following up from a rather old thread...
On Thu 2015-04-30 14:52:48 -0400, Tobias Mueller wrote:
> On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote:
>> I consider this a bug in SKS, if it can overconsume RAM on the basis
>> of one misbehaving or rejecting peer.
>>
>> the implication is
Hi.
On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote:
> I consider this a bug in SKS, if it can overconsume RAM on the basis
> of one misbehaving or rejecting peer.
>
> the implication is that a network attacker can force any SKS server
> into this state.
>
> Have you filed a bug repo
On Fri 2015-04-10 03:32:20 -0400, Kiss Gabor (Bitman) wrote:
>> sks 1.1.5+ requires round about 300MB in main memory on key.cccmz.de and
>> key.ip6.li. May be there is a problem, when haproxy is used in tcp mode to
>> proxy port 11370. key.ip6.li did not have problems, but a test system has
>> als