At the moment, we’re asserting Amazon Route 53 World Resolver, a brand new Amazon Route 53 service that gives safe and dependable DNS decision globally for queries from wherever (preview). You need to use World Resolver to resolve DNS queries to public domains on the web and personal domains related to Route 53 non-public hosted zones. Route 53 World Resolver gives community directors a unified answer to resolve queries from authenticated purchasers and sources in on-premises knowledge facilities, department workplaces, and distant places via globally distributed anycast IP addresses. This service contains built-in safety controls together with DNS visitors filtering, assist for encrypted queries, and centralized logging to assist organizations cut back operational overhead whereas sustaining compliance with safety necessities.
Organizations with hybrid deployments face operational complexity when managing DNS decision throughout distributed environments. Resolving public web domains and personal software domains usually requires sustaining break up DNS infrastructure, which will increase value and administrative burden particularly when replicating to a number of places. Community directors should configure customized forwarding options, deploy Route 53 Resolver endpoints for personal area decision, and implement separate safety controls throughout totally different places. Moreover, they have to configure and preserve multi-Area failover methods for Route 53 Resolver endpoints and supply constant safety coverage enforcement throughout all Areas whereas testing failover situations.
Route 53 World Resolver has key capabilities that deal with these challenges. The service resolves each public web domains and Route 53 non-public hosted zones, eliminating the necessity for separate split-DNS forwarding. It gives DNS decision via a number of protocols, together with DNS over UDP (Do53), DNS-over-HTTPS (DoH), and DNS-over-TLS (DoT). Every deployment gives a single set of frequent IPv4 and IPv6 anycast IP addresses that route queries to the closest AWS Area, decreasing latency for distributed shopper populations.
Route 53 World Resolver gives built-in safety features equal to Route 53 Resolver DNS Firewall. Directors can configure filtering guidelines utilizing AWS Managed Area Lists that present versatile controls with lists labeled by DNS threats (malware, spam, phishing) or internet content material (grownup websites, playing, social networking) which may not be secure for work or create customized area lists by importing domains from a file. Superior risk safety detects and blocks area era algorithm (DGA) patterns and DNS tunneling makes an attempt. For encrypted DNS visitors, Route 53 World Resolver helps DoH and DoT protocols to guard queries from unauthorized entry throughout transit.
Route 53 World Resolver solely accepts visitors from recognized purchasers that have to authenticate with the Resolver. For Do53, DoT, and DoH connections, directors can configure IP and CIDR allowlists. For DoH and DoT connections, token-based authentication gives granular entry management with customizable expiration durations and revocation capabilities. Directors can assign tokens to particular shopper teams or particular person units primarily based on organizational necessities.
Route 53 World Resolver helps DNSSEC validation to confirm the authenticity and integrity of DNS responses from public nameservers. It additionally contains EDNS Consumer Subnet assist, which forwards shopper subnet data to allow extra correct geographic-based DNS responses from content material supply networks.
Getting began with Route 53 World Resolver
This walkthrough reveals learn how to configure Route 53 World Resolver for a company with workplaces on the US East and West coasts that should resolve each public domains and personal purposes hosted in Route 53 non-public hosted zones. To configure Route 53 World Resolver, go to the AWS Administration Console, select World resolvers from the navigation pane, and select Create international resolver.
Within the Resolver particulars part, enter a Resolver identify similar to corporate-dns-resolver. Add an non-compulsory description like DNS resolver for company workplaces and distant purchasers. Within the Areas part, select the AWS Areas the place you need the resolver to function, similar to US East (N. Virginia) and US West (Oregon). The anycast structure routes DNS queries out of your purchasers to the closest chosen Area.
After the resolver is created, the console shows the resolver particulars, together with the anycast IPv4 and IPv6 addresses that you’ll use for DNS queries. You may proceed to create a DNS view by selecting Create DNS view to configure shopper authentication and DNS question decision settings.
Within the Create DNS view part, enter a DNS view identify similar to primary-view and optionally add a Description like DNS view for company workplaces. A DNS view helps you create totally different logical groupings to your purchasers and sources, and decide the DNS decision for these teams. This helps you preserve totally different DNS filtering guidelines and personal hosted zone decision insurance policies for various purchasers in your group.
For DNSSEC validation, select Allow to confirm the authenticity of DNS responses from public DNS servers. For Firewall guidelines fail open conduct, select Disable to dam DNS queries when firewall guidelines can’t be evaluated, which gives extra safety. For EDNS shopper subnet, preserve Allow chosen to ahead shopper location data to DNS servers, which permits content material supply networks to supply extra correct geographic responses. DNS view creation would possibly take a couple of minutes to develop into operational.
After the DNS view is created and operational, configure DNS Firewall guidelines to filter community visitors by selecting Create rule. Within the Create DNS Firewall guidelines part, enter a Rule identify similar to block-malware-domains and optionally add an outline. For Rule configuration sort, you’ll be able to select Buyer managed area lists, AWS managed area lists offered by AWS or DNS Firewall Superior safety.
