Sorry, false alarm. I discovered what it was....
It was the Redhat Up2date applet that periodically
is checks for new updates. I guess the dnsstuff
IP reverse maps is a bit out of date and the IP
address appeared to come from the DOD. Ah well,
live and learn...
Dan
-----Original Message-----
From: fedora-list-bounces(a)redhat.com
[mailto:fedora-list-bounces@redhat.com]On Behalf Of Daniel B. Thurman
Sent: Friday, October 28, 2005 7:57 PM
To: For users of Fedora Core releases (E-mail)
Subject: Abuse by Dod?
Errg... I installed Firestarter on FC4 and was wondering
why my HD and network was thrashing around and checking the
active connection page revealed:
Source-----------------Destination-----------------Port------Service-----Program
207.132.177.100 [my FC4 IP address] 443 HTTPS python
I stopped this "attack" by disabling HTTPS protocol in the policy
tab and that stopped the attack. Geez, now what do I do to stop
whomeever is doing it so that my HTTPS is available?
I tracked the network owner and fired off an abuse complaint
to: abuse(a)nic.mil but like this is gonna work. Hmm.... maybe
the Homeland Security is gonna come after me... heh heh.
Does anyone care to know what is going on?
Dan
--
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005
--
fedora-list mailing list
fedora-list(a)redhat.com
To unsubscribe:
https://www.redhat.com/mailman/listinfo/fedora-list
--
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005
--
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005