Caveats and a quick Docker example included 👍
A common developer trick that’s become popular is to work with valid domain names handled by magic DNS resolvers, like nip.io, xip.io, or sslip.io. If you include any IP address as part of their subdomain, their DNS servers will resolve to that IP authoritatively.
For example, you can use the domain
127.0.0.1.sslip.io anywhere and it will resolve globally to
127.0.0.1. The IP address itself is not available anywhere except your local machine, but the domain is considered a valid, resolvable name worldwide. This gives developers a chance to work locally without resorting to
127.0.0.1, or tricky hacks, like editing the
These magic DNS servers might be able to help because they can also be used with public IP addresses. That means, they can be used to assign a valid domain to a public IP in situations where those addresses would not normally have one.
Now, let’s go off topic for a moment. Take notice on your Internet connection. As you may know, most broadband providers are rolling out IPv6 to their customers. This is becoming a common practice as part of the IPv6 worldwide adoption. If that’s the case for you, it’s very likely that all of the most modern devices connected to your home Wi-Fi already have a public IPv6 address. Smartphones, laptops, tablets, desktop computers… Yes! In some creepy way, they are ALL available online, reachable from anywhere in the world where IPv6 is routable.
So, go ahead and check out the IP addresses you have in your network interface.
If you see some inet6 address with global scope, that means you are hot, online, right now!
If you’ve already put 2 and 2 together, you’ve realized you have the pieces you need to create a Let’s Encrypt certificate:
Public IP address + Valid domain name that resolves to that address
Here’s an example:
$ nslookup 2800-3f0-4001-810-0-0-0-200e.sslip.io Server: 18.104.22.168 Address: 22.214.171.124#53 Non-authoritative answer: Name: 2800-3f0-4001-810-0-0-0-200e.sslip.io Address: 2800:3f0:4001:810::200e
Note that the IPv6 address needs to be cleaned up in order to be used with sslip.io. Following IPv6 rules, expand
:: into its respective zeroes. Then, replace every colon (
:) with a dash (
-). Repeated zeroes can still be compacted into a single digit.
Now you can use
certbot to emit a valid certificate. If you don’t have
certbot installed, you can easily run it using the official Docker image.
docker run --rm -it --name certbot --network host \ -v $(pwd)/data:/etc/letsencrypt \ certbot/certbot \ --test-cert --dry-run \ --standalone \ certonly --agree-tos \ -m "firstname.lastname@example.org" \ -d <FORMATTED-IPv6>.sslip.io
The above will run certbot in dry-run mode using Let’s Encrypt staging endpoint. It won’t create a certificate, but it will test the waters and tell you if it’s possible.
To go ahead and create a real certificate, remove the
The local volume directory
./data will contain everything generated inside
/etc/letsencrypt, including certbot configuration files and the certificate. To renew it, change
renew, keeping the same
This is pretty much the same task that would be automated somewhere in a real server with public IP addresses, except you can do this manually using a valid domain that points to your local machine.
Installing the certificate is still up to you. That depends on the software, platform and frameworks you are using.
But now, you can test even more scenarios with a valid SSL certificate 😉
Some caveats to remember
As usual, for Let’s Encrypt to work, you still need a public IP address, either v4 or v6. This hint about using IPv6 comes from the fact that its adoption has been increasing worldwide. So, chances are that you already have one by now.
This same trick could also come in handy for your home brew projects, like Raspberry Pi boxes. But in any case, you might be out of luck if your broadband provider hasn’t rolled out IPv6 in your area yet.
By using your IPv6 address, you must also make sure that the software you are running — or developing on — supports IPv6. Aside from its clients resolving names on any public DNS server, the server software itself must also be able to bind to an IPv6 address in order for you to use the
<IPv6>.sslip.io domain. Otherwise, the certificate will be valid, but useless.
You might also be out of luck if your local machine is behind a corporate network that does not support or provide public IPv6 addresses. Corporate policies will likely not allow you to have one to begin with.
Either way, if you happen to be on the IPv6 network, you might also want to check your local firewall rules to make sure they allow incoming connections to port 80, at least temporarily.