From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 29369 invoked by alias); 30 Aug 2012 20:26:35 -0000 Received: (qmail 29346 invoked by uid 22791); 30 Aug 2012 20:26:34 -0000 X-SWARE-Spam-Status: No, hits=-6.1 required=5.0 tests=AWL,BAYES_00,KHOP_RCVD_UNTRUST,RCVD_IN_DNSWL_HI,RCVD_IN_HOSTKARMA_W,RP_MATCHES_RCVD,SPF_HELO_PASS X-Spam-Check-By: sourceware.org Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Thu, 30 Aug 2012 20:26:18 +0000 Received: from int-mx01.intmail.prod.int.phx2.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id q7UKQ3Jd018023 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 30 Aug 2012 16:26:04 -0400 Received: from fche.csb (vpn-10-179.rdu.redhat.com [10.11.10.179]) by int-mx01.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id q7UKQ2DO017811; Thu, 30 Aug 2012 16:26:03 -0400 Received: by fche.csb (Postfix, from userid 2569) id 092BE5816B; Thu, 30 Aug 2012 16:26:01 -0400 (EDT) Date: Thu, 30 Aug 2012 20:26:00 -0000 From: "Frank Ch. Eigler" To: Jonathan Larmour Cc: "Kumar, Venkataramanan" , Hans-Peter Nilsson , overseers@sourceware.org Subject: Re: FW: svn+ssh connection times out (fwd) Message-ID: <20120830202601.GC9840@redhat.com> References: <503FB5BF.2000807@jifvik.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <503FB5BF.2000807@jifvik.org> User-Agent: Mutt/1.4.2.2i Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org X-SW-Source: 2012-q3/txt/msg00084.txt.bz2 Hi - > It might be the Red Hat infrastructure where sourceware is co-located is > filtering things, although that seems unlikely. In particular on > sourceware I can successfully ping the 202.56.249.162 address he provides. We have on occasion blacklisted (iptables -j DROP) packets from ip addresses/ranges where abusive accesses have originated. 202.56.* is not covered by any of them AFAIK. - FChE