Re: [Sks-devel] memory leak: solved

2016-05-26 Thread Daniel Kahn Gillmor
following up from a rather old thread... On Thu 2015-04-30 14:52:48 -0400, Tobias Mueller wrote: > On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote: >> I consider this a bug in SKS, if it can overconsume RAM on the basis >> of one misbehaving or rejecting peer. >> >> the implication is

Re: [Sks-devel] memory leak: solved

2015-05-01 Thread Tobias Mueller
Hi. On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote: > I consider this a bug in SKS, if it can overconsume RAM on the basis > of one misbehaving or rejecting peer. > > the implication is that a network attacker can force any SKS server > into this state. > > Have you filed a bug repo

Re: [Sks-devel] memory leak: solved

2015-04-10 Thread Daniel Kahn Gillmor
On Fri 2015-04-10 03:32:20 -0400, Kiss Gabor (Bitman) wrote: >> sks 1.1.5+ requires round about 300MB in main memory on key.cccmz.de and >> key.ip6.li. May be there is a problem, when haproxy is used in tcp mode to >> proxy port 11370. key.ip6.li did not have problems, but a test system has >> als