sslip.io web page has new message

- Like xip.io, except
  - allow dashes as well as dots
  - allow IPv6
  - allow branding
  - allow wildcard TLS

We deprecate the old message, which was about using SSL.
This commit is contained in:
Brian Cunnie
2018-02-28 20:17:51 -08:00
parent 859107de14
commit 84d55750dc
2 changed files with 198 additions and 107 deletions

View File

@@ -43,8 +43,10 @@ src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]-->
<div id="navbar" class="collapse navbar-collapse"> <div id="navbar" class="collapse navbar-collapse">
<ul class="nav navbar-nav"> <ul class="nav navbar-nav">
<li class="active"><a href="/">Home</a></li> <li class="active"><a href="/">Home</a></li>
<!--
<li><a href="faq.html">FAQ</a></li> <li><a href="faq.html">FAQ</a></li>
<li><a href="about.html">About</a></li> <li><a href="about.html">About</a></li>
-->
</ul> </ul>
</div> </div>
<!--/.nav-collapse --> <!--/.nav-collapse -->
@@ -52,115 +54,108 @@ src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]-->
</nav> </nav>
<div class="container"> <div class="container">
<div class="starter-template"> <div class="starter-template">
<h1>sslip.io</h1> <h3 id="sslip.io">sslip.io</h3>
<h4><i><b></b></i></h4> <p>Operational Status: <a href="https://ci.nono.io/?groups=sslip.io"><img src="https://ci.nono.io/api/v1/pipelines/sslip.io/jobs/check-dns/badge" alt="ci.nono.io" /></a> <sup><a href="#status" class="alert-link">[Status]</a></sup></p>
<h3>Turn your red lock into a green lock!</h3> <p><em>sslip.io</em> is a DNS (<a href="https://en.wikipedia.org/wiki/Domain_Name_System">Domain Name System</a>) service that, when queried with a hostname with an embedded IP address, returns that IP Address. It was inspired by and uses much of the code of <a href="http://xip.io">xip.io</a>, which was created by <a href="https://github.com/sstephenson">Sam Stephenson</a></p>
<div class="alert alert-danger" role="alert"> <p>Here are some examples:</p>
<span class="glyphicon glyphicon-exclamation-sign" aria-hidden="true"></span> <table class="table">
<span class="sr-only">Error:</span> <thead>
2015-09-12: <b>This service is no longer available</b>. <tr class="header">
The original certificate for the sslip.io domain has <th>hostname</th>
been revoked and a new one issued on the condition that <th>IP Address</th>
the private key not be published. <i>Pivotal Software employees <th>Notes</th>
may access the key via <a style="color:#800;" href="https://drive.google.com/open?id=0ByweFu4TspftMWJPdE1US0hQTGc">Google Drive</a></i>. </tr>
If you're interested in deploying a custom version of </thead>
sslip.io, follow <tbody>
<a style="color:#800;" href="https://github.com/cloudfoundry-community/xip-release#deploying-a-custom-version-of-xip-to-amazon-aws"> <tr class="odd">
these instructions</a>. <td>192.168.0.1.sslip.io</td>
</div> <td>192.168.0.1</td>
<br /> <td>dot separators</td>
<div class="col-sm-5"> </tr>
<img src="img/red_lock.png" height="71" /> </div> <tr class="even">
<div class="col-sm-1"> <td>192-168-0-1.sslip.io</td>
<p></p> <td>192.168.0.1</td>
</div> <td>dash separators</td>
<div class="col-sm-5"> </tr>
<img src="img/green_lock.png" height="71" /> </div> <tr class="odd">
<div class="col-sm-1"></div> <td>www.192.168.0.1.sslip.io</td>
<div class="row"></div> <td>192.168.0.1</td>
<h3>What is it?</h3> <td>subdomain</td>
<p><b>sslip.io</b> is a means for developers to test against </tr>
valid SSL certificates without the bother of purchasing <tr class="even">
them. Two components make this possible:</p> <td>www.192-168-0-1.sslip.io</td>
<ol> <td>192.168.0.1</td>
<li>a special DNS backend that maps crafted hostnames to <td></td>
