I noticed the memory leak does not happen on bitcoins.lc and they use longpolling.
Looking at the network traffic, it seems that bitcoins.lc uses keep-alive (slush also has keep-alive)
Also there is something else which is weird.
Everything looks normal until phoenix sends out 2 similiar looking packets.
The server answers this with a error 400 bad request, which is followed by 2 RST.
This happens after every communication between miner and server.
This here is btcguild, but arsbitcoin behaves exactly the same.
14:04:20.907806 IP (tos 0x0, ttl 64, id 11848, offset 0, flags [DF], proto TCP (6), length 52)
10.23.42.151.33398 > 69.42.216.173.8332: Flags [.], cksum 0x52ac (incorrect -> 0x91b8), seq 481, ack 182, win 123, options [nop,nop,TS val 718992981 ecr 132504115], length 0
0x0000: 0014 bfa5 8817 0024 1d8a cc03 0800 4500 .......$......E.
0x0010: 0034 2e48 4000 4006 b9f6 0a17 2a97 452a .4.H@.@.....*.E*
0x0020: d8ad 8276 208c f8a3 dcc3 b6ca 5f86 8010 ...v........_...
0x0030: 007b 52ac 0000 0101 080a 2ada f655 07e5 .{R.......*..U..
0x0040: da33 .3
14:04:21.179311 IP (tos 0x0, ttl 64, id 11849, offset 0, flags [DF], proto TCP (6), length 52)
10.23.42.151.33398 > 69.42.216.173.8332: Flags [F.], cksum 0x52ac (incorrect -> 0x90a7), seq 481, ack 182, win 123, options [nop,nop,TS val 718993253 ecr 132504115], length 0
0x0000: 0014 bfa5 8817 0024 1d8a cc03 0800 4500 .......$......E.
0x0010: 0034 2e49 4000 4006 b9f5 0a17 2a97 452a .4.I@.@.....*.E*
0x0020: d8ad 8276 208c f8a3 dcc3 b6ca 5f86 8011 ...v........_...
0x0030: 007b 52ac 0000 0101 080a 2ada f765 07e5 .{R.......*..e..
0x0040: da33 .3
14:04:21.353823 IP (tos 0x0, ttl 54, id 34045, offset 0, flags [DF], proto TCP (6), length 316)
69.42.216.173.8332 > 10.23.42.151.33398: Flags [P.], cksum 0x2324 (correct), seq 182:446, ack 482, win 54, options [nop,nop,TS val 132504159 ecr 718993253], length 264
0x0000: 0024 1d8a cc03 0014 bfa5 8817 0800 4500 .$............E.
0x0010: 013c 84fd 4000 3606 6c39 452a d8ad 0a17 .<[email protected]*....
0x0020: 2a97 208c 8276 b6ca 5f86 f8a3 dcc4 8018 *....v.._.......
0x0030: 0036 2324 0000 0101 080a 07e5 da5f 2ada .6#$........._*.
0x0040: f765 4854 5450 2f31 2e31 2034 3030 2042 .eHTTP/1.1.400.B
0x0050: 6164 2052 6571 7565 7374 0d0a 436f 6e74 ad.Request..Cont
0x0060: 656e 742d 5479 7065 3a20 7465 7874 2f68 ent-Type:.text/h
0x0070: 746d 6c0d 0a43 6f6e 6e65 6374 696f 6e3a tml..Connection:
0x0080: 2063 6c6f 7365 0d0a 4461 7465 3a20 5765 .close..Date:.We
0x0090: 642c 2031 3020 4175 6720 3230 3131 2031 d,.10.Aug.2011.1
0x00a0: 323a 3033 3a33 3320 474d 540d 0a43 6f6e 2:03:33.GMT..Con
0x00b0: 7465 6e74 2d4c 656e 6774 683a 2031 3334 tent-Length:.134
0x00c0: 0d0a 0d0a 3c48 544d 4c3e 3c48 4541 443e ....
0x00d0: 0a3c 5449 544c 453e 3430 3020 4261 6420 .400.Bad.
0x00e0: 5265 7175 6573 743c 2f54 4954 4c45 3e0a Request.
0x00f0: 3c2f 4845 4144 3e3c 424f 4459 3e0a 3c48 . 0x0100: 313e 4d65 7468 6f64 204e 6f74 2049 6d70 1>Method.Not.Imp
0x0110: 6c65 6d65 6e74 6564 3c2f 4831 3e0a 496e lemented.In
0x0120: 7661 6c69 6420 6d65 7468 6f64 2069 6e20 valid.method.in.
0x0130: 7265 7175 6573 743c 503e 0a3c 2f42 4f44 request. 0x0140: 593e 3c2f 4854 4d4c 3e0a Y>.
14:04:21.353861 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
10.23.42.151.33398 > 69.42.216.173.8332: Flags [R], cksum 0xe4ef (correct), seq 4171488452, win 0, length 0
0x0000: 0014 bfa5 8817 0024 1d8a cc03 0800 4500 .......$......E.
0x0010: 0028 0000 4000 4006 e84a 0a17 2a97 452a .(..@[email protected]..*.E*
0x0020: d8ad 8276 208c f8a3 dcc4 0000 0000 5004 ...v..........P.
0x0030: 0000 e4ef 0000 ......
14:04:21.354062 IP (tos 0x0, ttl 54, id 34046, offset 0, flags [DF], proto TCP (6), length 52)
69.42.216.173.8332 > 10.23.42.151.33398: Flags [F.], cksum 0x8fb7 (correct), seq 446, ack 482, win 54, options [nop,nop,TS val 132504159 ecr 718993253], length 0
0x0000: 0024 1d8a cc03 0014 bfa5 8817 0800 4500 .$............E.
0x0010: 0034 84fe 4000 3606 6d40 452a d8ad 0a17 [email protected]@E*....
0x0020: 2a97 208c 8276 b6ca 608e f8a3 dcc4 8011 *....v..`.......
0x0030: 0036 8fb7 0000 0101 080a 07e5 da5f 2ada .6..........._*.
0x0040: f765 .e
14:04:21.354068 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
10.23.42.151.33398 > 69.42.216.173.8332: Flags [R], cksum 0xe4ef (correct), seq 4171488452, win 0, length 0
0x0000: 0014 bfa5 8817 0024 1d8a cc03 0800 4500 .......$......E.
0x0010: 0028 0000 4000 4006 e84a 0a17 2a97 452a .(..@[email protected]..*.E*
0x0020: d8ad 8276 208c f8a3 dcc4 0000 0000 5004 ...v..........P.
0x0030: 0000 e4ef 0000 ......
I am not sure, but this does not look normal to me, with the bad request and all.