Did you read the blog article? FTA:
"During Dans testing he confirmed (and we later confirmed) that our DNS implementation is not susceptible to the attack that was discovered. In other words, if you used OpenDNS then you were already protected long before this attack was even discovered. In fact, for those of you who were listening in on the Microsoft press call this morning, youll note that OpenDNS was suggested as the easy and simple solution for anyone who cant upgrade their DNS infrastructure today." They said they'll follow up with details why that is the case. - Andy O. ________________________________________ From: Michael Ross [mailto:[EMAIL PROTECTED] Sent: Thursday, July 10, 2008 12:51 PM To: NT System Admin Issues Subject: RE: Major DNS protocol issue effecting most implementations of DNS Anyone was open to this attack as long as they used DNS as it as designed. Ill requote from the original article. "Earlier this year, professional security research Dan Kaminsky discovered a major issue in how Internet addresses are managed (Domain Name System, or DNS). This issue was in the design of DNS and not limited to any single product." -----Original Message----- From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED] Sent: Thursday, July 10, 2008 11:48 AM To: NT System Admin Issues Subject: Re: Major DNS protocol issue effecting most implementations of DNS I meant to add: In the meantime, I would discontinue using them for DNS. Do it yourself or use OpenDNS. OpenDNS was never vulnerable to this attack vector: http://blog.opendns.com/2008/07/08/opendns-keeping-you-safe/ But, remember that this effects clients too. ~ Upgrade to Next Generation Antispam/Antivirus with Ninja! ~ ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm> ~
