echo -e "GET /nic/update?hostname=nome.dyndns.org HTTP/1.1\nHost: members.dyndns.org\nAuthorization: Basic $(echo -n "login:senha"|/usr/sbin/b64 -e)\nUser-Agent: Cia BFW 2.32.2\n\n"|nc members.dyndns.org 8245
HTTP/1.1 200 OK
Date: Wed, 28 Jun 2017 15:05:21 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/plain
Accept-Ranges: none
Connection: close
Transfer-Encoding: chunked
7
badauth
0
WWW.DynDNS.org : Checking need for update...
Current IP : 187.58.222.104
WWW.DynDNS.org : Old IP : 187.58.222.104
WWW.DynDNS.org : Forcing Update
Updating WWW.DynDNS.org -
HTTP/1.1 200 OK
Date: Wed, 28 Jun 2017 19:37:38 GMT
Server: Apache
X-User-Status: free
X-UpdateCode: n
Vary: Accept-Encoding
Content-Type: text/plain
Accept-Ranges: none
Connection: close
Transfer-Encoding: chunked
14
nochg 187.58.222.104
0
Response from WWW.DynDNS.org
========================
Your browser sent a request that this server could not understand.
========================
Se eu peço para checar aparece a mesma mensagem de quando funcionava o add-on:
WWW.DynDNS.org : Checking need for update...
Current IP : 187.58.222.104
WWW.DynDNS.org : Old IP : 187.58.222.104
WWW.DynDNS.org : The Update of is not needed
#!/bin/sh
#
# Dynamic DNS update client to www.dyndns.com
# by Claudio Roberto Cussuol
# 26/05/2003
#
. /etc/coyote/coyote.conf
# Language selection
. /ipupdate/language/ipupdate.enu # Load the default language file (English)
# Include an aditional language files if there is one
if [ -n "$LANGUAGE_WEBADMIN" ] ; then
CODLANG=`echo $LANGUAGE_WEBADMIN | tr [A-Z] [a-z]`
[ -r /ipupdate/language/ipupdate.${CODLANG} ] && . /ipupdate/language/ipupdate.${CODLANG}
fi
[ "$DYNDNS_UPDATE" != "YES" ] && exit
[ "$1" != "log" ] && echo $dynipddno : $dynipchup
[ "$1" != "log" ] && logger DYNDNS:Checking need for update...
. /ipupdate/checkip
if [ -e /var/log/dyndns.ip ] ; then
OLD=`cat /var/log/dyndns.ip`
else
OLD=`nslookup $DYNDNS_DOMAIN | tail -n 1 | sed s/Address:\ \ \ \ //`
fi
[ "$1" != "log" ] && echo $dynipddno : $dynipolip $OLD
[ "$1" != "log" ] && logger DYNDNS:Old IP.......: $OLD
if [ "$1" = "force" ] ; then
echo $dynipddno : $dynipforc
logger DYNDNS:Forcing update
OLD=""
fi
if [ "$CURRENT" != "$OLD" ] ; then
USUARIO=`echo -n "$DYNDNS_USERNAME:$DYNDNS_PASSWORD" | /usr/sbin/b64 -e`
[ "$1" != "log" ] && echo $dynipupng $dynipddno - $DYNDNS_DOMAIN
echo -e "GET /nic/update?system=$DYNDNS_SYSTEM&hostname=$DYNDNS_DOMAIN&mx=$DYNDNS_MX&backmx=$DYNDNS_BACKMX&wildcard=$DYNDNS_WILDCARD HTTP/1.1\r\nUser-Agent: Mozilla/4.0\r\nHost: members.dyndns.org\r\nAuthorization: Basic $USUARIO\r\n\r\n" | nc members.dyndns.org 8245 > /var/log/dyndns.txt
RESPONSE=`tail -n 3 /var/log/dyndns.txt | head -n 1`
RESPCODE=`echo "$RESPONSE" | cut -f 1 -d " "`
if [ "$RESPCODE" = "good" -o "$RESPCODE" = "nochg" ] ; then
echo $CURRENT > /var/log/dyndns.ip
fi
[ "$1" != "log" ] && echo $dynipresp $dynipddno
[ "$1" != "log" ] && echo ========================
[ "$1" != "log" ] && echo $RESPONSE
[ "$1" != "log" ] && echo ========================
[ "$1" != "log" ] && echo
echo "======================================" >> /var/log/ipupdate.log
date >> /var/log/ipupdate.log
echo $CURRENT >> /var/log/ipupdate.log
echo Updating DynDNS - $DYNDNS_DOMAIN >> /var/log/ipupdate.log
echo $RESPONSE >> /var/log/ipupdate.log
logger DYNDNS:Updating DynDNS - $DYNDNS_DOMAIN - $CURRENT
logger DYNDNS:$RESPONSE
else
[ "$1" != "log" ] && echo $dynipddno : $dynipupof $DYNDNS_DOMAIN $dynipnond
[ "$1" != "log" ] && logger DYNDNS:The update of $DYNDNS_DOMAIN is not needed
echo $CURRENT > /var/log/dyndns.ip
fi
echo -e "GET /nic/update?system=$DYNDNS_SYSTEM&hostname=$DYNDNS_DOMAIN&mx=$DYNDNS_MX&backmx=$DYNDNS_BACKMX&wildcard=$DYNDNS_WILDCARD HTTP/1.1\r\nUser-Agent: Mozilla/4.0\r\nHost: members.dyndns.org\r\nAuthorization: Basic $USUARIO\r\n\r\n" | nc members.dyndns.org 8245 > /var/log/dyndns.txt
echo -e "GET /nic/update?hostname=$DYNDNS_DOMAIN HTTP/1.1\nHost: members.dyndns.org\nAuthorization: Basic $USUARIO\nUser-Agent: Company - Device - Version Number\n\n" | nc members.dyndns.org 8245 > /var/log/dyndns.txt
celocao escreveu:Como posso fazer para enviar o ipupdate atualizado para o site do BrazilFW?
