BDNS gives you access to .bit, .lib, .emc, .coin, .bazar and OpenNIC domains Download for Chrome Install for Chrome from Chrome Web Store

Be aware of the known browser limitations

BDNS For Chrome

Chrome SourceWeb StoreDownload (crx)

Chrome 24 or above is required

1.0.12 (2018-04-23)

Replace suspended domain names (more details)

Full history

1.0.9 (2017-11-12)

Add support for OpenNIC's New Nation TLDs (.ku .te .ti .uu)

Full history

1.0.8 (2017-11-11)

Make toolbar button be disabled for BTLD tabs

Add a notification appearing when all site's IPs are down

Full history

1.0.6 (2017-09-18)

Add support for OpenNIC TLDs (.bbs and others)

Add more API servers

Full history

1.0.1 (2017-08-24)

Fix retry at another API server on failure

Full history

1.0 (2017-08-20)

First version

BDNS For Firefox

Firefox SourceMozilla Add-OnsDownload (xpi)

Firefox 55 or above is required

1.0.12 (2018-04-23)

Replace suspended domain names (more details)

Full history

1.0.9 (2017-11-12)

Add support for OpenNIC's New Nation TLDs (.ku .te .ti .uu)

Full history

1.0.8 (2017-11-11)

Add toolbar button (disabled for BTLD tabs)

Fix "The referenced resource will be unavailable until you reload this page"

Improve the message appearing when a site's IP doesn't respond

Full history

1.0.7 (2017-10-01)

Add resolver timeout and retry at another

Full history

1.0.6 (2017-09-18)

Add support for OpenNIC TLDs (.bbs and others)

Add more API servers

Full history

1.0.1 (2017-08-24)

Fix retry at another API server on failure

Full history

1.0 (2017-08-20)

First version

What is the Problem?

In today's Internet, when you request any website by name - say, google.com - your browser asks central name-servers for how to reach that website.

These servers, called root servers, are operated by the same entity, usually a governmental organization. This system is prone to censorship, commercial takeover, tracking, data retention and other abuse.

Visitors can be misdirected. Owners can lose their websites.

Diagram showing request passing through multiple parties on its way to requested root servers
You ISP .com Root Servers

– Where is google.com?

– At 8.8.48.35

Why Blockchain?

Blockchain – the same mechanism used in Bitcoin – removes the need for a central entity. Instead, there is a network of independent nodes, each with full knowledge on all existing websites.

This kind of access cannot be tampered with. It can be only turned off – together with the Internet.

Diagram showing autonomous resolution of a domain name

– Where is google.com?

– At 8.8.48.35

Why First Step?

Blockchain-DNS allows your browser to locate the website but it does not hide browsing from your ISP or government. They can still block it.

If they do, you have to use more sophisticated tools - such as VPN or Tor - to create an encrypted tunnel between your computer and the website.

Blockchain-DNS is a quick, hassle-free to avoid some degree of censorship. However, you still trade trust for one central servers for others. Servers of BDNS itself can be blocked or compromised.

Diagram showing that after name resolution request still has to pass through more parties on its way to the website
You ISP .com Root Servers

– Where is google.com?

– At 8.8.48.35

– Take me to 8.8.48.35

– Hello, Google

Let's Go!

  1. Store icon Open Chrome Web Store
    and click Install
  2. See the new button BDNS icon in your toolbar
    and start browsing

Don't know where to go?

Check out nx.bit or our catalogue of blockchain domains.

Back Forward Refresh Info http://nx.bit/ BDNS

Known Issues

Chrome requires http:// prefix (issue)

If you type an address like nx.bit into the address bar and hit Enter - you will be taken to Google search page. You have to type http://nx.bit or nx.bit/ (with a slash) instead.

Chrome does not allow https:// at B-TLD pages (issue)

An attempt to access a B-TLD page over HTTPS will produce an error page titled This site can't be reached and this error code:

ERR_PROXY_CERTIFICATE_INVALID

Report new issue Spamhaus, et cetera

Issues Caused by Spamhaus

In April 2018, BDNS experienced a wave of suspensions: 7 domain names were abruptly un-delegated and 1 API server was shut down and its account suspended under the accusation of "TOS violation". No prior notices were received.

Thanks to the redundancy, browser addons continued to work despite this event, only displaying occasional informational messages about unreachable resolver (and automatically retrying).

We are not a Botnet Controller

We have been reported that the domain name(s) 'bdns.name, bdns.tv', under your
control, are involved in propagating malware over the internet.

These domain name(s) are used to control infected computers (bots) using a so
called "botnet controller".

Evidence:

1. [1]https://www.spamhaus.org/sbl/archive/SBL396825
2. [2]https://www.spamhaus.org/sbl/archive/SBL396911

Please note, such activities are against our AUP.

