[Info-vax] SSH on VAX - performance impact of break in attempts

Graham Burley burley at Encompasserve.org
Thu Aug 26 11:47:01 EDT 2010


In article <673e4a7c-2427-4629-99aa-2ec221021e5a at q1g2000yqg.googlegroups.com>, Peter Weaver <info-vax at weaverconsulting.ca> writes:

>I created ROOT/ROOT account a long time ago that went to a .COM that
>emulated a bunch of unix commands.

I set-up something similar on Deathrow (deathrow.vistech.net) ...

>But none of the attacks ever tried the password root for the account
>root :(

The Deathrow root account has the password password, but still:

Username: ROOT                             Owner:  root
Expiration:            (none)    Pwdminimum:  6   Login Fails: 38481
Last Login: 10-MAY-2010 23:27 (interactive), 18-MAR-2007 12:33 (non-interactive)





More information about the Info-vax mailing list