Abstract
Maynard Koch, Florian Dolzmann, Thomas C. Schmidt, Matthias Wählisch,
Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks,
In: Proc. of ACM Conference on Computer and Communications Security (CCS), ACM : New York, 2025.
[BibTeX][Abstract]
Abstract: The DNS service infrastructure is infamous for facilitating reflective amplification attacks. Various countermeasures including server shielding, access control, rate limiting, and protocol restrictions have been implemented. Still, the threat remains throughout the deployment of DNS servers. In this paper, we report on and evaluate the widely unnoticed threat that derives from transparent DNS forwarders, a widely deployed incompletely functional set of DNS components. DNS transparent forwarders guide DNS requests non-recursively, i.e., without rebuilding packets with correct source addresses. As such, transparent forwarders feed arbitrary DNS requests into (mainly powerful and anycasted) open recursive resolvers, which in the case of misuse participate unwillingly in distributed reflective amplification attacks. We show that transparent forwarders raise severe threats to the Internet infrastructure. They easily circumvent rate limiting, and achieve an additional, scalable impact via the DNS anycast infrastructure, which we empirically verified up to a factor of 14. Transparent forwarders can also bridge access to shielded recursive resolvers, making these protected infrastructure entities part of the global DNS attack infrastructure.
Note: accepted for publication
Themes: Network Security , Network Management ,
This page generated by bibTOhtml on Mon Aug 25 12:05:03 AM UTC 2025