FINDING · DETECTION

An attacker with DNS spoofing capability — the paper cites the GFW explicitly — can respond to Ultrasurf DNS discovery queries before legitimate resolvers and inject crafted CNAME records that fully control the client's single-hop path selection. In code paths where peer verification is skipped ('SkipverifyQ0' log entries), this enables complete traffic interception without any cryptographic break.

From 2012-appelbaum-technicalTechnical analysis of the Ultrasurf proxying software · §6.4, §5.6 · 2012 · The Tor Project

Implications

Tags

censors
cn
techniques
dns-poisoning

Extracted by claude-sonnet-4-6 — review before relying.