Saslauthd memory leak ?

Igor Brezac igor at ipass.net
Mon Oct 17 19:00:21 EDT 2005


On Tue, 18 Oct 2005, Yann Rouillard wrote:

>
>> This is a known issue with certain pam implementations.
>>
>>>
>>>> You can use saslauthd -n0, but this performs poorly
>>>> because saslauthd has to spawn a new process for each authentication.
>>>
>>> Thanks for the idea, I will try anyway if the performance impact is
>>> acceptable.
>>>
>>
>> You can probably use saslauthd -a getpwent or -a shadow instead.
>
> You were right, using shadow solved the problem.
>
> However I tried -n0 option but it didn't work, because saslauthd was
> compiled with ipc_doors which doesn't support the -n options.

Why do you need ipc_doors?

Make sure you built saslauthd with -D_REENTRANT, otherwise your current 
config will have problems.  For ipc_doors you need the mechanisms to be 
thread-safe and I do not think pam qualifies completely.

>
> I think it would be nice to mention in the man or somewhere in the doc.
>

What would you like mentioned?  You can always submit a patch.

-- 
Igor


More information about the Cyrus-sasl mailing list