/system clock set time-zone-name=Europe/Vienna
2025-01-16 14:44:43 system,critical,info cloud change time Jan/16/2025 14:43:47 => Jan/16/2025 14:44:43
This is most probably a configuration related issue. I have cap ac with only 128MB system memory running wifi-qcom-ac and it reached quite 4 weeks uptime on 7.16.2 before I upgraded it to 7.17 today. It reported ~28mb of free memory before I upgraded the system."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
NOT STABLE.
In general, the problem of LOST SIGNAL has not been completely solved, and it is strange that Microtic don't pay due attention to this.
I have same problem with cap-ac (simple AP mode), SUP-160401 ."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
Re: v7.17rc [testing] is released!
Post by CGGXANNX » Thu Jan 16, 2025 12:03 pm
Well it may goes out of memory with SMB, but if wifi-qcom-ac really takes a large chunk of RAM, then OOM might also happen if you run a container (that worked fine with wireless), or if you use adlist with huge lists, etc... If they disable and hide SMB, then should they do that with container and adlist too?
Currently you have to explicitly remove wireless and install wifi-qcom-ac. It is assumed that you read the doc before doing that, and from now on, the doc has the warning about the RAM usage. If your router suffers from OOM, your first thought now would be to revert back to wireless.
STABLE != free of bugsNOT STABLE.
...
Oh, that's pretty good.Is possible now to add interface-list as tagged or untagged interface.
upgrade failed, free 9 kB of kernel disk space
[user@router] > /system/resource/print
version: 7.16.2 (stable)
free-hdd-space: 556.0KiB
total-hdd-space: 16.0MiB
board-name: D53G-5HacD2HnD
platform: MikroTik
[user@router] > /system/resource/print
version: 7.17 (stable)
free-hdd-space: 272.0KiB
total-hdd-space: 16.0MiB
board-name: D53G-5HacD2HnD
platform: MikroTik
[user@cap] > /system/resource/print
version: 7.16.2 (stable)
free-hdd-space: 760.0KiB
total-hdd-space: 16.0MiB
board-name: cAP ac
platform: MikroTik
[user@cap] > /system/resource/print
version: 7.17 (stable)
free-hdd-space: 480.0KiB
total-hdd-space: 16.0MiB
board-name: cAP ac
platform: MikroTik
Here my update on the "free-memory" topic for those interested and also managing 16MB devices. Before/after of 2 devices I just upgraded. td;dr: free space decreased.
andCode: Select all[user@router] > /system/resource/print version: 7.16.2 (stable) free-hdd-space: 556.0KiB total-hdd-space: 16.0MiB board-name: D53G-5HacD2HnD platform: MikroTik [user@router] > /system/resource/print version: 7.17 (stable) free-hdd-space: 272.0KiB total-hdd-space: 16.0MiB board-name: D53G-5HacD2HnD platform: MikroTik
Code: Select all[user@cap] > /system/resource/print version: 7.16.2 (stable) free-hdd-space: 760.0KiB total-hdd-space: 16.0MiB board-name: cAP ac platform: MikroTik [user@cap] > /system/resource/print version: 7.17 (stable) free-hdd-space: 480.0KiB total-hdd-space: 16.0MiB board-name: cAP ac platform: MikroTik
/interface wifi steering
add disabled=no name=steering1 neighbor-group=dynamic-ABC-6754ca15 rrm=yes wnm=yes
/interface wifi
set [ find default-name=wifi1 ] channel.band=2ghz-n .width=20/40mhz configuration.country=Czech .mode=ap .multicast-enhance=enabled .qos-classifier=\
priority .ssid=ABC disabled=no mtu=1500 security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes .ft-preserve-vlanid=no .wps=\
disable steering=steering1
set [ find default-name=wifi2 ] channel.band=5ghz-ac .frequency=5500 .width=20/40/80mhz configuration.country=Czech .mode=ap .multicast-enhance=enabled \
.qos-classifier=priority .ssid=ABC disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes .ft-preserve-vlanid=no \
.wps=disable steering=steering1
This is most probably a configuration related issue. I have cap ac with only 128MB system memory running wifi-qcom-ac and it reached quite 4 weeks uptime on 7.16.2 before I upgraded it to 7.17 today. It reported ~28mb of free memory before I upgraded the system."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
@Edpa
1. *) bridge - added interface-list support for VLANs;
Does this mean we can now list the bridge as an interface list member and this will include all vlans attached to the bridge?
connecting to upgrade.mikrotik.com
...
connection closed
connecting to upgrade.mikrotik.com
...
connection closed
I'm surprised they managed to make the propietary QCOM drivers run on a board with 128MB of RAM, back then when I had the ac2 it OOM'd even on OpenWrt running the "small buffers" ath10k driver."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
Re: v7.17rc [testing] is released!
Post by CGGXANNX » Thu Jan 16, 2025 12:03 pm
Well it may goes out of memory with SMB, but if wifi-qcom-ac really takes a large chunk of RAM, then OOM might also happen if you run a container (that worked fine with wireless), or if you use adlist with huge lists, etc... If they disable and hide SMB, then should they do that with container and adlist too?
Currently you have to explicitly remove wireless and install wifi-qcom-ac. It is assumed that you read the doc before doing that, and from now on, the doc has the warning about the RAM usage. If your router suffers from OOM, your first thought now would be to revert back to wireless.
Thank you for clarifying, Sit75. My earlier post wasn’t intended as a direct response to the RAM issue you mentioned. I’ve been monitoring free memory on RouterOS since version 7.13, and my recent observation of approximately 280KB less free space after upgrading was meant as a general heads-up for the community.We are speaking about RAM issue, not ROM. ROM has been solved roughly in 7.15, what I remember.
Workaround for now is to download 7.17 installer and run it manually. This way update succeeds and client is able to connect to 7.17 Dude server.The Dude upgrade issue acknowledged, we are working on it.
It should be possible to downgrade to 7.14.3 if I read it right:For any1 who upgraded to 7.17 pls check if it is still possible to downgrade to 7.14.3 after? Or it is now marked as not "allowed-versions" or whatever device mode forbids
/system/device-mode/print
mode: advanced
allowed-versions: 7.13+,6.49.8+
...
upgrade failed, free 25 kB of kernel disk space
Thx good manIt should be possible to downgrade to 7.14.3 if I read it right:For any1 who upgraded to 7.17 pls check if it is still possible to downgrade to 7.14.3 after? Or it is now marked as not "allowed-versions" or whatever device mode forbids
Code: Select all/system/device-mode/print mode: advanced allowed-versions: 7.13+,6.49.8+ ...
Remember that "stable" in software releases means: "here you have a version that will remain for a while, we will not release a new version every week or two, so you can install this and won't have to update it immediately". The stability refers to the number of updates.NOT STABLE."v7 stable"
This has nothing to do with ROS 7.17, it is a Winbox 4 issue.Skins still don't work on Winbox 4
Wow... And how about me that, using semantic versioning as a reference, I was thinking that Stable could mean that the software manufacturer should only release as stable code that is free of any known bugs.Remember that "stable" in software releases means: "here you have a version that will remain for a while, we will not release a new version every week or two, so you can install this and won't have to update it immediately". The stability refers to the number of updates.
NOT STABLE.
It does NOT mean that it will work in a stable way, i.e. will not crash or will not have problems with certain functions.
19:35:52 system,error upgrade failed, free 29 kB of kernel disk space
uptime: 2m19s
version: 7.16.2 (stable)
build-time: 2024-11-26 12:09:40
factory-software: 6.48.1
free-memory: 3840.5MiB
total-memory: 4096.0MiB
cpu: ARM64
cpu-count: 4
cpu-frequency: 1700MHz
cpu-load: 0%
free-hdd-space: 35.7MiB
total-hdd-space: 64.0MiB
write-sect-since-reboot: 33
write-sect-total: 310187
bad-blocks: 0%
architecture-name: arm64
board-name: CCR2004-1G-12S+2XS
platform: MikroTik
It would be desirable when it was like that, but for software as complex and versatile as RouterOS that simply isn't realistic.Wow... And how about me that, using semantic versioning as a reference, I was thinking that Stable could mean that the software manufacturer should only release as stable code that is free of any known bugs.
I think I'll review a little more about versioning standards.
skin does not work at all.Skins still don't work on Winbox 4
EoIP is a connectionless protocol, there is no "connection that is closing".Thoughts anyone?
And why is Microsoft releasing versions for Windows then ?Wow... And how about me that, using semantic versioning as a reference, I was thinking that Stable could mean that the software manufacturer should only release as stable code that is free of any known bugs.
Remember that "stable" in software releases means: "here you have a version that will remain for a while, we will not release a new version every week or two, so you can install this and won't have to update it immediately". The stability refers to the number of updates.
It does NOT mean that it will work in a stable way, i.e. will not crash or will not have problems with certain functions.
I think I'll review a little more about versioning standards.
With Beta and RC I reported CSS issues and it got Fixed before Final Realsenew webfig is nice, too bad there's still no dark mode in itself :D
Branding all broken here: %host% and %version% are showing as is instead of showing actual ip and ROS version...
it's not showing as breaking change on changelog (branding is not webfig itself), is there documentation about these changes?