Jun 29 05:09:31 brazilfw daemon.info dnsmasq[5609]: DHCPACK(eth0) 192.168.14.2 90:8d:78:71:3b:4c MARTA_ROUTER
Jun 29 05:10:29 brazilfw user.info kernel: eth1: Setting half-duplex based on MII #1 link partner capability of 0000.
Jun 29 05:11:31 brazilfw daemon.info pppd[3325]: No response to 3 echo-requests
Jun 29 05:11:31 brazilfw daemon.notice pppd[3325]: Serial link appears to be disconnected.
Jun 29 05:11:31 brazilfw daemon.info ip-down: ip-down script called with: ppp0 38400 187.58.222.104 179.184.126.190
Jun 29 05:11:31 brazilfw daemon.info dnsmasq[5609]: read /etc/hosts - 87 addresses
Jun 29 05:11:33 brazilfw daemon.warn dnsmasq[5609]: no servers found in /etc/resolv.dns, will retry
Jun 29 05:11:37 brazilfw daemon.notice pppd[3325]: Connection terminated.
Jun 29 05:11:37 brazilfw daemon.info pppd[3325]: Connect time 1407.7 minutes.
Jun 29 05:11:37 brazilfw daemon.info pppd[3325]: Sent 3501966632 bytes, received 267120620 bytes.
Jun 29 05:11:37 brazilfw daemon.err pppoe[3288]: read (asyncReadFromPPP): Session 6: Input/output error
Jun 29 05:11:37 brazilfw daemon.info pppoe[3288]: Sent PADT
Jun 29 05:11:42 brazilfw daemon.info pppd[3325]: Serial connection established.
Jun 29 05:11:42 brazilfw daemon.info pppd[3325]: Using interface ppp0
Jun 29 05:11:42 brazilfw daemon.notice pppd[3325]: Connect: ppp0 <--> /dev/pts/0
Jun 29 05:11:47 brazilfw daemon.debug pppoe[2124]: PADS: Service-Name: ''
Jun 29 05:11:47 brazilfw daemon.info pppoe[2124]: PPP session is 1 (0x1)
Jun 29 05:11:49 brazilfw user.info kernel: eth1: Setting full-duplex based on MII #1 link partner capability of c1e1.
