How to secure Windows Server 2012 R2 against “open recursive resolver” attack

ddosdns-hostingwindows-server-2012-r2

I received an email from an ISP stating that our server had participated in a DDOS attack against one of their servers–and that we appear to be running an "open recursive resolver".

The IP address they gave is for one of our development servers, which is running WIndows Server 2012 R2. I did some googling and followed these instructions (https://technet.microsoft.com/en-us/library/Cc771738.aspx?f=255&MSPPError=-2147217396) to disable recursion in DNS Manager. My questions are:

  1. Should turning off the recursion option be enough to make sure this does not happen again?

  2. Is it OK to delete the DNS Server on this server? I didn't even know it was apparently installed by default. We use external DNS servers for everything. I would like to keep our attack surface minimal in general.

Best Answer

If I were you I would approach this from the network perspective. Setup a firewall to log to log any traffic to 53/udp and 53/tcp on the server. Figure out what is using the service.

If no one knows why DNS was installed, and you disable it the only way to know if you needed it will be to examine what broke.