[Red5] ip-based security-constraints
sascha_sauren at arcor.de
Sat Sep 23 06:34:17 EDT 2006
Dan Rossi schrieb:
> Sascha wrote:
>> about usermanagment and rights i thought i would wait untill the
>> security engine is build into red5
> is it planned ?
look the roadmap, ACEGI project should be build in as security engine in
version 0.6 or 0.7 i think,
may it offers an option for accessing due the webapp that would be fine,
may its possible to use it anyway also if its not made für using with
webapplications, it uses ZONES(afaik)
so that each application and also the server security run in a different
> This is a permissions based authentication framework for user based
> management right ? Thats a bit far stretched from the topic i think ?
yes it is because from my point of view any kind of IP based security
only make sense if the IP never changes
and the connection is a secured presistant anything else would be insecure,
but it also belongs to the security standarts u will provide and the
purposes u gona need it!
> Blocking hosts, or blocking all and allowing some isnt that what the
> topic is about ?
if thats the topic, i must say sorry but then its much to much overhead,
but as i mentioned later,
and that was also the context wherin the question is asked, there are
situations where this kind
of security will cause problems.
Annother issue is that you will have control of the host
which is connecting but not the person, if you just whant to sort out
which of the connected
clients should be allowed to view(have access) or not may your way is
the best accepting that there are issues
and that its not secure.
More information about the Red5