[Info-vax] runaway TCP/IP ssh server processes
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Sun Jul 16 11:26:27 EDT 2017
In article <okfvui$9vc$2 at pcls7.std.com>, moroney at world.std.spaamtrap.com (Michael Moroney) writes:
>VAXman- @SendSpamHere.ORG writes:
>
>>Periodically, I am finding TCPIP$SSH_xxxx server processes consuming large
>>amounts of CPU time. These tend to bring the system to its knees. There's
>>no doubt that it's being precipitated by some attempt to exploit ssh. Has
>>anybody experienced this? Any clues as to how these processes gets in this
>>state and or how to thwart it?
>
>Yes, I've seen this a lot. Hackers (rather script kiddie scripts)
>discover a system with SSH and start to pound on it. One thing you can do
>is move SSH to an alternate port. Something I did over 10 years ago is
>write software that listens to the audit server for breakin notifications
>and block the net range it's coming from (usually zombie PCs all over the
>world).
I NEVER configure ssh on 22. It's always high up in the ephemeral port range.
>SSH processes getting wedged may be due to VMS SSH having the exploits
>the hackers are looking for, but because it's VMS, not Windoze/Linux, it
>doesn't behave as expected.
I wish I could figure out a way to reproduce it. I've tried limiting the CPU
time of the TCPIP$SSH account but that seems to have no affect; the processes
still consume CPU well over that limit.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list