Starting since 6.43rc21 new ip-cloud implementation is available for the first adopters. The feature set for now is the same as in older versions however that is about to change. It has improvements in security, responsiveness and expandability.
Current upgrade path:
disable ip-cloud /ip cloud set ddns-enabled=no
this is to remove your entry from the old database, so when you decide to not use the feature in newer version, it would not return your old address.
upgrade to verion 6.43rc21 or newer
enable the ip-cloud /ip cloud set ddns-enabled=yes
Will the cloud time accuracy be more reasonable?
I mean, I could live with a 2 second error and a 1 second resolution but more than that is really sub-par.
(especially as NTP and SNTP work OK but are not enabled by default as the cloud time option is)
You would need to find something else than serial number to use for hostname. There’s System ID, but it seems to be generated randomly, so it might not be unique. It also seems to make a difference between case of letters, so it would not work well with dns either. But I’m sure something could be invented, at least for licensed instances.
Btw, with security being a big topic lately, it would be interesting to know, how this whole thing works. I mean, when there’s regular DDNS service, it depends on username/password. Nobody else can know it, so it’s not possible to send fake requests for updates. But what is here? I don’t see any unique secret unknown to anyone else. If I learn someone’s RB serial number, is there anything else than so far unknown algorithm how to generate a valid request?
Maybe a little elaboration on this, so I can decide if I care? I use this feature only to locate MikroTik routers I have installed that don’t have static IP addresses.
To give more authoritative weight behind some excellent answers given by other users:
do not put RC in production - all new features come to RC, then get into current and only then it is placed into bugfix.
backwards compatibility was considered and then removed. So no, to use this, you will need to wait for stable and/or bugfix release to use in production
the new cloud works much faster, so the precision will be better - this is for setups where you cannot run NTP/SNTP or don’t need the time so precise. This is enabled by default to get some, any time for logs where a user could benefit from seeing a time of occurrence. The moment you get NTP/SNTP time IP-cloud time service stops even if enabled.
it is not possible to send fake updates to the IP-cloud. To the IP-cloud your router is unique.
CHR - it is complicated. There is a lot of things that have to be resolved for this to become a reality.
I use this feature only to locate MikroTik routers I have installed that don’t have static IP addresses.
this is the intended use - you are our target audience for the IP-cloud’s DDNS feature
I completely understand that the cloud time is based on a http timestamp so it offers only 1-second resolution and cannot set the clock very accurately, but that was never an excuse for serving time that is wrong by 10 minutes.
It is important that the cloud servers themselves are well synchronized to NTP time and that this situation is actively monitored by MikroTik and action is taken when the served time is noticed to be drifting away from correct time.
This is already true for the IP cloud as it exists now. At this moment the cloud time is ahead by 6 seconds! Why?? By configuring NTP on the servers you can easily keep it within 10 milliseconds so the actually served time is well within the 1 second resolution of the method used.
OK… so, as I don’t really care about using it for NTP or on IPV6, does this new implementation give me anything superior for my needs that would give me incentive to turn it on? Maybe I have overlooked an explanation, but I don’t think one has yet been presented.
It’s nice to hear. I just hoped we could get a little “peek under the hood”, how it works. And please don’t say “secret algorithm”, because when it has to be on every single router, one bored person with decompiler could be all what’s needed to make it not secret anymore.
Don’t take me wrong, I’m not trying to insinuate anything. I can imagine some possible ways how it could be done. E.g. if each router had some unique secret (password) stored on flash, and if you had database with =, that would be good enough, because nobody could get the secret from someone else’s router. But it would have to be something you had even before DDNS was introduced, because it works even on older RBs. Knowing that you have something like that (or even better) would help us sleep better.
And you missed this one:
If it would be possible to add multiple DDNS clients (with some reasonable limit), something like (just a quick thought, there might be better way):