How not? LAN is the network with internet access. Haven't you seen that the service works when I reload the service with the "Reload" or "Recargar" button?
Here it has been shown that it is not true and that having a DNS server in OpenWrt is enough without having to enter DNS servers in the LAN interface configuration.
With this you are giving me to understand that you are not sure of what you have said regarding having a public DNS server on the LAN interface and that entering the IP 127.0.0.1 is the same as having the forwarding in /etc/config/dhcp.
You had no DNS server specified whatsoever on your network
127.0.0.1 specifies dnssmasq, which specified AdGuard
AdGuard is just another DNS resolver I assume
This is why I don't know:
I don't know what you have configured here, and it would be a dramatic comedy if you specified chicken-in the-egg DNS setup here. Or you had no DNS servers setup there whatsoever.
So, that is eliminated by specifying a Public DNS server - especially for DDNS. Best practice - and trying to configure the machine so the issue or bug can be reproduced.
Thus far, I cannot reproduce a non working ddns config, except removing my DNS.
Yes, the dhcp file has dnsmasq settings. It should be noted that it is the only DNS server. Requests are forwarded to the specified IP 127.0.0.1#5300 which is AdGuardHome. This ad blocker has Cloudflare as upstream DNS.
In what network? In the LAN? I have already presented that it has not been fixed if I add public DNS servers in LAN as you are asking.
But it is not reachable as a DNS server. It is only for dnsmasq.
I already said that Cloudflare is the upstream DNS of AdGuardHome.
Something is wrong - I would advise trying a standard setup first. I'm not even sure how your DNS server would be added. Clearly from my screenshot I have the same version as you and I do not have this issue.
Adding an IP in /etc/config network on LAN does not add one in DDNS.
I thought WARP because you said Cloudflare and you seem to have tls (DoT) on your DNS servers. I didn't know if you had a CloudFlare wireguard tunnel, cool.
Yes, it was always there from your screenshiots, I understand you are concerned in any case, I see it. I need a test device to see if I have the same behavior. Nonetheless, one pick noted it didn't exist - I could only get that to occur when specifying wan in UCI when it doesn't exist. I'll need to test on another device.
I didn't say there. I mean on your LAN config. 127.0.0.1 should be fine - as discussed now.
I was trying to setup this thing https://github.com/BigNerd95/ASUSddns
I was trying to use custom DDNS service with custom script defined. But it turned out, that you can't define any parameters in this config line. Instead you are supposed to create a wrapper script that will be able to use such variables as $domain, $username, $password which will contain values from corresponding config lines. Documentation does not say anything about this.
The problem is that DDNS client supports custom scripts through "update_script" config param. It is even properly displayed in UI. But documentation does not give any hints on how this parameter should be used. For example in my case value of this parameter is "/usr/lib/ddns/AsusCommDNS.sh" and contents of the script
Untrue, I can insert those variables directly into a URL field. I don't need a script for custom DNS. In fact, I do this for HE.net DDNS - as there is a custom URL for doing both DDNS and updating a 6in4 tunnel.
I would advise reviewing the official Wiki before editing it.
I found it simplest to just add a trigger to my PPPoE interface to update the DNS whenever it comes up, i.e. my public IP changes. The main reason is that my firewall is set not to allow the router itself to make outbound connections, so I needed an event-driven hook to temporarily enable a firewall rule to allow the http(s) connection. It's straightforward enough; I'll post the code if anyone's interested.
(Note if you do this, remember to add the script(s) to the things that get backed up and restored at upgrade time.)
(The downside of this approach is that your provider's dyn dns interface may be nonfunctional or unreachable for some reason at interface-up time. I decided to deal with that case with a belt-and-braces approach: another system on my network, one which is always allowed outbound connections, has a cron entry to hit the URL every couple of hours to be on the safe side. So in the rare case that it doesn't happen in a timely way it'll still happen eventually.)
Asus may block connections from clients with wrong user agents at any time. Or change anything else. It is better to use a script that is regularly updated by author, when changes happen.