Sorry, false alarm. I discovered what it was.... It was the Redhat Up2date applet that periodically is checks for new updates. I guess the dnsstuff IP reverse maps is a bit out of date and the IP address appeared to come from the DOD. Ah well, live and learn...
Dan
-----Original Message----- From: fedora-list-bounces@redhat.com [mailto:fedora-list-bounces@redhat.com]On Behalf Of Daniel B. Thurman Sent: Friday, October 28, 2005 7:57 PM To: For users of Fedora Core releases (E-mail) Subject: Abuse by Dod?
Errg... I installed Firestarter on FC4 and was wondering why my HD and network was thrashing around and checking the active connection page revealed:
Source-----------------Destination-----------------Port------Service-----Program 207.132.177.100 [my FC4 IP address] 443 HTTPS python
I stopped this "attack" by disabling HTTPS protocol in the policy tab and that stopped the attack. Geez, now what do I do to stop whomeever is doing it so that my HTTPS is available?
I tracked the network owner and fired off an abuse complaint to: abuse@nic.mil but like this is gonna work. Hmm.... maybe the Homeland Security is gonna come after me... heh heh.
Does anyone care to know what is going on?
Dan
On Friday 28 October 2005 23:27, Daniel B. Thurman wrote:
Sorry, false alarm. I discovered what it was.... It was the Redhat Up2date applet that periodically is checks for new updates. I guess the dnsstuff IP reverse maps is a bit out of date and the IP address appeared to come from the DOD. Ah well, live and learn...
The G-Men will be knocking at your door any minute now. :)