[Info-vax] [Change topic] VMS systems botnets

Kerry Main kemain.nospam at gmail.com
Sat Oct 29 21:12:49 EDT 2016


> -----Original Message-----
> From: Info-vax [mailto:info-vax-bounces at rbnsn.com] On Behalf
> Of Simon Clubley via Info-vax
> Sent: 29-Oct-16 4:35 PM
> To: info-vax at rbnsn.com
> Cc: Simon Clubley <clubley at remove_me.eisner.decus.org-
> Earth.UFP>
> Subject: Re: [Info-vax] [Change topic] VMS systems botnets
> 
> On 2016-10-28, Roy Omond <roy at omond.net> wrote:
> > On 27/10/16 12:03, Stephen Hoffman wrote:
> >
> >> [...snip...]
> >
> >> I've cleaned up various
> >> down-revision or misconfigured OpenVMS boxes that were
> parts of botnets.
> >
> >> [...snip...]
> >
> >> Running old software — particularly on servers exposed to the
> 'net —
> >> is risky at best, and more than a few folks with OpenVMS
> servers have
> >> gotten bagged into botnets due to down-revision network
> services, or
> >> other issues.
> >
> > Hoff, I'd appreciate if you could expand on this.  How were
> these VMS
> > systems acting as botnets ?
> 
> For one thing, VMS systems have been used for the NTP DDOS
> amplification/reflection attacks.
> 
> Simon.
> 

Here is more formal info on this and the recommended fix that was published:
http://bit.ly/2dZd8QO

Full url:
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04790232


Regards,

Kerry Main
Kerry dot main at starkgaming dot com








More information about the Info-vax mailing list