<div dir="ltr"><span style="font-size:10pt;font-family:Tahoma,sans-serif;color:black">PS: <a href="http://blogs.technet.com/b/networking/archive/2014/12/15/handling-endless-delegation-chains-in-windows-dns-server.aspx">http://blogs.technet.com/b/networking/archive/2014/12/15/handling-endless-delegation-chains-in-windows-dns-server.aspx</a></span><br><div><br></div><div>Our DNS Rockstar Kumar Ashutosh just wrote blog if anyone is interested in more details.</div><div><br></div><div>Mehmet</div><div class="gmail_extra"><br><div class="gmail_quote">On Sun, Dec 14, 2014 at 8:57 PM, Mehmet Akcin <span dir="ltr"><<a href="mailto:mehmet@akcin.net" target="_blank">mehmet@akcin.net</a>></span> wrote:<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><span class=""><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Haven't heard about Microsoft's recursor yet.<br></blockquote><div><br></div></span><div>Microsoft Windows DNS is not affected with infinite-loop vulnerability.</div><span class="HOEnZb"><font color="#888888"><div><br></div><div>Mehmet </div></font></span></div></div></div>
</blockquote></div></div></div>