FINDING · DEFENSE
DNSSEC validation naturally prevents DNS injection collateral damage: both .de and .kr sign their results, allowing a validating resolver to reject the unsigned injected reply while awaiting the legitimate signed response. The paper identifies DNSSEC deployment at the TLD level as the most robust structural defense against injection-based collateral damage.
From 2012-sparks-collateral — The Collateral Damage of Internet Censorship by DNS Injection · §5 · 2012 · SIGCOMM Computer Communication Review
Implications
- Circumvention tools bootstrapping via DNS should either enforce DNSSEC validation or use out-of-band pinned records, since unsigned responses from affected TLD paths cannot be trusted for resolvers in high-collateral-damage regions.
- Prefer domain names under DNSSEC-signed TLDs (.de, .kr, .nl, etc.) for circumvention infrastructure endpoints — this turns censor injection into a detectable failure rather than a silent redirect.
Tags
Extracted by claude-sonnet-4-6 — review before relying.