From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,3339c21cad84e30c,start X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2001-02-08 09:33:29 PST Path: supernews.google.com!sn-xit-02!sn-xit-04!supernews.com!xfer13.netnews.com!netnews.com!news.maxwell.syr.edu!east1.newsfeed.sprint-canada.net!news.storm.ca!nnrp1.tor.metronet.ca!not-for-mail Message-ID: <3A82D822.E93A2152@home.com> From: "Warren W. Gay VE3WWG" X-Mailer: Mozilla 4.75 [en] (Windows NT 5.0; U) X-Accept-Language: en MIME-Version: 1.0 Newsgroups: comp.lang.ada Subject: BIND is Crying Out for Ada95 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Date: Thu, 08 Feb 2001 17:33:28 GMT NNTP-Posting-Host: 198.96.47.195 NNTP-Posting-Date: Thu, 08 Feb 2001 10:33:28 MDT Organization: MetroNet Communications Group Inc. Xref: supernews.google.com comp.lang.ada:5006 Date: 2001-02-08T17:33:28+00:00 List-Id: If someone has the time, here is a perfect chance to put Ada95 into the forefront, with a well written Ada95 version of BIND, with fewer weekly exploits. It provides an essential service for just about ALL networked systems today (what an opportunity ;-) I would take this on myself, but I already have an Ada95 project that I am trying to finish.. see text/href below: Excerpted from http://lwn.net re BIND vulnerabilities: ... The Berkeley Internet Name Domain (BIND) server is one of the classic free software success stories. It is free software, and plays a crucial role in the operation of the Internet. It runs almost every DNS server on the planet; its "market share" makes Sendmail and Apache look like bit players. And therein lies the problem. When a security problem turns up in BIND, the entire net is immediately vulnerable. In this respect, the net is a monoculture. Imagine the damage that could be done by a malign individual who is able to find and exploit a new BIND bug. Given that (1) BIND bugs seem to turn up regularly, and (2) BIND 9 contains a large amount of new code, this scenario is a real possibility. The fact that ISC plans to create a closed forum for the discussion of BIND security issues does not add confidence in this area. Full text at this week's http://lwn.net front page. -- Warren W. Gay VE3WWG http://members.home.net/ve3wwg