On Fri, August 19, 2005 10:29 am, Tito Mari Francis EscaƱo said:
> This may offend some members of this list, but recently I personally
encountered this SSH Bruteforce activity, but not only in my Linux box,
but on my OpenBSD (OBSD) testbox connected to the net outside the
firewall.
>
> Before I used this OBSD, I used to have here a Whitebox Linux so that
our associates can see our test web deployment, and it was
> (sickeningly) very slow to my surprise. I replaced it with OBSD and
uploaded static HTML pages. Things were OK until the screen reported SSH
connection request from an IP (211.234.100.76) using tried
> usernames and passwords, which I traced coming from KIDC-GABIA (a
National Internet Registry) in Seoul, Korea using whois.
>
> Anybody who can relate to this incident pls?

This ssh bruteforce stuff is very very old technique, and I guess most of
the servers from Korea were compromised by kiddos.

To answer your question, IMHO, some Linux distribution by default are not
optimized to be a server, and you have to adjust some kernel config and
other stuff to make it scream.  OTOH, OpenBSD by default is good to go as
a server, because OpenBSD guys are more on security and proactive
specially in networking stuffs.  I guess right now OpenBSD is challenging
CISCO claiming that there should be open-source counter part of their
technology like CARP, OpenBGP and OpenOSPF.

br


-- 
Jimmy B. Lim
IT Operation & Support Team Leader
System Administrator
Tricom Dynamics, Inc.
Tricom Systems (Phils.), Inc.
Key Id: 0x7D2BD148
j i m m y @ t r i c o m . c o m . p h





_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to