Over the past year DNS Amplification attacks have been worse, even to the point that the US-CERT (http://www.us-cert.gov/ncas/alerts/TA13-088A) issued a warning last month. With Linux and Unix BIND DNS Server installs a simple config change can take care of this issue however, in Microsoft’s implementation of the DNS server there is a lack of this basic functionality.
This problem is two fold on Windows if you are also using the recursive DNS servers internally for your DNS forwarders. If you are then the first step is standing up a couple of basic forwarding DNS servers. For an additional level of security I would also suggest deployment with conditional forwarders for domains which you are the root DNS server for to reduce the possibility spoofing (if not using DNSSEC), enhance internal DNS performance, and allow for internal DNS resolution to work in the event your WAN link goes down.
The second step is the actual removal of recursion on your existing DNS servers which the below step by step instructions will take of.
Load up DNS Management, right click on your DNS server and select properties.
Select the “Advanced” tab and check the box to “Disable recursion (also disables forwarders)”
Select “Apply”, then “OK”, and finally close out of the DNS management utility.
At this point we need to stop the DNS server service temporary via “net stop dns”
Now pull up Windows Explorer and navigate to %systemroot%\system32\dns, in this folder you’ll find something called “cache.dns”. This file contains the list of root-forwarders which are always active even though recursion is disabled…. anyway, rename this file to something like cache.dns.bak
Lastly start the DNS server back up “net start dns”
At this point validate recursion is really disabled via nslookup.
On a client system pull up a command line and perform the following
nslookup server my_non_recursive_dns_server_ip www.google.com www.mydomain.org
The resolution for www.google.com should not return an IP address (unless your Google) and the address for www.mydomain.org should return an IP assuming the DNS entry is located within the zone file on the server.
With the above completed, you will no longer be a potential node in a DNS amplification attack.