Parity error <bootu...@gmail.com> writes:

> We have been using the kerberos 1.10.3 library and we find that
> occasionally a lot of the following files are kept open by the library
> and they fill up the fd limit of the process,

Hopefully someone else has a more detailed answer for you, but there
have been 82 commits since then which are leak fixes, some of which may
relate to the problem.  So: "probably".

Unfortunately, krb5-10 is from early 2012.  MIT upstream focuses most
support efforts around 1.15-series (current release) and 1.14-series
(maintenance release).

If you can reproduce it on another system, perhaps try with a newer krb5
and see?  (Based on the version, you're using Centos6; Centos7 has
krb5-1.14.1 at the time of writing.)

--Robbie

Attachment: signature.asc
Description: PGP signature

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to