DNS Attacks Explained

Modern cyberattacks frequently target the Domain Name System (DNS). Understanding DNS attack techniques such as NXDOMAIN floods, DNS amplification and DNS tunneling is essential for protecting enterprise and ISP infrastructure.

Types of DNS Attacks #

Attack Target Goal
NXDOMAIN Flood Resolvers CPU exhaustion
Phantom Subdomain Authoritative servers Cache bypass
NXNSAttack Resolvers and authoritative Delegation explosion
DNS Amplification Victims Bandwidth exhaustion
DNS Tunneling Enterprise networks Data exfiltration
KeyTrap DNSSEC resolvers CPU exhaustion

The KEYTRAP DNSSEC Attack #

The KeyTrap vulnerability disclosed in 2024 demonstrated how DNSSEC validation itself can become a target for denial-of-service attacks. Unlike traditional DNS floods that rely on traffic volume, KeyTrap exploits the computational complexity of DNSSEC validation to exhaust resolver CPU resources.

When a DNSSEC-validating resolver receives a signed response, it must perform multiple cryptographic checks before accepting the answer. These include:

KeyTrap abuses this process by crafting DNSSEC responses containing many keys and signatures, forcing resolvers to attempt excessive validation paths. This creates a CPU amplification effect where a single small response can trigger disproportionate validation work.

KeyTrap DNSSEC attack workflow diagram illustrating how excessive DNSKEY and RRSIG validation can exhaust DNS resolver CPU resources

NSEC vs NSEC3 and the validation cost trade-off

DNSSEC must also prove when a domain does not exist. This is done using NSEC or NSEC3 records.

NSEC records list the next valid domain in a zone, allowing resolvers to verify non-existence efficiently. However, this design allows attackers to enumerate all domain names in a zone, a technique known as zone walking.

NSEC3 was introduced to prevent enumeration by hashing domain names instead of exposing them directly. While this improves privacy, it increases validation cost because resolvers must compute hashes and verify additional cryptographic proofs.

Because NSEC3 requires repeated hashing operations and additional validation steps, it can increase resolver workload and contribute to CPU exhaustion scenarios if abused.

Operational mitigation strategies

Modern DNS software including BIND, Unbound and PowerDNS has introduced protections against KeyTrap-style attacks by limiting validation workload per query. Recommended protections include:

For DNS operators, this attack highlights the importance of combining software updates, monitoring and defensive configuration practices when deploying DNSSEC validation at scale.

Why some DNS operators prefer NSEC over NSEC3

While NSEC3 was introduced to prevent DNSSEC zone enumeration, many large DNS operators intentionally choose NSEC instead of NSEC3 due to its significantly lower computational cost.

In large ISP or Protective DNS environments, resolver stability and performance are usually considered more important than preventing theoretical zone enumeration.

This is because:

For this reason, some operators deploy NSEC for performance-sensitive zones and reserve NSEC3 for cases where preventing enumeration is considered necessary.

This tradeoff highlights an important reality of DNSSEC operations: security features must always be balanced against operational risk and infrastructure capacity.

KeyTrap mitigation best practices for DNS operators

Mitigating DNSSEC validation attacks such as KeyTrap requires a combination of good cryptographic choices, careful DNSSEC policy design and proper resolver tuning. In operational environments such as ISPs and Protective DNS platforms, reducing unnecessary validation complexity is often the most effective defense.

The most important practical mitigation strategies include:

These practices significantly reduce the risk of CPU exhaustion attacks and improve overall resolver stability.

Example BIND 9.20+ DNSSEC configuration practices

The following configuration examples illustrate practical DNSSEC tuning techniques used in modern BIND deployments.

Use modern DNSSEC algorithms

Modern elliptic curve algorithms provide better performance and smaller signatures compared to RSA.



dnssec-policy "fast-dnssec" {

    keys {

        ksk lifetime P1Y algorithm ed25519;

        zsk lifetime P90D algorithm ed25519;

    };

};

Prefer NSEC instead of NSEC3 when possible

If zone enumeration is not a concern, operators may prefer NSEC to reduce validation cost.



dnssec-policy "nsec-policy" {

    keys {

        ksk lifetime P1Y algorithm ed25519;

        zsk lifetime P90D algorithm ed25519;

    };

    nsec3param none;

};

If using NSEC3, keep iterations low

High iteration counts increase CPU requirements without providing meaningful security benefits.



nsec3param 1 0 10 ABCDEF;

Many operators now use iteration values between 0 and 10 for performance reasons.

Resolver workload protection tuning

Limiting recursion depth and upstream fetches helps prevent excessive validation workload.



options {

    dnssec-validation yes;

    synth-from-dnssec yes;

    minimal-responses yes;

    max-recursion-depth 7;

    fetches-per-server 40;

    fetches-per-zone 75;

};

Enable DNSSEC aggressive negative caching

Aggressive use of DNSSEC-validated cache (RFC8198) allows resolvers to answer negative queries without repeated upstream validation.



synth-from-dnssec yes;

Together, these configuration practices help reduce DNSSEC validation cost and improve resilience against computational denial-of-service attacks such as KeyTrap.

