on a 2511, which i am using as a serial console server for a bunch of boxes, how do i send a <break> on one of the lines? randy
On Mon, 26 Jul 2004, Randy Bush wrote:
on a 2511, which i am using as a serial console server for a bunch of boxes, how do i send a <break> on one of the lines?
ctrl-shift-6 b I believe. Jason -- Jason Slagle - CCNP - CCDP /"\ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \ / ASCII Ribbon Campaign . X - NO HTML/RTF in e-mail . / \ - NO Word docs in e-mail .
Randy Bush wrote:
on a 2511, which i am using as a serial console server for a bunch of boxes, how do i send a <break> on one of the lines?
Doesn´t the usual way work? Which is that you telnet escape and say "send brk" to the prompt? No idea if there is similar facility in ssh. Pete
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Randy Bush wrote: | on a 2511, which i am using as a serial console server for a bunch | of boxes, how do i send a <break> on one of the lines? | The terminal emulation app that you use should have the capability to send a telnet break to the terminal server. The terminal server in turn will assert physical break on the line connected to the device. There are a couple of line commands that can affect the behavior when certain telnet commands are received. Specifically: telnet break-on-ip To cause the system to generate a hardware BREAK signal on the EIA/TIA-232 line that is associated with a reverse Telnet connection when a Telnet Interrupt-Process command is received on that connection, use the telnet break-on-ip command in line configuration mode. telnet sync-on-break To configure the Cisco IOS software to cause an incoming connection to send a Telnet Synchronize signal when it receives a Telnet BREAK signal, use the telnet sync-on-break command in line configuration mode. To disable this function, use the no form of this command. - -- ========= bep -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (MingW32) iD8DBQFBBUP8E1XcgMgrtyYRAlPNAJ4j/K5crtjriCSJMAHhKXeSEJKd5ACgrjHD vzE7+4PiokLTJby/cV4kbJA= =CBzv -----END PGP SIGNATURE-----
to further clarify
on a 2511, which i am using as a serial console server for a bunch of boxes, how do i send a <break> on one of the lines?
i am not telnetting anywhere on the net. i would deinstall telnet if it was an option in freebsd build. hence, i can not ^[ and send break. i am sshing into the 2511 and then issuing the equivalent of telnet 127.0.0.1 line# notice that, though this is telnet, it just goes over a serial cable to the serial console of the device to which i wish to send a break. Jason Slagle <raistlin@tacorp.net> saying "ctrl-shift-6 b" is the nearest i have heard. randy
On Mon, 26 Jul 2004, Randy Bush wrote:
notice that, though this is telnet, it just goes over a serial cable to the serial console of the device to which i wish to send a break.
Jason Slagle <raistlin@tacorp.net> saying "ctrl-shift-6 b" is the nearest i have heard.
This may require 'escape-character BREAK' in the line or con directive to have the desired result. J. -- Jess Kitchen ^ burstfire.net[works] _25492$ | www.burstfire.net.uk
Whatever your telnet/ssh client uses to send a break signal. In most UNIX telnet clients it's escape char (usually '^['), then "send break" Most PC ssh/telnet clients use shift-break, or ctrl-break. /cah On Mon, Jul 26, 2004 at 06:45:51AM -1000, Randy Bush wrote: ==> ==>on a 2511, which i am using as a serial console server for a bunch ==>of boxes, how do i send a <break> on one of the lines? ==> ==>randy
Randy Bush <randy@psg.com> writes:
on a 2511, which i am using as a serial console server for a bunch of boxes, how do i send a <break> on one of the lines?
telnet break is translated to long-space serial break: rs@valhalla [6] % telnet scrapheap 2003 Trying 10.1.1.25 Connected to 10.1.1.25. Escape character is '^]'. User Access Verification Password: Password OK installhost console login: installhost console login: telnet> send break Type 'go' to resume ok telnet> quit Connection closed. rs@valhalla [7] %
rs@valhalla [6] % telnet scrapheap 2003 Trying 10.1.1.25 Connected to 10.1.1.25. Escape character is '^]'.