(and also, documentation about "allow style.css and script.js in branding packages" would be good since it has potential)
/ip firewall connection tracking
set enabled=yes tcp-close-wait-timeout=30s tcp-fin-wait-timeout=30s tcp-time-wait-timeout=30s
/ip neighbor discovery-settings
set discover-interface-list=discovery lldp-mac-phy-config=yes lldp-vlan-info=yes
/ip settings
set max-neighbor-entries=1024 rp-filter=loose
/ipv6 settings
set accept-redirects=no max-neighbor-entries=1024
Stable in mikrotik standards.Wow... And how about me that, using semantic versioning as a reference, I was thinking that Stable could mean that the software manufacturer should only release as stable code that is free of any known bugs.
Remember that "stable" in software releases means: "here you have a version that will remain for a while, we will not release a new version every week or two, so you can install this and won't have to update it immediately". The stability refers to the number of updates.
It does NOT mean that it will work in a stable way, i.e. will not crash or will not have problems with certain functions.
I think I'll review a little more about versioning standards.
Well, the situation with the new UI is still not perfect, though some improvements have been made.Lot of work on WebUI.
But still no way to easily disable quickset, have an empty user name on login, re-login on page refresh and graphs are still 1998 style instead the webui...
Hello*) ovpn-client - added tls-crypt, tls-crypt-v2 support;
Can we get an example for this ? I could not figure it out myself and there is no documentation for it.*) wifi - added access-list stats (CLI only);
/interface/wifi/capsman/upgrade-policyHow do I stop my cap from auto updating when I update my router?
Install latest testing version and send us supout rif file from the devices.For me so far, on CCR2004's, it added a new problem.
I have one at my office - one at my home. I use EOIP (yes, I know I should subnet it, but for now I need it all on the same layer 2) with encryption to link the two locations together.
Version 7.16.2 the best on a 1gb symmetrical connection I could get was 400MB/sec between the two locations.
Version 7.17 made some huge improvements, I'm seeing 700-800MB/sec....
BUT connections are dropping. Not packet loss - connections get closed. You'll be winboxed in and poof - you're disconnected to the remote site.
Roll back to 7.16.2 - my speeds are back to what they were - and it's stable again.
Thoughts anyone?
Please refer to instructions.Hello*) ovpn-client - added tls-crypt, tls-crypt-v2 support;
Has anyone checked this? Especially on NordVPN or ProtonVPN services
The problem is that I don't know how to add the tls key, of course I used the import option but the problem still persists and it gives the tls error
Here the text can be improved, as "suggests" seems to either "tried" or "performed".Nowhere in the documentation does it say that the upgrade is done automatically. It doesn't work for me unless I put the packages in the "Packge path" folder.
MikroTik is always open to improvement, feel free to contact them to make an improvement in the documentation. Thanks for noticing (though it is not 7.17 related).Folder location for the RouterOS packages. For example, use "/upgrade" to specify the upgrade folder from the files section. If an empty string is set, CAPsMAN can use built-in RouterOS packages, note that in this case only CAPs with the same architecture as CAPsMAN will be upgraded.
/interface/wifi/radio/reg-info country="Superchannel" number=0
ranges: 2402-2482/60dBm/40MHz
5170-5895/60dBm/160MHz
[admin@MT] /system/routerboard/settings> set silent-boot=yes
failure: not allowed by device-mode
system/device-mode/update routerboard=yesRB912UAG-2HPnD
Can not change silent-bool option after upgrading to 7.17
Code: Select all[admin@MT] /system/routerboard/settings> set silent-boot=yes failure: not allowed by device-mode
We are working towards optimizing wireless-qcom-ac as we try to optimize other packages to be less resource heavy, but it is still a work in progress. As of this moment, wifi-qcom-ac is known and expected to take up more resources (including RAM) than legacy wireless drivers."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
Re: v7.17rc [testing] is released!
Post by CGGXANNX » Thu Jan 16, 2025 12:03 pm
Well it may goes out of memory with SMB, but if wifi-qcom-ac really takes a large chunk of RAM, then OOM might also happen if you run a container (that worked fine with wireless), or if you use adlist with huge lists, etc... If they disable and hide SMB, then should they do that with container and adlist too?
Currently you have to explicitly remove wireless and install wifi-qcom-ac. It is assumed that you read the doc before doing that, and from now on, the doc has the warning about the RAM usage. If your router suffers from OOM, your first thought now would be to revert back to wireless.
There is no superchannel in the new wifi-qcom(-ac) drivers, also there is no no_country_set. (BTW, superchannel was a mode, no_country_set was regulatory domain, so you're doing wrong things in the first place.)Trying Superchannel on HAP AX3, isnt it supposed to run all channels at max power? But when i set 5180 it runs at (tx-power: 17), i see briefly 60tx and drops to 17, i did try to set manually 28 it doesn't help.Code: Select all/interface/wifi/radio/reg-info country="Superchannel" number=0 ranges: 2402-2482/60dBm/40MHz 5170-5895/60dBm/160MHz
On the other hand if i set United States it does run on max power (tx-power: 28)
What are you even talking about, its literary in changelog of 7.17 update:There is no superchannel in the new wifi-qcom(-ac) drivers, also there is no no_country_set. (BTW, superchannel was a mode, no_country_set was regulatory domain, so you're doing wrong things in the first place.)Trying Superchannel on HAP AX3, isnt it supposed to run all channels at max power? But when i set 5180 it runs at (tx-power: 17), i see briefly 60tx and drops to 17, i did try to set manually 28 it doesn't help.Code: Select all/interface/wifi/radio/reg-info country="Superchannel" number=0 ranges: 2402-2482/60dBm/40MHz 5170-5895/60dBm/160MHz
On the other hand if i set United States it does run on max power (tx-power: 28)
The router is probably kicking you back to a default of Latvia, which is at 17.
And yes, I'm also running my wifi as "United States" because of high TX power, despite being in the EU. Isn't that great? :) But the only reason I have that is because I can't remember which South American country is better :D Was it Panama?
Not being erlinden but first thing which comes to mind: powerline.erlinden: If you can tell me how to place an access point in the basement for my washer and dryer that doesn't involve destroying walls and drilling through 0.4m of reinforced concrete, I'm all ears...
What say LOG?Unable to update RB450GX4. After rebooting the ROS version remains 16.2
Ah yes, that's nice, except for the fact that I have 3-phase electricity at home :) With wifi-qcom-ac my appliances are just barely holding on, whereas the old wireless package with superchannel and no_country_set was great, and I really have no desire to spend a crapload of extra money just so my wife can get notifications when the laundry is done...Not being erlinden but first thing which comes to mind: powerline.
E,g,:
https://www.devolo.global/products
You don't have to use the wifi variant, you can use the ethernet-only version and use your own AP of choice.
"sender" and "receiver" need to be on the same phase of your electrical installation and presence of solar power installations will reduce throughput drastically if on that same circuit (but I assume for a washer and dryer there is not much bandwidth needed).
Due to a chip issue which reports board temperature MikroTik decided to remove this parameter from health.Smol homenet updated:
Zwischenablage_01-17-2025_02.jpg
Works good so far :)
QUESTIONS:
*) firewall - added support for random external port allocation;
What means this? A bugfix or something we can configure? What is "random" now and what works now what has not worked before?
*) snmp - added wifi fields to MIKROTIK-MIB;
Where can I view the .mib-file? Which OIDs?
*) health - removed board-temperature on RB5009UPr+S+IN device;
WHY?! I used this as OID and it gave good reading!!
You removed it for the RB5009UPr+S+ (not "IN") too :'(
chart.png
Please send supout rif file.Hi
After upgrading, l2tp client is not connecting. In Webfig all ipsec tabs are empty and an /ip/ipsec/export results on an error.
# 2025-01-17 11:14:14 by RouterOS 7.17
# software id = WZEK-CJNA
#
# model = CCR2004-16G-2S+
# serial number = XXXXXXXXX
#error exporting "/ip/ipsec/policy/group" (timeout)
#error exporting "/ip/ipsec/proposal" (timeout)
#error exporting "/ip/ipsec/mode-config" (timeout)
#error exporting "/ip/ipsec/policy" (timeout)
#error exporting "/ip/ipsec/profile" (timeout)
#error exporting "/ip/ipsec/settings" (timeout)
Any clues?
Due to a chip issue which reports board temperature MikroTik decided to remove this parameter from health.
I can´t confirm that there´s a general problem with wifi-qcom-ac."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
Re: v7.17rc [testing] is released!
Post by CGGXANNX » Thu Jan 16, 2025 12:03 pm
Well it may goes out of memory with SMB, but if wifi-qcom-ac really takes a large chunk of RAM, then OOM might also happen if you run a container (that worked fine with wireless), or if you use adlist with huge lists, etc... If they disable and hide SMB, then should they do that with container and adlist too?
Currently you have to explicitly remove wireless and install wifi-qcom-ac. It is assumed that you read the doc before doing that, and from now on, the doc has the warning about the RAM usage. If your router suffers from OOM, your first thought now would be to revert back to wireless.
upgrade failed, free 9 kB of kernel disk spaceWhat say LOG?Unable to update RB450GX4. After rebooting the ROS version remains 16.2
MikroTik asked to send supout to them for this. I already netinstalled so can’t, but if you can generate a supout and send it to them as the above post requested, I’m sure they will help them.upgrade failed, free 9 kB of kernel disk space
What say LOG?
