The recently released (early july) advisory on the DNS exploits
discovered earlier this year have caused a bit of stir on the
BIND mailing lists, and rightly so.  Everybody on board with this one?  

CERT Bulletin:

http://www.kb.cert.org/vuls/id/800113

Dan Kiersky's own description, and web-based nameserver checker:

http://www.doxpara.com/

Alternate web-based nameserver checker (recommended by me! )

https://www.dns-oarc.net/oarc/services/dnsentropy

If your nameservers aren't updated, do so!  If your ISP's nameservers
aren't updated, hound them relentlessly until they are!  This is the
only way we can all protect the validity of our clients and our own
data.  

Reply via email to