[Info-vax] SSH on VAX - performance impact of break in attempts

Michael Kraemer m.kraemer at gsi.de
Wed Aug 25 07:21:55 EDT 2010


In article <8790d786-445c-4da9-a67d-01959b9e0ecc at i31g2000yqm.googlegroups.com>,
Neil Rieck <n.rieck at sympatico.ca> writes:
> 
> I have been seeing this for years on one of my public machines running
> TCPware. It is quite amusing and very childish: the far end system
> appears to be engaged in a dictionary via SSH and is cycling through
> various account names and passwords. Since this is a VMS machine, so
> no one has ever been able to break in. 

If - by chance - the right combination of account/password is guessed,
why would a VMS machine be safer than any other?

> My most recent attack came from
> Brazil. Either a PING or TRACEROUTE to the sending end is all you need
> to stop the attack for a few days.

Wouldn't that at least require a "ping of death" ?
 



More information about the Info-vax mailing list