[Info-vax] SSH on VAX - performance impact of break in attempts

Bob Koehler koehler at eisner.nospam.encompasserve.org
Fri Aug 27 10:45:07 EDT 2010


In article <i52ucj$396$1 at lnx107.hrz.tu-darmstadt.de>, m.kraemer at gsi.de (Michael Kraemer) writes:
> 
> If - by chance - the right combination of account/password is guessed,
> why would a VMS machine be safer than any other?

   VMS is no longer alone in this, but if you don't get that right
   combination in the first few tries VMS knows it's under attack and
   will deny the login anyhow.

   And all those who attack root, lpd, ..., have little chance of
   getting a right comination.




More information about the Info-vax mailing list