FINDING · DETECTION
MCI (AS197207, Iran) intercepts cleartext DNS and returns the bogon address 10.10.34.36 for dns.adguard.com A queries regardless of which upstream resolver is used (system, 8.8.8.8, or 9.9.9.9), and intercepted queries never reached a researcher-controlled DNS-over-UDP server. This bogon falls in the same /24 documented in prior Iranian censorship research. Additionally, SNI blocking for dns.adguard.com was confirmed independently on both port 853 (DoT) and port 443 (DoH).
From 2021-basso-measuring — Measuring DoT/DoH blocking using OONI Probe: a preliminary study · §V-D · 2021 · DNS Privacy Workshop
Implications
- Circumvention tools must supply pre-resolved IP addresses for DoT/DoH bootstrap rather than relying on getaddrinfo, as DNS interception will redirect domain lookups to bogon addresses before TLS ever starts.
- Using the service domain as the SNI in Iran triggers a second layer of blocking even after bypassing DNS injection; tools should either avoid the service's public hostname as SNI or use ECH.
Tags
Extracted by claude-sonnet-4-6 — review before relying.