<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssh attack, allows partial DOS in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957563#M29564</link>
    <description>This while the default for rsh is 3 ...&lt;BR /&gt;&lt;BR /&gt;Thx for the warning. Changed it on my system.&lt;BR /&gt;&lt;BR /&gt;Wim&lt;BR /&gt;</description>
    <pubDate>Mon, 06 Feb 2006 10:32:29 GMT</pubDate>
    <dc:creator>Wim Van den Wyngaert</dc:creator>
    <dc:date>2006-02-06T10:32:29Z</dc:date>
    <item>
      <title>ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957562#M29563</link>
      <description>VMS 8.2, alpha, tcp 5.5 eco1&lt;BR /&gt;This is mostly a warning.  The default ssh connection limit of 10,000 easily allows ssh robots to overrun maxprocesscnt.  When this has happened on my system it has forced a shutdown of the batch queue and I don't know what else. This  causes a partial denial-of-service.  I think during install of ssh, it should put a realistic limit based on current maxprocesscnt or have some  quicker means of intrusion blocking of ip ranges.</description>
      <pubDate>Mon, 06 Feb 2006 10:24:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957562#M29563</guid>
      <dc:creator>Kelly Cox</dc:creator>
      <dc:date>2006-02-06T10:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957563#M29564</link>
      <description>This while the default for rsh is 3 ...&lt;BR /&gt;&lt;BR /&gt;Thx for the warning. Changed it on my system.&lt;BR /&gt;&lt;BR /&gt;Wim&lt;BR /&gt;</description>
      <pubDate>Mon, 06 Feb 2006 10:32:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957563#M29564</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-02-06T10:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957564#M29565</link>
      <description>Same could be said for telnet which causes a process creation.</description>
      <pubDate>Mon, 06 Feb 2006 10:36:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957564#M29565</guid>
      <dc:creator>Ian Miller.</dc:creator>
      <dc:date>2006-02-06T10:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957565#M29566</link>
      <description>Hi &lt;BR /&gt;I had same problem too.&lt;BR /&gt;&lt;BR /&gt;During night I observe sometimes 200 - 500 attepts to login to my system via ssh. The problem is then, that my system does not have enough process slots. If a batch job is starting at exactly the time, where I do not have a free balanceset slot, the batchjob can't start.&lt;BR /&gt;&lt;BR /&gt;I solved the problem by adding some code to the ssh's login.com. If there are more than 5 connects from the same source address within 1 minute, I just kill them with stop/id. Further I introduced private and public keys. This way I can be sure, that i will not have uninvited guests.....&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Heinz</description>
      <pubDate>Mon, 06 Feb 2006 11:08:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957565#M29566</guid>
      <dc:creator>Heinz W Genhart</dc:creator>
      <dc:date>2006-02-06T11:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957566#M29567</link>
      <description>re: Ian,&lt;BR /&gt;&lt;BR /&gt;&lt;QUOTE&gt;&lt;BR /&gt;Same could be said for telnet which causes a process creation&lt;BR /&gt;&lt;/QUOTE&gt;&lt;BR /&gt;&lt;BR /&gt;But the service limit for TELNET seems to be more 'reasonable'.&lt;BR /&gt;&lt;BR /&gt;Make sure you reduce the SSH service limit way beyond your MAXPROCESSCNT system parameter.&lt;BR /&gt;&lt;BR /&gt;Batch queues will stop, if process creation fails with %JBC-F-NOSLOT due to exceeding MAXPROCESSCNT.&lt;BR /&gt;&lt;BR /&gt;Volker.</description>
      <pubDate>Mon, 06 Feb 2006 11:35:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957566#M29567</guid>
      <dc:creator>Volker Halle</dc:creator>
      <dc:date>2006-02-06T11:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957567#M29568</link>
      <description>While on the subject of SSH.&lt;BR /&gt;&lt;BR /&gt;1) Try copying a file of 15 MB between 2 SSH nodes.&lt;BR /&gt;&lt;BR /&gt;rcp : 25 sec, 2% cpu&lt;BR /&gt;scp : 100 sec, +- 20% cpu&lt;BR /&gt;&lt;BR /&gt;2) Prio of the encrypting process : 8&lt;BR /&gt;&lt;BR /&gt;3) Prio of the remote process when doing SSH as rsh : 2 (interactive : 4).&lt;BR /&gt;&lt;BR /&gt;Over here they are considering copying db's between nodes with it. Will need some extra cpu's ... good business for HP (and the others).&lt;BR /&gt;&lt;BR /&gt;Wim &lt;BR /&gt;</description>
      <pubDate>Mon, 06 Feb 2006 11:42:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957567#M29568</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-02-06T11:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957568#M29569</link>
      <description>Sorry for the dumb question, but where would I quickly check to see if my SSH server config has a large connection limit?  What value, where?  Is this specific to v5.5 or would it be true for v5.4, too?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 07 Feb 2006 09:10:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957568#M29569</guid>
      <dc:creator>Rick Dyson</dc:creator>
      <dc:date>2006-02-07T09:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957569#M29570</link>
      <description>$ ucx sho servi ssh/fu&lt;BR /&gt;field limit is max&lt;BR /&gt;$ ucx set servi ssh/lim=10&lt;BR /&gt;to modify it but&lt;BR /&gt;$ ucx disa servi ssh&lt;BR /&gt;$ ucx ena servi ssh&lt;BR /&gt;to activate it&lt;BR /&gt;&lt;BR /&gt;Wim</description>
      <pubDate>Tue, 07 Feb 2006 09:13:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957569#M29570</guid>
      <dc:creator>Wim Van den Wyngaert</dc:creator>
      <dc:date>2006-02-07T09:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957570#M29571</link>
      <description>Kelly,&lt;BR /&gt;&lt;BR /&gt;Thanks for the heads up on this issue.&lt;BR /&gt;&lt;BR /&gt;I agree with you about putting a realistic limit on the number of sessions.  Certainly a base value of 10% or even 20% of maxprocesscnt would be the maximum that this number should be set to by default.  I can imagine that someone might have a server where ALL of the remote activity is conducted through SSH -- on such a system you might want the limit to be 50% or higher, but give the system manager the responsibility to raise it.&lt;BR /&gt;&lt;BR /&gt;Robert</description>
      <pubDate>Tue, 07 Feb 2006 10:21:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957570#M29571</guid>
      <dc:creator>Robert_Boyd</dc:creator>
      <dc:date>2006-02-07T10:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: ssh attack, allows partial DOS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957571#M29572</link>
      <description>No real solution, just closing.</description>
      <pubDate>Thu, 20 Apr 2006 13:49:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/ssh-attack-allows-partial-dos/m-p/4957571#M29572</guid>
      <dc:creator>Kelly Cox</dc:creator>
      <dc:date>2006-04-20T13:49:06Z</dc:date>
    </item>
  </channel>
</rss>

