The DNS infrastructure is infamous for facilitating reflective amplification attacks. Various countermeasures such as server shielding, access control, rate limiting, and protocol restrictions have been implemented. Still, the threat remains throughout the deployment of DNS servers. In this paper, we report on and evaluate the often unnoticed threat that derives from transparent DNS forwarders, a widely deployed, incompletely functional set of DNS components. Transparent DNS forwarders transfer DNS requests without rebuilding packets with correct source addresses. As such, transparent forwarders feed DNS requests into (mainly powerful and anycasted) open recursive resolvers, which thereby can be misused to participate unwillingly in distributed reflective amplification attacks. We show how transparent forwarders raise severe threats to the Internet infrastructure. They easily circumvent rate limiting and achieve an additional, scalable impact via the DNS anycast infrastructure. We empirically verify this scaling behavior up to a factor of 14. Transparent forwarders can also assist in bypassing firewall rules that protect recursive resolvers, making these shielded infrastructure entities part of the global DNS attack surface.
翻译:DNS基础设施因助长反射放大攻击而声名狼藉。尽管已实施服务器屏蔽、访问控制、速率限制和协议限制等多种对策,但DNS服务器部署中仍普遍存在该威胁。本文报告并评估了一种常被忽视的威胁,其源于透明DNS转发器——一类广泛部署但功能不完整的DNS组件。透明DNS转发器在不重建具有正确源地址数据包的情况下转发DNS请求。因此,透明转发器将DNS请求馈入(主要是高性能且采用任播的)开放递归解析器,从而可能被滥用于非自愿地参与分布式反射放大攻击。我们展示了透明转发器如何对互联网基础设施构成严重威胁。它们轻易绕过速率限制,并通过DNS任播基础设施实现额外的可扩展影响。我们通过实验验证了这种扩展行为最高可达14倍。透明转发器还能协助绕过保护递归解析器的防火墙规则,使这些受屏蔽的基础设施实体成为全球DNS攻击面的一部分。