Displaying 4 results from an estimated 4 matches for "counterattack".
2015 Feb 05
2
Another Fedora decision
> On Feb 4, 2015, at 5:43 PM, Warren Young <wyml at etr-usa.com> wrote:
>
> SSH as shipped on CentOS doesn?t allow 1,000 guesses per second, as this calculator assumes
Hmm, just thought of a counterattack:
If CentOS?s SSH currently allows 10 guesses per minute *per IP*, all you need to do to get 1,000 guesses per second is to rent time on a 6,000 machine botnet.
2015 Feb 05
0
Another Fedora decision
On Wed, 2015-02-04 at 17:50 -0700, Warren Young wrote:
> > On Feb 4, 2015, at 5:43 PM, Warren Young <wyml at etr-usa.com> wrote:
> >
> > SSH as shipped on CentOS doesn?t allow 1,000 guesses per second, as this calculator assumes
>
> Hmm, just thought of a counterattack:
>
> If CentOS?s SSH currently allows 10 guesses per minute *per IP*, all you need to do to get 1,000 guesses per second is to rent time on a 6,000 machine botnet.
Rent ? That costs money. Just crack open some Windoze machines and do
it for free. That is what many hackers do.
Is this saf...
2015 Feb 05
2
Another Fedora decision
On 5 February 2015 at 10:36, Warren Young <wyml at etr-usa.com> wrote:
> When the hashes are properly salted, the only option is brute force. All having /etc/shadow does for you is let you make billions of guesses per second instead of 5 guesses per minute, as you get with proper throttling on remote login avenues.
Kinda highlights that 'time' is important here. Booting into a
2011 Jan 12
4
a nasty kernel oops
Ladies and Gentlemen,
I have been trying to sort out a nasty kernel oops for which I would
like to ask for some advice. I don't actually think that this is a nut
problem, although it is triggered by upsdrvctl or usbhid-ups. I rather
suspect the USB library or the associated kernel code.
Here is the configuration information:
* system: Centos-5.5
* kernel: 2.6.18-194.32.1.el5, latest vanilla