Dne Pá 11. dubna 2014 09:30:10, Greg Freemyer napsal(a):
On April 11, 2014 9:12:29 AM EDT, "Vojtěch Zeisek" <vojtech.zeisek@opensuse.org> wrote:
Dne Pá 11. dubna 2014 09:04:42, Greg Freemyer napsal(a):
On April 11, 2014 8:25:31 AM EDT, Per Jessen <per@computer.org>
Greg Freemyer wrote:
On April 11, 2014 6:45:54 AM EDT, "Vojtěch Zeisek" <vojtech.zeisek@opensuse.org> wrote: server was attacked or not... I use denyhosts and fail2ban to block attackers randomly trying random combinations of username and password...
Since each bite at the able only got a small amount of random ram, that may have been the best secondary defense for this. To get around that a bad guy would have had to of used a botnet to hit you from 1000's of unique IPs.
That is hard to coordinate, but certainly not impossible. Hopefully there weren't a huge number of botnets up and running the last couple of years attacking computers via this vulnerability.
Still I haven't heard about any real misuse of this bug. Are there any examples of compromised servers etc.?
Greg
V. -- Vojtěch Zeisek Komunita openSUSE GNU/Linuxu Community of the openSUSE GNU/Linux http://www.opensuse.org/ http://trapa.cz/