False alarm: Abuse of RHN Service?
nosp
nosp at xades.com
Wed Sep 3 12:40:25 UTC 2003
On Tue, 2003-09-02 at 05:00, Chris Kloiber wrote:
> On Mon, 2003-09-01 at 22:29, Stephen Smoogen wrote:
> > Is rhnsd running and did it have a bad key for a while? It checks in
> > quite regularly and if it couldnt complete the handshake.. would this
> > cause the problem?
>
> I couldn't say. I am aware of the limit on connections, but I have no
> firsthand knowledge of the actual code implementing it.
I turned off rhnsd yesterday (killed it and disabled via chkconfig). I
still, however, saw the problem again today plus some weird (possibly
related) output just before the error -- could indicate a network
problem causing up2date to spam RHN?
---
# up2date --nox -d -u
[...tons of lines with packages being "Done." skipped...]
vim-minimal-6.2.71-1.1.i386 ########################## Done.
vim-6.2.71-1.1.src.rpm: ########################## Done.
vnc-4.0-0.beta3.10.i386.rpm ########################## Done.
vnc-4.0-0.beta3.10.src.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm: wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm:
Traceback (most recent call last):
File "/usr/sbin/up2date", line 1149, in ?
sys.exit(main() or 0)
File "/usr/sbin/up2date", line 748, in main
fullUpdate, dryRun=options.dry_run))
File "/usr/sbin/up2date", line 1015, in batchRun
batch.run()
File "/usr/share/rhn/up2date_client/up2dateBatch.py", line 73, in run
self.__getPackages()
File "/usr/share/rhn/up2date_client/up2dateBatch.py", line 139, in
__getPackages
up2date.getPackage(pkg, wrapperUtils.printPkg,
wrapperUtils.printRetrieveHash)
File "/usr/share/rhn/up2date_client/up2date.py", line 313, in
getPackage
buffer = rpcServer.doCall(repos.getPackage, pkg, msgCallback,
progressCallback)
File "/usr/share/rhn/up2date_client/rpcServer.py", line 143, in doCall
up2dateAuth.updateLoginInfo()
File "/usr/share/rhn/up2date_client/up2dateAuth.py", line 137, in
updateLoginInfo
loginInfo = login()
File "/usr/share/rhn/up2date_client/up2dateAuth.py", line 116, in
login
raise up2dateErrors.AbuseError(f.faultString)
up2date_client.up2dateErrors.AbuseError:
Error Message:
Abuse of Service detected for server earth (1003549202)
Error Class Code: 49
Error Class Info:
You are getting this error because RHN has detected an abuse of
service from this system and account. This error is triggered when
your system makes too many connections to Red Hat Network. This
error can not be triggered under a normal use of the Red Hat
Network
service as configured by default on Red Hat Linux.
The Red Hat Network services for this system will remain disabled
until you will reduce the RHN network traffic from your system to
acceptable limits.
Please log into RHN and visit
https://rhn.redhat.com/help/contact.pxt
to contact technical support if you think you have received this
message in error.
More information about the fedora-test-list
mailing list