FINDING · DETECTION
On-path censors commonly operate on traffic mirrors rather than inline (in-path), making their systems failure-tolerant and easier to deploy. This architectural choice means on-path injectors cannot suppress the legitimate DNS reply—both the forged and authentic replies reach the resolver—creating a detectable anomaly. The same structural weakness applies to TCP RST injection and other on-path packet injection attacks.
From 2012-duan-hold-on — Hold-On: Protecting Against On-Path DNS Poisoning · §I, §II.A · 2012 · Securing and Trusting Internet Names
Implications
- Design stub resolvers or DNS forwarders to hold open their listening port after the first reply arrives and check for subsequent differing replies, which reliably signal on-path injection without requiring DNSSEC.
- Exploit the traffic-mirror deployment constraint shared by most national censors: since they cannot suppress legitimate replies, any resolver that waits for a second reply gains a reliable oracle for detecting injection.
Tags
Extracted by claude-sonnet-4-6 — review before relying.