lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 16 Oct 2007 13:34:18 -0600 From: James Lay <jlay@...ve-tothe-box.net> To: Bugtraq <bugtraq@...urityfocus.com> Subject: Re: SSH attacks - anyone else seen these? On 10/16/07 11:06 AM, "Tim" <secnews@...r1t.de> wrote: > I've recently noticed this in my logs: > > Oct 15 15:30:04 mysrv sshd[9563]: Bad protocol version > identification 'POST /unauthenticated//..%01/..%01/..%01/..%01/..%01/..%01/.. > %01/..%01/..%01/..%01/..%01/..%01/..%01' from 59.106.20.158 > > Oct 1 17:14:51 mysrv sshd[9915]: Bad protocol version > identification '\377\364\377\375\006\377\364\377\375\006\377\364\377\375\006' > from 84.58.87.123 > Oct 1 17:15:13 airrocket sshd[11982]: Bad protocol version identification '' > from 84.58.87.123 > > Did anyone else notice similar things? Does anyone know what vulnerability > they are attacking? > > Thanks, Nothing in my logs..just out of curiosity, are you running sshd with protocol version 1, 2, or both? James
Powered by blists - more mailing lists