC 1143 (which nails down the rules of subnegotiation in order to prevent negotiation loops), and an implementation of the RFCs for several standard telopts as well as non-standardized MUD community telopts. I can speak for the behavior of MUSHclient in especial regard here, though I am also familiar with the underlying Telnet nature of Mudlet, ZMud, and CMUD, not to mention my very own custom-made prototype client for which I very much needed to implement Telnet as described above.

Laforet•1h ago
It seems like they are doing a port based block similar to how residential lines often have their SMTP ports shut off.

That said in this day and age, servers on the public network really ought to use SSH.

davebranton•1h ago
Why would somebody read something that somebody couldn't be bothered to write? This article is AI slop.
gerdesj•1h ago
telnet isn't just for ... telnet.

  $ telnet smtp.example.co.uk 25
  HELO me
  MAIL FROM: gerdesj@example2.co.uk
  RCPT TO: gerdesj@example.co.uk
  DATA
.. or you can use SWAKS! For some odd reason telnet is becoming rare as an installed binary.
Twisol•1h ago
The difference between "telnet" the program and "telnet" the protocol is especially important in this discussion, I think.

A more "proper" tool for that is netcat -- I doubt SMTP supports the Telnet option negotiations subsystem. (I also doubt SMTP servers can interpret the full suite of Network Virtual Terminal (NVT) commands that the Telnet protocol supports.) There's clearly enough similarity between the two protocols that if you're just using it to transfer plaintext it will probably work out fine, but they are distinct protocols.

quotemstr•1h ago
You want nc (usually with -v) or socat. telnet is muscle memory for a lot of people (myself included sometimes) but it's a strictly inferior choice these days for poking arbitrary plaintext services.
doubled112•8m ago
As long as it works, it doesn’t really matter for a quick test.

I find myself using curl telnet://server:port too often these days because telnet and nc don’t get installed.

ktpsns•1h ago
I used telnet(1) as a generic TCP text client for many years before switching to GNU/BSD netcat. Nowadays, netcat is more prominent then telnet, and telnet had its corner cases with control characters.

Never heard about https://jetmore.org/john/code/swaks/, thanks for the tip.

Animats•1h ago
So eleven years ago someone put a backdoor in the Telnet daemon.

Who?

Where's the commit?

parl_match•1h ago
It wasn't a backdoor, just a very serious security bug. Congrats on jumping straight to conspiracy and paranoia, though.
alt187•1h ago
It's only a conspiracy and paranoia if it's wrong. 11 years ago was 2015.
greyface-•1h ago
https://codeberg.org/inetutils/inetutils/commit/fa3245ac8c28...
ieie3366•1h ago
That's crazy. This is core business critical software but they just YOLO critical changes without any automated tests? this PR would be insta-rejected in the small SAAS shop I work at.
avaer•1h ago
There's a famous XKCD about this: https://xkcd.com/2347/

In this case the hero's name is apparently Simon Josefsson (maintainer).

AlienRobot•59m ago
https://xkcd.com/2347/

Ah, someone beat me to it!

direwolf20•47m ago
If you think you can do better you're welcome to do better. I say this without a hint of sarcasm. This is how open source works. It's a do–ocracy, not a democracy. Whoever makes a telnet server gets to decide how the telnet server works and how much testing it gets before release.
acdha•44m ago
Culture has changed a lot since the 20th century and older projects can have antiquated norms around things like testing. I was just listening to a recent podcast talking about how worrisome it is that OpenSSL has a casual culture about testing[1] and was reminded about how normal that used to be. I think in the case of telnetd you also have the problem that it’s been deprecated for multiple decades so I’d bet that they struggle even more than average to find maintainer time.

1. https://securitycryptographywhatever.com/2026/02/01/python-c...

wildzzz•32m ago
Any business that has a telnet daemon able to be reached by an unauthenticated user is negligent. Just the fact that everything is in the clear is reason enough to never use it outside of protected networks.
fhub•26m ago
Even with automated tests you'd need to think of this exploit right? Perhaps fuzzing would have got it. The mailing lists says they proved it successful on

- OpenIndiana

- FreeBSD

- Debian GNU/Linux

So not complete YOLO.

See https://lists.gnu.org/archive/html/bug-inetutils/2015-03/msg...

FWIW, a well known LLM agent, when I asked for a review of the patch, did suggest it was dodgy but didn't pick up the severity of how dodgy it was.

