Is dvrdydns.com DDNS provider legit? safe ? Free?

Stewart2

n3wb
Apr 29, 2020
5
1
62208
Dvrdydns.com is showing up as a DDNS provider option in lower priced NVRs.
Has anyone used dvrdydns.com?
 
Never had a NVR, are you locked in to list of DDNS providers? If not, try using duckdns.org, it's free, just need a github, google, or twitter, etc account...
 
We setup a couple Zosi systems for a customer, there was only a select few DDNS providers hard-coded in the NVR.
no-ip.com
meibu.com
oray.com
dyn.com
dvrdydna.com

Duckdns is great.
 
No it is not safe. Here is why. If you are using a ddns provider that is included with your NVR, you are port forwarding which is simply not secure. You will be hacked.
Question for you....
I have been reading a bunch here, and I understand the security push for VPN and seperate VLANs behind your router. I agree that forwarding port 80 is Really not a good idea. What about port redirection?
Example-- Opening a random port that is not commonly used by an app or protocol, and having that random port redirected by your router to port 80 (or whatever) of a specific IP within your network. While not as secure or ideal-- isn't opening a random port and letting the router redirect it a lot better than port 80 open to the world? Wouldn't hackers just move on to the easy targets of unsecured port 80 connections (or other common ports) out on the internet from every new parent that bought a baby cam?? Wouldn't port redirection significantly reduce the risk since they would have to run a scan to discover the open port, and then figure out what it redirects to?
 
Question for you....
I have been reading a bunch here, and I understand the security push for VPN and seperate VLANs behind your router. I agree that forwarding port 80 is Really not a good idea. What about port redirection?
Example-- Opening a random port that is not commonly used by an app or protocol, and having that random port redirected by your router to port 80 (or whatever) of a specific IP within your network. While not as secure or ideal-- isn't opening a random port and letting the router redirect it a lot better than port 80 open to the world? Wouldn't hackers just move on to the easy targets of unsecured port 80 connections (or other common ports) out on the internet from every new parent that bought a baby cam?? Wouldn't port redirection significantly reduce the risk since they would have to run a scan to discover the open port, and then figure out what it redirects to?
It wont help. They scan many ports. It will just delay the inevitable. They dont have to figure out where its redirected, your router is doing that automatically for them. These hackers have automated scripts, it costs them nothing but time. See this great example by @alastairstevenson. He writes in part,
"At 30 packets per minute unsolicited, it really underlines the risks of using port forwarding to remotely access your cameras.
And the predominance of the high ports in use also underlines that using high ports doesn't really provide much protection. "

 
It wont help. They scan many ports. It will just delay the inevitable. They dont have to figure out where its redirected, your router is doing that automatically for them. These hackers have automated scripts, it costs them nothing but time. See this great example by @alastairstevenson. He writes in part,
"At 30 packets per minute unsolicited, it really underlines the risks of using port forwarding to remotely access your cameras.
And the predominance of the high ports in use also underlines that using high ports doesn't really provide much protection. "

HOLY CRAP!!!!!:eek::eek::eek:

That Hikvision hack experiment is Scary as hell.... THANK YOU for alerting me to that!!
Now I am more excited to get that Procurve switch this week and start setting up my Camera VLAN...
 
  • Like
Reactions: alastairstevenson