From owner-freebsd-questions@FreeBSD.ORG Sat Oct 22 15:16:39 2011 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 8EFAD106564A for ; Sat, 22 Oct 2011 15:16:39 +0000 (UTC) (envelope-from freebsd@edvax.de) Received: from mx01.qsc.de (mx01.qsc.de [213.148.129.14]) by mx1.freebsd.org (Postfix) with ESMTP id 52DEF8FC0A for ; Sat, 22 Oct 2011 15:16:39 +0000 (UTC) Received: from r56.edvax.de (port-92-195-104-16.dynamic.qsc.de [92.195.104.16]) by mx01.qsc.de (Postfix) with ESMTP id E7A623D454; Sat, 22 Oct 2011 17:16:37 +0200 (CEST) Received: from r56.edvax.de (localhost [127.0.0.1]) by r56.edvax.de (8.14.5/8.14.5) with SMTP id p9MFGbPo002960; Sat, 22 Oct 2011 17:16:37 +0200 (CEST) (envelope-from freebsd@edvax.de) Date: Sat, 22 Oct 2011 17:16:37 +0200 From: Polytropon To: "Hasse Hansson" Message-Id: <20111022171637.4ef367ee.freebsd@edvax.de> In-Reply-To: <000f01cc90cc$c8c0abe0$5a4203a0$@org> References: <000001cc90c0$a0c16050$e24420f0$@org> <4EA2CE72.5030202@cran.org.uk> <20111022161242.11803f76.freebsd@edvax.de> <000f01cc90cc$c8c0abe0$5a4203a0$@org> Organization: EDVAX X-Mailer: Sylpheed 3.1.1 (GTK+ 2.24.5; i386-portbld-freebsd8.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: SV: Breakin attempt X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Polytropon List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 22 Oct 2011 15:16:39 -0000 On Sat, 22 Oct 2011 17:10:44 +0200, Hasse Hansson wrote: > It don't bother me more than cluttering up my logfiles, but I got curious if > this > Attempt was originating from one person. That's problematic... in many cases, attackers do "hijack" home PCs or corporate networks to do their "dirty work" without the actual users noticing. In such a case, you could conclude that the attacks has been originated by one person, but carried out by several ones (or, to be precise, by their PCs). Attackers explore networks and turn them into tools they use theirselves, or they sell them to others who then use them (e. g. for further exploration, SSH attacks, spamming, illegal data storage and so on). -- Polytropon Magdeburg, Germany Happy FreeBSD user since 4.0 Andra moi ennepe, Mousa, ...