Free Memory: 617.6 MiB Total Memory:1024.0 MiB
Free HDD Space: 409.2 MiB Total HDD Size: 512.0 MiB
HZsolt, osc86, ormandj, nmt1900
Please send supout.rif file from your device to support@mikrotik.com
But the only reason I have that is because I can't remember which South American country is better :D Was it Panama?
Its strange! I using L2TPv2 tunnels, ip,ipv6,mpls over it. Using IGP protocol (RIP or OSPF doesn't matter) to distribute Loopback addresses. MPLS LDP is active on it and using BGP to exchange VPNvX routes. On IPv4 BGP peers I echange VPNv4 routes, on IPv6 BGP peers I exchange VPNv6 routes.Ok, I have serious problem with DHCP client after upgrade to 7.17, as it drops default route on multiple type of devices (RB4011, SXTsq 5 ac). I experienced this on RCs and betas too. Routers creating autosupout.rif file after dropping def route. I try to figure out what triggers this issue.
The questions was "WHY?" What is the chip doing to cause this decision?Due to a chip issue which reports board temperature MikroTik decided to remove this parameter from health.
First they have to figure out what does this message actually mean...upgrade failed, free 9 kB of kernel disk space
What say LOG?
Free Memory: 617.6 MiB Total Memory:1024.0 MiB
Free HDD Space: 409.2 MiB Total HDD Size: 512.0 MiB
Sometimes the reported board temperature is ridiculously high, I have seen that in one of our devices (while others are OK).The questions was "WHY?" What is the chip doing to cause this decision?Due to a chip issue which reports board temperature MikroTik decided to remove this parameter from health.
Still not all routes added to the correct VRF for PPP interfaces added to an interface list (through PPP profile) and interface list added to VRF.[*]*) ppp - add routes in matching VRF;
Maybe on some devices there is a separate partition for /boot ?upgrade failed, free 9 kB of kernel disk space
First they have to figure out what does this message actually mean...
On server-space it sounds quite logical, but here we have situation where some of same models succeed and some fail - while using same installation packages and sharing same architecture. It is hard to believe this has anything to do with userspace.Maybe on some devices there is a separate partition for /boot ?upgrade failed, free 9 kB of kernel disk space
First they have to figure out what does this message actually mean...
That used to be required/customary on some Linux filesystems or disk devices, to guarantee that the boot code was always within some area supported by the bootloader.
When for some reason the previous kernel version is not removed after upgrade, a next upgrade may be impossible.
(I know that issue from a server which was installed with a previous Debian version that by default created a "small" boot partition in certain circumstances)
Confirm, I have the same problem on RB5009. I’ve implemented a workaround script to trigger DHCP release once the obtained default route gets missing.Ok, I have serious problem with DHCP client after upgrade to 7.17, as it drops default route on multiple type of devices (RB4011, SXTsq 5 ac). I experienced this on RCs and betas too. Routers creating autosupout.rif file after dropping def route. I try to figure out what triggers this issue.
It seems, it reinitializes all the IGPs after 5sec:Confirm, I have the same problem on RB5009. I’ve implemented a workaround script to trigger DHCP release once the obtained default route gets missing.Ok, I have serious problem with DHCP client after upgrade to 7.17, as it drops default route on multiple type of devices (RB4011, SXTsq 5 ac). I experienced this on RCs and betas too. Routers creating autosupout.rif file after dropping def route. I try to figure out what triggers this issue.
2025-01-17 13:23:21 route,bgp,info JPoP_MTik1-IPv6-1 {l_addr: fc00::10:43:0:126, r_addr: fc00::10:7:255:255} Established
2025-01-17 13:23:26 route,rip,info instance { 0 IP } created
2025-01-17 13:23:26 route,rip,info instance { 0 IP6 } created
2025-01-17 13:23:27 route,rip,info instance { 0 IP } interface { L2TP1 } created
2025-01-17 13:23:27 route,rip,info instance { 0 IP6 } interface { L2TP1 } created
2025-01-17 13:23:29 route,rip,info instance { 0 IP6 } interface { L2TP1 } neighbor fe80::eb47:9598:f0:28%*8 created
2025-01-17 13:23:32 route,ospf,info instance { version: 3 router-id: 10.43.0.126 } created
2025-01-17 13:23:32 route,ospf,info OSPFv3 { version: 3 router-id: 10.43.0.126 } area { 0.0.0.0 } created
2025-01-17 13:23:32 route,ospf,info instance { version: 2 router-id: 10.43.0.126 } created
2025-01-17 13:23:32 route,ospf,info OSPFv2 { version: 2 router-id: 10.43.0.126 } area { 0.0.0.0 } created
$ ping 10.43.0.126
PING 10.43.0.126 (10.43.0.126) 56(84) bytes of data.
64 bytes from 10.43.0.126: icmp_seq=11 ttl=60 time=10.5 ms
64 bytes from 10.43.0.126: icmp_seq=12 ttl=60 time=12.1 ms
64 bytes from 10.43.0.126: icmp_seq=13 ttl=60 time=10.6 ms
64 bytes from 10.43.0.126: icmp_seq=14 ttl=60 time=12.0 ms
64 bytes from 10.43.0.126: icmp_seq=15 ttl=60 time=10.3 ms
64 bytes from 10.43.0.126: icmp_seq=16 ttl=60 time=10.3 ms
64 bytes from 10.43.0.126: icmp_seq=17 ttl=60 time=12.1 ms
64 bytes from 10.43.0.126: icmp_seq=18 ttl=60 time=10.1 ms
64 bytes from 10.43.0.126: icmp_seq=19 ttl=60 time=9.82 ms
64 bytes from 10.43.0.126: icmp_seq=20 ttl=60 time=12.5 ms
64 bytes from 10.43.0.126: icmp_seq=21 ttl=60 time=15.8 ms
64 bytes from 10.43.0.126: icmp_seq=22 ttl=60 time=10.4 ms
64 bytes from 10.43.0.126: icmp_seq=23 ttl=60 time=10.2 ms
64 bytes from 10.43.0.126: icmp_seq=24 ttl=60 time=10.2 ms
64 bytes from 10.43.0.126: icmp_seq=25 ttl=60 time=11.6 ms
64 bytes from 10.43.0.126: icmp_seq=26 ttl=60 time=10.2 ms
64 bytes from 10.43.0.126: icmp_seq=75 ttl=60 time=8.75 ms
64 bytes from 10.43.0.126: icmp_seq=76 ttl=60 time=11.5 ms
64 bytes from 10.43.0.126: icmp_seq=77 ttl=60 time=10.0 ms
64 bytes from 10.43.0.126: icmp_seq=78 ttl=60 time=11.7 ms
64 bytes from 10.43.0.126: icmp_seq=79 ttl=60 time=10.8 ms
64 bytes from 10.43.0.126: icmp_seq=80 ttl=60 time=10.6 ms
64 bytes from 10.43.0.126: icmp_seq=81 ttl=60 time=10.8 ms
64 bytes from 10.43.0.126: icmp_seq=82 ttl=60 time=11.8 ms
64 bytes from 10.43.0.126: icmp_seq=83 ttl=60 time=12.2 ms
64 bytes from 10.43.0.126: icmp_seq=84 ttl=60 time=10.1 ms
64 bytes from 10.43.0.126: icmp_seq=85 ttl=60 time=10.5 ms
64 bytes from 10.43.0.126: icmp_seq=86 ttl=60 time=10.2 ms
^C
--- 10.43.0.126 ping statistics ---
201 packets transmitted, 28 received, 86.0696% packet loss, time 202355ms
rtt min/avg/max/mdev = 8.746/10.988/15.813/1.273 ms
I can´t confirm that there´s a general problem with wifi-qcom-ac.
There are 4 devices running since 50days without any memory leaks or other problems:
hc_438.jpg
We are working towards optimizing wireless-qcom-ac as we try to optimize other packages to be less resource heavy, but it is still a work in progress. As of this moment, wifi-qcom-ac is known and expected to take up more resources (including RAM) than legacy wireless drivers.
Using Mikrotik as spoke (IKEv2 + PSK) to a Cisco Router and it still works fine after upgrading to 7.17.IKEv2 tunnels fail to establish after upgrading to 7.17 (between 7.17<->7.17 and 7.17<->7.16.2). However, 7.17 does establish IKEv2 with Huawei AR (same settings).
Rolling back to 7.16.2 does fix the issue.
Auth method is PSK, 7.17 peer sends "Delete" right after successful IKE_AUTH. Tested on both live RBs and GNS3 lab.
Am I the only one with this issue?
Yeah and some random guy here dreamed *THIS* will be a long-term, because it took so long... LOLArggg it seems like there are too many bugs in this version ...
After updating from 7.16.2 to 7.17 yesterday the 5ghz wifi has stopped working.
Both wifi interfaces are members of Bridge1, Bridge ports show wifi2 (2ghz) is up and running and it transmitting its SSID, whereas wifi1 shows it is not up and is not broadcasting its SSID.
