<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCPIP Login Failures in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094601#M30071</link>
    <description>&lt;!--!*#--&gt;&amp;gt; Perhaps we're dealing with the same hacker?&lt;BR /&gt;&lt;BR /&gt;Or the same program.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I have a record of the IP address [...]&lt;BR /&gt;&lt;BR /&gt;Only one?  Keep trying.&lt;BR /&gt;&lt;BR /&gt;Event time:                1-JAN-2007 13:17:58.62&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC00031 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     207.44.196.44&lt;BR /&gt;&lt;BR /&gt;Event time:               29-JAN-2007 06:53:32.40&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC0009E &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     201.216.236.100&lt;BR /&gt;&lt;BR /&gt;Event time:                5-FEB-2007 19:33:23.70&lt;BR /&gt;[...]  &lt;BR /&gt;Process name:             TCPIP$FTPC000CE &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     80.53.119.218&lt;BR /&gt;&lt;BR /&gt;Event time:               19-FEB-2007 19:52:04.05&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC00104 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     69.30.200.66&lt;BR /&gt;&lt;BR /&gt;Event time:                4-MAR-2007 18:34:00.28&lt;BR /&gt;[...]     &lt;BR /&gt;Process name:             TCPIP$FTPC0014B &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     210.192.96.48&lt;BR /&gt;&lt;BR /&gt;Event time:               13-MAR-2007 08:39:15.09&lt;BR /&gt;[...]   &lt;BR /&gt;Process name:             TCPIP$FTPC0017A &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     59.188.13.74&lt;BR /&gt;&lt;BR /&gt;Event time:               19-MAR-2007 20:00:24.05&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC0018D &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     200.105.74.106&lt;BR /&gt;&lt;BR /&gt;Event time:               22-MAR-2007 07:18:57.60&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC0019C &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     211.23.151.19&lt;BR /&gt;&lt;BR /&gt;Event time:               26-MAR-2007 01:24:19.42&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC00002 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     70.84.240.10&lt;BR /&gt;&lt;BR /&gt;Event time:               21-APR-2007 18:06:50.00&lt;BR /&gt;[...]   &lt;BR /&gt;Process name:             TCPIP$FTPC000A8 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     61.19.124.107&lt;BR /&gt;&lt;BR /&gt;Event time:               27-JUN-2007 07:40:28.83&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC0004B &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     219.239.34.200&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;and so on.</description>
    <pubDate>Tue, 30 Oct 2007 17:19:24 GMT</pubDate>
    <dc:creator>Steven Schweda</dc:creator>
    <dc:date>2007-10-30T17:19:24Z</dc:date>
    <item>
      <title>TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094597#M30067</link>
      <description>Hello,&lt;BR /&gt;   I am using TCP/IP services on OpenVMS 8.3 on an Alpha system (workstation, server, doesn't matter.  This question also applies to VMS 8.2, 7.3-2 and -1, as this occurs on these OS versions as well.&lt;BR /&gt;&lt;BR /&gt;    Anyway, I notice that on occasion, somebody is trying to gain access to my system via TCP/IP by guessing such usernames as admin, administrator, and other English names.  It seems this is done by a computer program because I will get several of these tries per second.  You can see this occurring by using the Accounting utility in OpenVMS.&lt;BR /&gt;&lt;BR /&gt;     The accounting utility will log the username that was attempted and the login failure message.  My question is the following.  Is there a way to determine (through the accounting utility, SDA, or other means) what password they are guessing?&lt;BR /&gt;&lt;BR /&gt;     Is it possible to have a watchdog program that can be triggered by a system event to notify when these username/password attacks begin?  Right now I am discovering them by periodically monitoring system activity or checking the accounting file.  It would be nice to have the system notify me automatically when these attacks begin.&lt;BR /&gt;&lt;BR /&gt;     So far, I have not been broken into, but it would be nice to manage this better than by accidental discovery.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Tue, 30 Oct 2007 13:36:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094597#M30067</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-10-30T13:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094598#M30068</link>
