diff options
author | Micah Elizabeth Scott <beth@torproject.org> | 2023-11-09 12:09:28 -0800 |
---|---|---|
committer | Micah Elizabeth Scott <beth@torproject.org> | 2023-11-09 14:16:27 -0800 |
commit | d3987e6889a51beef81bc7f4735c3749cd9fc78b (patch) | |
tree | 40a522dd8f28206527942ebe3b71debde14362b3 /spec/dos-spec | |
parent | 3781ff1039e8d6b48f11e6c5e2e99222ea25d75d (diff) | |
download | torspec-d3987e6889a51beef81bc7f4735c3749cd9fc78b.tar.gz torspec-d3987e6889a51beef81bc7f4735c3749cd9fc78b.zip |
Review feedback, repunctuate parenthetical
Diffstat (limited to 'spec/dos-spec')
-rw-r--r-- | spec/dos-spec/memory-exhaustion.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/spec/dos-spec/memory-exhaustion.md b/spec/dos-spec/memory-exhaustion.md index 591d950..2cc55eb 100644 --- a/spec/dos-spec/memory-exhaustion.md +++ b/spec/dos-spec/memory-exhaustion.md @@ -2,7 +2,7 @@ Memory exhaustion is a broad issue with many underlying causes. The Tor protocol requires clients, onion services, relays, and authorities to store various kind of information in buffers and caches. But an attacker can use these buffers and queues to exhaust the memory of the a targeted Tor process, and force the operating system to kill that process. -With this in mind, any Tor implementation—especially one that runs as a relay or onion service—must take steps to prevent memory-based denial-of-service attacks. +With this in mind, any Tor implementation (especially one that runs as a relay or onion service) must take steps to prevent memory-based denial-of-service attacks. ## Detecting low memory { #oom-detection } |