False alarm: Abuse of RHN Service?

nosp nosp at xades.com
Wed Sep 3 12:40:25 UTC 2003


On Tue, 2003-09-02 at 05:00, Chris Kloiber wrote:
> On Mon, 2003-09-01 at 22:29, Stephen Smoogen wrote:
> > Is rhnsd running and did it have a bad key for a while? It checks in 
> > quite regularly and if it couldnt complete the handshake.. would this 
> > cause the problem?
> 
> I couldn't say. I am aware of the limit on connections, but I have no
> firsthand knowledge of the actual code implementing it.

I turned off rhnsd yesterday (killed it and disabled via chkconfig).  I
still, however, saw the problem again today plus some weird (possibly
related) output just before the error -- could indicate a network
problem causing up2date to spam RHN?

---
# up2date --nox -d -u
[...tons of lines with packages being "Done." skipped...]
vim-minimal-6.2.71-1.1.i386 ########################## Done.
vim-6.2.71-1.1.src.rpm:     ########################## Done.
vnc-4.0-0.beta3.10.i386.rpm ########################## Done.
vnc-4.0-0.beta3.10.src.rpm:  wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:  
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:  wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:  
wget-1.8.2-15.3.i386.rpm:    wget-1.8.2-15.3.i386.rpm:   
wget-1.8.2-15.3.i386.rpm:
Traceback (most recent call last):
  File "/usr/sbin/up2date", line 1149, in ?
    sys.exit(main() or 0)
  File "/usr/sbin/up2date", line 748, in main
    fullUpdate, dryRun=options.dry_run))
  File "/usr/sbin/up2date", line 1015, in batchRun
    batch.run()
  File "/usr/share/rhn/up2date_client/up2dateBatch.py", line 73, in run
    self.__getPackages()
  File "/usr/share/rhn/up2date_client/up2dateBatch.py", line 139, in
__getPackages
    up2date.getPackage(pkg, wrapperUtils.printPkg,
wrapperUtils.printRetrieveHash)
  File "/usr/share/rhn/up2date_client/up2date.py", line 313, in
getPackage
    buffer = rpcServer.doCall(repos.getPackage, pkg, msgCallback,
progressCallback)
  File "/usr/share/rhn/up2date_client/rpcServer.py", line 143, in doCall
    up2dateAuth.updateLoginInfo()
  File "/usr/share/rhn/up2date_client/up2dateAuth.py", line 137, in
updateLoginInfo
    loginInfo = login()
  File "/usr/share/rhn/up2date_client/up2dateAuth.py", line 116, in
login
    raise up2dateErrors.AbuseError(f.faultString)
up2date_client.up2dateErrors.AbuseError:
Error Message:
    Abuse of Service detected for server earth (1003549202)
Error Class Code: 49
Error Class Info:
     You are getting this error because RHN has detected an abuse of
     service from this system and account. This error is triggered when
     your system makes too many connections to Red Hat Network. This
     error can not be triggered under a normal use of the Red Hat
Network
     service as configured by default on Red Hat Linux.
 
     The Red Hat Network services for this system will remain disabled
     until you will reduce the RHN network traffic from your system to
     acceptable limits.
 
     Please log into RHN and visit
https://rhn.redhat.com/help/contact.pxt
     to contact technical support if you think you have received this
     message in error.






More information about the fedora-test-list mailing list