By injecting responses for server1.yourco.com, server2.yourco.com, you could MITM someone's backend servers without leaving any traces, which is an even more serious concern if they're terminating TLS at the NGINX server, which is a <i>very</i> common use case.<p>DJB has been warning against non-randomized port numbers for DNS resolvers for more than 15 years.[1] This is not a new issue.<p>NGINX's response here is quite disheartening.<p>1. <a href="https://cr.yp.to/djbdns/forgery.html" rel="nofollow">https://cr.yp.to/djbdns/forgery.html</a>