Hence, we have suspended the domain name(s).

The first link read as follows (the second was entirely irrelevant):

Archived SBL Listing for SBL396825
46.28.204.81/32 was listed on the Spamhaus Block List - SBL
46.28.204.81/32 was listed on the Spamhaus Botnet Controller List - BCL
2018-03-30 16:43:11 GMT | solarcom.ch
QuantLoader botnet controller @46.28.204.81
---
The host at this IP address is obviously operated by cybercriminals.
It is running a malware botnet controller which is being used to control
infected computers (bots) around the globe using a trojan horse.

Malware botnet controller located at 46.28.204.81 on port 443 TCP:
$ telnet 46.28.204.81 443
Trying 46.28.204.81...
Connected to 46.28.204.81.
Escape character is '^]'

$ nslookup 46.28.204.81
hosted-by.solarcom.ch

Other malicious domain names hosted on this IP address:
bdns.co 46.28.204.81
bdns.name 46.28.204.81
bdns.at 46.28.204.81

Referencing malware binaries:
13cfcb457cf08fc9d7356bdf2202eb7b - AV detection: 32/68 (47.06%)
5dae8c502582fe89fb1c83e3b4c0866e - AV detection: 11/68 (16.18%)
62b504d59b6e877dbd9fe49dc01fceae - AV detection: 4/66 (6.06%)
7b1caff26936d4d50ea146b08c7a3574 - AV detection: 18/68 (26.47%)
92769328e49f5c5cdd4d3967c8081a6b - AV detection: 8/64 (12.50%)
993e99d8463a42df283121864ec9d66f - AV detection: 18/66 (27.27%)

This made as much sense as banning root DNS servers because they propagate IPs of malware hubs to anyone who can do nslookup.

Of course, Spamhaus cared about this reasoning not at all:

We have reviewed the DBL listing for bdns[.]name and decided that
we will retain that listing at this time. We do not discuss criteria
for inclusion in DBL, however it includes many factors. Your domain
matches several of those criteria.

DBL listings expire over time, so if our systems do not see your
domain for a while it will drop out of DBL zone. Many factors which
affect your domain's reputation may also change over time, so by
engaging in good reputation practices it will eventually drop out of
DBL. For more information, please see DBL FAQ "Why is my domain listed
in DBL?" http://www.spamhaus.org/faq/section/Spamhaus%20DBL#371

The hosting company (solarcom.ch, with their numerous aliases - cloudc.me, incloudibly.net, coinshost.com and others) while agreeing this was not a ToS violation per se, promised to issue a refund but that never happened.

Measures were taken to disperse the infrastructure even further (kudos, prq). However, because some ISPs use Spamhaus blocklists to "protect" users, BDNS may be still unreachable in those parts of the world.

Find up-to-date list of domain names at GitHub.

Just like with Bitcoin, you have a choice: either use a convenient 3rd party service or set up your own. Fortunately, there are many alternatives with various degrees of reliability and sophistication.

Options below are ordered by preference, starting with less reliable and secure.

Resolvers

These only help you locate the website. They offer no transport encryption or anonymity but are easy to configure and have negligible impact on performance.

Blockchain-DNS

  • Browser extension (Chrome/Firefox/Opera)
  • Support for unofficial TLDs (Namecoin/Emercoin)
  • Support for unofficial TLDs (OpenNIC)
  • Only works inside the browser where it's installed
  • Encrypted
  • Centralized, single provider
  • Has known problems due to browser API limitations
  • Has easy-to-use public web API

dotBit.me

  • Browser extension (Chrome)
  • Support for unofficial TLDs (Namecoin)
  • Only works inside the browser where it's installed
  • All issues of BDNS also apply here
  • Encrypted
  • Centralized, single provider, easy to block

FreeSpeedMe

  • Browser extension (Chrome)
  • Support for unofficial TLDs (Namecoin/Emercoin)
  • Only works inside the browser where it's installed
  • All issues of BDNS also apply here
  • Encrypted
  • Centralized, single provider, easy to block

PeerName

  • Custom software (Win/*nix/Mac)
  • Support for unofficial TLDs (Namecoin/Emercoin)
  • Only works inside the browser where it's installed
  • All issues of BDNS also apply here
  • Encrypted
  • Centralized, single provider, easy to block
  • Takes 7 days to notice changes on the blockchain
  • Ignores subdomains, treting them as CNAME to base domain
  • Allows purchasing a domain name (BDNS gives it for free)

GoodbyeDPI

  • Custom software (Win/*nix/Mac)
  • Easy to install and use
  • Only works for HTTP(S) traffic
  • No anonymization
  • Easy to block
  • Enables several tricks to bypass some ISP's filters
  • Autonomous, no 3rd party at all

