FINDING · DETECTION

DNS queries for blocked domains were intercepted on-path and never reached the authoritative server; instead, the DNS server received 5 TCP RST packets spoofed from the client's address — despite the original queries being UDP, a likely misconfiguration. Three RST packets carried an identical random sequence number while two had a relative offset of 30 from the first three, the same distinctive 3+2 RST pattern observed in the HTTP blocking mechanism.

From 2013-aryan-internetInternet Censorship in Iran: A First Look · §4.3, Figure 4 · 2013 · Free and Open Communications on the Internet

Implications

Tags

censors
ir
techniques
dns-poisoningrst-injection

Extracted by claude-sonnet-4-6 — review before relying.