cancel
Showing results for 
Search instead for 
Did you mean: 

DDNS not working

etperez22
Level 7
Hello anyone having issues with DDNS not updating?


mine has been updating for the last couple of months.
here is the syslog.

Dec 21 16:48:47 rc_service: httpds 7239:notify_rc restart_ddns_le
Dec 21 16:48:47 start_ddns: update WWW.DYNDNS.ORG dyndns, wan_unit 0
Dec 21 16:48:47 ddns update: ez-ipupdate: starting...
Dec 21 16:48:47 ddns update: connected to members.dyndns.org (162.88.175.12) on port 443.
Dec 21 16:48:47 ddns update: request successful
Dec 21 16:48:47 ddns update: asusddns_update: 0
Dec 21 16:48:47 ddns: ddns update ok
Dec 21 16:48:47 ddns update: exit_main
Dec 21 16:48:50 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:48:50 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-reg: bad comm
Dec 21 16:48:50 kernel: acme-client: transfer buffer: [{ "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", "re
Dec 21 16:48:50 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:48:50 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad comm
Dec 21 16:48:50 kernel: acme-client: transfer buffer: [{ "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", "re
Dec 21 16:49:00 rc_service: service 3835:notify_rc restart_letsencrypt
Dec 21 16:49:03 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:49:03 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-reg: bad comm
Dec 21 16:49:03 kernel: acme-client: transfer buffer: [{ "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", "re
Dec 21 16:49:03 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:49:03 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad comm
Dec 21 16:49:03 kernel: acme-client: transfer buffer: [{ "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", "re
Dec 21 16:50:00 rc_service: service 4016:notify_rc restart_letsencrypt
Dec 21 16:50:01 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:50:01 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-reg: bad comm
Dec 21 16:50:02 kernel: acme-client: transfer buffer: [{ "bilUnW5Vc3o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.
Dec 21 16:50:02 kernel: acme-client: SSL_read return 5: Success
Dec 21 16:50:02 kernel: acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: bad comm
Dec 21 16:50:02 kernel: acme-client: transfer buffer: [{ "bilUnW5Vc3o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "https://acme-v01.api.
Dec 21 16:53:33 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc013127538
Dec 21 16:53:33 kernel: ^[[0m
Dec 21 16:53:33 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc00195ac18
Dec 21 16:53:33 kernel: ^[[0m
Dec 21 16:53:42 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc019eecc18
Dec 21 16:53:42 kernel: ^[[0m
Dec 21 16:53:51 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc00195aa60
Dec 21 16:53:51 kernel: ^[[0m
Dec 21 16:53:51 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc0160cba60
Dec 21 16:53:51 kernel: ^[[0m
Dec 21 16:53:51 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc00195a1c8
Dec 21 16:53:51 kernel: ^[[0m
Dec 21 16:53:51 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc02c572538
Dec 21 16:53:51 kernel: ^[[0m
Dec 21 16:53:51 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc01365f8a8
Dec 21 16:53:51 kernel: ^[[0m
Dec 21 16:54:36 kernel: ^[[0;33;41mBLOG ERROR blog_request :blog_key corruption when deleting flowfor net_p=ffffffc01561f380
Dec 21 16:54:36 kernel: ^[[0m
4,095 Views
3 REPLIES 3

Natey2
Level 7
For Asus routers, try the DDNS at asuscomm.com and test lookup at http://iplookup.asus.com/nslookup.php

Sent using Tapatalk

I am hoping this Beta Version is what will fix the issue.


Version 9.0.0.4.384.81468 Beta Version
2020/01/1541.84 MBytes
ASUS RT-AC5300 Firmware version 9.0.0.4.384.81468
Please be noted this is a beta version, if you want to roll back to the official version, you will need to process manual firmware update in web GUI.

-Fixed Let's encrypt related issues

Please unzip the firmware file first then check the MD5 code.
MD5: bb205d844963f6b91586433529563e57

etperez22 wrote:
I am hoping this Beta Version is what will fix the issue.


Version 9.0.0.4.384.81468 Beta Version
2020/01/1541.84 MBytes
ASUS RT-AC5300 Firmware version 9.0.0.4.384.81468
Please be noted this is a beta version, if you want to roll back to the official version, you will need to process manual firmware update in web GUI.

-Fixed Let's encrypt related issues

Please unzip the firmware file first then check the MD5 code.
MD5: bb205d844963f6b91586433529563e57


Hello!

Do you by chance know when the official version will be out for the DDNS Encrypt fix? And how to I download the Beta Version?