aboutsummaryrefslogtreecommitdiff
path: root/spec/dos-spec/memory-exhaustion.md
diff options
context:
space:
mode:
authorMicah Elizabeth Scott <beth@torproject.org>2023-11-09 12:09:28 -0800
committerMicah Elizabeth Scott <beth@torproject.org>2023-11-09 14:16:27 -0800
commitd3987e6889a51beef81bc7f4735c3749cd9fc78b (patch)
tree40a522dd8f28206527942ebe3b71debde14362b3 /spec/dos-spec/memory-exhaustion.md
parent3781ff1039e8d6b48f11e6c5e2e99222ea25d75d (diff)
downloadtorspec-d3987e6889a51beef81bc7f4735c3749cd9fc78b.tar.gz
torspec-d3987e6889a51beef81bc7f4735c3749cd9fc78b.zip
Review feedback, repunctuate parenthetical
Diffstat (limited to 'spec/dos-spec/memory-exhaustion.md')
-rw-r--r--spec/dos-spec/memory-exhaustion.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/spec/dos-spec/memory-exhaustion.md b/spec/dos-spec/memory-exhaustion.md
index 591d950..2cc55eb 100644
--- a/spec/dos-spec/memory-exhaustion.md
+++ b/spec/dos-spec/memory-exhaustion.md
@@ -2,7 +2,7 @@
Memory exhaustion is a broad issue with many underlying causes. The Tor protocol requires clients, onion services, relays, and authorities to store various kind of information in buffers and caches. But an attacker can use these buffers and queues to exhaust the memory of the a targeted Tor process, and force the operating system to kill that process.
-With this in mind, any Tor implementation—especially one that runs as a relay or onion service—must take steps to prevent memory-based denial-of-service attacks.
+With this in mind, any Tor implementation (especially one that runs as a relay or onion service) must take steps to prevent memory-based denial-of-service attacks.
## Detecting low memory { #oom-detection }