[Info-vax] SSH on VAX - performance impact of break in attempts
Michael Kraemer
m.kraemer at gsi.de
Wed Aug 25 07:21:55 EDT 2010
In article <8790d786-445c-4da9-a67d-01959b9e0ecc at i31g2000yqm.googlegroups.com>,
Neil Rieck <n.rieck at sympatico.ca> writes:
>
> I have been seeing this for years on one of my public machines running
> TCPware. It is quite amusing and very childish: the far end system
> appears to be engaged in a dictionary via SSH and is cycling through
> various account names and passwords. Since this is a VMS machine, so
> no one has ever been able to break in.
If - by chance - the right combination of account/password is guessed,
why would a VMS machine be safer than any other?
> My most recent attack came from
> Brazil. Either a PING or TRACEROUTE to the sending end is all you need
> to stop the attack for a few days.
Wouldn't that at least require a "ping of death" ?
More information about the Info-vax
mailing list