the last days some teams in #antisec are 'leaking' Dns information about big sites and present it - or it is presented as - hacked, leaked or poisoned
first, there is nothing as important for a network as Dns. If your Dns is not maintained than it will lead to internal problems and external securityproblems. In the worst case you can even get blacklisted because you are used by a botnet to refer to other websites or to hide.
secondly, even if Dnssec has some small technical problems (and there are commercial solutions that do the same thing or evern better than Bind) for important networks it is the best solution to respond to this and a number of other securityproblems. Meanwhile even if you didn't upgrade to dnssec, you should have installed all the bindpatches.
thirdly, it is very amazing, but everything may be wrong with your Dns but nobody will be able to tell you about it because you have no (real or good) emailaddress mentioned or you haven't activated the mailfunction on your dns service
fourth, you are probably watching all kinds of traffic, but not the dns traffic. Who watches dns traffic, that is only the same stuff every time, address asking for hostname and dns server etc.... THis is right, but if you filter the normal traffic, you can sometimes not only see attacks and probing of your dns server but in the worst case, extraction of internal (secret) information over dns (port 53). Offcourse you should have enough power and space to log that without bringing down your network, installation or monitor tools
and if you aren't looking, how would you see if Anonymous is probing or attacking your dns servers
fifth don't try to be the internet. It is amazing how many dns servers still try to resolve every IP address on the internet into a domainname. THe internet is much too big for you and you should be sure that your dns servers sends the requests to the right dns server for the domain and be sure that you are correct and available for your own domain. That is already a whole lot to do. some say it is to be faster and so on, but there are specific methods to do that without becoming an authoritative dns server for other domains.
so what do those postings - and articles mean
For the moment not much - correct me if I am wrong
You see the IP adresses and names of the dns servers of very important servers
You see (mostly failed) tests to transfer the root zone (control) over the domains
You see (mostly failed) tests to poison a cache by sending for example someone who types in Google to a Porn site
but if you see this as a learning process, you will understand that some kids getting bored with dumping 4 million accounts on the internet the last year are looking to do other things and are in the learning process
and just as they have begun with some small stuff and sites, is it not important what they are doing now but what they can be doing later this year
this means that you have maybe some time but not sure how much
because hacking, ddossing or redirecting a Dns server is much more interesting than some stupid server or router because you can influence so much more what is happening - creating mayhem for the lulz
so it could be dangerously wrong just to write it off for the moment (attacks against dns infrastructure are happening every day even if it isn't in the press)