Jun 29 05:11:50 brazilfw daemon.notice pppd[3325]: PAP authentication succeeded
Jun 29 05:11:50 brazilfw daemon.notice pppd[3325]: local IP address 179.178.114.233
Jun 29 05:11:50 brazilfw daemon.notice pppd[3325]: remote IP address 179.184.126.190
Jun 29 05:11:50 brazilfw daemon.notice pppd[3325]: primary DNS address 200.175.5.139
Jun 29 05:11:50 brazilfw daemon.notice pppd[3325]: secondary DNS address 200.175.89.139
Jun 29 05:11:50 brazilfw daemon.info ip-up: ip-up script called with: ppp0 38400 179.178.114.233 179.184.126.190
Jun 29 05:11:50 brazilfw daemon.info dnsmasq[5609]: read /etc/hosts - 87 addresses
Jun 29 05:11:52 brazilfw daemon.info dnsmasq[5609]: reading /etc/resolv.dns
Jun 29 05:11:52 brazilfw daemon.info dnsmasq[5609]: using nameserver 200.175.89.139#53
Jun 29 05:11:52 brazilfw daemon.info dnsmasq[5609]: using nameserver 200.175.5.139#53
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: started, version 2.46 cachesize 1500
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: compile time options: no-IPv6 GNU-getopt no-DBus no-I18N TFTP
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: asynchronous logging enabled, queue limit is 5 messages
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.50.2 -- 192.168.50.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.49.2 -- 192.168.49.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.48.2 -- 192.168.48.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.47.2 -- 192.168.47.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.46.2 -- 192.168.46.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.45.2 -- 192.168.45.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.44.2 -- 192.168.44.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.43.2 -- 192.168.43.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.42.2 -- 192.168.42.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.41.2 -- 192.168.41.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.40.2 -- 192.168.40.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.39.2 -- 192.168.39.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.38.2 -- 192.168.38.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.37.2 -- 192.168.37.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.36.2 -- 192.168.36.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.35.2 -- 192.168.35.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.34.2 -- 192.168.34.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.33.2 -- 192.168.33.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.32.2 -- 192.168.32.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.31.2 -- 192.168.31.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.30.2 -- 192.168.30.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.29.2 -- 192.168.29.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.28.2 -- 192.168.28.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.27.2 -- 192.168.27.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.26.2 -- 192.168.26.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.25.2 -- 192.168.25.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.24.2 -- 192.168.24.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.23.2 -- 192.168.23.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.22.2 -- 192.168.22.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.21.2 -- 192.168.21.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.20.2 -- 192.168.20.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.19.2 -- 192.168.19.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.18.2 -- 192.168.18.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.17.2 -- 192.168.17.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.16.2 -- 192.168.16.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.15.2 -- 192.168.15.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.14.2 -- 192.168.14.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.13.2 -- 192.168.13.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.12.2 -- 192.168.12.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.11.2 -- 192.168.11.2, lease time 1h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: DHCP, IP range 192.168.0.10 -- 192.168.0.10, lease time 2h
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: reading /etc/resolv.dns
Jun 29 05:11:53 brazilfw daemon.info rc.qos: QOS script called with: ppp0
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: using nameserver 200.175.89.139#53
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: using nameserver 200.175.5.139#53
Jun 29 05:11:53 brazilfw daemon.info dnsmasq[4411]: read /etc/hosts - 87 addresses
Jun 29 05:11:53 brazilfw user.info kernel: HTB init, kernel part version 3.17
Jun 29 05:11:53 brazilfw user.info kernel: HTB init, kernel part version 3.17
Jun 29 05:11:53 brazilfw user.warn kernel: HTB: quantum of class 11000 is big. Consider r2q change.
Jun 29 05:11:53 brazilfw user.info kernel: HTB init, kernel part version 3.17
Jun 29 05:11:53 brazilfw user.warn kernel: HTB: quantum of class 11000 is big. Consider r2q change.
Jun 29 05:11:54 brazilfw daemon.info rc.firewall: Firewall script called with: ppp0
Jun 29 05:11:54 brazilfw user.notice root: Coyote Masquerading Script called with: ppp0
Jun 29 05:11:55 brazilfw user.notice root: DYNDNS:Checking need for update...
Jun 29 05:11:55 brazilfw user.notice root: IPUPDATE:Current IP...: 178.179.118.201
Jun 29 05:11:55 brazilfw user.notice root: DYNDNS:Old IP.......: 188.53.218.108
Jun 29 05:12:05 brazilfw user.notice root: DYNDNS:Updating DynDNS - vipcheck.dlinkddns.com - 178.179.118.201
Jun 29 05:12:05 brazilfw user.notice root: DYNDNS:good 178.179.118.201^M
Jun 29 05:12:05 brazilfw user.notice root: Setting clock using timeserver time-b.nist.gov:
Jun 29 05:12:11 brazilfw user.notice root: Success.
Jun 29 05:12:11 brazilfw user.notice root: Set the bios clock using timeserver
Jun 29 05:12:28 brazilfw daemon.info thttpd[7793]: spawned CGI process 7150 for file 'cgi-bin/index.cgi'
Jun 29 05:12:32 brazilfw daemon.info thttpd[7793]: spawned CGI process 7560 for file 'cgi-bin/diags.cgi'
Jun 29 05:12:33 brazilfw daemon.info dnsmasq[4411]: DHCPREQUEST(eth0) 192.168.29.2 f8:d1:11:80:06:ab
Voltar para BrazilFW 2.x - Ajuda em Geral (Todas as Línguas)
Usuários navegando neste fórum: Nenhum usuário registrado e 6 visitantes