Axel Grupe wrote:
[EMAIL PROTECTED] wrote:
Zitat von Axel Grupe <[EMAIL PROTECTED]>:
I'm running Debian Sarge so it's:
saslauthd 2.1.19
Source: pam-mysql Version: 0.5.0-6
The System is just in testing mode, so it hasn't been up for a longer time.
But thanks for the tip, I will observe it.
Could you send me ([EMAIL PROTECTED]) the source from pam_mysql Debian is shipping. I heard some rumors they fixed some of the leaks.
Thanks
Andreas
---
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list
In reply to leaking memory with saslauthd with n > 0.
I observed the problem now for nearly two days and it seems, that the daemon really leaks memory!
It started with about 3908 kb and now it requires 6596 kb.
So its not the best idea, or the daemon must be restarted on some days in the week, bad solution too.
Let's no mislead people. saslauthd does NOT leak memory. Some PAM modules DO leak, which causes saslauthd to grow as a side effect. saslauthd works fine with well-written password authenticators (including some PAM modules).
-- Kenneth Murchison Oceana Matrix Ltd. Software Engineer 21 Princeton Place 716-662-8973 x26 Orchard Park, NY 14127 --PGP Public Key-- http://www.oceana.com/~ken/ksm.pgp --- Cyrus Home Page: http://asg.web.cmu.edu/cyrus Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html