Le 07/10/2011 13:37, Fábio Costa a écrit : > I will test habor in the next week. > Gilles icecast do a global authentication for several user names in the > KH branch ,in the original, or neither? >
You can use a URL or a htpasswd file for auth purposes on Icecast 2.3.x : http://icecast.org/docs/icecast-2.3.2/icecast2_listenerauth.html And now, with icecast-kh (http://www.xiphicecast.webspace.virginmedia.com/) you can use wildcards for mount names in the configuration, meaning you can do something like <mount-name>/radio-*</mount-name> and have a generic auth setup there. I never stress tested it, but KH usually does things right ;) If you don't want to use the KH branch, you can also dynamically generate the XML for your new mounts, and SIGHUP, but that's certainly not as funny. Cheers, Gilou > Thanks to everybody for all the feedback. > > Em 7 de outubro de 2011 08:11, Romain Beauxis <[email protected] > <mailto:[email protected]>> escreveu: > > 2011/10/7 Fábio Costa <[email protected] > <mailto:[email protected]>>: > > Will try both, you think that output habor can handle the workload? > > Well, I wouldn't mind having some real testing about this.. It > _should_ .. :-) > > Romain > > > Em 6 de outubro de 2011 20:18, Romain Beauxis > <[email protected] <mailto:[email protected]>> > > escreveu: > >> > >> Despite the fact that I cooked up output.harbor, I would say > that the > >> KH branch is probably the safest option. > >> > >> However, if you dare to try output.harbor, I'll be very happy to > have > >> feedback and fix what needs to be fixed :-) > >> > >> Romain > >> > >> 2011/10/6 Fábio Costa <[email protected] > <mailto:[email protected]>>: > >> > will take a look. > >> > Thanks > >> > > >> > Em 6 de outubro de 2011 16:53, Brandon Casci > <[email protected] <mailto:[email protected]>> > >> > escreveu: > >> >> > >> >> I would give this a try with the KH branch, it may not work > but K,arl, > >> >> the > >> >> maintainer of that branch, has a put a lot of work into boosting > >> >> performance > >> >> and increasing the amounts of things that can be changed on > the fly and > >> >> applied via a SIGHUP > >> >> > >> >> 2011/10/6 Fábio Costa <[email protected] > <mailto:[email protected]>> > >> >>> > >> >>> I need to authenticate any mount point by an external > application i > >> >>> saw > >> >>> that i can do that with icecast but i have to change the > config by > >> >>> hand for > >> >>> each mount point.Since i would dynamically create > mountpiunts that is > >> >>> not an > >> >>> option. > >> >>> > >> >>> > >> >>> Em 6 de outubro de 2011 16:42, Brandon Casci > <[email protected] <mailto:[email protected]>> > >> >>> escreveu: > >> >>>> > >> >>>> What do you mean by dynamic authentication? Being able to > >> >>>> authenticate > >> >>>> against a username/password against any source? If so, use > you can do > >> >>>> that > >> >>>> with Icecast. You may need to use the KH branch of Icecast > to catch > >> >>>> bug > >> >>>> fixes, but briefly, you can a mount authenticate > connections against > >> >>>> an > >> >>>> external script. > >> >>>> > >> >>>> 2011/10/6 Fábio Costa <[email protected] > <mailto:[email protected]>> > >> >>>>> > >> >>>>> Hi all. > >> >>>>> I found myself in the need of dynamic authentication and > icecast > >> >>>>> doesn't support it. > >> >>>>> I'm considering making it in the network with samba but > would rather > >> >>>>> use an alternative to icecast, does anyone have a good > alternative > >> >>>>> to > >> >>>>> icecast with dynamic authentication to dynamic mountpoints? > >> >>>>> > >> >>>>> > >> >>>>> > >> >>>>> > > ------------------------------------------------------------------------------ > >> >>>>> All the data continuously generated in your IT infrastructure > >> >>>>> contains > >> >>>>> a > >> >>>>> definitive record of customers, application performance, > security > >> >>>>> threats, fraudulent activity and more. Splunk takes this > data and > >> >>>>> makes > >> >>>>> sense of it. Business sense. IT sense. Common sense. > >> >>>>> http://p.sf.net/sfu/splunk-d2dcopy1 > >> >>>>> _______________________________________________ > >> >>>>> Savonet-users mailing list > >> >>>>> [email protected] > <mailto:[email protected]> > >> >>>>> https://lists.sourceforge.net/lists/listinfo/savonet-users > >> >>>>> > >> >>>> > >> >>>> > >> >>>> > >> >>>> -- > >> >>>> ========================================= > >> >>>> Brandon Casci > >> >>>> Loudcaster > >> >>>> http://loudcaster.com > >> >>>> ========================================= > >> >>> > >> >> > >> >> > >> >> > >> >> -- > >> >> ========================================= > >> >> Brandon Casci > >> >> Loudcaster > >> >> http://loudcaster.com > >> >> ========================================= > >> > > >> > > >> > > >> > > > ------------------------------------------------------------------------------ > >> > All the data continuously generated in your IT infrastructure > contains a > >> > definitive record of customers, application performance, security > >> > threats, fraudulent activity and more. Splunk takes this data > and makes > >> > sense of it. Business sense. IT sense. Common sense. > >> > http://p.sf.net/sfu/splunk-d2dcopy1 > >> > _______________________________________________ > >> > Savonet-users mailing list > >> > [email protected] > <mailto:[email protected]> > >> > https://lists.sourceforge.net/lists/listinfo/savonet-users > >> > > >> > > > > > > > ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2 _______________________________________________ Savonet-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/savonet-users
