Axel Grupe wrote:

[EMAIL PROTECTED] wrote:

Zitat von Axel Grupe <[EMAIL PROTECTED]>:



I'm running Debian Sarge so it's:
saslauthd 2.1.19
Source: pam-mysql Version: 0.5.0-6
The System is just in testing mode, so it hasn't been up for a longer time.
But thanks for the tip, I will observe it.



Could you send me ([EMAIL PROTECTED]) the source from pam_mysql Debian is shipping. I heard some rumors they fixed some of the leaks.

Thanks

Andreas



---
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list



In reply to leaking memory with saslauthd with n > 0.
I observed the problem now for nearly two days and it seems, that the daemon really leaks memory!
It started with about 3908 kb and now it requires 6596 kb.
So its not the best idea, or the daemon must be restarted on some days in the week, bad solution too.

Let's no mislead people. saslauthd does NOT leak memory. Some PAM modules DO leak, which causes saslauthd to grow as a side effect. saslauthd works fine with well-written password authenticators (including some PAM modules).


--
Kenneth Murchison     Oceana Matrix Ltd.
Software Engineer     21 Princeton Place
716-662-8973 x26      Orchard Park, NY 14127
--PGP Public Key--    http://www.oceana.com/~ken/ksm.pgp
---
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html

Reply via email to