Custom DNS Server

  • Built-in support in OS (Win/*nix/Mac/Android)
  • Support for TLDs depends on the provider
  • Works system-wide (all browsers and other programs)
  • Many independent providers
  • Centralized, unencrypted, easy to spoof and block

DNSCrypt

  • Custom software (Win/*nix/Mac)
  • Support for TLDs depends on the provider
  • Works system-wide (all browsers and other programs)
  • Encrypted, hard to block
  • Centralized, few providers

Full Node (Best Option)

  • Custom software (Win/*nix/Mac)
  • Installation requires advanced skills
  • Support for TLDs of your choice
  • Fully decentralized, very hard to block
  • M
  • Maximum trust
  • Maximum flexibility
  • Can use via BDNS addon or as a custom DNS

Tunnels (Browsers)

These create a secure connection to the website. They ensure your privacy and may circumvent censorship but are more complex and impair performance.

HTTP (Web) Proxy

  • Built-in support in many programs
  • Only works for HTTP(S) traffic
  • Encryption depends on the target resource
  • Untrusted provider may read and/or alter your traffic
  • Leaks DNS
  • Only affects the program where it's configured for use
  • Performance impact depends on provider's location
  • Many independent providers, hard to block
  • Centralized

friGate

  • Browser extension (Chrome/Firefox/Opera)
  • Only works for HTTP(S) traffic
  • Support for unofficial TLDs (OpenNIC)
  • Stopped supporting Namecoin/Emercoin TLDs
  • Untrusted provider may read and/or alter your traffic
  • Built-in DNS resolution
  • Only works inside the browser where it's installed
  • All issues of BDNS also apply here
  • Little performance impact
  • Encrypted
  • Centralized, single provider, easy to block
  • Automatically enables a proxy to work around ISP censorship

SOCKS Proxy

  • Built-in support in many programs
  • Works for TCP/UDP traffic
  • Encryption depends on the target resource
  • Untrusted provider may read and/or alter your traffic
  • Leaks DNS
  • Only affects the program where it's configured for use
  • Performance impact depends on provider's location
  • Many independent providers
  • Centralized, easy to block

ssh

  • Untrusted provider may read and/or alter your traffic
  • Built-in DNS resolution
  • Only affects the program where it's configured for use
  • Wide-spread technology used in everyday work environments
  • Performance impact depends on provider's location
  • Encrypted, hard to block, traffic compression
  • Centralized
  • Creates tunnel to a specific resource (-L/-R) or using SOCKS5 (-D)
  • Trivial set up using any Linux VPS

ReQrypt

  • Custom software (Win/*nix/Mac)
  • Installation and use require advanced skills
  • Only works for HTTP(S) traffic
  • Encryption depends on the target resource
  • No anonymization
  • Untrusted provider may read and/or alter your traffic
  • Little performance impact
  • Centralized, single provider
  • Allows bypassing most ISPs' DPI filters (censorship)

VPN

  • Built-in support in OS (Win/*nix/Mac/iOS/Android)
  • Untrusted provider may read and/or alter your traffic
  • Works system-wide (all browsers and other programs)
  • Wide-spread technology used in everyday work environments
  • Performance impact depends on provider's location
  • Hard to block
  • Centralized
  • Encryption ranges from very bad (PPTP) to good

OpenVPN

  • Built-in support in OS (Win/*nix/Mac/Android)
  • Untrusted provider may read and/or alter your traffic
  • Works system-wide (all browsers and other programs)
  • Wide-spread technology
  • Performance impact depends on provider's location
  • Encrypted, hard to block
  • Centralized

SoftEther

  • Custom software (Win/*nix/Mac)
  • Untrusted provider may read and/or alter your traffic
  • Works system-wide (all browsers and other programs)
  • Performance impact depends on provider's location
  • Encrypted, hard to block
  • Centralized, few providers

Tor

  • Built-in support in OS (Win/*nix/Mac/Android)
  • Wide-spread technology
  • Client and server anonymization
  • Built-in DNS resolution
  • Only affects the program where it's configured for use
  • High performance impact
  • Encrypted, almost fully decentralized, very hard to block
  • Can be used over SOCKS5 protocol
  • Clearnet traffic can be read and/or altered
  • Many clearnet sites (banks, etc.) reject visitors from Tor

I2P

  • Custom software (Win/*nix/Mac)
  • Installation and use require advanced skills
  • Client and server anonymization
  • Only affects the program where it's configured for use
  • High performance impact
  • Encrypted, fully decentralized, very hard to block
  • Offers no exit into clearnet