Welfare agency Centrelink was one extremely large Australian organisation that didn't appear today to be worried about the problem, with a spokesperson for the agency saying it was not exposed to the flaw. "The Centrelink gateway uses a DNS product called djbdns, which is not vulnerable to the current DNS poisoning exploit," the spokesperson told ZDNet.com.au today.
("Aussies play down DNS disaster," 23 July 2008)
Note 1: This server scan avoids the unreliable "CH TXT" option to fpdns. Note 2: The scan is still in progress, and so far has identified servers for 50.8 million .com names; presumably more djbdns-hosted names, PowerDNS-hosted names, etc. will be discovered as the scan continues. Note 3: The Measurement Factory recently reported that there are "182 million .com ... domains"; that is a misunderstanding of the 182 million NS records in .com, and unfortunately has produced some skew in the Measurement Factory data.
Security
The dnscache program
The tinydns, walldns, and rbldns programs
The dns library
Ease of use: BIND versus djbdns
BIND, the Buggy Internet Name Daemon
How the BIND company makes money