DNS Amplification in the Dutch Digital Landscape
For the Hacking Lab course at TU Delft, my team and I investigated the DNS amplification potential of roughly 1800 domain names owned by the Dutch government. Inspired by the 2021 paper "ANYway: measuring the amplification DDoS potential of domains" by van der Toorn et al., we queried the authoritative nameservers for each domain using both ANY and TXT record types to measure how much a small DNS request could be amplified into a large response directed at a victim.
Our findings showed that Dutch government nameservers could amplify DNS requests by up to 70x. The worst offenders for ANY queries were predominantly hosted by Akamai, while the bottom of the list was dominated by AWS servers that truncate or force TCP for ANY requests. Interestingly, the worst offenders for TXT and ANY queries did not correlate, indicating that TXT amplification is driven by leftover verification records rather than server configuration.
We also built a proof of concept attack tool in Go using the GoPacket library to simulate an amplification attack in a containerized environment. Using all government domains, the simulation achieved 11x amplification (147 MB/s). When cherry-picking the 50 domains with the largest responses, this jumped to 49x amplification (644 MB/s), showing that an attacker’s choice of domains dramatically affects attack potency.
Our main recommendations were to implement RFC8482 to block ANY requests over UDP (reducing maximum amplification from ~70x to ~12x), clean up unnecessary TXT records, and introduce rate limiting on nameservers.
The full paper and code are available on GitHub.