Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 06 Apr 2005 11:56:29 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Martin McCormick <martin@dc.cis.okstate.edu>, freebsd-security@freebsd.org
Subject:   Re: What is this Very Stupid DOS Attack Script?
Message-ID:  <6.2.1.2.0.20050406114850.04d0b538@64.7.153.2>
In-Reply-To: <200504061549.j36Fn8Y5082507@dc.cis.okstate.edu>
References:  <200504061549.j36Fn8Y5082507@dc.cis.okstate.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
At 11:49 AM 06/04/2005, Martin McCormick wrote:
>         We have been noticing flurries of sshd reject messages in
>which some system out there in the hinterlands hits us with a flood of
>ssh login attempts.  An example:
>
>Apr  6 05:41:51 dc sshd[88763]: Did not receive identification
>         string from 67.19.58.170
>Apr  6 05:49:42 dc sshd[12389]: input_userauth_request: illegal
>         user anonymous
>         Other than spewing lots of entries in to syslog, what is the
>purpose of the attack?  Are they just hoping to luck in to an open
>account?  The odds of guessing the right account name and then guessing
>the correct password are astronomical to say the least.


Actually, sadly the odds are far too good given the cost to run such a 
script.  Unless you force users to use GOOD passwords, they will use dumb 
ones.... Think Paris Hilton recently.  The cost to let a script like that 
go in the background and pound away at hosts that have open ssh access is 
zilch. If you have ftpd running anywhere, you will see similar attempts

         ---Mike 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.2.1.2.0.20050406114850.04d0b538>