FINDING · DEFENSE

Because the GFW injects forged DNS responses rather than dropping the original query packet, the legitimate response from the upstream DNS server may still arrive after the injected forgery. The authors propose two circumvention strategies: querying on a non-standard port to bypass the port-53-only injection filter, or issuing standard-port queries and selectively discarding responses matching the known bad-IP pool to recover the authentic answer.

From 2007-lowe-greatThe Great DNS Wall of China · §6.4, §8 · 2007 · New York University

Implications

Tags

censors
cn
techniques
dns-poisoningpacket-injection
defenses
dns-tunneling

Extracted by claude-sonnet-4-6 — review before relying.