DNS piracy blocking orders: Google, Cloudflare, and OpenDNS respond differently

Why Target DNS Resolvers Instead of Registrars?

  • Courts go after big public DNS resolvers (Google, Cloudflare, OpenDNS) because they’re few, visible, and under local or allied jurisdiction, unlike scattered registrars and offshore registries.
  • Hitting resolvers gives wide coverage and also keeps users on centralized, monitorable infrastructure instead of pushing them to harder‑to‑track setups.
  • Some argue that for local blocking (e.g. in Argentina) it’s more logical to order local ISPs and resolvers than distant registries like Verisign.

Censorship, Borders, and Fundamental Rights

  • One side: states have the right to regulate activities inside their borders via courts; blocking pirate sites via due process is analogous to other injunctions.
  • Other side: information control is qualitatively different; censorship infrastructures historically expand from “piracy / CSAM / drugs” to political and social control.
  • Debate over whether there “should” be a right to private encrypted communication, even if no law currently enshrines it.
  • Some insist the internet should be borderless; others say that free‑internet exceptionalism already failed in places like China.

Piracy, ‘Learning’, and Fair Use

  • Accessing pirated material is rarely prosecuted; uploading/redistribution (e.g. via BitTorrent) is the legal hook.
  • Claiming sports streams are “for learning” is widely seen as untenable; no broad “learning exception” exists, only narrow fair‑use tests.
  • Some argue that if a work can ever be fairly used, intermediaries hosting it shouldn’t automatically be liable, drawing analogies to libraries.

How Blocking is Implemented and Circumvented

  • Most ordinary users use ISP or browser‑default DNS; a small minority run self‑hosted recursive resolvers or VPNs, which easily bypass basic DNS blocking.
  • In the highlighted Belgian case, Cloudflare both resolves DNS and fronts the site as a CDN, so it can serve an HTTPS 451 page directly. Where Cloudflare only runs the resolver and not the CDN, it would need different tactics (e.g. refusing or black‑holing queries).
  • OpenDNS’s approach is to stop serving users in countries that demand blocking, effectively “leaving” those jurisdictions.

Is DNS ‘Broken’? Alternatives and Protocol Details

  • Some argue that any resolver obeying political/legal blocks is “not fit for purpose”; others respond that DNS itself is fine and the issue is centralization and corporate reliance.
  • Suggested mitigations: self‑hosted recursive resolvers (Unbound, BIND), many small resolvers, VPNs, Tor, alternative networks (Freenet/Hyphanet), or decentralized naming (Namecoin/ENS), though these raise scalability and blockability questions.
  • RFC 8914’s “Censored” extended DNS error (code 16) is noted as a standardized way to signal legally imposed blocking.