[Info-vax] SSH on VAX - performance impact of break in attempts
Richard B. Gilbert
rgilbert88 at comcast.net
Wed Aug 25 10:38:17 EDT 2010
Michael Kraemer wrote:
> In article <8790d786-445c-4da9-a67d-01959b9e0ecc at i31g2000yqm.googlegroups.com>,
> Neil Rieck <n.rieck at sympatico.ca> writes:
>> I have been seeing this for years on one of my public machines running
>> TCPware. It is quite amusing and very childish: the far end system
>> appears to be engaged in a dictionary via SSH and is cycling through
>> various account names and passwords. Since this is a VMS machine, so
>> no one has ever been able to break in.
>
> If - by chance - the right combination of account/password is guessed,
> why would a VMS machine be safer than any other?
>
>> My most recent attack came from
>> Brazil. Either a PING or TRACEROUTE to the sending end is all you need
>> to stop the attack for a few days.
>
> Wouldn't that at least require a "ping of death" ?
>
A "ping of death"?????? How do you do that? I can think of a few
people who deserve one!
More information about the Info-vax
mailing list