[Info-vax] VAXstation 4000s available on ebay
Paul Sture
nospam at sture.ch
Tue Apr 9 03:13:48 EDT 2013
In article <kjv2u4$l8t$1 at speranza.aioe.org>,
glen herrmannsfeldt <gah at ugcs.caltech.edu> wrote:
> MG <marcogbNO at spamxs4all.nl> wrote:
> > On 7-apr-2013 18:10, Peter 'EPLAN' LANGSTOeGER wrote:
> >> Exposing VMS to the internet is not that as exposing Windoof to it...
>
> > With or without patch access, I'd personally still be a bit reluctant
> > to. Well, I did it for quite some time; especially with my plans, at
> > the time, for a remote access cluster setup. (See what I once had
> > running here... /at home/, a portion of it for that matter, just so
> > you know: <http://winnili.net>.)
>
> I suppose, but statistically you are probably fine. I remember
> many many (many) years ago when we were still running SunOS machines,
> and were supposed to be upgrading to Solaris, that already more
> breakins were on Solaris. (Even though more SunOS attacks were known.)
>
> The reason was that people were using Solaris for web servers
> (along with NT, which also has a lot of attacks).
When I had VMS open to the net I was getting a lot of attempts on port
22, mostly from China and Korea. A pretty small selection of usernames
were used, somewhere between 5 and 10, but that was half a dozen years
or more ago. Shifting SSH server off port 22 made for much less disk
rattling.
> It isn't how easy a system is to break that is important, but
> how easy it is weighted by how interested people are in breaking it.
>
> > Back then, I noticed tons of break-in attempts and it never really
> > felt too comfortable. I did eventually, as a first step, assign the
> > remote SSH port to something other than 22 (as a start). That solved
> > part of the problem, but it never felt too great.
>
> Most likely attacks that might work on Windows and Solaris.
>
> I am not sure what the distribution is now for web or mail servers.
> (It seems that the Chinese, among others, like attacking mail servers
> to steal mail secrets.)
When I installed Multinet someone latched onto the open mail relay that
was in the default configuration before I had even had chance to work
out how to close it down.
According to my web server stats MSIE is suddenly the top browser. Nope,
it's just a proliferation of bots downloading megabytes at a time.
--
Paul Sture
More information about the Info-vax
mailing list