FINDING · DEFENSE
Bypassing system DNS via local hosts-file entries (e.g., mapping github.com → 140.82.113.4) is documented as the most widely used free workaround for GFW DNS poisoning of GitHub as of 2026. The technique is fragile: GitHub IP addresses change, requiring users to re-query and update entries manually, making it unsuitable as a reliable long-term defense.
From 2026-anon-github-2026-6-dns — GitHub无法访问?2026年最新6种解决方法(含DNS修改与加速工具) | 二毛 · §方法一 · 2026 · ermao.net (Chinese-language circumvention blog)
Implications
- Hosts-file overrides confirm that the block is purely DNS-layer for many users, meaning a circumvention tool that forces a trusted DNS resolver (DoH/DoT) before any connection attempt can bypass the block without a full proxy.
- The instability of the approach (IP churn) argues for automated IP refresh mechanisms or dynamic DNS pinning rather than static configuration in any tool that uses direct-IP strategies.
Tags
Extracted by claude-sonnet-4-6 — review before relying.