-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

John Andersen wrote:
> On Monday 16 July 2007, G T Smith wrote:
>> The real problem starts when the attacker hits pay dirt, the entries I
>> would worry about are the ones that are not in the log.
> 
> Paydirt?  You mean like guessing BOTH the account name and password?
> The chances of this are vanishingly slim with reasonable password scheme.
> 

Exactly, a security breech by this route is either a case of serious bad
luck or serious incompetence on a Linux system, and it is often
difficult to distinguish between the two :-)

This is normally more of a nuisance than anything else.

However, it is probably worthwhile keeping a weather eye on the
usernames being targeted. If an unusually accurate set of usernames are
scanned, it is possibly an indicator that the attack is directed rather
than random and possibly is (or will be) one of many different attack
vectors. Unusual usernames could be indicators of another type of attack.


- --
==============================================================================
I have always wished that my computer would be as easy to use as my
telephone.
My wish has come true. I no longer know how to use my telephone.

Bjarne Stroustrup
==============================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org

iD8DBQFGnIH5asN0sSnLmgIRAhDdAJ97DAvdbp1hXBkqAfPnZ/zo5Yz3NgCeIQGS
GK/iuQ9krB9vGOqR/txBr+8=
=BEl2
-----END PGP SIGNATURE-----
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to