Chinese DNS censorship operates symmetrically — injecting forged responses for both inbound and outbound DNS packets regardless of whether any real service exists at the destination IP. This means any DNS response received for a probe sent to a closed-port IP inside China is unambiguously a censorship injection, not a legitimate resolver reply.
From 2022-bhaskar-many — Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
· §3.1
· 2022
· USENIX Security Symposium
Implications
Circumvention tools testing GFW DNS reachability can target inactive IPs (no open ports) inside Chinese subnets, ensuring every DNS response observed is a censor artifact rather than a legitimate resolver, enabling clean path-level censorship attribution.
The symmetric injection property lets a circumvention client determine whether its current network path traverses a GFW DNS injection node by querying a known-censored domain toward any Chinese IP — no open resolver needed.