Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Forced Update Improvement #15

Closed
iAnomaly opened this issue May 5, 2012 · 7 comments
Closed

Forced Update Improvement #15

iAnomaly opened this issue May 5, 2012 · 7 comments

Comments

@iAnomaly
Copy link

iAnomaly commented May 5, 2012

I'd love to see the Forced Update event set the IP to a random value and immediately set again to actual value. This circumvents silly free DDNS providers who do not consider an update with an unchanged IP address to actual be an update. Simply put, DDNS providers who expire free hosts addresses after an inactivity threshold punish users who's address remain constant for long periods of time and reward those who's change frequently.

@taem
Copy link
Contributor

taem commented May 17, 2012

Any ideas which random IP should be generated?

@iAnomaly
Copy link
Author

Is that a trick question? =P If I told you WHICH IP, it wouldn't be random.

Seriously though, the random IP doesn't matter because it should be IMMEDIATELY changed to the actual IP after. The only purpose is to trick the DDNS server into thinking the IP changed when in fact, it didn't.

Does this make sense?

Cheers

On May 17, 2012, at 1:03 AM, Timur Birshreply@reply.github.com wrote:

Any ideas which random IP should be generated?


Reply to this email directly or view it on GitHub:
#15 (comment)

@taem
Copy link
Contributor

taem commented May 18, 2012

Hi,

Thursday 17 May 2012 20:18, Cameron Boulton:

Is that a trick question? =P If I told you WHICH IP, it wouldn't be random.

Sorry, my English is not very well.
I meant which kind of IP should be generated - private/public?

Seriously though, the random IP doesn't matter because it should be
IMMEDIATELY changed to the actual IP after. The only purpose is to trick
the DDNS server into thinking the IP changed when in fact, it didn't.

Does this make sense?

I guess.

Timur

@troglobit
Copy link
Owner

Interesting idea! We've had a few issues with customers not getting their records updated properly. This workaround could actually prove useful.

@iAnomaly
Copy link
Author

Glad to hear. I recommend only performing this on a FORCED event, not every usual check for an IP change. DDNS providers could start banning users who abuse this feature. Another reason a "random" IP is important compared to 0.0.0.0

On May 20, 2012, at 3:13 PM, Joachim Nilssonreply@reply.github.com wrote:

Interesting idea! We've had a few issues with customers not getting their records updated properly. This workaround could actually prove useful.


Reply to this email directly or view it on GitHub:
#15 (comment)

@troglobit
Copy link
Owner

I shall see what I can do, but it is likely I will not have time to work on this until the fall.

As usual, patches are most welcome! :)

@troglobit
Copy link
Owner

This issue has been stuck a bit too long for my comfort. I've both been out of time and also out of clue on the random IP# as well as unclear on what DDNS service providers would appreciate a client that accesses too fast.

What about this?

  1. Triggered by external event, SIGUSR1 and new config option: --fake-address-change
  2. Send update to (all) DDNS provider(s) in .conf using random address from 203.0.113.0/24, RFC5737
  3. Wait random number of seconds (1-10)
  4. Send new update with actual IP address to (all) DDNS prover(s) in .conf

troglobit added a commit that referenced this issue Nov 24, 2013
This commit implements support for -z, --fake-address which is only used
on SIGUSR1, forced update.  When --fake-address is given and the user
sends SIGUSR1 inadyn will send a DDNS server update for all records
using the "random" address 203.0.113.42, it then waits a second before
sending another update for all records using real address.

Needless to say, this is entirely out of spec, but could be useful for
some users who always get the same lease and would then be deregistered
by their DDNS provider.  See issue #15 on GitHub for more details.

   #15

Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants