My ISP requires a forced daily disconnection, only choice I have is the time of day so every night at 4am UTC I issue a "ifup wan":
Mon Jun 12 04:00:05 2023 daemon.notice netifd: tunnel '6in4-he_2_fra' link is up
Mon Jun 12 04:00:10 2023 user.notice 6in4-he_2_fra: update 1/3: timeout
Mon Jun 12 04:00:17 2023 user.notice 6in4-he_2_fra: update 2/3: abuse
Mon Jun 12 04:00:17 2023 user.notice 6in4-he_2_fra: updated
Mon Jun 12 04:00:20 2023 user.notice firewall: Reloading firewall due to ifup of he_2_fra (6in4-he_2_fra)
Mon Jun 12 04:00:22 2023 user.notice nlbwmon: Reloading nlbwmon due to ifup of he_2_fra (6in4-he_2_fra)
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' has lost the connection
Tue Jun 13 04:00:00 2023 daemon.notice netifd: tunnel '6in4-he_2_fra' link is down
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Tue Jun 13 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Tue Jun 13 04:00:04 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Tue Jun 13 04:00:04 2023 daemon.notice netifd: Interface 'he_2_fra' is now up
Tue Jun 13 04:00:04 2023 daemon.notice netifd: tunnel '6in4-he_2_fra' link is up
Tue Jun 13 04:00:09 2023 user.notice 6in4-he_2_fra: update 1/3: Failed to send request: Operation not permitted
Tue Jun 13 04:00:19 2023 user.notice 6in4-he_2_fra: update 2/3: timeout
Tue Jun 13 04:00:19 2023 user.notice firewall: Reloading firewall due to ifup of he_2_fra (6in4-he_2_fra)
Tue Jun 13 04:00:21 2023 user.notice nlbwmon: Reloading nlbwmon due to ifup of he_2_fra (6in4-he_2_fra)
Tue Jun 13 04:00:26 2023 user.notice 6in4-he_2_fra: update 3/3: abuse
Tue Jun 13 04:00:26 2023 user.notice 6in4-he_2_fra: updated
Wed Jun 14 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' has lost the connection
Wed Jun 14 04:00:00 2023 daemon.notice netifd: tunnel '6in4-he_2_fra' link is down
Wed Jun 14 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Wed Jun 14 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Wed Jun 14 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Wed Jun 14 04:00:00 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Wed Jun 14 04:00:01 2023 daemon.notice netifd: Interface 'he_2_fra' is now down
Wed Jun 14 04:00:04 2023 daemon.notice netifd: Interface 'he_2_fra' is setting up now
Wed Jun 14 04:00:04 2023 daemon.notice netifd: Interface 'he_2_fra' is now up
Wed Jun 14 04:00:04 2023 daemon.notice netifd: tunnel '6in4-he_2_fra' link is up
Wed Jun 14 04:00:09 2023 user.notice 6in4-he_2_fra: update 1/3: Failed to send request: Operation not permitted
Wed Jun 14 04:00:19 2023 user.notice 6in4-he_2_fra: update 2/3: timeout
Wed Jun 14 04:00:20 2023 user.notice firewall: Reloading firewall due to ifup of he_2_fra (6in4-he_2_fra)
Wed Jun 14 04:00:21 2023 user.notice nlbwmon: Reloading nlbwmon due to ifup of he_2_fra (6in4-he_2_fra)
Wed Jun 14 04:00:26 2023 user.notice 6in4-he_2_fra: update 3/3: abuse
Wed Jun 14 04:00:26 2023 user.notice 6in4-he_2_fra: updated
By chance I noticed that the update process for the he.net IPV6 tunnel is reporting an "abuse" warning, every time and sometimes already at the second try. I am quite baffled: the IPV4 address is definitely changing from one day to the other (I checked the logs) and no update takes place for the IPV6 address since I have a static /48.
You still need to notify HE to update the tunnel endpoint with the new address from your side. Most likely this update is not as fast as you'd thought it is. But let's have a look at the configuration, while we're at it.
It is not updating IPV6 and it shouldn't be: I have a /48 and the addresses are static.
What should be updated is the IPV4-endpoint for the tunnel.
I might as well completely remove the config, I left it there but disabled to preserve history.
Locking means adding option use_ipv6 '0'
under 'duckdns_v4", right?
First of all the interface must be required per documentation, but it is missing from your config.
Second:
whatever is abusing is not connected to the wan but to the henet interface. So are you certain that what abuses is the ddns or the dynamic update of your endpoint for the 6in4 tunnel?
Thanks for catching that! I checked the backups of my config and it has always been that way, at least for the last 4 years. Of course I am not sure what is causing the problem, that's the whole point of asking here
Now the duckdns_v4 service has two additional keywords:
option interface 'wan'
option use_ipv6 '0'
and the duckdns_v6 (still disabled) has one: option interface 'he_2_fra'
Toggled WAN, waited for DNS update to propagate (I am on holiday) and reconnected: "abuse" message is still there.
It might as well be the case, though I still have no idea what kind of abuse it might be. Changing the title now.
Searching the he.net forums now, I see that abuse goes together with blocked updates... and I can connect just fine over IPV6, so I'm puzzled.
Although it has become rather obvious it's the henet endpoint update producing the log, you can easily verify that by disabling ddns and doing the ifup wan
As for what to do with that, maybe henet has a better explanation so it's worth asking in their forums.
Ok, basically the he.net forum was not terribly useful and got nowhere. I'm dropping the issue since the tunnel otherwise works and the original question is answered