From owner-freebsd-ports@freebsd.org Wed Jul 8 11:58:21 2015 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B56E2995F58 for ; Wed, 8 Jul 2015 11:58:21 +0000 (UTC) (envelope-from marko.cupac@mimar.rs) Received: from smtp.mimar.rs (smtp.mimar.rs [193.53.106.135]) by mx1.freebsd.org (Postfix) with ESMTP id 500811E8F for ; Wed, 8 Jul 2015 11:58:20 +0000 (UTC) (envelope-from marko.cupac@mimar.rs) Received: from vscan.mimar.rs (vscan.mimar.rs [193.53.106.134]) by smtp.mimar.rs (Postfix) with ESMTP id 79A17898D0 for ; Wed, 8 Jul 2015 13:58:12 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mimar.rs; h= content-transfer-encoding:content-type:content-type:mime-version :x-mailer:organization:message-id:subject:subject:from:from:date :date:received:received; s=mimar-0901; t=1436356688; x= 1438171089; bh=Xna8y7Hk6UsAG4yf5vFPfmnHOXZv/af/BaRqtlYW4UY=; b=1 LwNy+DQv0DA6P48oxs+9nKHIATbzZIo527pjBhCie1j/R92uqkad91khfjtTAmXi yfcbCbUmebSyRB2gg3m6DmcMdeukD+sd06PSvQB8wuZumSTC2K1d45/9lfRfn4BT euXoWaRzq6O8j4rpRdEgGI3+0V9N5i4juzC6/XmT+0= X-Virus-Scanned: amavisd-new at mimar.rs Received: from smtp.mimar.rs ([193.53.106.135]) by vscan.mimar.rs (vscan.mimar.rs [193.53.106.134]) (amavisd-new, port 10026) with ESMTP id hnxgrbj2z40K for ; Wed, 8 Jul 2015 13:58:08 +0200 (CEST) Received: from efreet (unknown [193.53.106.34]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: marko.cupac@mimar.rs) by smtp.mimar.rs (Postfix) with ESMTPSA id 5FFC589470 for ; Wed, 8 Jul 2015 13:58:07 +0200 (CEST) Date: Wed, 8 Jul 2015 13:58:06 +0200 From: Marko =?UTF-8?B?Q3VwYcSH?= To: freebsd-ports@freebsd.org Subject: pkg: cannot fetch vulnxml file Message-ID: <20150708135806.4a03ea96@efreet> Organization: Mimar X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.23; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2015 11:58:21 -0000 Hi, I have more than twenty 10.1-RELEASE-p14 servers, of which random 30% or so fail to fetch vulnxml file each night, as seen in daily security run output. Is there a restriction about number of requests per time period from same IP or AS? Why is this happening? Regards, --=20 Marko Cupa=C4=87 https://www.mimar.rs/