[33916] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Microsoft spokesperson blames ICANN

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Jan 25 02:41:42 2001

Message-Id: <200101250739.f0P7dHiI073322@black-ice.cc.vt.edu>
To: "Richard A. Steenbergen" <ras@e-gerbil.net>
Cc: nanog@merit.edu
In-reply-to: Your message of "Thu, 25 Jan 2001 02:17:04 EST."
             <Pine.BSF.4.21.0101250213520.38591-100000@overlord.e-gerbil.net> 
From: Valdis.Kletnieks@vt.edu
Date: Thu, 25 Jan 2001 02:39:17 -0500
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 25 Jan 2001 02:17:04 EST, "Richard A. Steenbergen" said:
> Security  
> 
> Managed DNS Service:
>    Built from the ground up to deliver secure and safe DNS service 
>    UltraDNS does not allow access to server source code 
> 
> BIND:
>    The SANS Institute reports that BIND is the #1 security vulnerability
>    for Internet servers 
> 
>    Hackers have access to source code 

Anybody want to make bets that if UltraDNS was anywhere near as popular
as BIND, that the source code would be available to hackers? ;)

Solaris, VMS, Microsoft, Bell System switches - the list goes on. If
it looks interesting enough, you WILL get hacked, and they WILL have
the source code.

				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech


home help back first fref pref prev next nref lref last post