Dominant failure modes differ systematically by country: China (AS45090) shows connect timeouts in 75% of DoT failures (IP-level blocking); Kazakhstan (AS48716) shows post-TLS-handshake timeouts in 72% of DoT failures (likely ACK or segment discard after handshake); Iran (AS197207) shows TLS handshake timeouts in 80% of DoT failures. Packet capture analysis confirmed that timeouts during and after the TLS handshake correspond to unacknowledged TCP segments, not connection resets.
From 2021-basso-measuring — Measuring DoT/DoH blocking using OONI Probe: a preliminary study
· §V-F, §V-G, Table VIII
· 2021
· DNS Privacy Workshop
Implications
Circumvention tools should report failure phase (connect / TLS handshake / post-handshake) in telemetry — failure mode fingerprints the censor's mechanism and informs which layer (IP, SNI, or payload) to target in evasion.
Post-handshake timeouts caused by unacknowledged TCP segments suggest middlebox segment dropping rather than RST injection; QUIC or DTLS-based transports may bypass this specific interception mechanism.