Yes, we have seen that article - several other Simple DNS Plus users have asked about this.
Unfortunately the article is somewhat misleading.
There is NO threat to any users of older DNS servers, nor to users of DNS servers that do not have DNSSEC resolving configured and turned on.
The article claims that 'the domain name system switches over to a new, more secure protocol' (referring to DNSSEC).
DNSSEC is NOT a new protocol - it is just an extension to the existing DNS protocol.
There is no 'switch' - just a new feature being enabled - which is fully backwards compatible.
Yes, the Internet DNS root servers are now implementing DNSSEC hosting (returning signed DNS records).
But this has NO effect on clients and DNS servers unless DNSSEC is also enabled locally.
If your DNS servers don't specifically request DNSSEC signature records (by setting a 'DNSSEC OK' flag in the request), then DNSSEC data will not be returned.
In fact, unless DNSSEC signatures are specifically requested, data packets from the root server will look exactly as they always have.
The problem that this article refers to is that some older firewalls will drop DNS UDP packets larger than 512 bytes.
This is an old problem related to 'EDNS0' which is often seen for example on Cisco PIX routers/firewalls.
DNSSEC does use 'EDNS0' and DNS packets with DNSSEC do tend to be large and often +512 bytes.
But again, unless your DNS server supports DNSSEC resolving and has this configured and turned on, the root servers will NOT return DNSSEC data, and therefore return packets will NOT be larger than before.
The only situation in which this may potentially cause problems is if you have a DNS server which supports DNSSEC resolving and this is configured and turned on.
But then, if you have a firewall with this problem, you would likely have encountered a lot of DNS resolving problems already since many DNS servers out there already implement DNSSEC hosting (has been in Simple DNS Plus v. 5.2 since April 2009).
Sincerely,
Jesper
JH Software
http://forum.simpledns.com/default.aspx?g=posts&m=1091