From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,3339c21cad84e30c X-Google-Attributes: gid103376,public X-Google-ArrivalTime: 2001-02-08 12:35:45 PST Path: supernews.google.com!sn-xit-02!supernews.com!news.tele.dk!193.174.75.178!news-fra1.dfn.de!news-koe1.dfn.de!news-han1.dfn.de!news.fh-hannover.de!news.cid.net!news.enyo.de!news1.enyo.de!not-for-mail From: Florian Weimer Newsgroups: comp.lang.ada Subject: Re: BIND is Crying Out for Ada95 Date: 08 Feb 2001 21:35:10 +0100 Organization: Enyo's not your organization Message-ID: <87u264ap6p.fsf@deneb.enyo.de> References: <3A82D822.E93A2152@home.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Xref: supernews.google.com comp.lang.ada:5023 Date: 2001-02-08T21:35:10+01:00 List-Id: "Warren W. Gay VE3WWG" writes: > If someone has the time, here is a perfect chance to put Ada95 > into the forefront, with a well written Ada95 version of BIND, > with fewer weekly exploits. It provides an essential service > for just about ALL networked systems today (what an opportunity ;-) Ada wouldn't help here. Even if your DNS name server is more reliable, DNS will still be subject to all kinds of attacks, because not only BIND is insecure, the DNS protocol is inadequate, too.