Try to add wifi1 (5 GHz) on bridge manually. It might help.
After updating from 7.16.2 to 7.17 yesterday the 5ghz wifi has stopped working.
Both wifi interfaces are members of Bridge1, Bridge ports show wifi2 (2ghz) is up and running and it transmitting its SSID, whereas wifi1 shows it is not up and is not broadcasting its SSID.
This is because many people wait for the final release to pull the trigger: "omg!!!!! it broke my xyz". instead of evaluating the testing releases ao Mikrotik can fix release specific issues before final version.Yeah and some random guy here dreamed *THIS* will be a long-term, because it took so long... LOLArggg it seems like there are too many bugs in this version ...
This is a typical MT point-zero release, 3 steps forward and 5 back... The long-term is as far away as with the v7.0 release.
Superchannel is working great on my hAP ax3, no DFS and max TX power allowed by the hardware just had to limit the frequency to 5180-5805 and 2412-2462. Otherwise it may pick a channel out of the usable spectrum for most WiFi clients.What are you even talking about, its literary in changelog of 7.17 update:
There is no superchannel in the new wifi-qcom(-ac) drivers, also there is no no_country_set. (BTW, superchannel was a mode, no_country_set was regulatory domain, so you're doing wrong things in the first place.)
The router is probably kicking you back to a default of Latvia, which is at 17.
And yes, I'm also running my wifi as "United States" because of high TX power, despite being in the EU. Isn't that great? :) But the only reason I have that is because I can't remember which South American country is better :D Was it Panama?
) wifi-qcom - added Superchannel country profile;
And it does work for higher channels i just tried like 5500 and 5600 it runs max power and skips DFS check, just not for lower ones for some reason so it seams as a bug..
I upgraded to 7.17 on my hAP ax2 and realized that the bridge ports are not shown as "hardware offloaded" anymore. This was always the case on previous versions. Bug?
Currently, HW offloaded bridge support for the IPQ-PPE switch chip is still a work in progress. We recommend using, the default, non-HW offloaded bridge (enabled RSTP).
@infabo, I know this is well intended.This is because many people wait for the final release to pull the trigger: "omg!!!!! it broke my xyz". instead of evaluating the testing releases ao Mikrotik can fix release specific issues before final version.Yeah and some random guy here dreamed *THIS* will be a long-term, because it took so long... LOL
This is a typical MT point-zero release, 3 steps forward and 5 back... The long-term is as far away as with the v7.0 release.
I respect that you want to be a MikroTik beta tester, but in a network with real network administrators and managers and hundreds of users to explain to if a software update goes wrong, this is something not everyone can afford.This is because many people wait for the final release to pull the trigger: "omg!!!!! it broke my xyz". instead of evaluating the testing releases ao Mikrotik can fix release specific issues before final version.
Yeah and some random guy here dreamed *THIS* will be a long-term, because it took so long... LOL
This is a typical MT point-zero release, 3 steps forward and 5 back... The long-term is as far away as with the v7.0 release.
This is most probably a configuration related issue. I have cap ac with only 128MB system memory running wifi-qcom-ac and it reached quite 4 weeks uptime on 7.16.2 before I upgraded it to 7.17 today. It reported ~28mb of free memory before I upgraded the system."Wireless" is fine with 7.17, but "wifi-qcom-ac" is crap, unfortunately. I have had long time open memory leak ticket SUP-147911 for hAP ac^2. This ticket has been closed without solution - but it is bullet proof the leak is related to "wifi-qcom-ac", because "wireless" is fine and stable. There is no any willingness on Mikrotik side to do any investigation, only short message - it is old HW. But this old HW IPQ-4019 with exact same amount of RAM memory (256MB) and ROM memory (16MB) is used in Chateau 5G R16. There was visible decrease of RAM free memory 10MB/day starting with 150MB to OOP after roughly 14-21 days - kernel panic memory.
do we have any update on [SUP-134566]: BGP-VRF V7?
when that feature will be implemented.
It works perfectly fine on v6
I believe there’s been a misunderstanding. I’m not looking to be a beta tester, as I use RouterOS in a private capacity and don’t have the inclination to take on that additional work.I respect that you want to be a MikroTik beta tester, but in a network with real network administrators and managers and hundreds of users to explain to if a software update goes wrong, this is something not everyone can afford.
This is because many people wait for the final release to pull the trigger: "omg!!!!! it broke my xyz". instead of evaluating the testing releases ao Mikrotik can fix release specific issues before final version.
do we have any update on [SUP-134566]: BGP-VRF V7?
when that feature will be implemented.
It works perfectly fine on v6
If you do not uncheck "Responder" in Wireguard clients in RouterOS 7.17 you will have a problem.*) wireguard - do not initiate handshake when peer is configured as responder;
I totally agree with you. But we also know that it is not realistic to think that a 100% functioning test can be performed in a laboratory.I believe there’s been a misunderstanding. I’m not looking to be a beta tester, as I use RouterOS in a private capacity and don’t have the inclination to take on that additional work.
I respect that you want to be a MikroTik beta tester, but in a network with real network administrators and managers and hundreds of users to explain to if a software update goes wrong, this is something not everyone can afford.
However, in a professional environment with dedicated network administrators, as you mentioned, it’s standard practice to have a lab setup for testing and evaluating configurations before rolling out updates to a production network with hundreds of users. It’s worth considering.
*) ppp - add routes in matching VRF;
DIvH 194.4.172.12/32 10.86.33.193 0 main
DAd 0.0.0.0/0 10.86.33.193@mobile 1 mobile 10.86.33.193%vlan32
I had the same problem on my CCR2004, make sure you don't have any features in use that will get disabled by the new device-mode settings. In my case, i had the device partitioned. After removing the second partition the update went flawlessly.
upgrade failed, free 9 kB of kernel disk space
Free Memory: 617.6 MiB Total Memory:1024.0 MiB
Free HDD Space: 409.2 MiB Total HDD Size: 512.0 MiB
Sorry, my bad. I have also other devices like hAP ac2, maybe I'm confusing those 2. I'll upgrade the ac2 to see if hw-offload works.I upgraded to 7.17 on my hAP ax2 and realized that the bridge ports are not shown as "hardware offloaded" anymore. This was always the case on previous versions. Bug?
I don't think that the hAP ax²/ax³ have ever had hardware offload support for the bridge. It's stated in the doc since the beginning:
https://help.mikrotik.com/docs/spaces/R ... Offloading
Currently, HW offloaded bridge support for the IPQ-PPE switch chip is still a work in progress. We recommend using, the default, non-HW offloaded bridge (enabled RSTP).
What takes away the possibility to easy switch back to the previous version in case you run into issues with 7.17.I had the same problem on my CCR2004, make sure you don't have any features in use that will get disabled by the new device-mode settings. In my case, i had the device partitioned. After removing the second partition the update went flawlessly.
Good to know we are commonly situated.I believe there’s been a misunderstanding. I’m not looking to be a beta tester, as I use RouterOS in a private capacity and don’t have the inclination to take on that additional work.
Small and medium sized business can't afford this either and the enterprise population is numerically small.However, in a professional environment with dedicated network administrators, as you mentioned, it’s standard practice to have a lab setup for testing and evaluating configurations before rolling out updates to a production network with hundreds of users. It’s worth considering.
My hAP ax2 on v7.16.2 shows bridge ports are hardware-offloaded:I don't think that the hAP ax²/ax³ have ever had hardware offload support for the bridge. It's stated in the doc since the beginning:
https://help.mikrotik.com/docs/spaces/R ... Offloading
This does not solve my problem with RB450Gx4. After that that madness with polishing device-mode I start to feel somewhat reluctant to be unpaid outsourced beta tester of "stable" releases.I had the same problem on my CCR2004, make sure you don't have any features in use that will get disabled by the new device-mode settings. In my case, i had the device partitioned. After removing the second partition the update went flawlessly.
upgrade failed, free 9 kB of kernel disk space
Free Memory: 617.6 MiB Total Memory:1024.0 MiB
Free HDD Space: 409.2 MiB Total HDD Size: 512.0 MiB
A better error message might certainly help here (;
best
MT should be using enterprise software development practices which includes for each function module, in parallel they write a unit test that covers every code path in the function module. The unit tests run late in the build cycle to catch regressions without manual testing which is where the payback occurs to offset the unit test development time. Without unit tests and as features grow the manual regression testing coverage becomes sparse (what we see today) and eventually the user base collapse death spiral occurs.@wuspmikrotik
And yet, it seems that MikroTik is expected to know every possible scenario and real-world setup and perform functional tests to ensure that absolutely no one experiences any problems in their specific environment.
You probably have protocol-mode=none configured on your bridge. The Wiki page referenced states:My hAP ax2 on v7.16.2 shows bridge ports are hardware-offloaded:I don't think that the hAP ax²/ax³ have ever had hardware offload support for the bridge. It's stated in the doc since the beginning:
https://help.mikrotik.com/docs/spaces/R ... Offloading
It is buggy though, plugging in a 100Mbps ethernet device on any of the ports reduces the max switch capacity to 100Mbps.
Currently, HW offloaded bridge support for the IPQ-PPE switch chip is still a work in progress. We recommend using, the default, non-HW offloaded bridge (enabled RSTP).
