FINDING · DEFENSE
The authors recommend that users encrypt DNS queries (DoT or DoH) to prevent the GFW's on-path injectors from intercepting and poisoning them, and additionally block all outgoing traffic to the known pool of GFW-injected IP addresses to avoid silently connecting to potentially surveillance-oriented infrastructure.
From 2025-sheffey-extended — Extended Abstract: I’ll Shake Your Hand: What Happens After DNS Poisoning · §4 · 2025 · Free and Open Communications on the Internet
Implications
- Circumvention tool bootstrapping flows that rely on plaintext DNS for initial server discovery are vulnerable to GFW injection even before the tunnel is established; move all bootstrapping resolution to DoH/DoT or embed server addresses directly.
- Maintain and distribute a regularly-updated blocklist of the GFW's injected IP pool so clients can drop connections to these addresses before any application data is transmitted.
Tags
Extracted by claude-sonnet-4-6 — review before relying.