User Access Verification
Password: Password OK
installhost console login: installhost console login: telnet> send break Type 'go' to resume ok telnet> quit Connection closed. rs@valhalla [7] %
i am seriously shocked by the number of folk in this forum who not only seem to use telnet over the internet, but seem willing to advertise it. randy
Randy Bush <randy@psg.com> writes:
rs@valhalla [6] % telnet scrapheap 2003 Trying 10.1.1.25 Connected to 10.1.1.25. Escape character is '^]'.
i am seriously shocked by the number of folk in this forum who not only seem to use telnet over the internet, but seem willing to advertise it.
not as shocked as i am that a co-author of at least ten rfcs and perpetual ietf attendee doesn't recognize an rfc1918 address when he sees it, even when given the big hint of a hostname that does not appear in the global dns. can you say "lab network"? ---Rob
On Mon, 26 Jul 2004 15:56:04 EDT, "Robert E. Seastrom" said:
not as shocked as i am that a co-author of at least ten rfcs and perpetual ietf attendee doesn't recognize an rfc1918 address when he sees it, even when given the big hint of a hostname that does not appear in the global dns.
can you say "lab network"?
I don't know how you run your lab nets, but if I have something on a lab net, it still gets secured the same way as a world-visible machine would. 1) That protects it if ever I add a gateway machine that talks to the world. 2) It keeps you in the habit of securing *everything*. Apparently, the knee-jerk 'ewww' at using telnet, even on a lab network, wasn't ingrained enough to configure ssh instead... Thus there's indeed a high likelyhood that there's still telnet being used in some corner of the production net....
On Mon, Jul 26, 2004 at 04:32:53PM -0400, Valdis.Kletnieks@vt.edu wrote:
I don't know how you run your lab nets, but if I have something on a lab net, it still gets secured the same way as a world-visible machine would.
1) That protects it if ever I add a gateway machine that talks to the world.
2) It keeps you in the habit of securing *everything*.
Apparently, the knee-jerk 'ewww' at using telnet, even on a lab network, wasn't ingrained enough to configure ssh instead... Thus there's indeed a high likelyhood that there's still telnet being used in some corner of the production net....
as we all fall over ourselves to prove to the world how cool we are by busting on robs lab demo and by the way, also mentioning in passing how secure our labs are, and how rigorously we engineer them, perhaps one might take the time to consider the fact that perhaps rob enabled this in his lab to illustrate his answer. /vijay
On Mon, 26 Jul 2004, Randy Bush wrote:
as we all fall over ourselves to prove to the world how cool we are by busting on robs lab demo
i did not mean to bust on rob, in partucular. but note that 95% of the (amazing number of) replies *assumed* telnet to the router.
Blame it on cisco, not the responses to your request for help (which did not mention that SSH was the only possible access method or that you don't encrypt telnet sessions between managment networks to get around legacy requirements). I mean, jeez. If I didn't know of your reputation, I'd assume you were trolling. Andy --- Andy Dills Xecunet, Inc. www.xecu.net 301-682-9972 ---
serious question just to play devils advocate whats the difference between telnet from a directly connected host and a serial line? all the issues with the former can be applied to the latter cant they? Steve
On Mon, 26 Jul 2004, Randy Bush wrote:
whats the difference between telnet from a directly connected host and a serial line?
if the 'directly connected host' is on multi-point medium, then it is subject to sniff attacks
I realised that but you can 'sniff' a serial line if you physically tap it, you're saying you can setup a span port much easier as its software tho right? but that requires you to have compromised the switch and an attached server, that in itself should be throwing up some alarms - rancid, tripwire etc? it would be easier to hack the host directly and install a keylogger, only one hack to do that way and you can grab any passwds from telnet or ssh sessions Steve
participants (12)
-
Andy Dills
-
Bruce Pinsky
-
Craig A. Huegen
-
Jason Slagle
-
Jess Kitchen
-
Laurence F. Sheldon, Jr.
-
Petri Helenius
-
Randy Bush
-
Robert E. Seastrom
-
Stephen J. Wilcox
-
Valdis.Kletnieks@vt.edu
-
vijay gill