For curiosity, what is your wifi1 and wifi2 configuration? In my case quite basic one SSID with fast roaming on between 2,4 GHz and 5GHz bands. Allowed WPA2 and WPA3. No any interAP roaming. Nothing special. Mixed IPv4 and IPv6 traffic with majority of IPv6.same for me.This is most probably a configuration related issue. I have cap ac with only 128MB system memory running wifi-qcom-ac and it reached quite 4 weeks uptime on 7.16.2 before I upgraded it to 7.17 today. It reported ~28mb of free memory before I upgraded the system.
running 2 hAP ac2 (one with the 256MB and one with the 128MB flash storage)
both running without any issues what so ever on wifi-qcom-ac for weeks under 7.16
/interface wifi steering
add disabled=no name=steering1 neighbor-group=dynamic-ABC-6754ca15 rrm=yes wnm=yes
/interface wifi
set [ find default-name=wifi1 ] channel.band=2ghz-n .width=20/40mhz configuration.country=Czech .mode=ap .multicast-enhance=enabled .qos-classifier=\
priority .ssid=ABC disabled=no mtu=1500 security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes .ft-preserve-vlanid=no .wps=\
disable steering=steering1
set [ find default-name=wifi2 ] channel.band=5ghz-ac .frequency=5500 .width=20/40/80mhz configuration.country=Czech .mode=ap .multicast-enhance=enabled \
.qos-classifier=priority .ssid=ABC disabled=no security.authentication-types=wpa2-psk,wpa3-psk .ft=yes .ft-over-ds=yes .ft-preserve-vlanid=no \
.wps=disable steering=steering1
Where do you get dhcp from? I have tried several models/scenarios and I don't see this problem.Ok, I have serious problem with DHCP client after upgrade to 7.17, as it drops default route on multiple type of devices (RB4011, SXTsq 5 ac). I experienced this on RCs and betas too. Routers creating autosupout.rif file after dropping def route. I try to figure out what triggers this issue.
/ip neighbor discovery-settings
set discover-interface-list=L2_neighbor_discovery
Have an rb450gx4 and was able to upgrade to 7.17 without issues from 7.16.2Super-stable 7.17 is unable to install on RB450Gx4450Gx4 has 512 MB storage space and only 25% of it is used. What is going on??? Other devices with 16 MB storage updated without problems...Code: Select allupgrade failed, free 9 kB of kernel disk space
P. S. It seems to be an overlooked problem from rc stage -> viewtopic.php?p=1119444
19:24:07 system,error upgrade failed, free 57 kB of disk space
> /system/package/print
Columns: NAME, VERSION, BUILD-TIME, SIZE
# NAME VERSION BUILD-TIME SIZE
0 container 7.16.2 2024-11-26 12:09:40 96.1KiB
1 wifi-qcom-ac 7.16.2 2024-11-26 12:09:40 2676.1KiB
2 routeros 7.16.2 2024-11-26 12:09:40 11.1MiB
> /system/resource/print
uptime: 7m2s
version: 7.16.2 (stable)
build-time: 2024-11-26 12:09:40
factory-software: 6.99
free-memory: 74.7MiB
total-memory: 256.0MiB
cpu: ARM
cpu-count: 4
cpu-frequency: 448MHz
cpu-load: 3%
free-hdd-space: 256.0KiB
total-hdd-space: 16.0MiB
write-sect-since-reboot: 891
write-sect-total: 1243788
architecture-name: arm
board-name: D53G-5HacD2HnD
platform: MikroTik
> /system/resource/print
uptime: 1m58s
version: 7.17 (stable)
build-time: 2025-01-16 08:19:28
factory-software: 6.99
free-memory: 57.9MiB
total-memory: 256.0MiB
cpu: ARM
cpu-count: 4
cpu-frequency: 672MHz
cpu-load: 3%
free-hdd-space: 68.0KiB
total-hdd-space: 16.0MiB
write-sect-since-reboot: 510
write-sect-total: 1245818
architecture-name: arm
board-name: D53G-5HacD2HnD
platform: MikroTik
What is your RB450Gx4's factory version?Have an rb450gx4 and was able to upgrade to 7.17 without issues from 7.16.2Super-stable 7.17 is unable to install on RB450Gx4450Gx4 has 512 MB storage space and only 25% of it is used. What is going on??? Other devices with 16 MB storage updated without problems...Code: Select allupgrade failed, free 9 kB of kernel disk space
P. S. It seems to be an overlooked problem from rc stage -> viewtopic.php?p=1119444
6.45.1What is your RB450Gx4's factory version?
Have an rb450gx4 and was able to upgrade to 7.17 without issues from 7.16.2
My theory is some of older versions creating too small partition for kernel. If you repartition your device for two partition with 7.16.2, and activate the part1 (second) partition and upgrade with part1 then you could upgrade. Or make full backup, netinstall with 7.16.2 then upgrade should be successful.6.45.1
What is your RB450Gx4's factory version?
I validated this, setting protocol-mode=none shows hw-offloaded ports on my hAP ax2. It's a pitty that in 2024/25 we still have recent products without basic features like bridge hw-offload + R/MSTP...You probably have protocol-mode=none configured on your bridge. The Wiki page referenced states:
My hAP ax2 on v7.16.2 shows bridge ports are hardware-offloaded:
It is buggy though, plugging in a 100Mbps ethernet device on any of the ports reduces the max switch capacity to 100Mbps.
Code: Select allCurrently, HW offloaded bridge support for the IPQ-PPE switch chip is still a work in progress. We recommend using, the default, non-HW offloaded bridge (enabled RSTP).
combo2 excessive broadcasts/multicasts, probably a loop
combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd
combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd
combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> ff:ff:ff:ff:ff:ff VID 500 ETHERTYPE 0x0806
combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> ff:ff:ff:ff:ff:ff VID 500 ETHERTYPE 0x0806
combo2: bridge RX looped packet - MAC 48:a9:8a:be:de:b5 -> 33:33:00:00:00:01 VID 500 ETHERTYPE 0x86dd
Same there. But if i set pool prefix lenght to 128 error dissapears. But right setting for my pool prefix lenght is 64. With 64 in settings it gives error "pool6 refused acquire: bad preferred prefix length!".*) dhcpv6-server - added IPv6 address delegation support;
this not work. When i select a pool on ADDRESS POOL in the dhcpv6 server, i obtain in log: pool6 refused acquire: bad preferred prefix length! (1) and the pool is properly configured
this model is supposed to have 16MB of flash, how did you get 128 or 256MB?running 2 hAP ac2 (one with the 256MB and one with the 128MB flash storage)
Certainly, there are admins who might attempt such an upgrade directly, but it's always a risk. Even on Windows, untested updates - such as Exchange KBs - can cause significant issues if applied without proper research or understanding of others' experiences. Microsoft has had its fair share of problematic updates, despite being a billion-dollar enterprise. Yet, when it comes to Mikrotik, expectations of zero bugs remain sky-high - something to reflect on!I guess you would never make an inplace upgrade of a MS Server 2019 to 2025 without testing, right?
this model is supposed to have 16MB of flash, how did you get 128 or 256MB?running 2 hAP ac2 (one with the 256MB and one with the 128MB flash storage)
As a homeowner, I had no issues updating my hapax3, non-critical AP to 7.17. My main router CCR1009 will not get upgraded until 7.17.1 or 7.17.2 are released, fixing the most egregious 7.17 issues.Well, we should make some test before upgrading en-masse our devices. I have upgraded only one my personal router that is not critical. The other one in my network are all on the 7.16.2
Find something ? I also try but can't figure out.Can we get an example for this ? I could not figure it out myself and there is no documentation for it.*) wifi - added access-list stats (CLI only);
[admin@ACIEG] /ip/firewall/mangle> export terse
[ .... ]
/ip firewall mangle add action=accept chain=prerouting
[admin@ACIEG] /ip/firewall/mangle>
[admin@ACIEG] /ip/firewall/mangle> export terse
[ ... ]
/ip firewall mangle add action=accept chain=prerouting hotspot=auth
[admin@ACIEG] /ip/firewall/mangle>
Same there. But if i set pool prefix lenght to 128 error dissapears. But right setting for my pool prefix lenght is 64. With 64 in settings it gives error "pool6 refused acquire: bad preferred prefix length!".*) dhcpv6-server - added IPv6 address delegation support;
this not work. When i select a pool on ADDRESS POOL in the dhcpv6 server, i obtain in log: pool6 refused acquire: bad preferred prefix length! (1) and the pool is properly configured
Hi,Hi,
7.17 is working great few days on:
HAP AX3, HAP AC 3, HAP AX2, HAP AC2, SXT, WAP G60, CUBE 60
What is your RB450Gx4's factory version?
Have an rb450gx4 and was able to upgrade to 7.17 without issues from 7.16.2
uptime: 16h9m8s
version: 7.17 (stable)
build-time: 2025-01-16 08:19:28
factory-software: 6.45.3
free-memory: 871.9MiB
total-memory: 1024.0MiB
cpu: ARM
cpu-count: 4
cpu-frequency: 448MHz
cpu-load: 12%
free-hdd-space: 429.2MiB
total-hdd-space: 512.0MiB
write-sect-since-reboot: 39224
write-sect-total: 32069553
bad-blocks: 0.1%
architecture-name: arm
board-name: RB450Gx4
platform: MikroTik
I think its talking about this:Find something ? I also try but can't figure out.