      <description>&lt;!--!*#--&gt;Logging failing passwords can cause trouble,&lt;BR /&gt;because if someone gains access to legitimate&lt;BR /&gt;password typos, this info can help an&lt;BR /&gt;evil-doer to guess correct passwords.&lt;BR /&gt;&lt;BR /&gt;On the bright side, the most common FTP&lt;BR /&gt;attack (on my system, at least) is for user&lt;BR /&gt;"Administrator", which, with a 12-character&lt;BR /&gt;user-name limit, is seen as "Administrato",&lt;BR /&gt;so, unless you actually have an&lt;BR /&gt;"Administrato" account, these should be&lt;BR /&gt;pretty harmless.&lt;BR /&gt;&lt;BR /&gt;SSH attacks seem to lead pretty quickly to:&lt;BR /&gt;   Status:  %LOGIN-F-EVADE, break-in evasion in effect&lt;BR /&gt;so I figure that they're pretty unlikely to&lt;BR /&gt;succeed, too.&lt;BR /&gt;&lt;BR /&gt;So far, I've been satisfied with (roughly)&lt;BR /&gt;daily inspection of the output from ANAL&lt;BR /&gt;/AUDI /FULL /SINC = previous_date-time, but I&lt;BR /&gt;assume that there's software out there which&lt;BR /&gt;would let you scan the OPCOM messages, and&lt;BR /&gt;then let you do what you want when you see&lt;BR /&gt;something interesting.</description>
      <pubDate>Tue, 30 Oct 2007 14:02:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094598#M30068</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2007-10-30T14:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094599#M30069</link>
      <description>Make sure you have LOGFAILURE and BREAKIN ALARMS and AUDITS enabled for all potential sources. Check parameters and make sure you understand how breakin detection and evasion works. See:&lt;BR /&gt;&lt;BR /&gt;$ MCR SYSGEN SHOW/LGI&lt;BR /&gt;&lt;BR /&gt;In particular, make sure your LGI_BRK_LIM is set appropriately.&lt;BR /&gt;&lt;BR /&gt;Rather than scanning the accounting file, try SHOW INTRUSIONS. You'll see something like this:&lt;BR /&gt;&lt;BR /&gt;$ show intru&lt;BR /&gt;Intrusion       Type       Count        Expiration         Source&lt;BR /&gt;---------       ----       -----        ----------         ------&lt;BR /&gt;   NETWORK      SUSPECT       3   31-OCT-2007 08:32:12.86  cracker.central.com::TELNET_0A02FDFE&lt;BR /&gt;&lt;BR /&gt;Suspects are probably just fat fingered users getting their passwords wrong, but INTRUDER maybe something to be concerned about.&lt;BR /&gt;&lt;BR /&gt;For retrospective analysis, look in the security journal (ANALYZE/AUDIT).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;There are a few potential ways to automate monitoring. If you're at a terminal, use REPLY/ENABLE=SECURITY. You'll see the audit alarms as they happen.&lt;BR /&gt;&lt;BR /&gt;If you have a console manager, you may have a mechanism for scanning console output for BREAKIN audit messages. Failing that you could build yourself an audit listener to watch for them, or the "poor man's" approach would be a DCL procedure to poll SHOW INTRUSION and scan for intruder records.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;So far, I have not been broken into&lt;BR /&gt;&lt;BR /&gt;  Unless you have very lax password policies, and/or users who release their passwords, I'd go so far as to say it's all but impossible to crack an OpenVMS host using any form of dictionary attack (especially if they're using windows standard usernames!). If you're concerned, you can boost your protection by adjusting the LGI parameters to be more severe.&lt;BR /&gt;&lt;BR /&gt;  One fairly simple, and usually benign approach is to increase LGI_BRK_TMO and/or LGI_HID_TIM. The default is 5 minutes. Increase them to 1 or 2 DAYS. Any automated attack will be detected in a few seconds, but future attempts will fail from that source for the next few days. The cracker won't see anything other than "invalid password", but the system will refuse access even if they chance on a valid username/password pair. Every failure will just extend the blackout period.&lt;BR /&gt;&lt;BR /&gt;&amp;gt;Is there a way to determine (through the &lt;BR /&gt;&amp;gt;accounting utility, SDA, or other means) &lt;BR /&gt;&amp;gt;what password they are guessing?&lt;BR /&gt;&lt;BR /&gt;  It's a while since I've looked, but I think once a source is declared an intruder, the BREAKIN audits log both the username and password. You need SECURITY privilege to see them in the audit journal.&lt;BR /&gt;&lt;BR /&gt;  If it were my system, I'd turn on maximum auditing and request professional assistance from my local law enforcement. This kind of activity is illegal in most jurisdictions. I'd be doing my best to track down and prosecute the perpetrators.</description>
