Ah, but a major point here. It *IS* easy to tell which implementations of DNS are running on servers. That’s the point. Identifiable Name Servers that haven’t been patched(Exploitable) versus those that have already been patched(NON-Exploitable).
bruinbirdman, You can tell if you’re ISPs DNS server(s) have been patched or not by using the tool on doxpara.com.
bruinbirdman,
You haven’t given enough information about your problem for most people to day anything other than shoot in the dark.
Another sidenote. The backdrop to the DNS flaw from early July culminating in the coup-de-gras with proof of exploit, etc., yesterday at the Vegas convention has been utterly fascinating(at least to me). Stuff that could make a geek-worthy thriller movie. For a quick preview, read as many of the articles you can find on cuil.com or google search “DNS Flaw” from July-now. Focus on most of the security-related sites.
Yep, all true.
I patched my company's nameservers over a week ago (had to wait for the NetBSD pkgsrc to catch up, but they did...) and then discovered that our upstream ISP's were only half-patched... so I switched over our NS forwarders (named.conf) so that we were using the patches ones preferentially.
My home ISPs (Frontier DSL and TW RoadRunner) were both patched immediately as far as I can tell.