FINDING · DETECTION
An attacker with DNS spoofing capability — the paper cites the GFW explicitly — can respond to Ultrasurf DNS discovery queries before legitimate resolvers and inject crafted CNAME records that fully control the client's single-hop path selection. In code paths where peer verification is skipped ('SkipverifyQ0' log entries), this enables complete traffic interception without any cryptographic break.
From 2012-appelbaum-technical — Technical analysis of the Ultrasurf proxying software · §6.4, §5.6 · 2012 · The Tor Project
Implications
- Authenticate all server descriptors with a pinned public key before acting on them; DNS responses must be treated as untrusted transport, not as authoritative server identity.
- Fall back to out-of-band bootstrap channels (HTTPS to CDN, encrypted email, Atom feed over authenticated TLS) with certificate pinning so DNS-level manipulation cannot redirect clients to attacker-controlled infrastructure.
Tags
Extracted by claude-sonnet-4-6 — review before relying.