<div dir="ltr"><div><div>Martin,<br><br>I've provided Steve with a new password. Thanks for identifying the compromise. <br><br></div>Best regards,<br></div>Frank<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">
On Thu, Aug 8, 2013 at 2:14 AM, Martin Spott <span dir="ltr"><<a href="mailto:Martin.Spott@mgras.net" target="_blank">Martin.Spott@mgras.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Steve,<br>
apparently someone somehow managed to guess your password, logged into<br>
one of those machines which provide shell login to OSGeo "shell" users<br>
and subsequently changed your password at 2013-08-06 13:54:43 UTC.<br>
Finally the affected machine was used to run pscan2/scanssh to randomly<br>
scan SSH access on other systems.<br>
<br>
Your password is now safe because I set it to a random string and I<br>
suggest you negotiate with FrankW to set a new password. I invite<br>
everybody to join me in checking the other OSGeo servers for similar<br>
abuse of the "steve" or other logins.<br>
<div class="HOEnZb"><div class="h5"><br>
Cheers,<br>
Martin.<br>
--<br>
Unix _IS_ user friendly - it's just selective about who its friends are !<br>
--------------------------------------------------------------------------<br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>---------------------------------------+--------------------------------------<br>I set the clouds in motion - turn up | Frank Warmerdam, <a href="mailto:warmerdam@pobox.com" target="_blank">warmerdam@pobox.com</a><br>
light and sound - activate the windows | <a href="http://pobox.com/~warmerdam" target="_blank">http://pobox.com/~warmerdam</a><br>and watch the world go round - Rush | Geospatial Software Developer<br>
</div>