Sorry, false alarm. I discovered what it was.... It was the Redhat Up2date applet that periodically is checks for new updates. I guess the dnsstuff IP reverse maps is a bit out of date and the IP address appeared to come from the DOD. Ah well, live and learn... Dan -----Original Message----- From: fedora-list-bounces@xxxxxxxxxx [mailto:fedora-list-bounces@xxxxxxxxxx]On Behalf Of Daniel B. Thurman Sent: Friday, October 28, 2005 7:57 PM To: For users of Fedora Core releases (E-mail) Subject: Abuse by Dod? Errg... I installed Firestarter on FC4 and was wondering why my HD and network was thrashing around and checking the active connection page revealed: Source-----------------Destination-----------------Port------Service-----Program 207.132.177.100 [my FC4 IP address] 443 HTTPS python I stopped this "attack" by disabling HTTPS protocol in the policy tab and that stopped the attack. Geez, now what do I do to stop whomeever is doing it so that my HTTPS is available? I tracked the network owner and fired off an abuse complaint to: abuse@xxxxxxx but like this is gonna work. Hmm.... maybe the Homeland Security is gonna come after me... heh heh. Does anyone care to know what is going on? Dan -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005 -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005 -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.1.362 / Virus Database: 267.12.5/150 - Release Date: 10/27/2005