[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #19151 [Core Tor/Tor]: Looks like a memory leak?
#19151: Looks like a memory leak?
-----------------------------------+------------------------------
Reporter: t-3.net | Owner:
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.2.???
Component: Core Tor/Tor | Version: Tor: 0.2.7.6
Severity: Major | Resolution:
Keywords: 029-proposed unsolved | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------+------------------------------
Comment (by t-3.net):
Well, if you find that you're having trouble duplicating the problem and
would like to do some debugging, the offer is there. I'm not too worried
about the security aspect of tor dev accessing the relay using their ssh
key. The vserver is not real bad on security, and it's not like I'd be
throwing open the standard ssh port with password auth enabled.
If you wanted, I could set up a copy of the vserver that has had
/var/lib/tor/keys/* shredded and then you can put whatever keys you like
there, but after that kind of change I think it would take a while to get
its traffic back. The problem may require the traffic amounts Libero gets
now or in some other way be peculiar to the existing setup.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19151#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs