Toru,
The problem with iptables is that is only protects based on a host/
port combination.
If I have a shared server with 400 people having their own hosted
directory in Apache, with iptables I can certainly restrict my
memcached instance to only accept connections from that server. But
On Oct 27, 8:04 pm, Toru Maesaka wrote:
> Makes sense considering the growing popularity of shared networks.
> However, here's my humble comment on this use-case... can't people
> just use iptables for protecting their memcached host/port in a shared
> network? or is this feature intended for p
Awesome! Thanks for clarifying things.
Makes sense considering the growing popularity of shared networks.
However, here's my humble comment on this use-case... can't people
just use iptables for protecting their memcached host/port in a shared
network? or is this feature intended for people that
On Oct 26, 9:35 am, Brian Aker wrote:
> I had someone ask me about this at the conference I am at currently.
> Are you all likely to release this soon?
Yes.
It's been through a few stages of review, has tests, and there has
been at least some client interop effort (I've got cyrus sasl2
Hi!
On Oct 27, 2009, at 12:09 AM, Dustin wrote:
As a bonus, the code already existed. We'd talked about it a long
time ago and I built some stuff that worked then, but just got around
to cleaning it up enough to go (you can see the commits are from early
I had someone ask me about this at t
On Oct 26, 1:33 am, Toru Maesaka wrote:
> From chasing the commit log and reading Trond's blog entry, I noticed
> that we're throwing in SASL support to memcached.
>
> I guess this is to make it friendlier to deploy memcached on an
> untrusted network (e.g. Amazon's EC2) but I wanted to hear wh
Hi folks!
>From chasing the commit log and reading Trond's blog entry, I noticed
that we're throwing in SASL support to memcached.
I guess this is to make it friendlier to deploy memcached on an
untrusted network (e.g. Amazon's EC2) but I wanted to hear what the
actual deciding factor was. You k