From e14d7f0571a3bd383990207f317dcf6389905675 Mon Sep 17 00:00:00 2001 From: Brian Cunnie Date: Tue, 9 Feb 2021 08:22:57 -0800 Subject: [PATCH] Website Documentation: Expand TLS options - Use HTTP-01 challenge for run-of-the-mill certificates - White label domains can acquire their own wildcard certificates - VMware employees have access to *.sslip.io wildcard - Use DNS-01 challenge for *.w-x-y-z.sslip.io wildcards --- k8s/document_root/index.html | 46 ++++++++++++++++++++++-------------- 1 file changed, 28 insertions(+), 18 deletions(-) diff --git a/k8s/document_root/index.html b/k8s/document_root/index.html index 07837ba..0c9f002 100644 --- a/k8s/document_root/index.html +++ b/k8s/document_root/index.html @@ -147,21 +147,44 @@ src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js">

Let’s test it from the command line using dig:

-
dig +short 169-254-169-254.xip.example.com @ns-gce.nono.io.
+
dig @ns-gce.nono.io. 169-254-169-254.xip.example.com +short

Yields, hopefully: [connection timed out]

169.254.169.254

But I Want My Own DNS Server!

If you want to run your own DNS server, it's simple: you can compile from source or you can use one of our pre-built binaries. In the following example, we install & run - our server within a docker container:

+ "https://github.com/cunnie/sslip.io/tree/master/bosh-release/src/sslip.io-dns-server">source or you can use + one of our pre-built binaries. In the following + example, we install & run our server within a docker container:

 docker run -it --rm fedora
 curl -L https://github.com/cunnie/sslip.io/releases/download/2.1.2/sslip.io-dns-server-linux-amd64 -o dns-server
 chmod +x dns-server
 ./dns-server 2> dns-server.log &
 dnf install -y bind-utils
-dig +short 127-0-0-1.sslip.io @localhost # returns "127.0.0.1"
+dig @localhost 127-0-0-1.sslip.io +short # returns "127.0.0.1" +

TLS

+

You can acquire TLS certificates for your externally-accessible hosts from certificate authorities (CAs) such + as Let's Encrypt. The easiest mechanism to acquire a certificate would be to use the HTTP-01 challenge. It requires, at a + minimum, a web server running on your machine. The Caddy web server is one + of the most popular examples. For example, if you had a webserver with the IP address 52.0.56.137, you could + obtain a TLS certificate for "52.0.56.137.sslip.io", or "www.52.0.56.137.sslip.io", or + "prod.www-52-0-56-137.sslip.io".

+

If you have procured a wildcard certificate for your branded / white label / custom sslip.io-style subdomain, + you may install it on your machines for TLS-verified connections.

+
+

When using a TLS wildcard certificate in conjunction with your branded sslip.io style subdomain, you must + use dashes not dots as separators. For example, if you have the TLS certificate for + *.xip.example.com, you could browse to https://www-52-0-56-137.xip.example.com/ but not + https://www.52.0.56.137.xip.example.com/.

+
+

Acquiring wildcard certificates for "sslip.io" (not white-labeled) subdomains, e.g. "*.52-0-56-137.sslip.io", + is possible but more complicated. For those interested, the procedure is described here.

+

For a real-world example of a TLS wildcard cert and sslip.io domain, browse https://52-0-56-137.sslip.io.

+

VMware employees can download the *.sslip.io TLS private key here.

-

TLS (Transport Layer Security)

-

If you have a wildcard certificate for your sslip.io-style subdomain, you may install it on your machines for - TLS-verified connections.

-
-

When using a TLS wildcard certificate in conjunction with your branded sslip.io style subdomain, you must - use dashes not dots as separators. For example, if you have the TLS certificate for - *.xip.example.com, you could browse to https://52-0-56-137.xip.example.com/ but not - https://52.0.56.137.xip.example.com/.

-
-

For a real-world example of a TLS wildcard cert and sslip.io domain, browse https://52-0-56-137.sslip.io.

-

VMware employees can download the *.sslip.io TLS private key here.


Footnotes

[Status] A status of “build failing” rarely means the system is failing. It’s