NXDOMAIN Attack Variants #

NXDOMAIN DNS attack diagram

NXDOMAIN responses indicate domains that do not exist. Attackers exploit this behavior by generating massive amounts of random queries.

NXDOMAIN Attack Mitigation #

DNS DDoS Attack Variants #

DNS DDoS attack types

DNS DDoS Mitigation #

Recursive Resolution Exhaustion Attacks #

Not all DNS attacks rely on traffic volume. Some attacks attempt to exhaust resolver resources by forcing excessive recursive resolution work. During years of operating large recursive DNS infrastructures, operators may occasionally observe domains that trigger unusually deep resolution chains before eventually returning SERVFAIL. While isolated cases may simply be misconfigurations, repeated patterns can indicate intentionally crafted resolver exhaustion scenarios.

These situations typically involve domains delegated to nameservers located in other domains, which are in turn delegated again, sometimes across multiple levels:


domain1.tld   →   ns.domain2.tld
domain2.tld   →   ns.domain3.tld
domain3.tld   →   ns.domain4.tld
domain4.tld   →   ns.domain5.tld
domain5.tld   →   unreachable or broken

DNS resolver attack diagram illustrating recursive resolution exhaustion caused by malicious delegation chains leading to SERVFAIL conditions

Before a resolver can answer the original query, it must resolve the IP addresses of each nameserver in the chain. Each step may require additional A and AAAA lookups, glue validation, DNSSEC checks and timeout handling. If failures occur deep in the chain, the resolver may only return SERVFAIL after performing significant work.

Why this technique increases resolver workload

This technique increases the computational cost of answering a single query by forcing resolvers to perform multiple dependent lookups instead of a single resolution step.

This creates a form of resolution workload amplification where a single query may trigger dozens of internal resolver operations.

Operational indicators of suspicious delegation chains

Based on operational observations across large DNS environments, suspicious patterns may include:

While DNS misconfigurations are common on the Internet, repeated occurrences of these patterns combined with high query volumes may indicate intentional abuse.

Mitigation strategies

Resolvers can reduce the impact of recursive exhaustion techniques through defensive configuration and monitoring:

These protections help ensure resolver stability even when processing malicious or pathological DNS delegation structures.

DNS Tunneling #

DNS tunneling command and control diagram

DNS tunneling is a technique used by malware and post-exploitation tools to communicate with command-and-control (C2) infrastructure or exfiltrate data using DNS queries. Because DNS is almost always allowed through firewalls, attackers abuse it as a covert communication channel.

Instead of normal domain lookups, tunneling malware encodes data inside DNS queries, typically inside long subdomain labels:


encoded-data.attacker-domain.com

The authoritative server controlled by the attacker decodes the data and may respond with additional encoded instructions using DNS responses such as TXT records.

How DNS tunneling works

A typical DNS tunneling workflow involves:

Popular tunneling tools include iodine, dnscat2 and frameworks commonly used in incident response testing.

Operational indicators of DNS tunneling

DNS operators often detect tunneling activity through abnormal query characteristics rather than signature matching. Common indicators include:

In large recursive resolver environments, DNS tunneling often becomes visible as statistical anomalies before it is identified as malware activity.

DNS Tunneling Mitigation #

Because tunneling relies on domain resolution, Protective DNS provides an effective control point to detect and block these communications before connections are established.

Common mitigation techniques include:

In operational DNS environments, combining threat intelligence feeds with statistical anomaly detection is often the most effective way to detect tunneling activity early.

Example of suspicious DNS tunneling traffic

DNS tunneling activity often becomes visible when inspecting unusual DNS responses. For example, a TXT query to a suspicious domain may return encoded data instead of normal text records:


$ dig TXT data.attacker-domain.com

;; ANSWER SECTION:
data.attacker-domain.com. 60 IN TXT
"U29tZSBtYWx3YXJlIGNvbW1hbmQgYW5kIGNvbnRyb2wgZGF0YQ=="

This response contains what appears to be Base64 encoded data rather than legitimate TXT information such as SPF, DKIM or domain verification records. Decoding this value reveals structured data rather than human-readable configuration text:


$ echo U29tZSBtYWx3YXJlIGNvbW1hbmQgYW5kIGNvbnRyb2wgZGF0YQ== | base64 -d

Some malware command and control data

While not all encoded TXT records are malicious, repeated queries returning encoded payloads combined with abnormal query patterns may indicate DNS tunneling activity.

Other practical indicators operators monitor

These indicators are commonly used in Protective DNS environments to identify compromised hosts attempting covert communication.

Legitimate TXT records such as SPF typically contain structured policy text (for example v=spf1 include:spf.example.com -all), making encoded blobs easy to distinguish during investigation.

