FINDING · DEFENSE
TCP segmentation — splitting DNS-over-TCP messages into 20-byte fragments — successfully circumvented DNS censorship for 40 of 41 tested resolvers in China. In Iran, TCP segmentation is inconsistently effective: it succeeds in some scan runs and fails entirely in others, suggesting the Iranian censor can reassemble TCP fragments when processing capacity permits.
From 2026-niere-dpyproxy-dns — Towards Automated DNS Censorship Circumvention · §6.2.1, §6.2.2 · 2026 · FOCI 2026 (Free and Open Communications on the Internet)
Implications
- TCP segmentation should be a standard mode in any DNS resolver targeting Chinese users — it is reliable, standard-compliant, and requires no server-side changes.
- In Iran, TCP segmentation alone is insufficient as a primary defense; pair it with encrypted DNS (DoQ or DoT without SNI) since Iran's fragmentation reassembly is load-dependent and unreliable as a sole mechanism.
Tags
Extracted by claude-sonnet-4-6 — review before relying.