TTL manipulation experiments demonstrated that the GFW injects forged DNS responses at the router level, not at the DNS server: responses to censored domain queries exhibited inconsistent IP ident fields and wildly varying TTL values — consistent with a stateless in-path router — while control (non-censored) responses to the same server showed monotonically increasing ident and stable TTL. The injection was observed exclusively on port 53; identical queries sent to port 80 received no injected responses.
From 2007-lowe-great — The Great DNS Wall of China
· §6.4, Table 3
· 2007
· New York University
Implications
DNS injection is port-53-specific; querying on any other port (443 for DoH, 853 for DoT, or even an arbitrary non-standard port) bypasses the in-path injection entirely.
Circumvention tools must not assume DNS tampering is limited to the configured resolver — in-path routers may inject responses before the resolver is reached, making 'trusted resolver' strategies insufficient.