Thank you!MT devices don't have RTC built in, so ROS has to "invent" an approximation to current time when it boots. After initial boot (from factory or after netinstall), ROS doesn't have any better clue so it sets time to 1970-01-01 00:00:00. After a "normal" reboot, ROS takes time stamp of some of recent files and starts from there. Since everybody wants small number of writes to built-in storage, this means that timestamp can be old (from minutes to hours).
So when there's a mechanism which retrieves precise time stamps (either NTP client or cloud time) and ROS has to step time (by more than some margin, with normal NTP client this is when time difference exceeds few tens of seconds), there's a log entry - because stepping time means discontinuity in timestamps (e.g. of log entries). Seeing those in log happening a short time period after device reboot is thus normal. However, if this happens regularly or after longer uptime, this might indicate some kind of problem.
And yes, configuring and enabling (S)NTP client on ROS device is the right thing to do.
I not noticed that. All is working fine.Anyone else having issue with the date/time settings after upgrade?
My was 12h off. I had to manually set my time.
Then Enabled SNTP and added se.pool.ntp.org as servers.
may/22 12:48:52 system,critical,info ntp change time May/22/2023 12:48:52 => May/22/2023 19:21:20
I see 6.49.8 is showing longterm, and 6.49.7 stable. Strange
So the vulnerability is relevant in v6.49.8 ????
Sometimes you have to give limited access to contractors,If its the case, it needs to be fixed. It seems that you need a user that do have right to log inn to the router to use this vulnerability.
But I do not feel any pity for user leaving Winbox or HTTP admin gui open to the pubic.
I made a backup script using shell script in a Linux machine.@davidalain do you mean using ROS as SSH client to connect to other devices?
My case is similar to yours (using a RSA priv/pub key pair) and works perfectly after upgrade, at least on RB4011 and hEX S (RB760iGS) devices.I made a backup script using shell script in a Linux machine.
So Mikrotik devices act as SSH servers and a Linux machine as the SSH client.
CCR1072, CCR1009, RB4011, and hEX S.
I have a ccr2004 with many bgp feeds, gre and sit tunnels, that I would like to upgrade too, but I wonder the best way to do that.So 6.49.8 is now the latest and only version supported with v6,
How is the upgrade supported from v6.49.x to the v7?
Can I upgrade to the latest 7 version or do I need to go with some steps?
Do you have some date when v6 is out of support?
Thanks for info.
Thank you so much for this helping advice!!!Also you need to really study and test the upgrade before you do any upgrades in a production environment. E.G. in the help document it says:
BGP
All known configurations will upgrade from 6.x to 7.x successfully.
Well, that for sure is not correct, I have mentioned several times on the forum that not all configurations upgrade successfully, and you need to prepare.
E.g.:
- routing filters now have an implicit "reject" at the end, that used to be an implicit "accept". You may need to add an "accept" to your filters, depending on what they do and how they are structured
- in the peer configuration, update-source can no longer be the name of an interface, it HAS to be an address.
- in the networks configuration, it is no longer possible to have networks without the "synchronize" option
- route aggregation is no longer supported
So it is advisable to first rework your v6 configuration to adapt to the above, before you attempt an in-place upgrade.
As stated in the CVE - "MikroTik RouterOS stable before 6.49.7...". Yes, 6.49.8 is built on 6.49.7. Thus it includes the same fix.
+1 and it isn't clear if that CVE-2023-30799 was only addressed in 6.49.7 onwards, or also in 6.48.7 LTS which was released at a later date - there is nothing in the release notes.I visited a lonely page that feels completely neglected by Mikrotik: https://blog.mikrotik.com/security/ also supplies RSS feed for Mikrotik.
No, post #22 above probably sums up the status completely (not mentioning 6.48.7 does mean something). But since 6.49.8 is now LTS, it doesn't matter if the vulnerability is fixed in 6.48.7 or not.... it isn't clear if that CVE-2023-30799 was only addressed in 6.49.7 onwards, or also in 6.48.7 LTS which was released at a later date - there is nothing in the release notes.
The problem is that the place where Mikrotik could provide clearity is not used. Now we have to go through several posting to have an answer.No, post #22 above probably sums up the status completely (not mentioning 6.48.7 does mean something). But since 6.49.8 is now LTS, it doesn't matter if the vulnerability is fixed in 6.48.7 or not.... it isn't clear if that CVE-2023-30799 was only addressed in 6.49.7 onwards, or also in 6.48.7 LTS which was released at a later date - there is nothing in the release notes.
That just doesn't make sense. Even starting from version 7.0 migration was supported officially. Of course there were many problems, and depending on your usage scenario versions below 7.10 may be completely unusable, but with every higher version it generally becomes better.There is difference if the migration is supported officially or not. For example v7.10 supports migration, but 7.11 not etc,
No, post #22 above probably sums up the status completely (not mentioning 6.48.7 does mean something). But since 6.49.8 is now LTS, it doesn't matter if the vulnerability is fixed in 6.48.7 or not.... it isn't clear if that CVE-2023-30799 was only addressed in 6.49.7 onwards, or also in 6.48.7 LTS which was released at a later date - there is nothing in the release notes.
Maybe you should read the first post in the release topic:Another lesson learned - always make and download a backup of a device before upgrade.. I didn;t expecting that this was a simple long-term to long-term upgrade with changelog identical to currently running release.
I would say 70000 address list entries is too much to ask of this low-end device,