[Gllug] [Fwd: [SECURITY] [DSA-134-1] OpenSSH remotevulnerability]

Paul Brazier pbrazier at cosmos-uk.co.uk
Fri Jun 28 08:38:43 UTC 2002


> Firewalls in front of tcpwrappers in front of a large machine 
> gun nest.

I've just installed snort and logcheck on a few machines and it's quite
an eye-opener to see the number of hits you get every day from people
doing portscans, attempting to connect to ssh or ftp, or seeing if
you're running an open mail relay. Plus attempted IIS and MS SQL Server
exploits. I've noticed a lot of stuff coming from Korea and the far east
in general.

Should I just ignore these? are there any that I should be reporting to
the relevant sysadmins?

Paul.


<P><FONT SIZE=2 FACE="Arial">***********************************************************************
Notice
This e-mail may contain information that is privileged, confidential or 
otherwise protected from disclosure. It must not be used by, or its 
contents copied or disclosed to persons other than the intended 
recipient. Any liability (in negligence or otherwise) arising from any 
third party acting, or refraining from acting, on any information 
contained in this e-mail is excluded. If you have received this e-mail 
in error please notify our Systems Administrator on 020 8695 4111 and 
delete the e-mail. 

Warning
It is the responsibility of the recipient to ensure that the onward 
transmission, opening or use of this message and any attachments will 
not adversely affect its systems or data. Please carry out such virus 
and other checks as you consider appropriate. No responsibility is 
accepted by Cosmos PLC in this regard.

***********************************************************************



-- 
Gllug mailing list  -  Gllug at linux.co.uk
http://list.ftech.net/mailman/listinfo/gllug




More information about the GLLUG mailing list