FINDING · DETECTION

Both Firefox and Chromium leak cleartext DNS before establishing encrypted DNS connections: they first send an unencrypted UDP DNS query to resolve the DoH server's domain (e.g., doh.opendns.com). An in-path censor can intercept and poison this initial query, making encrypted DNS in browsers completely ineffective without additional circumvention of the resolver-lookup step. Additionally, Chromium always includes the SNI extension in the encrypted DNS TLS handshake (e.g., "doh.opendns.com"), leaking the resolver identity even after the initial lookup. No resolver requires SNI to be present for certificate validation when the resolver's IP certificate is configured.

From 2026-lange-towardsTowards Automated DNS Censorship Circumvention · §2.4, §7, §10 · 2026 · Free and Open Communications on the Internet

Implications

Tags

censors
ircn
techniques
dns-poisoningsni-blocking
defenses
ech-esni

Extracted by claude-sonnet-4-6 — review before relying.