For this walkthrough, select AWS managed area lists. Within the Area lists dropdown, select a number of AWS managed lists similar to Menace – Malware to dam recognized malicious domains. You may depart Question sort empty to use the rule to all DNS question sorts. On this instance, select A to use this rule solely to IPv4 deal with queries. Within the Rule motion part, choose Block to forestall DNS decision for domains that match the chosen lists. For Response to ship for Block motion, preserve NODATA chosen to point that the question was profitable however no response is on the market, then select Create guidelines.
The following step is to configure entry sources to specify which IP addresses or CIDR blocks are allowed to ship DNS queries to the resolver. Navigate to the Entry sources tab within the DNS view after which select Create entry supply.
Within the Entry supply particulars part, enter a Rule identify similar to office-networks to establish the entry supply. Within the CIDR block area, enter the IP deal with vary to your workplaces to permit queries from that community. For Protocol, choose Do53 for traditional DNS queries over UDP or select DoH or DoT if you wish to require encrypted DNS connections from purchasers. After configuring these settings, select Create entry supply to permit the required community to ship DNS queries to the resolver.
Subsequent, navigate to the Entry tokens tab within the DNS view to create token-based authentication for purchasers and select Create entry token. Within the Entry token particulars part, enter a Token identify similar to remote-clients-token. For Token expiry, choose an expiration interval from the dropdown primarily based in your safety necessities, similar to one year for long-term shopper entry, or select a shorter period like 30 days or 90 days for tighter entry management. After configuring these settings, select Create entry token to generate the token, which purchasers can use to authenticate DoH and DoT connections to the resolver.
After the entry token is created, navigate to the Personal hosted zones tab within the DNS view to affiliate Route 53 non-public hosted zones with the DNS view in order that the resolver can resolve queries to your non-public software domains. Select Affiliate non-public hosted zone and within the Personal hosted zones part, choose a personal hosted zone from the checklist that you really want the resolver to deal with. After choosing the zone, select Affiliate to allow the resolver to answer DNS queries for these non-public domains out of your configured entry sources.
With the DNS view configured, firewall guidelines created, entry sources and tokens outlined, and personal hosted zones related, the Route 53 World Resolver setup is full and able to deal with DNS queries out of your configured purchasers.
After creating your Route 53 World Resolver, it’s essential configure your DNS purchasers to ship queries to the resolver’s anycast IP addresses. The configuration technique relies on the entry management you configured in your DNS view:
- For IP-based entry sources (CIDR blocks) – Configure your supply purchasers to level DNS traffic to the Route 53 World Resolver anycast IP addresses offered within the resolver particulars. World Resolver will solely permit entry from allowlisted IPs that you’ve laid out in your entry sources. You may as well affiliate the entry sources to totally different DNS views to supply extra granular DNS decision views for various units of IPs.
- For entry token–primarily based authentication – Deploy the tokens in your purchasers to authenticate DoH and DoT connections with Route 53 World Resolver. You should additionally configure your purchasers to level the DNS visitors to the Route 53 World Resolver anycast IP addresses offered within the resolver particulars.
For detailed configuration directions to your particular working system and protocol, confer with the technical documentation.
Extra issues to know
We’re renaming the prevailing Route 53 Resolver to Route 53 VPC Resolver. This naming change clarifies the architectural distinction between the 2 providers. VPC Resolver operates Regionally inside your VPCs to supply DNS decision for sources in your Amazon VPC setting. VPC Resolver continues to assist inbound and outbound resolver endpoints for hybrid DNS architectures inside particular AWS Areas.
Route 53 World Resolver enhances Route 53 VPC Resolver by offering internet-reachable, international and personal DNS decision for on-premises and distant purchasers with out requiring VPC deployment or non-public connections.
Current VPC Resolver configurations stay unchanged and proceed to operate as configured. The renaming impacts the service identify within the AWS Administration Console and documentation, however API operation names stay unchanged. In case your structure requires DNS decision for sources inside your VPCs, proceed utilizing VPC Resolver.
Be part of the preview
Route 53 World Resolver reduces operational overhead by offering unified DNS decision for private and non-private domains via a single managed service. The worldwide anycast structure improves reliability and reduces latency for distributed purchasers. Built-in safety controls and centralized logging assist organizations preserve constant safety insurance policies throughout all places whereas assembly compliance necessities.
To be taught extra about Amazon Route 53 World Resolver, go to the Amazon Route 53 documentation.
You can begin utilizing Route 53 World Resolver via the AWS Administration Console in US East (N. Virginia), US East (Ohio), US West (N. California), US West (Oregon), Europe (Frankfurt), Europe (Eire), Europe (London), Asia Pacific (Mumbai), Asia Pacific (Singapore), Asia Pacific (Tokyo), and Asia Pacific (Sydney) Areas.










