On Thu, 2004-10-14 at 21:03 +0200, Alexander Dalloz wrote: > Am Do, den 14.10.2004 schrieb Edwin Dicker um 20:42: > > Maybe anyone knows someone who is not subscribed to this list and has these > > attempts as well ?? > > Me. I am root on 2 systems where there is no connection to this list and > they are too probed on ssh. > Me too, on half-a-dozen boxes. > At least obvious from my observations is, that mainly old Redhat systems > are already owned and used for further attacks. > Come now, that hardly seems fair. OpenSSH/OpenSSL are used on lots of systems and OS's, and I've seen probes from at least five different identifiable Linux variants in the past as well as Windows boxen (not too hard to install an SSH client if you crack one!). Don't beat up too hard on the RH boxen. They're certainly not alone. Cheers, -- Rodolfo J. Paiz <rpaiz@xxxxxxxxxxxxxx>
Attachment:
signature.asc
Description: This is a digitally signed message part