      <pubDate>Tue, 30 Oct 2007 16:51:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094599#M30069</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2007-10-30T16:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094600#M30070</link>
      <description>Hello,&lt;BR /&gt;     Thanks for your responses!  In fact, somebody has tried several times in the past FTP into my system as administrato.  Perhaps we're dealing with the same hacker?  I have a record of the IP address that is trying to get in.&lt;BR /&gt;&lt;BR /&gt;     I've thought in the past of contacting a law enforcement agency about this but I wasn't sure who to contact.&lt;BR /&gt;&lt;BR /&gt;      Anyway, thanks again!  I'll give your suggestions a try.</description>
      <pubDate>Tue, 30 Oct 2007 17:00:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094600#M30070</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-10-30T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094601#M30071</link>
      <description>&lt;!--!*#--&gt;&amp;gt; Perhaps we're dealing with the same hacker?&lt;BR /&gt;&lt;BR /&gt;Or the same program.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I have a record of the IP address [...]&lt;BR /&gt;&lt;BR /&gt;Only one?  Keep trying.&lt;BR /&gt;&lt;BR /&gt;Event time:                1-JAN-2007 13:17:58.62&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC00031 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     207.44.196.44&lt;BR /&gt;&lt;BR /&gt;Event time:               29-JAN-2007 06:53:32.40&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC0009E &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     201.216.236.100&lt;BR /&gt;&lt;BR /&gt;Event time:                5-FEB-2007 19:33:23.70&lt;BR /&gt;[...]  &lt;BR /&gt;Process name:             TCPIP$FTPC000CE &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     80.53.119.218&lt;BR /&gt;&lt;BR /&gt;Event time:               19-FEB-2007 19:52:04.05&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC00104 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     69.30.200.66&lt;BR /&gt;&lt;BR /&gt;Event time:                4-MAR-2007 18:34:00.28&lt;BR /&gt;[...]     &lt;BR /&gt;Process name:             TCPIP$FTPC0014B &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     210.192.96.48&lt;BR /&gt;&lt;BR /&gt;Event time:               13-MAR-2007 08:39:15.09&lt;BR /&gt;[...]   &lt;BR /&gt;Process name:             TCPIP$FTPC0017A &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     59.188.13.74&lt;BR /&gt;&lt;BR /&gt;Event time:               19-MAR-2007 20:00:24.05&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC0018D &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     200.105.74.106&lt;BR /&gt;&lt;BR /&gt;Event time:               22-MAR-2007 07:18:57.60&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC0019C &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     211.23.151.19&lt;BR /&gt;&lt;BR /&gt;Event time:               26-MAR-2007 01:24:19.42&lt;BR /&gt;[...]    &lt;BR /&gt;Process name:             TCPIP$FTPC00002 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     70.84.240.10&lt;BR /&gt;&lt;BR /&gt;Event time:               21-APR-2007 18:06:50.00&lt;BR /&gt;[...]   &lt;BR /&gt;Process name:             TCPIP$FTPC000A8 &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     61.19.124.107&lt;BR /&gt;&lt;BR /&gt;Event time:               27-JUN-2007 07:40:28.83&lt;BR /&gt;[...]      &lt;BR /&gt;Process name:             TCPIP$FTPC0004B &lt;BR /&gt;Username:                 Administrato    &lt;BR /&gt;[...]&lt;BR /&gt;Remote node fullname:     219.239.34.200&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;and so on.</description>
      <pubDate>Tue, 30 Oct 2007 17:19:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094601#M30071</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2007-10-30T17:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094602#M30072</link>
      <description>Hello,&lt;BR /&gt;   On 11-Jul-2007, the IP address of Administrato was 60.32.141.186.  I've had subsequent attacks, but that is the first accounting record I found.  I just tried to FTP to this system and I got a "220 FTP OK" and then a login prompt.&lt;BR /&gt;&lt;BR /&gt;    Anyway, this is not the only IP address that runs this FTP login program, at least 3 times a second, guessing passwords.  The point I was making is that I wanted to see what passwords this or other systems were guessing, just to see what these fools are trying to do!&lt;BR /&gt;&lt;BR /&gt;    Anyway, I'll try the security commands suggested by the other responder to my note.&lt;BR /&gt;&lt;BR /&gt;    BTW, I'll bet I'm not the only VMS or other system that has experienced this.  If you do a:&lt;BR /&gt;&lt;BR /&gt;$ acc/user=(-SYSTEM,-TCPIP$FAILSAFE,...)&lt;BR /&gt;&lt;BR /&gt;     You'll see who's trying to login to your system over the internet.  Then you can do a&lt;BR /&gt;&lt;BR /&gt;$ acc/ident=&lt;THE pid=""&gt;/full&lt;BR /&gt;&lt;BR /&gt;you'll get the IP address.&lt;BR /&gt;&lt;BR /&gt;Thanks again, folks!&lt;/THE&gt;</description>
