Abuse by Dod?

Daniel B. Thurman dant at cdkkt.com
Sat Oct 29 03:27:22 UTC 2005


Sorry, false alarm.  I discovered what it was....
It was the Redhat Up2date applet that periodically
is checks for new updates.  I guess the dnsstuff
IP reverse maps is a bit out of date and the IP
address appeared to come from the DOD.  Ah well,
live and learn...

Dan

-----Original Message-----
From: fedora-list-bounces at redhat.com
[mailto:fedora-list-bounces at redhat.com]On Behalf Of Daniel B. Thurman
Sent: Friday, October 28, 2005 7:57 PM
To: For users of Fedora Core releases (E-mail)
Subject: Abuse by Dod?



Errg... I installed Firestarter on FC4 and was wondering
why my HD and network was thrashing around and checking the
active connection page revealed:

Source-----------------Destination-----------------Port------Service-----Program
207.132.177.100   [my FC4 IP address]    443       HTTPS    python

I stopped this "attack" by disabling HTTPS protocol in the policy
tab and that stopped the attack.  Geez, now what do I do to stop
whomeever is doing it so that my HTTPS is available?

I tracked the network owner and fired off an abuse complaint
to: abuse at nic.mil but like this is gonna work.  Hmm.... maybe
the Homeland Security is gonna come after me...  heh heh.

Does anyone care to know what is going on?

Dan

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005
 

-- 
fedora-list mailing list
fedora-list at redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list

-- 
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005
 

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005
 




More information about the fedora-list mailing list