From mboxrd@z Thu Jan 1 00:00:00 1970 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "J-P. Rosen" Newsgroups: comp.lang.ada Subject: Re: Ada/GNAT/AWS-friendly web hosting Date: Thu, 12 Sep 2024 19:06:08 +0200 Organization: Adalog Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Thu, 12 Sep 2024 19:06:07 +0200 (CEST) Injection-Info: dont-email.me; posting-host="892e32e502bd4c76484f8e29e6e548c5"; logging-data="362828"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19HyxnSopnKrK4cLNjb5XuY" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:eu+8lyvLP86m92vO0Mjy7IyyBEA= Content-Language: en-US, fr In-Reply-To: Xref: news.eternal-september.org comp.lang.ada:66348 List-Id: Le 12/09/2024 à 16:54, DrPi a écrit : > The usual way is to use Apache (or nginx or another one) as a front end. > Your application uses port 1080 (or something else) and the front end > relays this port to the external 80 port. > This way, the security stuff is manage by the front end, not your > application. You can also run multiple applications, each being > redirected to its domain name/path. But security breaches mainly use known bugs in Apache... If you write your own server with AWS, the attacker knows nothing about the software that answers! And as for buffer overflows attacks... well, it's Ada. You'll see some handled Constraint_Error in the log file, end of story! -- J-P. Rosen Adalog 2 rue du Docteur Lombard, 92441 Issy-les-Moulineaux CEDEX https://www.adalog.fr https://www.adacontrol.fr