      <pubDate>Tue, 30 Oct 2007 18:05:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094602#M30072</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-10-30T18:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094603#M30073</link>
      <description>Hello,&lt;BR /&gt;     Regarding John Gillings' response about using $ show intrusion, I do recall doing that at the time, but it did not show up any intruder records.  That led me to believe that repeat FTP login failures are not tracked by the show intrusion program.&lt;BR /&gt;&lt;BR /&gt;     I'm not under attack now, but next time I will be sure to verify show intrusion.&lt;BR /&gt;&lt;BR /&gt;    BTW, my LGI sysgen parameters are the default values you get when you would install OpenVMS 8.3.&lt;BR /&gt;&lt;BR /&gt;     Anyway, thanks again!</description>
      <pubDate>Tue, 30 Oct 2007 21:32:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094603#M30073</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-10-30T21:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094604#M30074</link>
      <description>Have you considered configuring the TCPIP services to only accept connections from the networks you know are valid?  I realize this approach might not work depending on the number of networks.  We only allow connections from 3 networks, all others are just dropped.&lt;BR /&gt;</description>
      <pubDate>Wed, 31 Oct 2007 18:29:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094604#M30074</guid>
      <dc:creator>Kevin Carter_3</dc:creator>
      <dc:date>2007-10-31T18:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094605#M30075</link>
      <description>Kevin,&lt;BR /&gt;     Thanks for your response.  I'm not sure I understand what you mean by configuring TCPIP to only accept connections from networks I know are valid?  Is this something you can do from the tcpip$config program, the TCPIP, or the NCL command utility?  I guess I'm not familiar with this.&lt;BR /&gt;     I'm not overly concrned about somebody actually breaking into my system.  I would just like to find out if there are some countermeasures, like determining the origin or the nature of the breakin attempts.  Maybe it's possible to build a knowledge base of the types of breakins and protect against those specifically, rather than shutting certain things down?  I think this is a valid question, especially when somebody is trying to gain unauthorized access to your system.&lt;BR /&gt;&lt;BR /&gt;Thanks again!</description>
      <pubDate>Wed, 31 Oct 2007 18:42:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094605#M30075</guid>
      <dc:creator>DECxchange</dc:creator>
      <dc:date>2007-10-31T18:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094606#M30076</link>
      <description>&amp;gt; [...] Is this something you can do from the&lt;BR /&gt;&amp;gt; tcpip$config program, the TCPIP, [...]&lt;BR /&gt;&lt;BR /&gt;TCPIP HELP SET COMMUNICATION /REJECT&lt;BR /&gt;(or /ACCEPT)&lt;BR /&gt;&lt;BR /&gt;That covers _all_ services.  For an&lt;BR /&gt;individual service, there's:&lt;BR /&gt;&lt;BR /&gt;TCPIP HELP SET SERVICE /REJECT&lt;BR /&gt;(or /ACCEPT)&lt;BR /&gt;&lt;BR /&gt;The lists have limited length, so rejecting&lt;BR /&gt;very many hosts or networks individually is&lt;BR /&gt;not possible this way.  And if you're trying&lt;BR /&gt;to offer freeware to the universe, limiting&lt;BR /&gt;access to only your close friends does rather&lt;BR /&gt;defeat the purpose.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; [...] countermeasures, like determining the&lt;BR /&gt;&amp;gt; origin or the nature of the breakin&lt;BR /&gt;&amp;gt; attempts.&lt;BR /&gt;&lt;BR /&gt;Other than complaining to the ISP of the&lt;BR /&gt;hijacked Windows system, I don't know what&lt;BR /&gt;you can do.  The true origin is probably&lt;BR /&gt;hidden behind the intermediate victim.&lt;BR /&gt;&lt;BR /&gt;I haven't seen them much lately, but&lt;BR /&gt;anonymous FTP attacks with&lt;BR /&gt;ident:Xgpuser@home.com (where "X" would be&lt;BR /&gt;any upper-case letter) were pretty common for&lt;BR /&gt;a long time.  Things like that could be&lt;BR /&gt;handled nicely if the FTP server had some&lt;BR /&gt;kind of call-out to a user-supplied&lt;BR /&gt;accept-reject command procedure.  I haven't&lt;BR /&gt;heard of one being added yet, however.</description>
