Documentation

Everything you need to claim, configure, and secure your free shi-n.ing subdomains.

๐Ÿชถ Overview

Fioness is a free subdomain service running on Cloudflare Workers. Claim up to 3 subdomains on shi-n.ing and point them using any standard DNS record type โ€” no account required.

  • Free forever โ€” 3 subdomains per account, no payment required
  • Instant activation โ€” live in under a second
  • Full DNS support โ€” A, AAAA, CNAME, MX, SPF, DKIM, DMARC, TXT, CAA, SRV, NS, PTR and more
  • Secure โ€” HSTS mandatory for .ing TLDs, optional TOTP 2FA on accounts
  • Anonymous-first โ€” claim without an account, link to one later

Claiming a Subdomain

Visit get.shi-n.ing to claim. No account needed.

1

Enter a name

Lowercase letters, numbers, hyphens. Blocked names (brands, infrastructure) cannot be claimed.

2

Choose a DNS record type

CNAME, A, AAAA, MX, SPF, DKIM, DMARC, TXT, CAA, SRV, NS, or PTR โ€” all supported.

3

Enter the record value

The form shows the correct format per type. For CNAME enter a hostname; for A enter an IPv4 address.

4

Click Claim

Active in ~20โ€“40 ms. The Worker starts proxying traffic immediately.


DNS Record Types โ€” Quick Reference

All DNS record type information is sourced from Cloudflare's DNS documentation. Each record has a maximum wire-format size of 4,096 bytes (RFC 1035). Multiple records with the same name and type must not exceed 8,192 characters combined.

TypeCategoryPurposeExample value
AIP resolutionMaps name โ†’ IPv4 address203.0.113.42
AAAAIP resolutionMaps name โ†’ IPv6 address2001:db8::1
CNAMEIP resolutionAliases name โ†’ another hostnamemysite.com
MXEmailSpecifies mail servermail.mysite.com
SPFEmail authLists authorised sending serversv=spf1 include:mysite.com ~all
DKIMEmail authCryptographic email signing keyv=DKIM1; k=rsa; p=...
DMARCEmail authPolicy for unauthenticated emailv=DMARC1; p=reject; rua=mailto:...
TXTSpecializedFree-form text; verification tokensmy-verification-value
CAASpecializedRestricts certificate authorities0 issue "letsencrypt.org"
SRVSpecializedHost & port for services (VOIP, XMPPโ€ฆ)10 5 5060 sip.mysite.com
NSDelegationNameserver for subdomain delegationns1.mysite.com
PTRReverse DNSMaps IP back to hostnamemyserver.mysite.com
SOAAuthorityZone metadata; auto-managed by Cloudflareautomatic
DS / DNSKEYDNSSECCryptographic chain-of-trustvia CF DNSSEC setup
SVCB / HTTPSConnectionAdvertises HTTP/2 & HTTP/3 supportauto-generated by CF

A & AAAA Records

A records map a name to one or more IPv4 addresses. AAAA records map to IPv6. These are the only record types that can be proxied through Cloudflare's CDN.

FieldNotes
NameSubdomain or zone apex (@). Labels max 63 chars; FQDN max 253 chars.
AddressYour origin server IP. Cannot be a Cloudflare IP. For AAAA, stored in canonical notation (e.g. fe80::0:0:1 โ†’ fe80::1).
TTLCache duration. Proxied records default to Auto (300 s). DNS-only lets you customise.
ProxyProxied (โ˜) or DNS only. Only proxied records get Cloudflare CDN benefits.
Note: Alternative IPv4 notations like 1.1 for 1.0.0.1 are not supported for A records.

Example

TypeNameValue
Ayou.shi-n.ing203.0.113.42
AAAAyou.shi-n.ing2001:db8::1

CNAME Records

CNAME (Canonical Name) records alias one domain name to another. The final target in the chain must resolve to a valid A or AAAA record. Queries for other record types on the same name are not supported when using CNAME.

FieldNotes
NameThe subdomain being configured.
TargetThe hostname where traffic is directed (e.g. mysite.com or myapp.netlify.app).
TTLAuto (300 s) when proxied.
CDN chaining: If your CNAME target is already served by another CDN (Netlify, Vercel, etc.) and you also proxy through Cloudflare, you may encounter errors. Use DNS-only mode or point directly to an IP in that case.

