Diese Seite (Version-31) wurde zuletzt am 30-Juni-2025 18:51 von Administrator geändert.

Diese Seite wurde am 28-Dez.-2024 17:15 von Administrator erstellt.

Du bist nicht autorisiert, diese Seite umzubenennen.

Du bist nicht autorisiert, diese Seite zu löschen.

Versionsgeschichte der Seite

Version Zuletzt geändert Größe Autor Änderungen Kommentar
31 30-Juni-2025 18:51 6 KB Administrator zur vorherigen
30 29-Dez.-2024 12:43 6 KB Administrator zur vorherigen | zur neuesten
29 29-Dez.-2024 12:40 5 KB Administrator zur vorherigen | zur neuesten
28 29-Dez.-2024 12:39 5 KB Administrator zur vorherigen | zur neuesten
27 29-Dez.-2024 12:39 5 KB Administrator zur vorherigen | zur neuesten
26 29-Dez.-2024 12:36 3 KB Administrator zur vorherigen | zur neuesten
25 29-Dez.-2024 12:35 3 KB Administrator zur vorherigen | zur neuesten
24 29-Dez.-2024 12:34 3 KB Administrator zur vorherigen | zur neuesten
23 29-Dez.-2024 12:29 4 KB Administrator zur vorherigen | zur neuesten
22 29-Dez.-2024 12:28 5 KB Administrator zur vorherigen | zur neuesten
21 29-Dez.-2024 12:27 4 KB Administrator zur vorherigen | zur neuesten

Links

Eingehende Links Ausgehende Links

Versionsunterschiede

Unterschiede zwischen Version und .

Zeile 12: Eine Zeile geändert.
Port xxx # set port here
Port xx x # set port here
Zeile 71: 75 Zeilen gelöscht.
{{{
import socket # determine ipv6
import re # regular expression
import urllib.request # http
dynv6_domain = "your.dynv6.domain"
dynv6_token="your.token"
local_domain = socket.gethostname()
print('Checking DynV6', dynv6_domain, 'against', local_domain)
#ipv6_regex = "^([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}$"
ipv6_regex = "^([0-9a-fA-F]{1,4}:).*$"
##--- get LOCAL address ---
tupel = socket.getaddrinfo(local_domain, None, socket.AF_INET6, flags=socket.AI_CANONNAME)
local_ipv6 = ''
for item in tupel:
if(item[4][0].startswith('2a02')):
#print("item=", item)
local_ipv6 = item[4][0]
break
local_ipv6_valid = False
if re.search(ipv6_regex, local_ipv6):
local_ipv6_valid = True
if(local_ipv6_valid == False):
print("local_ipv6=", local_ipv6, " NOT VALID")
else:
print("local_ipv6=", local_ipv6, " IS VALID")
#--- get dynV6 address ---
tupel = socket.getaddrinfo(dynv6_domain, None, socket.AF_INET6)
dynv6_ipv6 = tupel[0][4][0]
dynv6_ipv6_valid = False
if re.search(ipv6_regex, dynv6_ipv6):
dynv6_ipv6_valid = True
if(dynv6_ipv6_valid == False):
print("dynv6_ipv6=", dynv6_ipv6, " NOT VALID")
else:
print("dynv6_ipv6=", dynv6_ipv6, " IS VALID")
if(not local_ipv6_valid or not dynv6_ipv6_valid):
print("one ipv6 is invalid, skipping update")
else:
if(local_ipv6 == dynv6_ipv6):
print("dynv6 ipv6 is up to date, skipping update")
else:
print("dynv6 differs from local ipv6 => UPDATING...")
url = "https://dynv6.com/api/update?hostname=" + dynv6_domain + "&token=" + dynv6_token + "&ipv6=" + local_ipv6
response = urllib.request.urlopen(url).read()
print(response)
}}}
! 3. Windows: schedule script to run each time the PC is booted, see "Aufgabenplanung" (task scheduler)
I scheduled this batch
{{{
echo off
REM set utf-8
chcp 65001
python "G:\Raspberry PI5 8GB\DynDNS\update_computer.py"
echo:
echo done
pause
}}}
! 4. Raspberry: create and set iptables ruleset, see [Firewall with iptables]
! 5. Raspberry: use python script to query the current ipv6 from dynv6 (Windows) and replace in iptables ruleset
Zeile 152: 2 Zeilen geändert.
import socket # determine ipv6
import subprocess
import socket # determine ipv6
import subprocess # run local commands
Zeile 155: 7 Zeilen geändert.
def set_dynv6_domain_into_ipv6tables(dynv6_domain, rulenum):
try:
print('------------------------------------------------------------')
print('set dynv6 domain', dynv6_domain, 'into ip6tables at position', rulenum)
tupel = socket.getaddrinfo(dynv6_domain, None, socket.AF_INET6)
# tupel like [(<AddressFamily.AF_INET6: 23>, 0, 0, '', ('2a02:5a0:4110:f590:4670:9876:1345:ee', 8384, 0, 0))]
print("tupel=", tupel)
tupel = socket.getaddrinfo('your.pc.com', None, socket.AF_INET6)
# tupel like [(<AddressFamily.AF_INET6: 23>, 0, 0, '', ('2a02:5a0:4110:f590:4670:1234:9876:6541', 8384, 0, 0))]
print("tupel=", tupel)
Zeile 163: 2 Zeilen geändert.
ipv6=tupel[0][4][0]
print(dynv6_domain + " ipv6=", ipv6)
ipv6=tupel[0][4][0]
print("ipv6=", ipv6)
Zeile 166: 4 Zeilen geändert.
subprocess.run(["/usr/sbin/ip6tables", "-R", "INPUT", rulenum, "-s", ipv6, "-j", "ACCEPT"])
subprocess.run(["/usr/sbin/ip6tables", "-R", "OUTPUT", rulenum, "-d", ipv6, "-j", "ACCEPT"])
except BaseException:
print('FAILED TO GET', dynv6_domain)
subprocess.run(["/usr/sbin/ip6tables", "-R", "INPUT", "1", "-s", ipv6, "-j", "ACCEPT"]) # replace first ipv6 INPUT rule
subprocess.run(["/usr/sbin/ip6tables", "-R", "OUTPUT", "1", "-d", ipv6, "-j", "ACCEPT"]) # replace first ipv6 OUTPUT rule
}}}
Zeile 91: Eine Zeile hinzugefügt.
! 3. Windows schedule script to run each time the PC is booted, see "Aufgabenplanung" (task scheduler)
Zeile 172: 3 Zeilen geändert.
set_dynv6_domain_into_ipv6tables('your.dynv6.domain.no1', '1')
set_dynv6_domain_into_ipv6tables('your.dynv6.domain.no2', '2')
set_dynv6_domain_into_ipv6tables('your.dynv6.domain.no3', '3')
! 4. Raspberry: create and set iptables ruleset, see [Firewall with iptables]
Zeile 176: Eine Zeile geändert.
}}}
! 5. Raspberry: use python script to query the current ipv6 from dynv6 (Windows) and replace in iptables ruleset
Zeile 183: 5 Zeilen geändert.
# m h dom mon dow command
*/5 * * * * /home/markus/update_ip6tables.py > /var/log/con.log
#check with
> journalctl -b
*/5 * * * * /home/markus/update_ip6tables.py