FINDING · EVALUATION

Active probing resistance was evaluated by simultaneously querying 5 additional DNS resolvers for every domain during DNS-sly operation. DNS-sly's response change distribution falls within one standard deviation of the other resolvers, making probing attacks unable to distinguish DNS-sly servers from ordinary resolvers. TTL-based re-encoding prohibition neutralizes forced-divergence probing where an attacker sends repeated identical queries to expose responder state.

From 2016-akbar-dns-slyDNS-sly: Avoiding Censorship through Network Complexity · §4.1 · 2016 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
active-probing
defenses
dns-tunneling

Extracted by claude-sonnet-4-6 — review before relying.