[Info-vax] SSH on VAX - performance impact of break in attempts

AEF spamsink2001 at yahoo.com
Wed Aug 25 10:24:56 EDT 2010


On Aug 25, 7:21 am, m.krae... at gsi.de (Michael Kraemer) wrote:
> In article <8790d786-445c-4da9-a67d-01959b9e0... at i31g2000yqm.googlegroups.com>,
>
> Neil Rieck <n.ri... at sympatico.ca> writes:
>
> > I have been seeing this for years on one of my public machines running
> > TCPware. It is quite amusing and very childish: the far end system
> > appears to be engaged in a dictionary via SSH and is cycling through
> > various account names and passwords. Since this is a VMS machine, so
> > no one has ever been able to break in.
>
> If - by chance - the right combination of account/password is guessed,
> why would a VMS machine be safer than any other?
>
> > My most recent attack came from
> > Brazil. Either a PING or TRACEROUTE to the sending end is all you need
> > to stop the attack for a few days.
>
> Wouldn't that at least require a "ping of death" ?

There's also break-in evasion.

AEF



More information about the Info-vax mailing list