Did you read the blog article?

FTA:

"During Dan’s testing he confirmed (and we later confirmed) that our DNS
implementation is not susceptible to the attack that was discovered. In
other words, if you used OpenDNS then you were already protected long before
this attack was even discovered.

In fact, for those of you who were listening in on the Microsoft press call
this morning, you’ll note that OpenDNS was suggested as the easy and simple
solution for anyone who can’t upgrade their DNS infrastructure today."

They said they'll follow up with details why that is the case.

 - Andy O. 
________________________________________
From: Michael Ross [mailto:[EMAIL PROTECTED] 
Sent: Thursday, July 10, 2008 12:51 PM
To: NT System Admin Issues
Subject: RE: Major DNS protocol issue effecting most implementations of DNS

Anyone was open to this attack as long as they used DNS as it as designed.
Ill requote from the original article.
"Earlier this year, professional security research Dan Kaminsky discovered a
major issue in how Internet addresses are managed (Domain Name System, or
DNS). This issue was in the design of DNS and not limited to any single
product."

-----Original Message-----
From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
Sent: Thursday, July 10, 2008 11:48 AM
To: NT System Admin Issues
Subject: Re: Major DNS protocol issue effecting most implementations of DNS
I meant to add: In the meantime, I would discontinue using them for
DNS.  Do it yourself or use OpenDNS.  OpenDNS was never vulnerable to
this attack vector:
   http://blog.opendns.com/2008/07/08/opendns-keeping-you-safe/
But, remember that this effects clients too.


~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to