home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   RBERRYPI      Support for the Raspberry Pi device      21,939 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 19,243 of 21,939   
   Chris Green to The Natural Philosopher   
   Re: It is now very nearly impossible to    
   29 Jan 24 19:27:12   
   
   INTL 3:770/1 3:770/3   
   REPLYADDR cl@isbd.net   
   REPLYTO 3:770/3.0 UUCP   
   MSGID:  48988ad8   
   REPLY:  ee539cb2   
   PID: SoupGate-Win32 v1.05   
   The Natural Philosopher  wrote:   
   > On 29/01/2024 12:19, Chris Green wrote:   
   > > The Natural Philosopher  wrote:   
   > >> On 29/01/2024 04:54, 68g.1499 wrote:   
   > >>> North Korea is not   
   > >>>     going to spend five days worth of CPU time to crack your   
   > >>>     little home Pi and its valuable horde of "Rick and Morty"   
   > >>>     vids. Your home connection is likely too slow to be very   
   > >>>     useful for launching broadscale attacks on other systems   
   > >>>     as well.   
   > >>   
   > >> Indeed. I've two servers on the open internet with open ssh ports . In 8   
   > >> years although there is a constant stream of login attempts no one has   
   > >> guessed the correct user name  - let alone the password.   
   > >>   
   > >> People get paranoid about stuff they think they know about and forget   
   > >> the simple things.   
   > >> A  long but easily memorable string like  my.cat.hates.PIZZA! will   
   > >> probably fall to a dictionary attack in a few thousand hours, but   
   > >> really, who cares?   
   > >>   
   > > I've never understood how this can work.  If you type a wrong password   
   > > to ssh it will wait several seconds before allowing you to try again.   
   > > In addition it will throw you off completely after three failures and   
   > > you'd have to start all over.  This is default ssh, no fail2ban or   
   > > anything like that.   
   >   
   > Not sure how it works, but I see series of attacks spaced about 5   
   > seconds apart. Usually from different IP addresses   
   >   
   Well, as I said, at 5 seconds per attempt a dictionary attack is   
   hopeless.   
      
   --   
   Chris Green   
   ·   
      
   --- SoupGate-Win32 v1.05   
    * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)   
   SEEN-BY: 1/19 15/0 16/0 19/37 80/1 90/1 105/81 106/201 123/130 128/260   
   SEEN-BY: 129/305 135/225 142/104 153/757 7715 203/0 218/700 840 220/70   
   SEEN-BY: 221/1 6 242 360 226/17 30 100 227/114 229/110 112 113 200   
   SEEN-BY: 229/206 307 317 400 426 428 470 550 616 664 700 230/0 240/5832   
   SEEN-BY: 266/512 267/800 280/5003 282/1038 291/111 292/854 301/1 310/31   
   SEEN-BY: 320/119 219 319 2119 322/757 325/304 335/364 341/66 342/200   
   SEEN-BY: 396/45 423/81 460/58 633/280 712/848 770/1 3 100 330 340   
   SEEN-BY: 772/210 220 230 5020/400 5053/58 5058/104 5075/35   
   PATH: 770/3 1 218/840 221/6 1 320/219 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca