Are there alternative ways to operate an open/forwarding DNS server, without having to use rate limiting or other means of traffic inspection to prevent being used for DNS amplification attacks?
Within a given network, the DNS server can be easily restricted to only answer to specified IP adresses, but given the increased usage of mobile devices I would like to avoid this restriction. (lets ignore VPNs for this question)
Can you point me to any alternative approaches that try to prevent access to the DNS server or amplification attacks by other means then actually keeping track of requests and client behaviour?
Are there any client-side solutions, less heavy than a VPN, to authenticate to a DNS server?
edit: as this question has been marked as a duplicate to an unrelated question, I have edited the title to include "client-side". This is not a duplicate. I have mentionend the traditional way to to limit the effects of an amplification attack on the server in my question and I tried to indicate my search by mentioning the VPN based solutions.