FINDING · EVALUATION
DNS manipulation is widespread across China (305 domains via local resolvers, 300 via public resolvers) and Russia (251 local, 205 public), but simply switching to a public DNS resolver already evades local-resolver-only filtering for many domains, reducing apparent censorship at the public-resolver layer. On-path filtering systems that poison queries to public resolvers represent a harder threat class requiring encrypted DNS.
From 2022-hoang-measuring — Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering · §4.1, Table 2 · 2022 · Passive and Active Measurement Conference
Implications
- Circumvention tools should route DNS through encrypted resolvers hosted on non-standard ports and IPs not associated with known public resolvers, since major public DoTH resolvers are actively blocked in China and monitored in Russia.
- Measurement infrastructure distinguishing on-path poisoning (multiple simultaneous responses) from local-resolver tampering (single forged response) enables more accurate circumvention routing decisions — tools should implement analogous detection.
Tags
Extracted by claude-sonnet-4-6 — review before relying.