[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #19151 [Core Tor/Tor]: Looks like a memory leak?



#19151: Looks like a memory leak?
-----------------------------------+------------------------------
 Reporter:  t-3.net                |          Owner:
     Type:  defect                 |         Status:  new
 Priority:  Medium                 |      Milestone:  Tor: 0.2.???
Component:  Core Tor/Tor           |        Version:  Tor: 0.2.7.6
 Severity:  Major                  |     Resolution:
 Keywords:  029-proposed unsolved  |  Actual Points:
Parent ID:                         |         Points:
 Reviewer:                         |        Sponsor:
-----------------------------------+------------------------------

Comment (by t-3.net):

 Well, if you find that you're having trouble duplicating the problem and
 would like to do some debugging, the offer is there. I'm not too worried
 about the security aspect of tor dev accessing the relay using their ssh
 key. The vserver is not real bad on security, and it's not like I'd be
 throwing open the standard ssh port with password auth enabled.

 If you wanted, I could set up a copy of the vserver that has had
 /var/lib/tor/keys/* shredded and then you can put whatever keys you like
 there, but after that kind of change I think it would take a while to get
 its traffic back. The problem may require the traffic amounts Libero gets
 now or in some other way be peculiar to the existing setup.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19151#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs