Transparent DNS Forwarders
- Transparent DNS forwarders are network intermediaries that relay DNS queries without modifying header fields, caching, or altering the original client information.
- They are often deployed unintentionally on legacy CPE devices, making them prevalent in regions with misconfigured networks and exposing the infrastructure to DNS amplification attacks.
- Their inherent lack of privacy and filtering functions poses significant risks, necessitating robust countermeasures like network ingress filtering and rigorous infrastructure audits.
Transparent DNS forwarders are network intermediaries that relay DNS queries between stub resolvers and upstream recursive resolvers without performing modifications such as source network address translation (NAT), record caching, or query rewriting. Their distinguishing characteristic is that they transparently pass DNS requests and replies—leaving the client’s original source IP address and DNS transaction contents fully intact—thereby decoupling initial query origination from final resolution but preserving resolvability and, in many existing deployments, invisibility to both users and many forms of infrastructure measurement.
1. Definition, Topology, and Function
A transparent DNS forwarder is a DNS processing entity that relays UDP (and, less commonly, TCP) DNS queries from clients to recursive resolvers without rewriting key header fields, caching results, or otherwise acting as a “normal” DNS recursive server (Nawrocki et al., 2021, Koch et al., 21 Oct 2025). Formally, a forwarder is “transparent” if, for a given query:
IP_target ≠ IP_response
where IP_target is the initial destination (the transparent forwarder) and IP_response is the source address of the reply (the recursive resolver).
Typically, transparent forwarders reside on Customer Premises Equipment (CPE) devices—such as poorly configured routers or gateways—especially in networks using legacy firmware stacks. They are not logical DNS resolvers in the sense of issuing new queries upstream; rather, they inject little to no processing logic beyond straightforward packet forwarding. Their role can be accidental, resulting from misconfiguration, but their effect is critical: they enable end-user queries to be relayed to open recursive resolvers without directly exposing internal infrastructure to scans and measurement (Nawrocki et al., 2021).
Transparent forwarders do not:
- Synthesize DNS replies,
- Implement local record caching,
- Rewrite/obscure the original source address,
- Modify DNS payloads,
- Provide logging or analytics,
- Filter or rate-limit on a per-client basis.
They typically operate as part of the Stage 1 DNS resolution path (client-to-recursive) and are “invisible” from the perspective of the DNS client, which perceives only a direct relationship with the chosen resolver, even though their queries traverse additional infrastructure.
2. Prevalence, Visibility, and Geographic Distribution
Transparent DNS forwarders are a significant but under-measured component of the open DNS infrastructure. Statistical measurements employing transactional correlation (matching outgoing queries to incoming responses) have shown that transparent forwarders constitute approximately 26% of all observed open DNS (ODNS) infrastructure nodes (Nawrocki et al., 2021). Conventional Internet-wide scan methodologies (e.g., Shadowserver, Censys) often miss these entities, as they focus on stateless, response-based metrics and fail to capture transactionally passive devices.
The prevalence of transparent forwarders is especially high in regions with widespread use of affordable, misconfigured CPE hardware. For example, in India, as much as 80% of observed ODNS infrastructure consists of transparent forwarders (Nawrocki et al., 2021). Regions in Asia and South America also exhibit disproportionate rates, likely corresponding to network management practices and vendor market shares.
The invisibility of transparent forwarders in standard infrastructure surveys leads to substantial underestimation of potential threats and risks, such as those associated with DNS amplification attacks or privacy compromise (Nawrocki et al., 2021, Koch et al., 21 Oct 2025).
3. Privacy, Trust, and Security Properties
Transparent DNS forwarders are neutral pass-through entities with no inherent privacy or security-enhancing functionality. As such, they do not provide:
- Encryption (queries and responses remain in cleartext unless higher-layer protocols—e.g., DNS-over-TLS—are used),
- Authentication or integrity protection (no MACs, signatures, or nonces are added),
- Anonymization (the client’s source IP is fully exposed to the recursive resolver and potentially downstream entities).
