Welcome to WebmasterWorld Guest from 188.8.131.52
Due to the distributed nature of the DNS, no one organization can implement a fix for this vulnerability. It requires the cooperation of all name server operators and DNS software vendors. However, ICANN sees an important goal in spreading awareness of the need to update Internet infrastructure to cope with the threat. The organization has been undertaking significant outreach efforts to top-level domain operators to advise them on the issue. It has also prepared an FAQ and online domain testing tool to raise awareness of the problem, and to encourage network operators to rectify or update their servers.
For domain operators, here's their tool to detect is a xone is vulnerable.
For most users it is important to ensure the DNS servers their computer uses to look up domains has been patched to enable "source port randomization". To check if this change has been made by your Internet provider one can go to an online testing tool provided by the DNS Operations, Analysis and Research Center at: