Verlagslink DOI: 10.1145/3719027.3765096
Titel: Forward to hell? On the potentials of misusing transparent DNS forwarders in reflective amplification attacks
Sprache: Englisch
Autorenschaft: Koch, Maynard 
Dolzmann, Florian 
Schmidt, Thomas C.  
Wählisch, Matthias 
Herausgeber*In: Tu, Guan-Hua 
Tan, Zhaowei 
Schlagwörter: DNS Security; DNS Transparent Forwarders; DDoS
Erscheinungsdatum: 22-Nov-2025
Verlag: Association for Computing Machinery
Teil der Schriftenreihe: Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security 
Anfangsseite: 3915
Endseite: 3929
Konferenz: ACM SIGSAC Conference on Computer and Communications Security 2025 
Zusammenfassung: 
The DNS service infrastructure is infamous for facilitating reflective amplification attacks. Various countermeasures including server shielding, access control, rate limiting, and protocol restrictions have been implemented. Still, the threat remains throughout the deployment of DNS servers. In this paper, we report on and evaluate the widely unnoticed threat that derives from transparent DNS forwarders, a widely deployed incompletely functional set of DNS components. DNS transparent forwarders guide DNS requests non-recursively, i.e., without rebuilding packets with correct source addresses. As such, transparent forwarders feed arbitrary DNS requests into (mainly powerful and anycasted) open recursive resolvers, which in the case of misuse participate unwillingly in distributed reflective amplification attacks. We show that transparent forwarders raise severe threats to the Internet infrastructure. They easily circumvent rate limiting, and achieve an additional, scalable impact via the DNS anycast infrastructure, which we empirically verified up to a factor of 14. Transparent forwarders can also bridge access to shielded recursive resolvers, making these protected infrastructure entities part of the global DNS attack infrastructure.
URI: https://hdl.handle.net/20.500.12738/19093
ISBN: 979-8-4007-1525-9
Begutachtungsstatus: Diese Version hat ein Peer-Review-Verfahren durchlaufen (Peer Review)
Einrichtung: Fakultät Informatik und Digitale Gesellschaft 
Dokumenttyp: Konferenzveröffentlichung
Enthalten in den Sammlungen:Publications without full text

Zur Langanzeige

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Diese Ressource wurde unter folgender Copyright-Bestimmung veröffentlicht: Lizenz von Creative Commons Creative Commons