Have a server on my lan running as a yum mirror for my lan, running rawhide. Other than the kernel, it gets updated pretty much daily. Saw this in the log: --------------------- httpd Begin ------------------------ 1663.90 MB transfered in 1894 responses (1xx 0, 2xx 1852, 3xx 0, 4xx 42, 5xx 0) 322 Documents (3.81 MB), 1534 Archives (1449.43 MB), 12 Content pages (0.00 MB), 2 Program source files (0.00 MB), 10 CD Images (144.50 MB), 14 Other (66.15 MB) Attempts to use 1 known hacks were logged 4 time(s) passwd by 192.168.15.101 4 time(s) A total of 1 sites probed the server 192.168.15.101 !!!! 2 possible successful probes /pub/yum/fedora/core/development/i386/Fedora/RPMS/pam_passwdqc-0.7.6-1.i386.rpm HTTP Response 200 /pub/yum/fedora/core/development/i386/Fedora/RPMS/passwd-0.69-2.i386.rpm HTTP Response 200 A total of 7 unidentified 'other' records logged *snip* The server is behind a router firewall. I do have a couple ports forwarded to it - for bittorrent (tcp) and for ntpd (udp - this is also my lan time server) - not ports apache uses. 192.168.15.101 is my wireless router (not the router the server is behind, the wireless does strictly my wireless clients) - what exactly is the "known hack" it is referring to? I certainly haven't tried to hack it, I suspect that that is a bogus entry, but I do want to make sure someone isn't connecting through my wireless router and trying stuff. The "possible succesful probes" are clearly yum updates that happened to contain the word "passwd" in the filename. Is that something that should be filed as a false positive bug? A password containing file would not have the mime type application/x-rpm