The DNS infrastructure is infamous for facilitating reflective amplification attacks. Various countermeasures such as server shielding, access control, rate limiting, and protocol restrictions have been implemented. Still, the threat remains throughout the deployment of DNS servers. In this paper, we report on and evaluate the often unnoticed threat that derives from transparent DNS forwarders, a widely deployed, incompletely functional set of DNS components. Transparent DNS forwarders transfer DNS requests without rebuilding packets with correct source addresses. As such, transparent forwarders feed DNS requests into (mainly powerful and anycasted) open recursive resolvers, which thereby can be misused to participate unwillingly in distributed reflective amplification attacks. We show how transparent forwarders raise severe threats to the Internet infrastructure. They easily circumvent rate limiting and achieve an additional, scalable impact via the DNS anycast infrastructure. We empirically verify this scaling behavior up to a factor of 14. Transparent forwarders can also assist in bypassing firewall rules that protect recursive resolvers, making these shielded infrastructure entities part of the global DNS attack surface.
翻译:DNS基础设施因助长反射放大攻击而声名狼藉。尽管已实施服务器屏蔽、访问控制、速率限制和协议限制等多种应对措施,但威胁在DNS服务器的整个部署过程中依然存在。本文报告并评估了源自透明DNS转发器这一常被忽视的威胁——透明DNS转发器是一类广泛部署但功能不完整的DNS组件。透明DNS转发器在传输DNS请求时,不会重建具有正确源地址的数据包。因此,透明转发器将DNS请求馈送至(主要为高性能且采用任播的)开放递归解析器,从而可能被滥用于非自愿地参与分布式反射放大攻击。我们展示了透明转发器如何对互联网基础设施构成严重威胁。它们轻易绕过速率限制,并通过DNS任播基础设施实现额外的、可扩展的攻击影响。我们通过实证验证了这种扩展行为最高可达14倍。透明转发器还能协助绕过保护递归解析器的防火墙规则,使这些受屏蔽的基础设施实体成为全球DNS攻击面的一部分。