FINDING · DETECTION
Iranian DNS censorship returns special-purpose/private IPv4 addresses in 99.99% of manipulated responses (only 0.01% public), whereas Chinese manipulation returns public IPs 99.46% of the time—often addresses that host no services at all. The 10 most frequent Chinese censor-injected IPs constituted approximately 75% of all Chinese manipulated DNS responses.
From 2017-pearce-global — Global Measurement of DNS Manipulation · §5.2, Table 8 · 2017 · USENIX Security Symposium
Implications
- Circumvention clients in IR can use private-IP-in-DNS-response as a cheap, high-confidence censorship signal to trigger bootstrap fallback immediately, without external measurement infrastructure.
- Circumvention clients in CN cannot rely on private-IP detection; they need AS-consistency checks or active TLS certificate validation since the GFW injects seemingly routable public IPs.
Tags
Extracted by claude-sonnet-4-6 — review before relying.