Within the evaluation framework established in (Jahromi et al., 17 Sep 2025), plain transparent forwarders fail to achieve most of the 14 desired DNS properties, including resiliency against false resolver response (S1), replay attacks (S2), censorship (A1, A2), eavesdropping (P1), and client IP concealment (P3):
| Property | Transparent Forwarder | Secure Scheme Example |
|---|---|---|
| S1: False-response resilience | ◯ (no) | ● (DoT/DoH) |
| P1: Eavesdropping resilience | ◯ (no) | ● (DoT/DoH) |
| P3: Hide client IP from resolver | ◯ (no) | ● (ODNS/ODoH) |
Because transparent forwarders simply relay the client’s DNS packet (preserving all fields), they do not prevent exposure of the full query content, the client IP, or associated side-channel information (e.g., EDNS Client Subnet fields).
Transparent forwarders are also problematic from a privacy standpoint when layered on top of encrypted DNS protocols. For instance, even with DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT), traffic analysis vulnerabilities persist, since metadata such as TLS record sizes, ordering, and burst patterns can be readily extracted, permitting adversaries to fingerprint websites with high accuracy (F1-score ≈ 0.90 in closed world settings, ≈ 0.70 in open world) (Siby et al., 2019). Transparent forwarders neither mask nor obfuscate these side-channel features; thus, the core privacy risk remains unless advanced padding or constant-size packetization is implemented.
4. Impact on DNS Ecosystem: Amplification, Consolidation, and Measurement
Transparent DNS forwarders materially expand the DNS attack surface and directly enable misuses not present in properly configured caching recursive resolvers.
- Reflective Amplification Attacks: As forwarders do not rewrite source IP addresses, attackers can send DNS queries with spoofed (victim) IPs to a forwarder, which relays them to powerful open recursive resolvers (often anycasted). These resolvers then send amplified responses directly to victims. Laboratory measurements have shown that a single transparent forwarder can facilitate up to 1.43 Gbit/s of reflective DNS amplification (on MikroTik RB750Gr3 hardware), which is 29–40× the amplification achieved when the same hardware is configured as a full recursive forwarder (Koch et al., 21 Oct 2025). The scalable impact is further multiplied when multiple forwarders target globally distributed anycasted resolvers, with observed effective amplification scaling up to a factor of 14.
- Firewall and Access Control Bypass: Transparent forwarders undermine the protections offered by resolver firewalls. Shielded resolvers—configured to answer only from trusted IP ranges—may be inadvertently exposed when transparent forwarders relay public queries without address rewriting, enabling the servers to be abused or exhausted (Koch et al., 21 Oct 2025).
- Infrastructure Consolidation: Empirical studies reveal that a vast number of transparent forwarders channel DNS traffic to a small set of public recursive resolvers (primarily Google and Cloudflare), reinforcing centralization trends and introducing new attribution and load risks (Nawrocki et al., 2021).
- Measurement “Blind Spots”: Because transparent forwarders do not synthesize responses or alter transaction IDs, standard scan techniques underestimate their existence. Transactional approaches (e.g., DNSRoute++) that map both query paths and source/destination behavior are necessary to properly enumerate and characterize these entities (Nawrocki et al., 2021).
5. Architectural Comparisons and Deployment Scenarios
Transparent DNS forwarders differ from traditional recursive resolvers and advanced DNS proxy architectures in several key ways:
- Zero Application Logic: Unlike recursive servers, transparent forwarders do not build new queries, perform iterative resolution, or cache answers.
- No Source NAT: The original source IP of the client is preserved; no address rewriting is performed, allowing clients and responses to be directly linked.
- Minimal Intervention: No logging, DNS filtering, or analytics are performed.
- Accidental/Legacy Deployment: The role is frequently conferred through misconfigured CPE devices, not deliberate design.
The main deployment scenarios include:
- Direct relay from user to open resolver: The reply is sent directly to the user (or the source of the spoofed query), enhancing the attack potential in reflective scenarios.
- Bypass of shielded resolvers: Firewall-passed queries via transparent forwarders can subvert policy controls on restricted resolvers (Koch et al., 21 Oct 2025).
- Misconfigured broadcast handling: Routers may forward broadcasted DNS queries to multiple devices, creating excess amplification.
