I also have Cox as my Internet provider, but use OpenDNS, which checks
out as OK using Doxpara.com. Apparently, they've done their homework.
Chalk up another one up for open source.
Richard P.
Larry wrote:
But according to this article on the Washington Post's website, even
applying the patch won't, in and of itself, protect you from the
undocumented feature in DNS.
http://blog.washingtonpost.com/securityfix/2008/07/patch_the_entire_inte
rnet_tues_1.html
"The updates Microsoft released Tuesday fix the problem in computers
powered by its Windows operating system. But Kaminsky said the larger
issue lies at the Internet service provider and corporate level, as many
businesses who run DNS servers have yet to update their systems to guard
against the vulnerability.
In fact, even regular home users who apply the Microsoft updates could
still be vulnerable if their ISP hasn't yet addressed the problem.
(Kaminsky has a tool up his Web site - http://www.doxpara.com - that
allows visitors to tell if their ISP or employer is vulnerable to the
flaw. Visiting that site from my home PC indicates that my provider --
Cox Communications -- in Northern Virginia has not yet fixed this flaw
on their end.)
Kaminsky said while end users should be concerned about this flaw, they
shouldn't panic, and there is no evidence to date that hackers have
figured out how to exploit the DNS vulnerability."
*************************************************************************
** List info, subscription management, list rules, archives, privacy **
** policy, calmness, a member map, and more at http://www.cguys.org/ **
*************************************************************************