| Internet-Draft | Avoid Large Records with a Wildcard Owne | January 2026 |
| Zuo, et al. | Expires 9 July 2026 | [Page] |
As DNS hosting becomes increasingly centralized, with multiple zones hosted on shared authoritative name servers, the risk of DNS amplification attacks has grown. By crafting large DNS records with wildcard owner names, attackers can exploit these shared servers to launch high-volume DDoS amplification attacks.¶
This document provides operational guidance for DNS hosting providers to mitigate DDoS risks arising from amplification of responses derived from wildcard owner names.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 5 July 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
The DNS system exhibits a small-query, large-response characteristic, which can lead to high amplification towards targeted victims. Both recursive and authoritative DNS servers can be abused as amplifiers. Previous work [RFC5358] recommends restricting recursive lookup services to intended clients to prevent unintended amplification. Additionally, [RFC8482] recommends returning minimal-sized responses for queries with QTYPE=ANY.¶
However, the risk of DNS amplification remains critical. The centralization of DNS hosting and the increasing number of open recursive resolvers worldwide have heightened the potential for DDoS amplification attacks. On one hand ,exploitation of a single hosted zone may affect all zones on the same name server.On the other hand, the large and globally distributed population of open resolvers provides attackers with an extensive amplification surface.¶
This document provides guidance for DNS hosting providers to mitigate DDoS risks arising from maliciously crafted DNS records.¶
A DNS amplification attack typically requires the following conditions:¶
These conditions can be easily satisfied by configuring oversized DNS records such as large TXT records with wildcard owner names on shared DNS hosting platforms. An attacker can then issue small queries with randomized labels, discard the replies, and trigger excessive traffic between recursive resolvers and authoritative servers. Because wildcard expansion forces each random name to bypass resolver caches, the queries are repeatedly forwarded upstream to authoritative DNS servers. The attack is highly efficient because an originating stub resolver using UDP without EDNS(0) will trigger a truncated response from the open resolver, which prevents large authoritative answers from reaching the originating host. As a result, bandwidth consumption is confined to the path between open resolvers and authoritative servers. The lack of EDNS(0) also provides only a weak signal, making it difficult to develop effective mitigations based solely on this behavior.¶
The following illustrates a scenario where an attacker could exhaust the outbound capacity of a victim authoritative server:¶
Identify the authoritative name server for the victim domain.¶
Register a domain controlled by the attacker on the same name server.¶
Create oversized records with a wildcard owner name, such as TXT records.¶
Identify open recursive resolvers by scanning the IP space.¶
Use automated tools to send DNS queries for random subdomains (e.g., {random}.attack TXT) to open recursive resolvers.¶
The outbound capacity from the authoritative server hosting the victim domain will be exhausted.¶
Attackers can also leverage compromised hosts, for example systems within a botnet that rely on their configured recursive resolvers, to initiate the attack. In this case, DNS queries can be triggered indirectly by other application protocols. Examples include a web advertisement that embeds a URL containing the target domain and a randomized sublabel, or a minor compromise of a popular web page that inserts an equivalent invisible reference. These mechanisms allow large volumes of queries to be generated without requiring direct control of the DNS client software.¶
This section provides best practices for maintaining DNS data at reasonable sizes and reducing the risk that a shared authoritative server may be abused. Recommendations primarily target DNS hosting providers.¶
Operators should enforce size limits for large records, particularly those with wildcard owner names, and apply restrictive controls when records have very short TTLs. Thresholds should be determined based on the operational environment and risk tolerance.¶
Recommended practices:¶
Apply size limits to records with wildcard owner names.¶
Enforce maximum size thresholds for DNS records defined under wildcard owner names to prevent amplification through oversized responses.¶
Apply size limits to records with very small TTLs.¶
Short TTL values increase cache-miss frequency, which amplifies the number of forwarded queries.¶
Monitor for abnormal traffic patterns.¶
Implement logging and real-time alerting to detect unusually high query volumes or other indicators of potential attack activity.¶
Rate-limit queries that generate large responses.¶
Apply per-source, per-prefix, or query-type-aware rate limiting to reduce amplification effects and prevent overload on authoritative servers.¶
Restrict and periodically review wildcard usage.¶
Require justification and periodic review for wildcard records with large RDATA to avoid unintended amplification exposure.¶
Test mitigation controls.¶
Regularly test monitoring, rate-limiting, and record-size enforcement mechanisms under realistic conditions, adjusting thresholds to maintain protection without disrupting legitimate traffic.¶
These measures reduce the attack surface for DNS amplification attacks while enabling operators to balance availability and security for their users.¶
Tests have shown that some DNS hosting providers allow users to configure oversized records with wildcard owner names. Responses exceeding the standard UDP packet size trigger TCP fallback, allowing responses up to approximately 64 KB, yielding amplification factors exceeding 1000x.¶
Observations from providers include:¶
This non-normative appendix provides an illustrative model of the aggregated bandwidth impact of large DNS responses in amplification scenarios.¶
In large-scale amplification scenarios, total bandwidth impact grows proportionally with the number of attack sources and the average response size. To assist operators in evaluating practical effects of response size limits, a simplified model is provided.¶
Let:¶
The total query rate is N*q.¶
Approximate bandwidth at different points in the resolution path:¶
These relationships are linear in S, illustrating that reducing response size proportionally reduces bandwidth requirements for all participants. This model ignores retransmissions, protocol overhead, and TCP fallback.¶
For illustration, consider two nominal attack-source distributions:¶
| Parameter | Case A | Case B |
|---|---|---|
| Number of sources (N) | 1,000 | 50,000 |
| Query rate per source (q) | 1 qps | 1 qps |
| Query size (Q) | 60 bytes | 60 bytes |
| Cache miss ratio (R) | 1.0 | 0.8 |
Approximate aggregate bandwidths at different response size caps:¶
| Response Size (bytes) | Attacker Upstream (Case A / Case B) | Authoritative Outbound (Case A / Case B) | Resolver Total (Case A / Case B) |
|---|---|---|---|
| 65,535 | 0.480 Mbps / 24.0 Mbps | 524.3 Mbps / 21.0 Gbps | 525.2 Mbps / 21.1 Gbps |
| 8,192 | 0.480 Mbps / 24.0 Mbps | 65.5 Mbps / 2.62 Gbps | 66.5 Mbps / 2.66 Gbps |
| 4,096 | 0.480 Mbps / 24.0 Mbps | 32.8 Mbps / 1.3 Gbps | 33.7 Mbps / 1.35 Gbps |
| 1,024 | 0.480 Mbps / 24.0 Mbps | 8.2 Mbps / 0.32 Gbps | 9.1 Mbps / 0.37 Gbps |
| 512 | 0.480 Mbps / 24.0 Mbps | 4.1 Mbps / 0.16 Gbps | 5.1 Mbps / 0.21 Gbps |