Cloudflare uses CNAME flattening to resolve the chain at the edge, returning the final IP directly โ€” improving performance and enabling CNAME at the zone apex.

Example

TypeNameValue
CNAMEyou.shi-n.ingmysite.com

MX Records

A Mail Exchange (MX) record specifies which mail server is responsible for accepting email for a domain. Without an MX record, email to that domain cannot be delivered.

FieldNotes
NameThe domain that receives email.
Mail serverHostname of the mail server (must resolve to an A or AAAA record).
PriorityLower number = higher priority. Multiple MX records are tried lowest-first.

Example

TypeNameValue
MXyou.shi-n.ingmail.mysite.com

Email Authentication: SPF, DKIM, DMARC

These three records work together to prove email is legitimate and prevent your domain being used for spoofing. They are recommended even for domains that never send email โ€” set restrictive values to block abuse.

SPF โ€” Sender Policy Framework

Lists IP addresses and services authorised to send email on behalf of your domain. Receiving servers check this before accepting a message.

Use caseValue
Google Workspacev=spf1 include:_spf.google.com ~all
Custom serverv=spf1 ip4:203.0.113.1 ~all
No email sentv=spf1 -all

DKIM โ€” DomainKeys Identified Mail

Uses a public/private key pair. The private key signs outgoing email on your mail server; the public key is published in DNS so receivers can verify the signature.

FieldValue
Name formatselector._domainkey (the selector is provided by your mail provider)
Value formatv=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A...

DMARC โ€” Domain-based Message Authentication

Instructs receiving mail servers what to do when SPF or DKIM checks fail, and where to send aggregate reports.

Policy (p=)Effect
noneMonitor only โ€” no action on failures. Good starting point.
quarantineSend failing messages to spam.
rejectReject failing messages outright. Strongest protection.
v=DMARC1; p=reject; rua=mailto:dmarc@mysite.com; adkim=s; aspf=s
Tip: Start with p=none and monitor reports for a few weeks before moving to quarantine or reject.

TXT Records

TXT (text) records store arbitrary text strings in DNS. They are commonly used for domain ownership verification before issuing SSL certificates, and as the underlying format for SPF, DKIM, and DMARC.

Content is one or more text strings in double quotes. Cloudflare adds quotes automatically if omitted when creating the record.

Size limit: Max 4,096 bytes per record (wire format). Multiple same-name TXT records must not exceed 8,192 characters combined.

Example

TypeNameValue
TXTyou.shi-n.inggoogle-site-verification=abc123xyz

CAA Records

Certificate Authority Authorization (CAA) records specify which CAs may issue SSL/TLS certificates for your domain. This prevents rogue or misissued certificates.

TagMeaning
issueAuthorises CA to issue standard (non-wildcard) certificates
issuewildAuthorises CA to issue wildcard certificates
iodefURL or email to report unauthorised issuance attempts
0 issue "letsencrypt.org"
0 issuewild "sectigo.com"
0 iodef "mailto:security@mysite.com"

SRV Records

Service (SRV) records specify the hostname and port for specific services such as SIP (VOIP), XMPP (messaging), and others that need DNS-based service discovery.

Record names use the format _service._proto.name (e.g. _xmpp._tcp.you.shi-n.ing). SRV records cannot be proxied.

FieldDescription
PriorityLower = higher priority when multiple SRV records exist
WeightLoad-balancing weight among same-priority records
PortTCP/UDP port the service listens on
TargetHostname of the server

In the Fioness value field, enter as: priority weight port hostname

10 5 5060 sip.mysite.com

SVCB & HTTPS Records

Service Binding (SVCB) and HTTPS records let a client learn upfront how to connect to a server โ€” including whether to use HTTP/2 or HTTP/3 โ€” without an initial plaintext connection. This reduces latency and improves security.

If your domain has HTTP/2 or HTTP/3 enabled with Cloudflare's Universal SSL and proxied DNS records, Cloudflare generates HTTPS records automatically. You do not need to add them manually in most cases.

Spec: Defined in RFC 9460. Supported by modern browsers; older clients transparently fall back to A/AAAA lookups.

