From e14d7f0571a3bd383990207f317dcf6389905675 Mon Sep 17 00:00:00 2001
From: Brian Cunnie Let’s test it from the command line using Yields, hopefully: [connection timed out] If you want to run your own DNS server, it's simple: you can compile from source or you can use one of our pre-built binaries. In the following example, we install & run
- our server within a docker container:dig
:
+ dig +short 169-254-169-254.xip.example.com @ns-gce.nono.io.
dig @ns-gce.nono.io. 169-254-169-254.xip.example.com +short
169.254.169.254
But I Want My Own DNS Server!
docker run -it --rm fedora curl -L https://github.com/cunnie/sslip.io/releases/download/2.1.2/sslip.io-dns-server-linux-amd64 -o dns-server chmod +x dns-server ./dns-server 2> dns-server.log & dnf install -y bind-utils -dig +short 127-0-0-1.sslip.io @localhost # returns "127.0.0.1"+dig @localhost 127-0-0-1.sslip.io +short # returns "127.0.0.1" +
You can acquire TLS certificates for your externally-accessible hosts from certificate authorities (CAs) such + as Let's Encrypt. The easiest mechanism to acquire a certificate would be to use the HTTP-01 challenge. It requires, at a + minimum, a web server running on your machine. The Caddy web server is one + of the most popular examples. For example, if you had a webserver with the IP address 52.0.56.137, you could + obtain a TLS certificate for "52.0.56.137.sslip.io", or "www.52.0.56.137.sslip.io", or + "prod.www-52-0-56-137.sslip.io".
+If you have procured a wildcard certificate for your branded / white label / custom sslip.io-style subdomain, + you may install it on your machines for TLS-verified connections.
+When using a TLS wildcard certificate in conjunction with your branded sslip.io style subdomain, you must + use dashes not dots as separators. For example, if you have the TLS certificate for + *.xip.example.com, you could browse to https://www-52-0-56-137.xip.example.com/ but not + https://www.52.0.56.137.xip.example.com/.
+Acquiring wildcard certificates for "sslip.io" (not white-labeled) subdomains, e.g. "*.52-0-56-137.sslip.io", + is possible but more complicated. For those interested, the procedure is described here.
+For a real-world example of a TLS wildcard cert and sslip.io domain, browse https://52-0-56-137.sslip.io.
+VMware employees can download the *.sslip.io TLS private key here.
If you have a wildcard certificate for your sslip.io-style subdomain, you may install it on your machines for - TLS-verified connections.
-When using a TLS wildcard certificate in conjunction with your branded sslip.io style subdomain, you must - use dashes not dots as separators. For example, if you have the TLS certificate for - *.xip.example.com, you could browse to https://52-0-56-137.xip.example.com/ but not - https://52.0.56.137.xip.example.com/.
-For a real-world example of a TLS wildcard cert and sslip.io domain, browse https://52-0-56-137.sslip.io.
-VMware employees can download the *.sslip.io TLS private key here.
[Status] A status of “build failing” rarely means the system is failing. It’s