IP addresses (e.g. <i>192-168-0-1.sslip.io</i> resolves </tr>
to <i>192.168.0.1</i>) (similar to xip.io)</li> <tr class="odd">
<li>a wildcard SSL certificate for *.sslip.io and the corresponding <td>www-192-168-0-1.sslip.io</td>
key, both downloadable from GitHub</li> <td>192.168.0.1</td>
</ol> <td>embedded</td>
<p>Install the certificate and key on the server, modify the </tr>
server's configuration to use the certificate and key, <tr class="even">
and restart the daemon. After that, browse the server <td>1.sslip.io</td>
using the sslip.io hostname via HTTPS (e.g. <td>::1</td>
<a href="https://52-0-56-137.sslip.io">https://52-0-56-137.sslip.io</a>) <td>IPv6 — always use dashes</td>
and receive a valid SSL connection (green lock), all </tr>
in a matter of seconds. </p> <tr class="odd">
<h3>How do I use it? </h3> <td>2607-f8b0-400a-800200e.sslip.io</td>
<p class="lead">First, find your server's IP address to determine its sslip.io <td>2607:f8b0:400a:800::200e</td>
hostname <td>IPv6</td>
</p> </tr>
<p>Your server's sslip.io hostname is a mash-up of your server's </tbody>
IP address and the <b>sslip.io</b> domain. Here are some
examples:
</p>
<table class="sslip">
<tr>
<th>Server's IP Address</th>
<th>sslip.io Hostname</th>
</tr>
<tr>
<td>127.0.0.1</td>
<td>127-0-0-1.sslip.io</td>
</tr>
<tr>
<td>192.168.1.80</td>
<td>192-168-1-80.sslip.io</td>
</tr>
<tr>
<td>172.16.0.80</td>
<td>172-16-0-80.sslip.io</td>
</tr>
<tr>
<td>52.0.56.137</td>
<td><a href="https://52-0-56-137.sslip.io/">52-0-56-137.sslip.io</a></td>
</tr>
</table> </table>
<br /> <h3 id="branding">BRANDING</h3>
<p class="lead">Second, download sslip.io's SSL certificate and key from <p>sslip.io can be used to brand your own site (you dont need to use the sslip.io domain). For example, say you own the domain “example.com”, and you want your subdomain, “xip.example.com” to have xip.io-style features. To accomplish this, youd need to set the following four DNS servers as NS records for the subdomain “xip.example.com”</p>
GitHub <table class="table">
</p> <thead>
<p>Download the SSL key (<a href="https://raw.githubusercontent.com/cunnie/sslip.io/master/ssl/sslip.io.key.pem">sslip.io.key.pem</a>) <tr class="header">
and wildcard SSL certificate chain (<a href="https://raw.githubusercontent.com/cunnie/sslip.io/master/ssl/sslip.io.chained.crt.pem">sslip.io.chained.crt.pem</a>) <th>hostname</th>
from GitHub. You may use <i>curl</i> if you prefer the <th>IP address</th>
command line:</p> <pre> <th>Location</th>
curl -OL https://raw.githubusercontent.com/cunnie/sslip.io/master/ssl/sslip.io.key.pem </tr>
curl -OL https://raw.githubusercontent.com/cunnie/sslip.io/master/ssl/sslip.io.chained.crt.pem</pre> </thead>
<p class="lead">Third, configure the webserver with the SSL certificate <tbody>
&amp; key</p> <tr class="odd">
<p>Configure the server's configuration file's SSL portion <td><code>ns-aws.nono.io.</code></td>
to use the SSL certificate &amp; key downloaded from <td>52.0.56.137</td>
GitHub. Here is a sample from sslip.io's webserver's <td>USA</td>
<i>nginx.conf</i> (modified for clarity):</p> <pre> </tr>
server { <tr class="even">
listen 443 ssl; <td><code>ns-gce.nono.io.</code></td>
ssl_certificate /etc/ssl/sslip.io.chained.crt.pem; <td>104.155.144.4</td>
ssl_certificate_key /etc/ssl/sslip.io.key.pem;</pre> <td>USA</td>
<p>Here's a similar configuration for Apache 2.4's <i>httpd-ssl.conf</i>:</p><pre> </tr>
Listen 443 <tr class="odd">
SSLCertificateFile "/etc/ssl/sslip.io.chained.crt.pem" <td><code>ns-azure.nono.io.</code></td>
SSLCertificateKeyFile "/etc/ssl/sslip.io.key.pem"</pre> <td>52.187.42.158</td>
<p class="lead">Finally, restart your webserver and browse to its sslip.io <td>Singapore</td>
