Banze, Andreas wrote:

>>Well, in fact I received the "Don't panic" message from logwatch this 
>>morning. After checking Google I found that the message is a 
>>signature 
>>left by scanssh as noted in 
>>http://www.der-keiler.de/Mailing-Lists/securityfocus/incidents
>>    
>>
>/2001-12/0244.html 
>
>
>  
>
>>So I took the following actions:
>>0. Identified the originating IP
>>1. downloaded, compiled and installed the latest version of ssh.
>>2. portscanned the IP (just to make him/her know)
>>3. iptables denying all traffic from that IP range.
>>    
>>
>
>  
>
>>Are these actions OK, paranoid or just plain futile?
>>    
>>
>
>depends on your and the other system. In case you are providing services
>(e.g. webserver) and the other machine is a multiuser system it's a little
>bit too much.
>
>Apart from that a mail to the responsible abuse-Account for that IP seems to
>be a much better way to "let him/her know" than port scanning. You are using
>nearly the same methods to "warn" people they used to alarm you - doesn't
>seem right for me, but it's your decision. 
>
>  
>
Hmm, you're right. I guess it's the limit between defense and attack. 
Good point.

Francisco





_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to