[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Sks-devel] memory leak: solved
From: |
Daniel Kahn Gillmor |
Subject: |
Re: [Sks-devel] memory leak: solved |
Date: |
Thu, 26 May 2016 12:26:46 -0400 |
User-agent: |
Notmuch/0.22+16~g87b7bd4 (http://notmuchmail.org) Emacs/24.5.1 (x86_64-pc-linux-gnu) |
following up from a rather old thread...
On Thu 2015-04-30 14:52:48 -0400, Tobias Mueller wrote:
> On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote:
>> I consider this a bug in SKS, if it can overconsume RAM on the basis
>> of one misbehaving or rejecting peer.
>>
>> the implication is that a network attacker can force any SKS server
>> into this state.
>>
>> Have you filed a bug report about this?
> Has this been done?
> Where is the bug tracker, anyway?
I've just filed this as a report here:
https://bitbucket.org/skskeyserver/sks-keyserver/issues/39/misbehaving-peer-or-network-can-cause-out
Regards,
--dkg
signature.asc
Description: PGP signature
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- Re: [Sks-devel] memory leak: solved,
Daniel Kahn Gillmor <=