address via HTTPS</p> </tr>
<p>Browse to your webserver's sslip.io hostname, e.g. <a href="https://52-0-56-137.sslip.io">https://52-0-56-137.sslip.io</a> <tr class="even">
(assuming that 52.0.56.137 is the IP address of your <td><code>ns-he.nono.io.</code></td>
webserver, which it isn't because that's the IP address <td>78.46.204.247</td>
of <i>our</i> webserver). Admire the beautiful green <td>Germany</td>
lock in your browser's address bar.</p> </tr>
<div class="row"> </tbody>
<p></p> </table>
<p>Lets test it from the command line using <code>dig</code>:</p>
<pre><code>dig +short 169-254-169-254.xip.example.com @ns-gce.nono.io.</code></pre>
<p>Yields, hopefully: <sup><a href="#timeout" class="alert-link">[connection timed out]</a></sup></p>
<pre><code>169.254.169.254</code></pre>
<h4 id="tls-transport-layer-security">TLS (Transport Layer Security)</h4>
<p>If you have a wildcard certificate for your sslip.io-style subdomain, you may install it on your machines for TLS-verified connections.</p>
<div class="alert alert-warning" data-role="alert">
<p>When using a TLS wildcard certificate in conjunction with your branded sslip.io style subdomain, you must <b>use dashes not dots</b> as separators. For example, if you have the TLS certificate for <i>*.xip.example.com</i>, you could browse to https://https://52-0-56-137.xip.example.com/ but not https://52.0.56.137.xip.example.com/.</p>
</div> </div>
<p>&copy; 2015 Brian Cunnie, Pivotal Software</p> <p>For a real-world example of a TLS wildcard cert and sslip.io domain, browse <a href="https://52-0-56-137.sslip.io" class="uri">https://52-0-56-137.sslip.io</a>.</p>
<p>Pivotal employees can download the sslip.io TLS private key <a href="https://drive.google.com/open?id=0ByweFu4TspftMWJPdE1US0hQTGc">here</a>.</p>
<hr />
<h4 id="footnotes">Footnotes</h4>
<p><a name="status"><sup>[Status]</sup></a> A status of “build failing” rarely means the system is failing. Its more often an indication that when the servers were last checked (currently every six hours), the CI (continuous integration) <a href="https://ci.nono.io/teams/main/pipelines/sslip.io">server</a> had difficulty reaching one of the four sslip.io nameservers. Thats normal. <sup><a href="#timeout" class="alert-link">[connection timed out]</a></sup></p>
<p><a name="timeout"><sup>[connection timed out]</sup></a></p>
<p>DNS runs over <a href="https://en.wikipedia.org/wiki/User_Datagram_Protocol">UDP</a> which has no guaranteed delivery, and its not uncommon for the packets to get lost in transmission. DNS clients are programmed to seamlessly query a different server when that happens. Thats why DNS, by fiat, requires at least two nameservers (for redundancy). From <a href="https://tools.ietf.org/html/rfc1034">IETF (Internet Engineering Task Force) RFC (Request for Comment) 1034</a>:</p>
<blockquote>
<p>A given zone will be available from several name servers to insure its availability in spite of host or communication link failure. By administrative fiat, we require every zone to be available on at least two servers, and many zones have more redundancy than that.</p>
</blockquote>
</div> </div>
</div> </div>
<!-- /.container --> <!-- /.container -->

96
document_root/index.md Normal file
View File

@@ -0,0 +1,96 @@
### sslip.io
Operational Status: [![ci.nono.io](https://ci.nono.io/api/v1/pipelines/sslip.io/jobs/check-dns/badge)](https://ci.nono.io/?groups=sslip.io)
<sup><a href="#status" class="alert-link">[Status]</a></sup>
_sslip.io_ is a DNS ([Domain Name
System](https://en.wikipedia.org/wiki/Domain_Name_System)) service that, when
queried with a hostname with an embedded IP address, returns that IP Address.