Can we get an example for this ? I could not figure it out myself and there is no documentation for it.
/interface/wifi/access-list> print
# MAC-ADDRESS ACTION LAST-LOGGED-OUT MATCH-COUNT
;;; Switch
0 E0:F6:B5:XX:XX:XX accept 2025-01-18 02:15:16 3
;;; Xiaomi
1 9E:AA:77:XX:XX:XX accept 2025-01-19 22:56:08 70
*) smb - stability improvements for client/server;
--Request by Infuse--> SMB (Server Message Block Protocol)
SMB Header
Server Component: SMB
SMB Command: Negotiate Protocol (0x72)
NT Status: STATUS_SUCCESS (0x00000000)
Flags: 0x18, Canonicalized Pathnames, Case Sensitivity
0... .... = Request/Response: Message is a request to the server
.0.. .... = Notify: Notify client only on open
..0. .... = Oplocks: OpLock not requested/granted
...1 .... = Canonicalized Pathnames: Pathnames are canonicalized
.... 1... = Case Sensitivity: Path names are caseless
.... ..0. = Receive Buffer Posted: Receive buffer has not been posted
.... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported
Flags2: 0xc843, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Used, Extended Attributes, Long Names Allowed
1... .... .... .... = Unicode Strings: Strings are Unicode
.1.. .... .... .... = Error Code Type: Error codes are NT error codes
..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only
...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs
.... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported
.... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path
.... .... .1.. .... = Long Names Used: Path names in request are long file names
.... .... ...0 .... = Security Signatures Required: Security signatures are not required
.... .... .... 0... = Compressed: Compression is not requested
.... .... .... .0.. = Security Signatures: Security signatures are not supported
.... .... .... ..1. = Extended Attributes: Extended attributes are supported
.... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response
Process ID High: 0
Signature: 0000000000000000
Reserved: 0000
Tree ID: 0
Process ID: 1344
User ID: 0
Multiplex ID: 0
Negotiate Protocol Request (0x72)
Word Count (WCT): 0
Byte Count (BCC): 34
Requested Dialects
Dialect: NT LM 0.12
Buffer Format: Dialect (2)
Name: NT LM 0.12
Dialect: SMB 2.002
Buffer Format: Dialect (2)
Name: SMB 2.002
Dialect: SMB 2.???
Buffer Format: Dialect (2)
Name: SMB 2.???
<--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
NT Status: STATUS_SUCCESS (0x00000000)
Command: Negotiate Protocol (0)
Credits granted: 1
Flags: 0x00000001, Response
.... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 0
Reserved: 0x00000000
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
Negotiate Protocol Response (0x00)
StructureSize: 0x0041
0000 0000 0100 000. = Fixed Part Length: 32
.... .... .... ...1 = Dynamic Part: True
Security mode: 0x01, Signing enabled
.... ...1 = Signing enabled: True
.... ..0. = Signing required: False
Dialect: SMB2 wildcard (0x02ff)
Reserved: 0
Server Guid: 00000000-0000-0000-0000-000000000000
Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL
.... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS
.... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING
.... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU
.... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL
.... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES
.... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING
.... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION
.... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS
Max Transaction Size: 1048576
Max Read Size: 4194304
Max Write Size: 4194304
Current Time: Jan 19, 2025 19:31:13.155350300 PST
Boot Time: No time specified (0)
Blob Offset: 0x00000080
Blob Length: 74
Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265
GSS-API Generic Security Service Application Program Interface
OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation)
Simple Protected Negotiation
negTokenInit
mechTypes: 1 item
MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider)
negHints
hintName: not_defined_in_RFC4178@please_ignore
Reserved2: 0x00000000
--Request by Infuse--> SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
Channel Sequence: 0
Reserved: 0000
Command: Negotiate Protocol (0)
Credits requested: 99
Flags: 0x00000000
.... .... .... .... .... .... .... ...0 = Response: This is a REQUEST
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 1
Reserved: 0x00000000
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
[Response in: 28]
Negotiate Protocol Request (0x00)
[Preauth Hash: d5a10eba0dae463de64e00a9d6f28d86caf27f31cbee57633eee39494cbf27b6c601bf7ee95418c314a20508a331866661c4abd3b99240566b0f96e46bb3f036]
StructureSize: 0x0024
0000 0000 0010 010. = Fixed Part Length: 18
.... .... .... ...0 = Dynamic Part: False
Dialect count: 4
Security mode: 0x01, Signing enabled
.... ...1 = Signing enabled: True
.... ..0. = Signing required: False
Reserved: 0000
Capabilities: 0x00000045, DFS, LARGE MTU, ENCRYPTION
.... .... .... .... .... .... .... ...1 = DFS: This host supports DFS
.... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING
.... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU
.... .... .... .... .... .... .... 0... = MULTI CHANNEL: This host does NOT support MULTI CHANNEL
.... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES
.... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING
.... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION
.... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS
Client Guid: 51497ea5-5cef-b244-b964-6e8ce408a16f
NegotiateContextOffset: 0x00000000
NegotiateContextCount: 0
Reserved: 0000
Dialect: SMB 2.0.2 (0x0202)
Dialect: SMB 2.1 (0x0210)
Dialect: SMB 3.0 (0x0300)
Dialect: SMB 3.0.2 (0x0302)
<--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
NT Status: STATUS_INSUFFICIENT_RESOURCES (0xc000009a)
Command: Negotiate Protocol (0)
Credits granted: 1
Flags: 0x00000001, Response
.... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 1
Reserved: 0x00000000
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
[Response to: 24]
[Time from request: 0.000004000 seconds]
Negotiate Protocol Response (0x00)
[Preauth Hash: f4c7dbdcf3ecb837e5cb129c6cc7c78a3a6f3b2b56109787fd24bcdf2ce7ac44650bd5b25beafbb863ca3411f0f53ebfc1a15743abe42cd58eb4777cdc21ddc2]
StructureSize: 0x0009
0000 0000 0000 100. = Fixed Part Length: 4
.... .... .... ...1 = Dynamic Part: True
Error Context Count: 0
Reserved: 0x00
Byte Count: 0
Error Data: 00
--Request by macOS--> SMB (Server Message Block Protocol)
SMB Header
Server Component: SMB
SMB Command: Negotiate Protocol (0x72)
NT Status: STATUS_SUCCESS (0x00000000)
Flags: 0x08, Case Sensitivity
0... .... = Request/Response: Message is a request to the server
.0.. .... = Notify: Notify client only on open
..0. .... = Oplocks: OpLock not requested/granted
...0 .... = Canonicalized Pathnames: Pathnames are not canonicalized
.... 1... = Case Sensitivity: Path names are caseless
.... ..0. = Receive Buffer Posted: Receive buffer has not been posted
.... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported
Flags2: 0xc801, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Allowed
1... .... .... .... = Unicode Strings: Strings are Unicode
.1.. .... .... .... = Error Code Type: Error codes are NT error codes
..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only
...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs
.... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported
.... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path
.... .... .0.. .... = Long Names Used: Path names in request are not long file names
.... .... ...0 .... = Security Signatures Required: Security signatures are not required
.... .... .... 0... = Compressed: Compression is not requested
.... .... .... .0.. = Security Signatures: Security signatures are not supported
.... .... .... ..0. = Extended Attributes: Extended attributes are not supported
.... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response
Process ID High: 0
Signature: 0000000000000000
Reserved: 0000
Tree ID: 65535
Process ID: 1
User ID: 65535
Multiplex ID: 0
Negotiate Protocol Request (0x72)
Word Count (WCT): 0
Byte Count (BCC): 34
Requested Dialects
Dialect: NT LM 0.12
Buffer Format: Dialect (2)
Name: NT LM 0.12
Dialect: SMB 2.002
Buffer Format: Dialect (2)
Name: SMB 2.002
Dialect: SMB 2.???
Buffer Format: Dialect (2)
Name: SMB 2.???
