Deutsch   English   Français   Italiano  
<vbv71v$b2ac$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "J-P. Rosen" <rosen@adalog.fr>
Newsgroups: comp.lang.ada
Subject: Re: Ada/GNAT/AWS-friendly web hosting
Date: Thu, 12 Sep 2024 19:06:08 +0200
Organization: Adalog
Lines: 17
Message-ID: <vbv71v$b2ac$1@dont-email.me>
References: <vbutl5$8a99$5@dont-email.me> <vbuvbl$nsk$1@rasp.pasdenom.info>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 12 Sep 2024 19:06:07 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="892e32e502bd4c76484f8e29e6e548c5";
	logging-data="362828"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19HyxnSopnKrK4cLNjb5XuY"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:eu+8lyvLP86m92vO0Mjy7IyyBEA=
Content-Language: en-US, fr
In-Reply-To: <vbuvbl$nsk$1@rasp.pasdenom.info>
Bytes: 1830

Le 12/09/2024 à 16:54, DrPi a écrit :
> The usual way is to use Apache (or nginx or another one) as a front end. 
> Your application uses port 1080 (or something else) and the front end 
> relays this port to the external 80 port.
> This way, the security stuff is manage by the front end, not your 
> application. You can also run multiple applications, each being 
> redirected to its domain name/path.
But security breaches mainly use known bugs in Apache... If you write 
your own server with AWS, the attacker knows nothing about the software 
that answers! And as for buffer overflows attacks... well, it's Ada. 
You'll see some handled Constraint_Error in the log file, end of story!

-- 
J-P. Rosen
Adalog
2 rue du Docteur Lombard, 92441 Issy-les-Moulineaux CEDEX
https://www.adalog.fr https://www.adacontrol.fr