DNS censorship of encrypted protocols is inconsistent in both China and Iran.
In China, Yandex resolvers are censored only when the SNI extension is present;
omitting SNI bypasses censorship for these resolvers. In Iran, DoH requires SNI
omission for Quad9, Google, Adguard, CleanBrowsing, and NextDNS resolvers, but
works with SNI for Yandex and Cisco resolvers. These inconsistencies suggest
resolvers have been accidentally missed by censors, highlighting the value of
automated tools that trial all resolver-mode combinations rather than hard-coding
a single strategy. The support evaluation found 47 resolvers supporting DoH, 16
supporting DoH3, and only 8 supporting DoQ out of ~65 tested.
From 2026-lange-towards — Towards Automated DNS Censorship Circumvention
· §6.2, Table 2
· 2026
· Free and Open Communications on the Internet
Implications
Automated circumvention tools that enumerate resolver-protocol combinations find working paths that a fixed configuration would miss; the DPYProxy-DNS auto mode reliably finds a working combination in under 60s in most runs.
Inconsistent censorship gaps (e.g., Yandex with no-SNI in China, Cisco+DoH with SNI in Iran) are exploitable today but may be patched; tools should re-probe periodically rather than caching a single configuration indefinitely.