FINDING · EVALUATION
In a 75-domain, 492-destination experiment, domains that showed small-scale routing-induced censorship changes — where some (source IP, source port) combinations bypassed censorship while others did not — were exclusively domains first censored within the last 2 years, indicating inconsistent GFW censorship-node configuration during rollout.
From 2022-bhaskar-many — Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement · §5.4 · 2022 · USENIX Security Symposium
Implications
- Newly blocked domains are more likely to have inconsistent GFW coverage across routing paths; prioritize source-parameter sweeps immediately after a domain is reported newly blocked.
- Track GFW blocking events with timestamps: routing-induced bypasses are most exploitable in the 0–24-month window following initial censorship of a domain, while configuration propagates.
Tags
Extracted by claude-sonnet-4-6 — review before relying.