sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] memory leak: solved


From: Daniel Kahn Gillmor
Subject: Re: [Sks-devel] memory leak: solved
Date: Thu, 26 May 2016 12:26:46 -0400
User-agent: Notmuch/0.22+16~g87b7bd4 (http://notmuchmail.org) Emacs/24.5.1 (x86_64-pc-linux-gnu)

following up from a rather old thread...

On Thu 2015-04-30 14:52:48 -0400, Tobias Mueller wrote:
> On Fr, 2015-04-10 at 17:18 -0400, Daniel Kahn Gillmor wrote:
>> I consider this a bug in SKS, if it can overconsume RAM on the basis
>> of one misbehaving or rejecting peer.
>> 
>> the implication is that a network attacker can force any SKS server
>> into this state.
>> 
>> Have you filed a bug report about this?
> Has this been done?
> Where is the bug tracker, anyway?

I've just filed this as a report here:

  
https://bitbucket.org/skskeyserver/sks-keyserver/issues/39/misbehaving-peer-or-network-can-cause-out

Regards,

        --dkg

Attachment: signature.asc
Description: PGP signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]