Subject: Re: security/2075
To: Steven M. Bellovin <smb@cs.columbia.edu>
From: Jeroen Massar <jeroen@unfix.org>
List: tech-security
Date: 08/14/2005 20:35:19
--=-vpw2YQicDN2XUnYGkPgF
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Sun, 2005-08-14 at 14:24 -0400, Steven M. Bellovin wrote:
> In message <42FF84D9.6050209@NetBSD.org>, Elad Efrat writes:
>=20
> >
> >4. An attacker trying to brute-force an account password (with or
> >   without a master.passwd), let alone the root password, is very
> >   uncommon; I believe the majority, if not all, of inexperienced
> >   attackers today will attempt to run their arsenal of exploits on a
> >   target system.
> >
> >   Experienced attackers will attempt their *private* arsenal of
> >   exploits on a target system. :)
>=20
> [gnats-bugs deleted]
>=20
> This is not correct.  There are exploits in the wild that try=20
> password-guessing attacks via ssh.  In fact, the attack is quite common.

Which is indeed why quite some people on this planet have a ratelimitter
on their port 22, or moved SSH to another, not so obvious, port...

Not much one can do against brute-force unfortunately...

Greets,
 Jeroen


--=-vpw2YQicDN2XUnYGkPgF
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Jeroen Massar / http://unfix.org/~jeroen/

iD8DBQBC/47nKaooUjM+fCMRAoChAKCOTiIIVmvdboOuXhu8Uk5wsuvd7ACgj3L4
7pLzEXvZjmxil0iviw/yHmI=
=n/AP
-----END PGP SIGNATURE-----

--=-vpw2YQicDN2XUnYGkPgF--