FINDING · DETECTION
Chinese DNS censorship operates symmetrically — injecting forged responses for both inbound and outbound DNS packets regardless of whether any real service exists at the destination IP. This means any DNS response received for a probe sent to a closed-port IP inside China is unambiguously a censorship injection, not a legitimate resolver reply.
From 2022-bhaskar-many — Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement · §3.1 · 2022 · USENIX Security Symposium
Implications
- Circumvention tools testing GFW DNS reachability can target inactive IPs (no open ports) inside Chinese subnets, ensuring every DNS response observed is a censor artifact rather than a legitimate resolver, enabling clean path-level censorship attribution.
- The symmetric injection property lets a circumvention client determine whether its current network path traverses a GFW DNS injection node by querying a known-censored domain toward any Chinese IP — no open resolver needed.
Tags
Extracted by claude-sonnet-4-6 — review before relying.