oui:
sysmgr@fserv ~> sudo lsof -i :443 | grep CLOSE
python3 1352 root 29u IPv4 72133416 0t0 TCP 192.168.1.14:50852->157.97.137.137:https (CLOSE_WAIT) Pas encore mais chez moi le process existe: sysmgr@fserv ~> sudo ps -fp 1352
UID PID PPID C STIME TTY TIME CMD
root 1352 1349 1 Feb21 ? 00:13:06 python3 -m homeassistant --config /configInfo : https://www.abuseipdb.com/check/157.97.137.137 ***EDIT*** l'enquete continue
sysmgr@fserv ~> sudo tcpdump -i any host 157.97.137.137
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
09:59:09.670421 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 2855977021, ack 1175334390, win 344, options [nop,nop,TS val 317195707 ecr 2223560329], length 0
09:59:09.670428 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317195707 ecr 2223560329], length 0
09:59:09.884338 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317195920 ecr 2223560329], length 0
09:59:09.884342 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317195920 ecr 2223560329], length 0
09:59:10.096348 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317196133 ecr 2223560329], length 0
09:59:10.096356 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317196133 ecr 2223560329], length 0
09:59:10.523348 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317196560 ecr 2223560329], length 0
09:59:10.523352 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317196560 ecr 2223560329], length 0
09:59:11.377341 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317197414 ecr 2223560329], length 0
09:59:11.377346 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317197414 ecr 2223560329], length 0
09:59:13.083412 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317199120 ecr 2223560329], length 0
09:59:13.083416 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317199120 ecr 2223560329], length 0
09:59:16.499370 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317202536 ecr 2223560329], length 0
09:59:16.499373 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317202536 ecr 2223560329], length 0
09:59:23.339375 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317209376 ecr 2223560329], length 0
09:59:23.339378 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317209376 ecr 2223560329], length 0
09:59:37.003388 ovs_eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317223040 ecr 2223560329], length 0
09:59:37.003540 eth0 Out IP 192.168.1.14.50852 > 157.97.137.137.https: Flags [F.], seq 0, ack 1, win 344, options [nop,nop,TS val 317223040 ecr 2223560329], length 0
EDIT#2 trouvé le "coupable" : https://github.com/home-assistant/core/issues/156956