FINDING · DETECTION
99.88% of 1,607 tested Chinese recursive DNS servers returned tampered responses for censored domains. Tampered responses drew from a pool of only 8 IP addresses, compared to 441–454 distinct IPs returned by U.S. control servers for the same query set — with 366 censored domains sharing exactly those 8 IPs.
From 2007-lowe-great — The Great DNS Wall of China · §6.1, Table 1 · 2007 · New York University
Implications
- Any circumvention tool relying on standard DNS will receive false IPs; use DNS-over-HTTPS or DNS-over-TLS, or hardcode IP addresses, to bypass the DNS-layer censorship entirely.
- The centralized pool of 8 known bad IPs can be used as a detection oracle: a client receiving one of these IPs for a queried domain can confirm DNS tampering without external ground truth.
Tags
Extracted by claude-sonnet-4-6 — review before relying.