Sorry, false alarm. I discovered what it was.... It was the Redhat Up2date applet that periodically is checks for new updates. I guess the dnsstuff IP reverse maps is a bit out of date and the IP address appeared to come from the DOD. Ah well, live and learn...
Dan
-----Original Message----- From: fedora-list-bounces@redhat.com [mailto:fedora-list-bounces@redhat.com]On Behalf Of Daniel B. Thurman Sent: Friday, October 28, 2005 7:57 PM To: For users of Fedora Core releases (E-mail) Subject: Abuse by Dod?
Errg... I installed Firestarter on FC4 and was wondering why my HD and network was thrashing around and checking the active connection page revealed:
Source-----------------Destination-----------------Port------Service-----Program 207.132.177.100 [my FC4 IP address] 443 HTTPS python
I stopped this "attack" by disabling HTTPS protocol in the policy tab and that stopped the attack. Geez, now what do I do to stop whomeever is doing it so that my HTTPS is available?
I tracked the network owner and fired off an abuse complaint to: abuse@nic.mil but like this is gonna work. Hmm.... maybe the Homeland Security is gonna come after me... heh heh.
Does anyone care to know what is going on?
Dan