      <pubDate>Wed, 31 Oct 2007 21:53:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094606#M30076</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2007-10-31T21:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094607#M30077</link>
      <description>I experience similar attempts at times and therefore I routinely check via accounting and audit on a daily basis. Indeed, I see "Administrato"(r) and "root" used quite often. I don't rely on the IP addresses: these people may use a anonymizer, broke into another system and used that, or have installed a bot creating a zombie box to 'guess' access to a number of sites (and communiate it back to the 'real' machine).&lt;BR /&gt;&lt;BR /&gt;Requiering a second password could frustrate any attempt - I think these programs can cope with that - but I'm not sure if that can be set to be a requirement of specific interface. Would be nice if that were true!&lt;BR /&gt;&lt;BR /&gt;Setting the LGI-flags can turn out very frustrating: if users usually access the VMS box from a Citric server over IP (telnet, FTP, HTTP), the _whole_ Citrix server will be locked out durung this period when too many failed attempts are signalled - no matter what username or IP protocol is used (based on own experience).&lt;BR /&gt;That might not be what you want.&lt;BR /&gt;&lt;BR /&gt;If you want a "watchdog", you can think of PointSecure's System Detective. FWIK, that offers you the logging facilities you want, and probably more. It could be quite expensive but if you can afford the cost, it might be what you need. (I don't know if PointSecure offers hobbyist licenses either, it would be a nice thing if they did!).&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Nov 2007 05:51:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094607#M30077</guid>
      <dc:creator>Willem Grooters</dc:creator>
      <dc:date>2007-11-13T05:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094608#M30078</link>
      <description>There are LGI_callout and PASSWORD POLICY callouts that could trap the attempt and send information to files.  If you see the attempt to login ADMINISTRATOR you could just call out a bunch of GETJPI items and see what is going on.  You would also see the password being used for the attempt if you were in the PASSWORD POLICY module, entry point POLICY_CLEARTEXT.&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Dec 2007 15:34:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094608#M30078</guid>
      <dc:creator>Richard W Hunt</dc:creator>
      <dc:date>2007-12-04T15:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: TCPIP Login Failures</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094609#M30079</link>
      <description>Richard,&lt;BR /&gt;&lt;BR /&gt;&amp;gt;You would also see the password being used &lt;BR /&gt;&amp;gt;for the attempt if you were in the &lt;BR /&gt;&amp;gt;PASSWORD POLICY module, entry point &lt;BR /&gt;&amp;gt;POLICY_CLEARTEXT. &lt;BR /&gt;&lt;BR /&gt;  Not quite... These are two very distinct entities.&lt;BR /&gt;&lt;BR /&gt;  The password policy module implemented in VMS$PASSWORD_POLICY.EXE and controlled by SYSGEN parameter LOAD_PWD_POLICY is called only from the SET PASSWORD command when a user is changing passwords. It is not called during any kind of login.&lt;BR /&gt;&lt;BR /&gt;  The LGI_CALLOUTS module is a used to get control of the login process. It's horribly complex and difficult to get working properly (you think you had trouble with password policies! ;-). It also seems to me that LGI_CALLOUTS has been superceeded by the new ACME mechanism, but I'm not sure if that's been let out into the wild for ordinary people to develop their own ACME modules. &lt;BR /&gt;&lt;BR /&gt;LGI_CALLOUTS and/or ACME could be used to track login attempts and implement special cases for certain usernames. If you go down this track, make sure the behaviour of the login, as perceived by the user doesn't make it obvious that you're doing anything very different (like a different failure message).&lt;BR /&gt;&lt;BR /&gt; For ADMINISTRATOR or ROOT or any other obviously non-OpenVMS username I'd be tempted to put an extra delay before the Password prompt, and another before "User authorization failure" message, and I'd log the username/password pairs. I'd also allow the attempt to go throught the normal mechanism so that the normal intrusion detection mechanism was invoked.</description>
      <pubDate>Tue, 04 Dec 2007 21:43:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/tcpip-login-failures/m-p/4094609#M30079</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2007-12-04T21:43:52Z</dc:date>
    </item>
  </channel>
</rss>

