[Info-vax] SSH on VAX - performance impact of break in attempts

Richard B. Gilbert rgilbert88 at comcast.net
Wed Aug 25 10:38:17 EDT 2010


Michael Kraemer wrote:
> In article <8790d786-445c-4da9-a67d-01959b9e0ecc at i31g2000yqm.googlegroups.com>,
> Neil Rieck <n.rieck at sympatico.ca> writes:
>> I have been seeing this for years on one of my public machines running
>> TCPware. It is quite amusing and very childish: the far end system
>> appears to be engaged in a dictionary via SSH and is cycling through
>> various account names and passwords. Since this is a VMS machine, so
>> no one has ever been able to break in. 
> 
> If - by chance - the right combination of account/password is guessed,
> why would a VMS machine be safer than any other?
> 
>> My most recent attack came from
>> Brazil. Either a PING or TRACEROUTE to the sending end is all you need
>> to stop the attack for a few days.
> 
> Wouldn't that at least require a "ping of death" ?
>  

A "ping of death"??????   How do you do that?  I can think of a few 
people who deserve one!



More information about the Info-vax mailing list