On Fri, 11 Mar 2016, Paul Jakma wrote:

On Fri, 11 Mar 2016, Donald Sharp wrote:

The RESTRICTED_NODE command is not used, introduces code
complexity and provides no additional levels of security.

The only way to get into RESTRICTED_NODE is to add, under
vty configuration the command 'anonymous restricted', and
then telnet to a daemon, provide a password, then type
'enable' and fail to enter the password three times.

No, that's not right. It's intended for use with another vty-config command that allows anonymous access - 'no login' I think.

You go straight into restricted mode.

Oh, it should be the unauthenticated "go straight into non-enabled vty access without password" feature that is under discussion here. If 'restricted mode' doesn't make sense, then the no-auth vty feature doesn't either and it should go too.

If the no-auth telnet to vty feature is being used by some route servers or looking-glasses, then 'restricted mode' does make sense, cause you can give access to just reasonably performant 'query' commands - without giving access to the expensive table dumping commands (which vty just isn't the right tool for - use MRT dumps).

So, the question is, does anyone use or need the unauthenticated bgpd telnet feature? It could be hard to answer that...

regards,
--
Paul Jakma      [email protected]  @pjakma Key ID: 64A2FF6A
Fortune:
What the large print giveth, the small print taketh away.

_______________________________________________
Quagga-dev mailing list
[email protected]
https://lists.quagga.net/mailman/listinfo/quagga-dev

Reply via email to