We are undergoing PCI Compliance checks and our external nameservers (all Windows Server 2008 R2) have been hit by Nessus Plugin ID: 35450 (verbage below). Although this is a low severity hit, I see DDoS in the title and I freak.
Plugin ID: 35450 Name: DNS Server Spoofed Request Amplification DDoS Synopsis: The remote DNS server could be used in a distributed denial of service attack. Plugin Output: The DNS query was 17 bytes long, the answer is 449 bytes long.
I googled the heck out of this to no avail. Please respond if you have any suggestions.
I did find ways to test (below) but no luck on any mitigation steps...
On Linux:
dig . NS @
[example: dig . NS @192.168.1.1]
Or on the web: http://isc1.sans.org/dnstest.html