Show HN: Backname.io – every IP address gets its own domain

  • Nice. I've seen other usecases for this.

    Accessing an IPv4 address on a IPv6-only network with NAT64/DNS64 is only possible if you access that IPv4 via a DNS name that resolves to the IPv4 address. DNS64 will turn your A record into an AAAA record, with the IPv4 address mapped to a v6 addrsss that the NAT64 layer knows how to "undo".

    I've seen others need this a few times in practice.

  • The problem is someone ends up using one of these in production. Then backname.io becomes an attractive target.

    It would be cool to have it as a locally installed custom DNS resolver on the developers computer though.

  • I'm failing to see the utility of this if I still have to type the IP address. Also, it fails using local address like 192-168-1-1.backname.io where it might be usefull somehow, so, please explain. Thanks.

  • xip.io was indeed useful. nip.io seems to still work.

    Isn't the main useful aspect that you can do xyz.1.2.3.4.backname.io where xyz is anything you want? Perhaps you set this up anyway, but would be worth mentioning.

  • There is also http://traefik.me/

    There is https://ipq.co/ and https://fdns.uk/ that will let you create a name to point to a chosen ip.

  • https://github.com/ncruces/keyless was my attempt to provide you with the necessary tools to build your own service that would not only:

      - give you a domain for any IP (even local IPs);
      - give you SSL on that domain (even local IPs!);
      - abide by Let's Encrypt terms.

  • Does this serve the same purpose as .in-addr.arpa?

  • I can think of at least four reasons and security concerns not to use a service like this:

    - Exposing a potentially private IP to an external service

    - If testing local IPs, adds a requirement for an internet connection

    - Must trust that it will always resolve to the actual IP not another one

    - Requires your service to accept a hostname that it likely shouldn't

  • Just by looking at the handler, it is not RFC compliant. I do not see SOA record being generated properly nor do I see a proper handling of nxdomain vs nodatae responses.

    See RFC 2308.

  • > 127-0-0-1.backname.io resolves to 127.0.0.1

    Is this enough to fool Edge (Windows 10) into allowing you to view your local Apache development environment?

  • This is cool! So I can spin up a server, then instantly get a domain and then an SSL cert, nice!

  • http://afraid.org