[33916] in North American Network Operators' Group
Re: Microsoft spokesperson blames ICANN
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Jan 25 02:41:42 2001
Message-Id: <200101250739.f0P7dHiI073322@black-ice.cc.vt.edu>
To: "Richard A. Steenbergen" <ras@e-gerbil.net>
Cc: nanog@merit.edu
In-reply-to: Your message of "Thu, 25 Jan 2001 02:17:04 EST."
<Pine.BSF.4.21.0101250213520.38591-100000@overlord.e-gerbil.net>
From: Valdis.Kletnieks@vt.edu
Date: Thu, 25 Jan 2001 02:39:17 -0500
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, 25 Jan 2001 02:17:04 EST, "Richard A. Steenbergen" said:
> Security
>
> Managed DNS Service:
> Built from the ground up to deliver secure and safe DNS service
> UltraDNS does not allow access to server source code
>
> BIND:
> The SANS Institute reports that BIND is the #1 security vulnerability
> for Internet servers
>
> Hackers have access to source code
Anybody want to make bets that if UltraDNS was anywhere near as popular
as BIND, that the source code would be available to hackers? ;)
Solaris, VMS, Microsoft, Bell System switches - the list goes on. If
it looks interesting enough, you WILL get hacked, and they WILL have
the source code.
Valdis Kletnieks
Operating Systems Analyst
Virginia Tech