FINDING · EVALUATION
Iris detected 41,778 manipulated DNS responses (0.31% of 13.5 million queries) across 58 countries and 1,408 domains in a two-day measurement window in January 2017. Iranian resolvers exhibited the highest median manipulation rate at 6.02% per resolver; China followed at 5.22%. Iran and China together accounted for roughly 55% of all manipulated responses despite contributing only approximately 6% of total query volume.
From 2017-pearce-global — Global Measurement of DNS Manipulation · §5.2, Table 6 · 2017 · USENIX Security Symposium
Implications
- Circumvention tools operating in IR or CN should treat DNS resolution as unreliable for sensitive domains and use alternative name-resolution mechanisms (DoH, hardcoded IPs, or encrypted bootstrapping) by default rather than as a fallback.
- DNS anomaly rates of 5–6% per resolver mean passive DNS-based detection is a realistic attack surface; tools should validate any DNS-resolved proxy IP via TLS certificate or HTTPS content checks before use.
Tags
Extracted by claude-sonnet-4-6 — review before relying.