NS Records

Nameserver (NS) records indicate which DNS server is authoritative for a zone or subdomain. You only need to add NS records when delegating a subdomain to a different DNS provider than the parent zone.

RFC 1912 limit: A delegation should not include more than 7 nameservers for the same name. Cloudflare supports up to 10 but best practice is 7 or fewer. Requests exceeding 10 will be rejected.

Example (subdomain delegation)

TypeNameValue
NSsub.you.shi-n.ingns1.mysite.com

PTR Records

Pointer (PTR) records map an IP address back to a hostname โ€” the reverse of an A record. They live in reverse DNS zones (in-addr.arpa for IPv4, ip6.arpa for IPv6) and are used for reverse lookups (e.g. mail server identity checks).

PTR records are typically controlled by your hosting provider. You can use them in Fioness if you manage the reverse zone for your IP block.

Example

TypeNameValue
PTRyou.shi-n.ingmyserver.mysite.com

SOA Records

The Start of Authority (SOA) record stores zone metadata: primary nameserver, admin email address, serial number, and cache TTLs. Every DNS zone has exactly one SOA record.

If you use Cloudflare as your authoritative DNS, you do not need to create an SOA record โ€” Cloudflare creates and maintains it automatically when you add the zone to your account.

Enterprise only: Cloudflare Enterprise accounts can customise SOA values as zone defaults or per-zone overrides from the DNS Records page.

DNSSEC โ€” DS & DNSKEY Records

DNSSEC uses cryptographic signatures to ensure DNS responses are authentic and tamper-proof. It creates a verifiable chain of trust from the root DNS servers down to individual records in your zone.

  • DNSKEY records โ€” public cryptographic keys stored in your zone, used to verify signed records.
  • DS records โ€” delegation signer records stored at the parent TLD registry, establishing the chain of trust from the parent to your zone.
Most domains do not need to add these manually. Enable DNSSEC from DNS โ†’ Settings in the Cloudflare dashboard โ€” Cloudflare generates keys automatically and gives you the DS record value to add to your domain registrar.

How It Works

Cloudflare's wildcard DNS record catches all *.shi-n.ing requests and routes them to the Worker before reaching any origin.

Browser โ†’ Cloudflare Edge โ†’ Worker
                                 โ†“
                    KV lookup: subdomain:yourname
                                 โ†“
                    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
                    โ”‚                         โ”‚
               Record found             Not found
               Reverse proxy โ†’         โ†’ 404 page
               target destination

The Worker injects HSTS headers on every response (mandatory for .ing TLDs on the HSTS preload list) and forwards the full URL path and query string to your configured target.


Domain Verification

After claiming, Fioness provides a TXT token you can add to your own DNS to prove you control the target. Add it at your DNS provider:

TypeNameValue
TXT_fioness.you.shi-n.ingfioness-verify=abc123โ€ฆ

Verification is optional but may be required for future features such as custom certificates.


Accounts

Claim anonymously with a browser token, or create an account to manage subdomains across devices. Account features:

  • Manage subdomains from any device or browser
  • Receive email confirmations and password reset links
  • Enable TOTP two-factor authentication
  • Same 3-subdomain limit as anonymous users

Passwords are hashed (SHA-256 + email salt) before storage. Sessions are 30-day bearer tokens in localStorage.


Two-Factor Authentication

TOTP-based 2FA per RFC 6238 โ€” works with Google Authenticator, Authy, 1Password, Bitwarden, and any TOTP app.

1

Go to Manage โ†’ Account & Security

Click "Enable 2FA" to generate a QR code.

2

Scan the QR code

Open your authenticator app and scan, or manually enter the secret key.

3

Confirm with a code

Enter the 6-digit code to confirm. 2FA activates immediately.

4

Sign in with 2FA

Future logins require your authenticator code after the password.


Blocked Subdomain Names

Certain names are blocked to prevent abuse:

  • Reserved (www, mail, api, get, etc.) โ€” infrastructure. Cannot be claimed.
  • Brand / scam-risk (dhl, amazon, paypal, etc.) โ€” visitors are redirected to get.shi-n.ing to prevent phishing.

To suggest an addition, contact hi@shi-n.ing.