Arubis•1h ago
Telnet's cleartext and always has been. A backdoor seems like overkill.
direwolf20•44m ago
You still have to know the password or snoop on someone typing the password. But with this vuln, you don't. You can just get root instantly.
mmooss•49m ago
> backdoor

Do you mean that it's intentional? Why do you think so?

trebligdivad•1h ago
Why are people still using telnet across the internet in this century? Was this _all_ attack traffic?

(OK, I know one ancient talker that uses it - but on a very non-standard port so a port 23 block wouldn't be relevant)

mcpherrinm•1h ago
As I understand it, greynoise is monitoring scanner traffic, so yes this would all be scans or attacks
jaredsohn•1h ago
To watch Star Wars in ASCII.

telnet towel.blinkenlights.nl https://www.youtube.com/watch?v=Mhcf6tc2jeQ

(Remember hearing about this many years ago and verified some instance of it still exists/works.)

mmooss•38m ago

  Connection failed
Maybe we should give the kind person who hosts it a break. Try it out tomorrow. (Yes, I should have thought of that before I tried.)
iamnothere•24m ago
Hams use it over packet radio sometimes since encryption is forbidden on the amateur bands.

IMHO we need a good telnet replacement that sends signed data. Most people interpret signatures as allowed under FCC rules, just not encryption.

rcakebread•8m ago
One? All the talkers still use it and all the MUDs/MOOs etc. far out number the talkers.
catskull•1h ago
When I was an intern for some reason they issued me a voip phone for my desk. One day I got bored and figured out I could telnet into it. Nothing interesting but it was still a fun moment for me!
lacunary•53m ago
telnet + shijack = good times
charcircuit•48m ago
The design of telnet and ssh where you have a daemon running as root is bad security that as shown here is a liability, a ticking time bomb ready to give attackers root.
direwolf20•45m ago
Literally how else is a remote login daemon supposed to work though?
dragonfax•41m ago
1. Start with root to bind the port below 1024.

2. give up root because you don't need it any further.

3. Only accept non-root logins

4. when a user creates a session, if they need root within the session they can obtain it via sudo or su.

acdha•32m ago
That still needs a way to change users, and OpenSSH already has privilege separation. That hardens the process somewhat to reduce the amount of code running in the process which can change the uid for a session but fundamentally something needs permission to call setuid() or the equivalent.
Aloha•32m ago
I'm not sure that you need root because of the port - I think login itself needs to run as root, otherwise it cant login to anything other than the account its running under.
wiml•28m ago
You still need to have privileges to become the userid of the user logging in. Openssh does do privsep, but you still need a privileged daemon.
klempner•24m ago
Congratulations, you've created a server that lets people have shells running as the user running telnetd.

You presumably want them to run as any (non root) user. The capability you need for that, to impersonate arbitrary (non-root) users on the system, is pretty damn close to being root.

charcircuit•32m ago
The remote daemon has its own account and is given a privilege that allows it to connect a network socket to a pseudo terminal.
esseph•23m ago
Any breach of the daemon will still give access to a system that can approve/deny user logins. Breaching the daemon therefore allows permission escalation, because you can simply jump to an account. Chain with any local vuln of your choice to completely own the box.

It doesn't matter what user it is running as.

If this was so easy to deal with, someone would have done it. Instead, we get endless HN comments about people that act like they can do better but never submit a PR.

direwolf20•6m ago
Those are already unprivileged operations, but how does it start the initial process in that terminal with the correct privileges for a different user?
nine_k•33m ago
What do you think proper architecture would be, given that ssh needs a capability to let root logins?

I suppose it could be via a proper PAM module, which is widely supported.

Too bad the first PAM RFC was published about the same time the first be version of ssh was released.

jopython•36m ago
This is about Telnetd. Not telnet itself.
saulpw•33m ago
...except that port 23 seems to now be filtered across the internet at large, leading to a huge drop-off in telnet traffic over the course of days if not hours. I think it's safe to say that even if you patch telnetd, being able to use telnet over the internet is not possible in many places (including Canada, according to the data).
fsmv•32m ago
Your cookie banner is very inconvenient and made me leave your website and not read the article
keyle•10m ago
It's nice to not see C being blamed for once! ... Just good old lack of reasoning (which is most C's codebase downfall, agreeably).