Why open-source DNS is 'internet's dirty little secret'
Sep 23, 2009, 14:03 (9 Talkback[s])
(Other stories by Toby Wolpe)
Full Text Search: The Key to Better Natural Language Queries for NoSQL in Node.js
"Are you talking about open-source software?
Correct. So, whether it's Eircom in Ireland or a Brazilian ISP that
was attacked earlier this year, all of them were using some variant
of freeware. Freeware is not akin to malware, but is opening up
those customers to problems. So we've seen the majority of the
world's top ISPs migrating away from freeware to a solution that is
carrier-grade, commercial-grade and secure.
"What characterises that open-source, freeware legacy DNS that
you think makes it weaker? Number one is in terms of security
controls. If I have a secret way of blocking a hacker from
attacking my software, if it's freeware or open source, the hacker
can look at the code.
"By virtue of something being open source, it has to be open to
everybody to look into. I can't keep secrets in there. But if I
have a commercial-grade software product, then all of that is
closed off, and so things are not visible to the hacker."
Good FUD never dies. If only this were good FUD.--
- Tweaking dhcp client configuration to change the default DNS servers to Open DNS(Aug 20, 2009)
- Open-source Project Aims to Makes Secure DNS Easier(Jul 31, 2009)
- BIND 9 DNS under attack - time to update(Jul 29, 2009)
- Setting up a dynamic DNS service part 2: dhcpd(Jul 22, 2009)
- Setting up a dynamic DNS service part 1: named(Jul 15, 2009)
- BIND 10 Set to Update DNS(Jun 13, 2009)
- Installing MyDNS & MyDNSConfig 3 On Fedora 10(May 31, 2009)
- BIND 10 starts development(Apr 24, 2009)
- Installing MyDNS-NG & MyDNSConfig 3 On Debian Lenny(Apr 10, 2009)
- Web Content Filtering with OpenDNS(Mar 03, 2009)