Replacing clear text remote access protocols

I've always had a love/hate relationship with the ubiquitous Telnet remote access protocol. Telnet access is a standard feature on most Internet routing equipment and for remote access; therefore, you've probably used it if you've ever needed remote access to a router, switch, or host across the Internet.


It's important to note that regular Telnet is not encrypted, which means that Telnet can expose the login and password for remote Internet equipment. This issue alone makes using Telnet for any type of Internet communication a concern, since passing usernames and passwords for routers across the Internet isn't a good idea. Using a modem connected to Internet equipment isn't always practical either.


Encrypted remote access provides the same functionality as Telnet but prevents data sniffing and interception. The standard in this area is Secure Shell (SSH). Most free UNIX systems include a variation of SSH with their distributions, and UNIX systems that don't include SSH can use either commercial SSH versions or OpenSSH. You can also configure higher end routers and switches from Cisco to support SSH. (For specific details on how to configure SSH on Cisco IOS routers, click here.) A number of companies offer SSH client programs, including SSH Communications Security and VanDyke Software (specifically, its product SecureCRT), as well as various free implementations such as PuTTY.


However, it's important to emphasize that encryption alone doesn't guarantee security, and using SSH protocol version 1 quite possibly will result in other security problems. I was reminded of this fact last Wednesday when I received a security bulletin from X-Force in my inbox while reviewing materials for this article. Version 1 of the SSH protocol contains a design flaw, which was fixed in subsequent versions. So if you're going to implement SSH on your systems, review specific information regarding implementation. In other words, if possible, specify SSH version 2 instead of version 1.


In addition to Telnet, TN3270 is a remote access protocol that supports remote access to IBM mainframes and other "big iron" equipment. People frequently use TN3270 on internal networks, which may or may not be a security issue, depending on the other security procedures in place. The primary issue with TN3270 is that many companies use TN3270 to access mainframes across the Internet. As with Telnet, TN3270 uses clear text authentication and data traffic. Since many hospitals and financial companies use mainframes extensively for customer database applications, exposure of customer data due to clear text remote access protocols is a potential security risk.


Fortunately, it's possible to secure TN3270 with encryption, although I don't have personal experience implementing secure TN3270. Two products that look interesting in this area are SecureAgent Software's SecureTN3270 and Hummingbird's HostExplorer (which I've seen in action and can report looks pretty much like standard TN3270). Of course, always evaluate products carefully before selecting a replacement product for TN3270.