FINDING · DEFENSE
Encrypted DNS protocols (DNS-over-HTTPS and DNS-over-TLS via Cloudflare 1.1.1.1, Google 8.8.8.8, AdGuard, or NextDNS) prevent DNS injection by encrypting the resolver query, making it opaque to in-path GFW middleboxes. The blog recommends these as a lightweight defense that avoids the maintenance overhead of static hosts entries.
From 2026-anon-6-github-dns — 全网最全!6种方法解决 GitHub 国内由于 DNS 污染导致无法访问的问题 | 二毛 · §2 使用加密 DNS 服务 · 2026 · ermao.net (Chinese-language circumvention blog)
Implications
- Circumvention tools should bundle a DoH or DoT resolver for their own name lookups rather than relying on the system resolver, eliminating the DNS injection attack surface for bootstrapping.
- DoH/DoT alone is insufficient if the censor also IP-blocks the resolver endpoints (e.g., 1.1.1.1 or 8.8.8.8 are intermittently blocked in CN); tools need a fallback chain.
Tags
Extracted by claude-sonnet-4-6 — review before relying.