<--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
NT Status: STATUS_SUCCESS (0x00000000)
Command: Negotiate Protocol (0)
Credits granted: 1
Flags: 0x00000001, Response
.... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 0
Reserved: 0x00000000
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
Negotiate Protocol Response (0x00)
StructureSize: 0x0041
0000 0000 0100 000. = Fixed Part Length: 32
.... .... .... ...1 = Dynamic Part: True
Security mode: 0x01, Signing enabled
.... ...1 = Signing enabled: True
.... ..0. = Signing required: False
Dialect: SMB2 wildcard (0x02ff)
Reserved: 0
Server Guid: 00000000-0000-0000-0000-000000000000
Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL
.... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS
.... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING
.... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU
.... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL
.... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES
.... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING
.... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION
.... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS
Max Transaction Size: 1048576
Max Read Size: 4194304
Max Write Size: 4194304
Current Time: Jan 19, 2025 19:12:36.815501500 PST
Boot Time: No time specified (0)
Blob Offset: 0x00000080
Blob Length: 74
Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265
GSS-API Generic Security Service Application Program Interface
OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation)
Simple Protected Negotiation
negTokenInit
mechTypes: 1 item
MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider)
negHints
hintName: not_defined_in_RFC4178@please_ignore
Reserved2: 0x00000000
--Request by macOS--> SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
Channel Sequence: 0
Reserved: 0000
Command: Negotiate Protocol (0)
Credits requested: 0
Flags: 0x00000000
.... .... .... .... .... .... .... ...0 = Response: This is a REQUEST
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 1
Reserved: 0x0000feff
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
[Response in: 58]
Negotiate Protocol Request (0x00)
[Preauth Hash: d31c2830b42fa5c6603ae5e67d9fbbd519687ecc35f3a604d91d0b2cf677831d9ee858e922cf7f1e2fbd9e18b9c1fef59ddb991a3fe69433da1d3eac9afa60c8]
StructureSize: 0x0024
0000 0000 0010 010. = Fixed Part Length: 18
.... .... .... ...0 = Dynamic Part: False
Dialect count: 5
Security mode: 0x01, Signing enabled
.... ...1 = Signing enabled: True
.... ..0. = Signing required: False
Reserved: 0000
Capabilities: 0x0000007f, DFS, LEASING, LARGE MTU, MULTI CHANNEL, PERSISTENT HANDLES, DIRECTORY LEASING, ENCRYPTION
.... .... .... .... .... .... .... ...1 = DFS: This host supports DFS
.... .... .... .... .... .... .... ..1. = LEASING: This host supports LEASING
.... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU
.... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL
.... .... .... .... .... .... ...1 .... = PERSISTENT HANDLES: This host supports PERSISTENT HANDLES
.... .... .... .... .... .... ..1. .... = DIRECTORY LEASING: This host supports DIRECTORY LEASING
.... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION
.... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS
Client Guid: 5918f3a6-8558-bf44-bce9-89cb9c46119a
NegotiateContextOffset: 0x00000070
NegotiateContextCount: 5
Reserved: 0000
Dialect: SMB 2.0.2 (0x0202)
Dialect: SMB 2.1 (0x0210)
Dialect: SMB 3.0 (0x0300)
Dialect: SMB 3.0.2 (0x0302)
Dialect: SMB 3.1.1 (0x0311)
Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES
Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001)
DataLength: 38
Reserved: 00000000
HashAlgorithmCount: 1
SaltLength: 32
HashAlgorithm: SHA-512 (0x0001)
Salt: b2967270afec39d772b756b248b7e7f8c6868f28a5bd3dae84be2c94061cdd38
Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES
Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002)
DataLength: 10
Reserved: 00000000
CipherCount: 4
CipherId: AES-256-GCM (0x0004)
CipherId: AES-256-CCM (0x0003)
CipherId: AES-128-GCM (0x0002)
CipherId: AES-128-CCM (0x0001)
Negotiate Context: SMB2_COMPRESSION_CAPABILITIES
Type: SMB2_COMPRESSION_CAPABILITIES (0x0003)
DataLength: 10
Reserved: 00000000
CompressionAlgorithmCount: 1
Flags: 0x00000000
.... .... .... .... .... .... .... ...0 = Chained: False
0000 0000 0000 0000 0000 0000 0000 000. = Reserved: 0x00000000
CompressionAlgorithmId: None (0x0000)
Negotiate Context: SMB2_SIGNING_CAPABILITIES
Type: SMB2_SIGNING_CAPABILITIES (0x0008)
DataLength: 6
Reserved: 00000000
SigningAlgorithmCount: 2
SigningAlgorithmId: AES-GMAC (0x0002)
SigningAlgorithmId: AES-CMAC (0x0001)
Negotiate Context: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID
Type: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID (0x0005)
DataLength: 58
Reserved: 00000000
Netname: Shared Movies._smb._tcp.local
<--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2)
SMB2 Header
ProtocolId: 0xfe534d42
Header Length: 64
Credit Charge: 0
NT Status: STATUS_SUCCESS (0x00000000)
Command: Negotiate Protocol (0)
Credits granted: 1
Flags: 0x00000001, Response
.... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE
.... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command
.... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command
.... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed
.... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY
...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation
..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation
Chain Offset: 0x00000000
Message ID: 1
Reserved: 0x0000feff
Tree Id: 0x00000000
Session Id: 0x0000000000000000
Signature: 00000000000000000000000000000000
[Response to: 54]
[Time from request: 0.000007000 seconds]
Negotiate Protocol Response (0x00)
[Preauth Hash: 5c8cf3670d9ca5d3b91e2199ac05900e9dc87288dfab3e1ebf702d0fba52eaeafe46ae3070c36de4b1460af9540cd3ceeb601c97b62ba1d73ab22a9a011d192f]
StructureSize: 0x0041
0000 0000 0100 000. = Fixed Part Length: 32
.... .... .... ...1 = Dynamic Part: True
Security mode: 0x01, Signing enabled
.... ...1 = Signing enabled: True
.... ..0. = Signing required: False
Dialect: SMB 3.1.1 (0x0311)
NegotiateContextCount: 3
Server Guid: 00000000-0000-0000-0000-000000000000
Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL
.... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS
.... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING
.... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU
.... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL
.... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES
.... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING
.... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION
.... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS
Max Transaction Size: 1048576
Max Read Size: 4194304
Max Write Size: 4194304
Current Time: Jan 19, 2025 19:12:36.820239300 PST
Boot Time: No time specified (0)
Blob Offset: 0x00000080
Blob Length: 74
Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265
GSS-API Generic Security Service Application Program Interface
OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation)
Simple Protected Negotiation
negTokenInit
mechTypes: 1 item
MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider)
negHints
hintName: not_defined_in_RFC4178@please_ignore
NegotiateContextOffset: 0x000000d0
Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES
Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001)
DataLength: 38
Reserved: 00000000
HashAlgorithmCount: 1
SaltLength: 32
HashAlgorithm: SHA-512 (0x0001)
Salt: edb44f22adfc8867776d42525d298d1ee4b228e0690e951e33ad271ab36e6f6a
Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES
Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002)
DataLength: 4
Reserved: 00000000
CipherCount: 1
CipherId: AES-128-GCM (0x0002)
Negotiate Context: SMB2_SIGNING_CAPABILITIES
Type: SMB2_SIGNING_CAPABILITIES (0x0008)
DataLength: 4
Reserved: 00000000
SigningAlgorithmCount: 1
SigningAlgorithmId: AES-CMAC (0x0001)
It works perfectly for me, do you also have this firmware?R11e-LTE-US is not working! With 7.16.2 works well.
Downgraded and working well again.
... though this is just regular DNS traffic on a hotspot. Can I mitigate this warning from being triggered?system;warning possible SYN flooding on tcp port 53
Regarding #3, dynamic DHCP serves are used to handout IP info to LTE passthrough client in this and previous RouterOS versions, most likely was not noticing it.Hi,
Upgraded RBLtAP-2HnD from 7.16.2 to v7.17 this morning.
These comments I want to add / ask after the upgrade:
1., not used LTE APNs can't be deleted - even if LTE1 interface is disabled. I have 3 created for test purpose. One will stay as a tested/working one. Other two APN profiles (test) can't be deleted. Any restriction for the deletion of them?
2., LTE1 interface is used as passthrough via VLANxx interface. 4GInternet works fine. The status on the top says: "Running", "Not Slave" "Not Passthrough", Not Inactive".So the message "Not Passthrough" is confusing in this case.
3., As the devide is used as a passthrough device from 4G WAN to the main router CCR1009 and configured according to the manual - strangely one DHCP Server entry appeared and can't be deleted. Seems like dynamic entry...The name is equal to the working and used APN "name". Is that with purpose? I read that DHCP server needs to be deleted in such case where device used as an LTE passthrough.
/system logging action remove [find name=support]
/system logging action add name=support target=memory memory-lines=16383
/system logging add action=support topics=lte
Yup, seeing the same thing, it shows like this: Also, when one router was 7.17 and the other 7.16.x the VRRP would move master from the older to newer one when it was not supposed to (higher priority on older).It seems that 7.17 has broken the VRRP Sync Connection tracking mechanism. On my VRRP interfaces with Torch and I don't see any protocol-112 (vrrp) or UDP/8275 traffic. What gives??
Exactly... I have this red message too.. I should open a SUP but can't do it yet as I'm on vacation.Yup, seeing the same thing, it shows like this:
Screenshot_20250120_114301.png
Also, when one router was 7.17 and the other 7.16.x the VRRP would move master from the older to newer one when it was not supposed to (higher priority on older).
Where are no known general connectivity issue with R11e-LTE-US under RouterOS v7.17 control.R11e-LTE-US is not working! With 7.16.2 works well.
Downgraded and working well again.
/system logging action remove [find name=support]
/system logging action add name=support target=memory memory-lines=16383
/system logging add action=support topics=lte
Regarding #3, dynamic DHCP serves are used to handout IP info to LTE passthrough client in this and previous RouterOS versions, most likely was not noticing it.Hi,
Upgraded RBLtAP-2HnD from 7.16.2 to v7.17 this morning.
