FINDING · DEFENSE
Because the GFW injects forged DNS responses rather than dropping the original query packet, the legitimate response from the upstream DNS server may still arrive after the injected forgery. The authors propose two circumvention strategies: querying on a non-standard port to bypass the port-53-only injection filter, or issuing standard-port queries and selectively discarding responses matching the known bad-IP pool to recover the authentic answer.
From 2007-lowe-great — The Great DNS Wall of China · §6.4, §8 · 2007 · New York University
Implications
- Implement a 'discard-and-wait' DNS client strategy: drop any response whose answer IP matches the known bad-IP pool and accept the next arriving packet, which is likely the legitimate server response.
- Use DNS-over-HTTPS (port 443) or DNS-over-TLS (port 853) as the primary DNS transport for censored-region clients; the paper's port-80 test confirmed no injection fires on non-53 ports.
Tags
Extracted by claude-sonnet-4-6 — review before relying.