The Asuswrt-Merlin custom firmware adds support for custom dynamic DNS providers to various ASUS routers. This is great for Cloudflare users because, although Cloudflare is not one of the built-in providers, we can add support for it. This guide and accompanying script do exactly that. Confirmed works for the RT-AC68U, RT-AC66U, RT-AC87U and RT-AX88U model routers.
Features include:
- Support for querying your Cloudflare DNS zone to determine record IDs
- Handling of Merlin firmware success/failure callbacks
- Logging of JSON responses for later inspection, and
- Configurable rate-limiting to comply with Cloudflare API TOS
- @epicylon - Verified works on RT-AC66U
- @bengalih - Several contributions toward support for API Tokens, proxying, and other enhancements.
- @gumanov - Verified works on RT-AX88U
- @clayauld - Verified works on RT-AC87U
- @ttgapers - Verified works on RT-AC86U & RT-AC68U. Updated script to run from /jffs/addons/ddns/cloudflare/ directory.
You should have your Merlin-enabled ASUS router configured for your network with Internet access. Since you've found this guide, it's also assumed you have a Cloudflare account managing your own domain, and you've already created a subdomain you will use for dynamic DNS.
Configuration of Cloudflare DDNS involves changes through the router web portal as well as changes made through the router shell.
- Enable shell access and JFFS partition
- Install Cloudflare DDNS script
- Enable custom DDNS
- Verification
- Clean up
Directions for disabling dynamic DNS and removal of the script and related files are at bottom.
In the router portal, under Administration -> System,
- Basic Config -> Enable JFFS custom scripts and configs: Yes
- Service -> Enable SSH: LAN only
Save the configuration. Ensure you are able to SSH into your router using your router portal credentials (or via public key crypto, depending on configuration) before continuing.
Note: If SSH will be left enabled after installation, disallow password login, enable brute force protection, and use public keys for login to enhance security.
- Log into your router via SSH, and navigate to
/jffs/addons/ddns/cloudflare
. - Copy the
cloudflare_ddns
and.cloudflare.example
files to that directory. - Rename
.cloudflare.example
to.cloudflare
. - Edit
.cloudflare
with your Cloudflare API token and zone ID from your Cloudflare portal. The script also supports the legacy "API Key plus account e-mail" method of authentication, but this method appears likely to be eliminated in future. - Run
chmod 700 cloudflare_ddns
. - Run
chmod 600 .cloudflare
. - Run
./cloudflare_ddns list
. - Step 7 should have resulted in the creation of a log file named
cloudflare_ddns.log
. Open the log file and review the JSON response object, which should be a listing of your Cloudflare DNS records for the zone ID specified in Step 4.
Note: If there is an error in the log file or no log file is present, ensure permissions are correct and that the text of the script is copied accurately. Double-check your Cloudflare credentials. If the error is from Cloudflare, you can review the text of the error in the JSON response and look for any error code online.
- Edit
.cloudflare
with the DNS record information (i.e. ID, name and type) obtained from Step 8. Ensure your text matches exactly. - Run
./cloudflare_ddns 1.1.1.1
. - Review the log file for the result of the last execution. If you see a successful response, verify against the Cloudflare portal. Otherwise, review the errors and correct as necessary.
Note: You may get a throttled response if you have queried too quickly after Step 7. The script rate-limits to one query every 5 minutes. This is configurable in the
cloudflare_ddns
script or you can simply wait.
- Ensure rate-limiting is working as expected by re-issuing the command in Step 10 a couple of times in quick succession and verifying that the log file shows frequent invocations are throttled.
- If there is an existing /jffs/scripts/ddns-start script rename to ddns-start.bak (rollback if changing DNS providers)
- If Steps 11 and 12 were successful, run
ln -s /jffs/addons/ddns/cloudflare/cloudflare_ddns /jffs/scripts/ddns-start
. This creates a symbolic link with the name expected by the router firmware.
In the router portal, under WAN -> DDNS,
- Enable DDNS client: Yes
- Server: Custom
- Host name:
the DNS host name you're using in Cloudflare
- HTTPS/SSL Certificate: None
Save the configuration.
If all is configured correctly, you should see:
- A "successful" message on the router portal on saving the configuration. I believe this is determined by the
/sbin/ddns_custom_updated
commands being called properly within thecloudflare_ddns
script. - In the router portal, under System Log, you should see entries as below.
Nov 5 6:57 start_ddns: update CUSTOM , wan_unit 0
Nov 5 6:57 custom_script: Running /jffs/scripts/ddns-start (args: x.x.x.x ) - max timeout = 120s
Nov 5 6:57 ddns: Completed custom ddns update
- A new log file for the script should have been created in a /tmp folder and it should contain a successful log entry. Find the log file by running
find / -name ddns-start.log 2>&1
. - The Cloudflare portal should reflect the updated public IP address of your router.
Note: If any errors occur, review the router log file and the script log file for an indication of the error or manually re-run
./cloudflare_ddns list
and./cloudflare_ddns 1.1.1.1
to identify and troubleshoot.
Once everything is configured and working properly, you may delete the cloudflare_ddns.log
file from the /jffs/addons/ddns/cloudflare
directory on the router. If SSH access is no longer needed, disable SSH on the router portal for security (especially if password authentication was used).
To remove the script, the process is essentially reversed.
- In the router portal, disable DDNS client and save. It may be worthwhile to restart your router to ensure any in-memory settings are cleared.
- Log into the router via SSH and delete (in order): a) ddns-start, b) cloudflare_ddns, c) .cloudflare, d) cloudflare_ddns.log, and e) ddns-start.log.