By contrast, “privacy-forwarding” DNS systems such as ODNS, ODoH, or systems employing decentralized resolver selection (K-resolver, Onoma) intentionally modify the forwarding logic to provide privacy enhancements, such as domain sharding, anonymizing proxies, or domain-specific encrypted query relaying (Schmitt et al., 2018, Singanamalla et al., 2020, Kumar et al., 2023, Hoang et al., 2020, Hounsel et al., 2020).
6. Security Threats and Countermeasure Strategies
Transparent DNS forwarders unintentionally enable highly scalable, rate-limiting-bypassing DNS reflection attacks. Their statelessness and lack of rate limiting, coupled with the prevalence of anycasted resolver backends, make them potent facilitators of infrastructure amplification.
Recommended countermeasures, as outlined in (Koch et al., 21 Oct 2025), include:
- Network Ingress Filtering: Enforce RFC 2827-style filtering at the network edge to drop spoofed source IP packets.
- Reverse Path Forwarding (RPF) Checks: Verify that incoming packets follow legitimate source routing to mitigate masqueraded requests (RFC 8704).
- Firewall Rule Hardening: Ensure firewalls are applied at both the network edge and the recursive resolver, blocking unauthorized relay access.
- Global/Source-Independence Rate Limiting: Limit total query rates at key recursive resolver or anycast PoPs, not just per-source, to mitigate distributed abuse.
- Routine Infrastructure Audits: Employ transactional scanning methodologies (cf. DNSRoute++) to surface and remediate transparent forwarders.
- Responsible Disclosure: Proactive notification and remediation campaigns (as documented in (Koch et al., 21 Oct 2025)) can substantially decrease the proportion of misconfigured forwarders.
A plausible implication is that, without systematic deployment of these countermeasures and robust measurement, the DNS ecosystem will remain vulnerable to scalable, hard-to-trace attacks leveraging the inherent transparency of these forwarders.
7. Compatibility, Extensions, and Future Directions
Transparent DNS forwarders, as currently deployed, offer little resistance to censorship, surveillance, or traffic analysis. They are minimally compatible with privacy and security extensions layered atop DNS (e.g., DNS-over-TLS, DNS-over-HTTPS, DNSSEC), in the sense that when upstream resolvers support these protocols, queries may be protected in transit beyond the forwarder. However, unless the forwarder itself supports (or enforces) encrypted transport and disables leakage-prone mechanisms (such as exposing EDNS Client Subnet information), the privacy properties are only as strong as the weakest link in the query path (Siby et al., 2019, Jahromi et al., 17 Sep 2025).
Recent proposals, such as those implementing user-side or decentralized resolver selection, resolver-less DNS, anonymity-enhanced caching mechanisms, and blockchain-backed multi-resolver voting (Sy, 2019, Kumar et al., 2023, Fu et al., 2023), as well as stage-2 security enhancements (ss2DNS/DNSSEC+), offer substantial improvements to the security and privacy posture of DNS resolution—either by removing or cryptographically shielding the forwarding function.
Ongoing and future research emphasizes:
- Designing forwarders that are not only transparent in packet forwarding but also auditable and resistant to abuse by integrating authenticated logging, query anonymization, or secure key distribution.
- Incorporating techniques such as constant-size packetization, domain-specific sharding, adaptive insertion of dummy queries, or private information retrieval for enhancing privacy in forwarder architectures.
- Expanding measurement tools (e.g., DNSRoute++) for continuous audit and refinement of the global forwarding infrastructure.
References (by arXiv id)
- (Schmitt et al., 2018)
- (Siby et al., 2019)
- (Sy, 2019)
- (Hoang et al., 2020)
- (Hounsel et al., 2020)
- (Singanamalla et al., 2020)
- (Nawrocki et al., 2021)
- (Kumar et al., 2023)
- (Kosek et al., 2023)
- (Fu et al., 2023)
- (Jahromi et al., 2 Aug 2024)
- (Delignat-Lavaud et al., 18 Mar 2025)
- (Xiao et al., 28 Jul 2025)
- (Jahromi et al., 17 Sep 2025)
- (Sjösvärd et al., 29 Sep 2025)
- (Sjösvärd et al., 29 Sep 2025)
- (Koch et al., 21 Oct 2025)