Another leak: tls_new_client_session

Stefan Paetow Stefan.Paetow at
Thu Mar 5 10:37:12 CET 2015

> Leaking the ssl structs with 2 client sessions was around 300k so if it
> doesn't grow much beyond that, 356k could easily be plausible for no
> leaks we care about.

Alan, Sam, 

Unfortunately I had to restart the server at 8pm last night after realising that there were in fact no proper auth/proxy sessions that occurred (instead, the requests would abort). However, after restarting and checking it worked, looking at the memory usage this morning at 9:36, the FR RSS grew by 2980KB over 13.5 hours. Based on past data, this is a large improvement (where in 3.0.4 it would grow by that amount in around 2.5 hours). The server will continue to run some more for a 24h checkpoint.

I hope that's useful.

Stefan Paetow
Moonshot Industry & Research Liaison Coordinator

t: +44 (0)1235 822 125
gpg: 0x3FCE5142
xmpp: stefanp at
skype: stefan.paetow.janet
Lumen House, Library Avenue, Harwell Oxford, Didcot, OX11 0SG
Jisc is a registered charity (number 1149740) and a company limited by guarantee which is registered in England under Company No. 5747339, VAT No. GB 197 0632 86. Jisc’s registered office is: One Castlepark, Tower Hill, Bristol, BS2 0JA. T 0203 697 5800.
Jisc Collections and Janet Ltd. is a wholly owned Jisc subsidiary and a company limited by guarantee which is registered in England under Company No. number 2881024, VAT No. GB 197 0632 86. The registered office is: Lumen House, Library Avenue, Harwell, Didcot, Oxfordshire, OX11 0SG. T 01235 822200.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 496 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <>

More information about the Freeradius-Devel mailing list