It was inspired by and uses much of the code of [xip.io](http://xip.io), which
was created by [Sam Stephenson](https://github.com/sstephenson)
Here are some examples:
| hostname | IP Address | Notes |
| ---------- | ------------ | ------- |
| 192.168.0.1.sslip.io | 192.168.0.1 | dot separators |
| 192-168-0-1.sslip.io | 192.168.0.1 | dash separators |
| www.192.168.0.1.sslip.io | 192.168.0.1 | subdomain |
| www.192-168-0-1.sslip.io | 192.168.0.1 | |
| www-192-168-0-1.sslip.io | 192.168.0.1 | embedded |
| --1.sslip.io | ::1 | IPv6 — always use dashes |
| 2607-f8b0-400a-800--200e.sslip.io | 2607:f8b0:400a:800::200e | IPv6 |
### BRANDING
sslip.io can be used to brand your own site (you don't need to use the sslip.io
domain). For example, say you own the domain "example.com", and you want your
subdomain, "xip.example.com" to have xip.io-style features. To accomplish this,
you'd need to set the following four DNS servers as NS records for the
subdomain "xip.example.com"
| hostname | IP address | Location |
| --------------------- | ------------- | -------- |
| `ns-aws.nono.io.` | 52.0.56.137 | USA |
| `ns-gce.nono.io.` | 104.155.144.4 | USA |
| `ns-azure.nono.io.` | 52.187.42.158 | Singapore |
| `ns-he.nono.io.` | 78.46.204.247 | Germany |
Let's test it from the command line using `dig`:
```
dig +short 169-254-169-254.xip.example.com @ns-gce.nono.io.
```
Yields (hopefully
<sup><a href="#timeout" class="alert-link">[connection timed out]</a></sup>
):
```
169.254.169.254
```
#### TLS (Transport Layer Security)
If you have a wildcard certificate for your sslip.io-style subdomain, you may
install it on your machines for TLS-verified connections.
<div class="alert alert-warning" role="alert">
When using a TLS wildcard certificate in conjunction with your branded
sslip.io style subdomain, you must <b>use dashes not dots</b> as separators.
For example, if you have the TLS certificate for <i>\*.xip.example.com</i>,
you could browse to https://https://52-0-56-137.xip.example.com/ but not
https://52.0.56.137.xip.example.com/.
</div>
For a real-world example of a TLS wildcard cert and sslip.io domain, browse
[https://52-0-56-137.sslip.io]( https://52-0-56-137.sslip.io).
Pivotal employees can download the sslip.io TLS private key
[here](https://drive.google.com/open?id=0ByweFu4TspftMWJPdE1US0hQTGc).
---
#### Footnotes
<a name="status"><sup>[Status]</sup></a>
A status of "build failing" rarely means the system is failing. It's more
often an indication that when the servers were last checked (currently every
six hours), the CI (continuous integration)
[server](https://ci.nono.io/teams/main/pipelines/sslip.io) had difficulty
reaching one of the four sslip.io nameservers. That's normal.
<sup><a href="#timeout" class="alert-link">[connection timed out]</a></sup>
<a name="timeout"><sup>[connection timed out]</sup></a>
DNS runs over [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) which
has no guaranteed delivery, and it's not uncommon for the packets to get lost
in transmission. DNS clients are programmed to seamlessly query a different
server when that happens. That's why DNS, by fiat, requires at least two
nameservers (for redundancy). From [IETF (Internet Engineering Task Force) RFC
(Request for Comment) 1034](https://tools.ietf.org/html/rfc1034):
> A given zone will be available from several name servers to insure its
availability in spite of host or communication link failure. By administrative
fiat, we require every zone to be available on at least two servers, and many
zones have more redundancy than that.