Strange MD5 Auth problem in BIRD 1.3.8

Ondrej Zajicek santiago at crfreenet.org
Tue Oct 15 10:55:08 CEST 2013


On Thu, Oct 10, 2013 at 04:49:41PM -0500, Michael Vallaly wrote:
> 
> Hi,
> 
> I recently had an interesting problem surrounding socket option buffers
> and its use in Bird on Linux 3.6 which I hope someone could shed some
> light on.
> 
> And after digging around in the Linux system it seems I was
> running out of socket option memory buffers (duh!). 
> Thusly I was able to "fix" this by issuing:
> 
> <snip> 
> echo 40960 > /proc/sys/net/core/optmem_max  # Defaults to 20480
> </snip>
> 
> Is this expected? Any insight on how to properly size the socket option
> memory buffers used by bird? Is this some sort of a socket buffer leak?

I have no idea. This seems like an internal problem of Linux kernel.
/proc/sys/net/core/optmem_max AFAIK specifies ancillary buffer size
*per socket*, and MD5sum uses just perhaps some 100s of bytes.

-- 
Elen sila lumenn' omentielvo

Ondrej 'SanTiago' Zajicek (email: santiago at crfreenet.org)
OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net)
"To err is human -- to blame it on a computer is even more so."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: Digital signature
URL: <http://trubka.network.cz/pipermail/bird-users/attachments/20131015/26aca735/attachment-0001.asc>


More information about the Bird-users mailing list