Many local companies make use of their ISP for DNS, or forward their
DNS queries for non-internal names to their ISP's DNS servers. So it
is not enough to have your DNS server patched, but also your ISP's DNS
server if you rely on that.
Here's two local service providers that did not patch their DNS
servers:
* Kemmunet (tested manually for a client on 10th August)
* Nextgen / nextweb / euroweb
I'm sure that there are more.
Apart from doxpara's test, I recommend the following site because its
quite visual and everyone likes nice colors :-)
https://www.dns-oarc.net/oarc/services/dnsentropy
If anyone tests their ISP please post over here.
As a sitenote: I tried to get my ISP to patch when it first came out
and spoke to their sysadmin face to face. Of course nothing happened
up till today.
Sandro -
enablesecurity.com
On Sep 1, 12:42 pm, Donald Tabone <
dtab...@gmail.com> wrote:
> I imagine by now most of you have heard of the DNS vulnerability Dan
> Kaminsky came out with.
>
> < if you administer DNS servers and haven't, I strongly recommend you
> take a look athttp://
doxpara.com>