Saslauthd memory leak ?

Yann Rouillard yann at pleiades.fr.eu.org
Mon Oct 17 18:46:29 EDT 2005


> This is a known issue with certain pam implementations.
> 
> >
> >> You can use saslauthd -n0, but this performs poorly
> >> because saslauthd has to spawn a new process for each authentication.
> >
> > Thanks for the idea, I will try anyway if the performance impact is
> > acceptable.
> >
> 
> You can probably use saslauthd -a getpwent or -a shadow instead.

You were right, using shadow solved the problem.

However I tried -n0 option but it didn't work, because saslauthd was
compiled with ipc_doors which doesn't support the -n options.

I think it would be nice to mention in the man or somewhere in the doc.




More information about the Cyrus-sasl mailing list