provide a pointer for our openssl patch
Roger Dingledine

Roger Dingledine commited on 2010-04-23 01:46:10
Zeige 1 geänderte Dateien mit 5 Einfügungen und 3 Löschungen.

... ...
@@ -915,9 +915,11 @@ CPU load). You can tell Tor to use this malloc implementation instead:
915 915
 
916 916
 <li>If you're running a fast relay, meaning you have many TLS connections
917 917
 open, you are probably losing a lot of memory to OpenSSL's internal
918
-buffers (38KB+ per socket). We've patched OpenSSL to release unused buffer
919
-memory more aggressively. If you update to OpenSSL 1.0.0-beta5, Tor's
920
-build process will automatically recognize and use this feature.</li>
918
+buffers (38KB+ per socket). We've patched OpenSSL to <a
919
+href="http://archives.seul.org/or/dev/Jun-2008/msg00001.html">release
920
+unused buffer memory more aggressively</a>. If you update to OpenSSL
921
+1.0.0-beta5, Tor's build process will automatically recognize and use
922
+this feature.</li>
921 923
 
922 924
 <li>If you're running on Solaris, OpenBSD, NetBSD, or
923 925
 old FreeBSD, Tor is probably forking separate processes
924 926