FINDING · EVALUATION
Across 10,000 destination IPs in China, 37% showed some change in censorship behavior depending on source IP and source port, spanning 56% of measured ASes. The dominant form of variation (95% of cases) was all-or-nothing: a given (source IP, source port) pair either experienced no censorship or 'expected' censorship, with no intermediate states.
From 2022-bhaskar-many — Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement · §5.2 · 2022 · USENIX Security Symposium
Implications
- Systematically probe source IP/port combinations before establishing a circumvention session — in 37% of Chinese vantage points, some combinations bypass the GFW DNS censor entirely.
- The all-or-nothing nature means a single working (source IP, source port) pair may fully circumvent DNS censorship; build probe-and-select logic into client session establishment.
Tags
Extracted by claude-sonnet-4-6 — review before relying.