NXNSAttack (Delegation Explosion Attack) #

NXNSAttack is a DNS protocol abuse technique disclosed in 2020 that targets recursive resolvers by forcing them to perform excessive upstream queries through malicious delegation responses. Unlike traditional DNS floods that rely on traffic volume, NXNSAttack increases resolver workload by abusing how resolvers process NS referrals.

Instead of returning a small set of legitimate authoritative nameservers, an attacker-controlled zone returns a large number of NS records pointing to domains that require additional resolution:


victim-domain.tld   NS   ns1.attack-domain.tld
victim-domain.tld   NS   ns2.attack-domain.tld
victim-domain.tld   NS   ns3.attack-domain.tld
victim-domain.tld   NS   ns4.attack-domain.tld
...

Because the resolver must resolve the IP address of each nameserver before continuing resolution, this forces the resolver to generate many additional A and AAAA queries.

Why NXNSAttack has a very high impact

NXNSAttack is particularly effective because it creates a workload amplification effect inside the resolver. A single query may cause dozens or even hundreds of additional upstream resolution attempts.

This can transform a relatively small query stream into a large volume of recursive activity, consuming CPU, memory and network resources.

Why NXNSAttack is dangerous for large resolvers

Large ISP resolvers are particularly vulnerable because they process very high query volumes. Even a small percentage of NXNSAttack queries can significantly increase resolver workload.

In practice, operators may observe:

Because the attack exploits normal DNS protocol behavior, it can be difficult to distinguish from legitimate traffic without behavioral analysis.

Mitigation strategies

Modern DNS resolvers now include protections against NXNSAttack-style delegation abuse. Common mitigation techniques include:

Current versions of BIND, Unbound and PowerDNS include protections that significantly reduce the effectiveness of NXNSAttack when properly configured.

Practical example of an NXNSAttack scenario

A normal DNS resolution typically requires resolving only a small number of authoritative nameservers. For example:


example.com   NS   ns1.example.com
example.com   NS   ns2.example.com

The resolver only needs to resolve two nameserver addresses before obtaining an answer.

In an NXNSAttack scenario, an attacker-controlled domain may instead return a large number of delegated nameservers pointing to external domains:


malicious-domain.tld   NS   ns1.attacker-zone.tld
malicious-domain.tld   NS   ns2.attacker-zone.tld
malicious-domain.tld   NS   ns3.attacker-zone.tld
malicious-domain.tld   NS   ns4.attacker-zone.tld
malicious-domain.tld   NS   ns5.attacker-zone.tld
malicious-domain.tld   NS   ns6.attacker-zone.tld
...

If these nameservers do not include glue records, the resolver must resolve each hostname separately:


ns1.attacker-zone.tld   → requires A lookup
ns1.attacker-zone.tld   → requires AAAA lookup

ns2.attacker-zone.tld   → requires A lookup
ns2.attacker-zone.tld   → requires AAAA lookup

ns3.attacker-zone.tld   → requires A lookup
ns3.attacker-zone.tld   → requires AAAA lookup

...

This means that a single original query may trigger dozens of additional recursive queries before resolution can continue. If some of these nameservers are unreachable or intentionally slow, timeout handling and retry logic further increase resolver workload.

In practice, operators may observe that a small number of NXNSAttack domains can generate disproportionate upstream query traffic compared to normal domains.

Resolver vs Authoritative DNS Attacks #

Attack Resolver impact Authoritative impact
NXDOMAIN flood High Low
Phantom subdomain Medium High
NXNSAttack Very high Medium
Amplification Low Medium
Tunneling High None

Why DNS attacks matter for ISPs #

ISPs operate large recursive DNS infrastructures that are constant attack targets. Infected customer devices frequently generate malicious DNS traffic which can:

How DNS Firewalls stop DNS attacks #

DNS Firewall technology blocks threats before connections are established by enforcing policy decisions at the DNS layer.

Operational Best Practices for DNS Operators #

DNS operators can significantly reduce the impact of attacks by combining protocol hardening, monitoring and operational discipline. The following practices are commonly implemented in large ISP and enterprise DNS environments:

Resolver protection best practices

Authoritative DNS protection

Infrastructure protection

Monitoring and detection

Protective DNS operational benefits

Operators deploying Protective DNS commonly observe:

Common mistakes DNS operators should avoid

Real World Impact of DNS Attacks #

DNS attacks do not only affect infrastructure availability. They often translate into operational and financial impact.

Organizations deploying Protective DNS frequently observe measurable reductions in incident volume after blocking malware domains at the DNS layer.

Frequently Asked Questions #

What is a DNS attack?

A DNS attack targets DNS infrastructure to disrupt resolution or enable data exfiltration.

What DNS attacks affect ISPs most?

NXDOMAIN floods, tunneling and botnet C2 domains are the most common threats.

How does Protective DNS help?

Protective DNS blocks malicious domains before connections occur.

Request Information

captcha
Can't read it? Click refresh
Planisys 2026 © All rights reserved.