[Info-vax] SSH on VAX - performance impact of break in attempts
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Wed Aug 25 08:00:31 EDT 2010
In article <i52ucj$396$1 at lnx107.hrz.tu-darmstadt.de>, m.kraemer at gsi.de (Michael Kraemer) writes:
>In article <8790d786-445c-4da9-a67d-01959b9e0ecc at i31g2000yqm.googlegroups.com>,
>Neil Rieck <n.rieck at sympatico.ca> writes:
>>
>> I have been seeing this for years on one of my public machines running
>> TCPware. It is quite amusing and very childish: the far end system
>> appears to be engaged in a dictionary via SSH and is cycling through
>> various account names and passwords. Since this is a VMS machine, so
>> no one has ever been able to break in.
>
>If - by chance - the right combination of account/password is guessed,
>why would a VMS machine be safer than any other?
Beacause only a fool would create a 'root' account or an 'administrator'
account on VMS *AND* give it privies. If such a fool should exit, he or
she deserves the wrath of whatever these password crackers can do! The
12 character username prohibits the 'administrator' account.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
All your spirit rack abuses, come to haunt you back by day.
All your Byzantine excuses, given time, given you away.
More information about the Info-vax
mailing list