These comments I want to add / ask after the upgrade:
1., not used LTE APNs can't be deleted - even if LTE1 interface is disabled. I have 3 created for test purpose. One will stay as a tested/working one. Other two APN profiles (test) can't be deleted. Any restriction for the deletion of them?
2., LTE1 interface is used as passthrough via VLANxx interface. 4GInternet works fine. The status on the top says: "Running", "Not Slave" "Not Passthrough", Not Inactive".So the message "Not Passthrough" is confusing in this case.
3., As the devide is used as a passthrough device from 4G WAN to the main router CCR1009 and configured according to the manual - strangely one DHCP Server entry appeared and can't be deleted. Seems like dynamic entry...The name is equal to the working and used APN "name". Is that with purpose? I read that DHCP server needs to be deleted in such case where device used as an LTE passthrough.
Regarding #1 and #2, please create Supout file with extended LTE logging enabled and open servicedesk ticket.
[https://help.mikrotik.com/servicedesk/servicedesk]
This article explains how to make a Supout.rif file:
[https://help.mikrotik.com/docs/display/ROS/Supout.rif]
Use following commands to enable extended LTE logging:Code: Select all/system logging action remove [find name=support] /system logging action add name=support target=memory memory-lines=16383 /system logging add action=support topics=lte
Yes, thanks team! I also opened a ticket on it a little bit more than a year ago (7.13 at that time). But my experience is little bit different than yours and others reporting "its fine" in this topic. So for me it's been random kernel crash, but generally speaking likely tied to serious traffic going through the AP via wifi (speedtest etc.). Sometimes after updates I had a kernel panic within 24 hours, sometimes after days, weeks, sometimes it was fine for multiple months after this. But the issue was there. I received an update on my ticket then 7.17rc1 came out, and not installed 7.17 on all my devices - has been stable on all these, so fingers crossed.Thank you Deniss for your effort. I wanted not to be rude, but closing the tickets with kernel crashes without any solution makes me little bit angry. And not only here, in my job (mobile telco industry) too. :-)) Resources are in my case fine, I have 256MB RAM, not only 128MB. I am willing to test it, if you want.
We are working towards optimizing wireless-qcom-ac as we try to optimize other packages to be less resource heavy, but it is still a work in progress. As of this moment, wifi-qcom-ac is known and expected to take up more resources (including RAM) than legacy wireless drivers.
You should understand in general that while RouterOS does automatically convert configuration when you upgrade (and it usually also works OK when you downgrade), but there is no compatibility between exported configuration between versions.In CLI Responder parameter for Wireguard peer renamed to "responder" and was "is-responder" in previous versions. So some exported configs will produce syntax error
Fortunately my RB1100AHx2 continuously serving DHCP clients for more than 4 days without any problem. There is no RADIUS or any special case, only static and dynamic bindings.Upgraded a RB1100AHx2 from 7.16.2 to 7.17 on Friday afternoon, everything was fine up until last night when the DHCP server stopped issuing DHCP leases. Service Desk unfortunately restarted the router without first collecting a supout.rif file but that fixed the issue.
Will most probably need to wait for the issue to re-occur, so that we can give support something to work with.
/ip neighbor discovery-settings set discover-interface-list=none
/ip settings set max-neighbor-entries=8192 rp-filter=strict
/ipv6 settings set accept-redirects=no accept-router-advertisements=no max-neighbor-entries=8192
Do you use VPNv6 in BGP?Confirm, I have the same problem on RB5009. I’ve implemented a workaround script to trigger DHCP release once the obtained default route gets missing.Ok, I have serious problem with DHCP client after upgrade to 7.17, as it drops default route on multiple type of devices (RB4011, SXTsq 5 ac). I experienced this on RCs and betas too. Routers creating autosupout.rif file after dropping def route. I try to figure out what triggers this issue.
Do you use VPNv6 in BGP?I can confirm this - happened on my hEX Refresh too. Triggered a dhcp release and it went back to normal.
.After updating my RB4011+RM from 7.16.2 to 7.17, several IP related settings were lost/reset to default. Caught it because the router was suddenly sending out neighbor discovery packets.
These settings went missing:Code: Select all/ip neighbor discovery-settings set discover-interface-list=none /ip settings set max-neighbor-entries=8192 rp-filter=strict /ipv6 settings set accept-redirects=no accept-router-advertisements=no max-neighbor-entries=8192
Maybe you are willing to participate in the beta and rc cycles to identify more bugs, before it gets "stable" like I do? :-)> [stable] is released!
far from stable ...
rb760igs
crs326-24g-2s+
both have same problem
few hour after update, one of CPU core goes to 100%, dhcp leases are not served any more, login from winbox show EMPTY windows in IPv4 dhcp server/network/leases
after reboot, everything is back to normal
Most users like myself can't afford to duplicate their network.Maybe you are willing to participate in the beta and rc cycles to identify more bugs, before it gets "stable" like I do? :-)
> iot/lora/set forward=
crc-validtaion dev-addr-validtaion proprietary-traffic
- /ip settings
- set max-neighbor-entries=8192 rp-filter=loose tcp-syncookies=yes
/system clock
- set time-zone-name=Europe/Amsterdam
+ set time-zone-name=Europe/London
So you were not able to reproduce the same issue on v6....
We have 2 CCR1072s on v7.17 and v7.16.2, and neither will link the ether1 copper lan port (the one used for netbooting). You can physically see the port's LEDs light up, but in routerOS, the link remains down. We were able to replicate the issue with a spare CCR1072 that was running v6. The port works and links normally in v6, but as soon as we upgrade it to 7.16.2, the port will light up the LEDs, but will not link on routerOS. We didn't test how far back this goes on the v7 tree.
...
What is your RB450Gx4's factory version?Code: Select alluptime: 16h9m8s version: 7.17 (stable) build-time: 2025-01-16 08:19:28 factory-software: 6.45.3 free-memory: 871.9MiB total-memory: 1024.0MiB cpu: ARM cpu-count: 4 cpu-frequency: 448MHz cpu-load: 12% free-hdd-space: 429.2MiB total-hdd-space: 512.0MiB write-sect-since-reboot: 39224 write-sect-total: 32069553 bad-blocks: 0.1% architecture-name: arm board-name: RB450Gx4 platform: MikroTik
system,arm - automatically increase boot part size on upgrade or netinstall (fixed upgrade failed due to a lack of space on kernel disk/partition)
Most users like myself can't afford to duplicate their network.
IMO MikroTik is making two (2) mistakes, (A) sub-standard software testing (too many regressions) compared to competition, and (B) releasing new features before fixing old bugs. This release is the worst possible combination, releasing new broken features at the same time breaking old features.
I quote my original post:So you were not able to reproduce the same issue on v6....
We have 2 CCR1072s on v7.17 and v7.16.2, and neither will link the ether1 copper lan port (the one used for netbooting). You can physically see the port's LEDs light up, but in routerOS, the link remains down. We were able to replicate the issue with a spare CCR1072 that was running v6. The port works and links normally in v6, but as soon as we upgrade it to 7.16.2, the port will light up the LEDs, but will not link on routerOS. We didn't test how far back this goes on the v7 tree.
...
When you did the move to v7 have you upgraded or used Netinstall? If the former than does the issue persist if you Netinstall the latest stable 7.17.0 without default configuration than reach the desired configuration state by starting from scratch (or applying the result of the export verbose show-sensitive file=desired_name done on 7.17.0 one command at a time)?
Realising that after the Google search I could not reach many sites (related to not having whitelisted googleadservices.com), I have turned the ad-list feature off (disabling the item), so it should not be imo relevant.Not sure what memory is used for adlist, but you might want to decrease its size:
/ip dns cache-size
What is it currently set to? Default is 2048.
servers: 8.8.8.8
4.4.4.4
dynamic-servers:
use-doh-server:
verify-doh-cert: no
doh-max-server-connections: 5
doh-max-concurrent-queries: 50
doh-timeout: 5s
allow-remote-requests: yes
max-udp-packet-size: 4096
query-server-timeout: 2s
query-total-timeout: 10s
max-concurrent-queries: 100
max-concurrent-tcp-sessions: 20
cache-size: 2048KiB
cache-max-ttl: 1w
address-list-extra-time: 0s
vrf: main
mdns-repeat-ifaces:
cache-used: 1997KiB
Generally good advice, thank you!Here's some advice then, to everybody who complains every time there's a new release, from someone who's been doing this for 20+ years:
Don't put brand new releases on your devices unless there's a feature or fix you specifically need, and even then, be prepared for other things to break. With RouterOS 7, wait until at least a point release or two before upgrading production devices, especially if you don't have a way to test beforehand.
If having the latest and greatest is that critical to you, buy some cheaper hardware to test with, or lab things up in GNS3 (for free).
A "good" way to handle this (this is how bind9 does it) is to keep a rolling average of response times of different DNS resolvers, i.e. each time a query is sent and replied by that resolver (also SERVFAIL reply) the average is updated to like (avg*99 + this)/100, and send most of the queries to the fastest server. Sometimes queries are sent to the others, to keep their averages uptodate.TLDR: ROS DNS forwarder should not switch upstream DNS server just because a single request was answered with status SERVFAIL, because SERVFAIL not necessarily indicates a problem with the specific DNS server.
The strange thing is your device shows 2MB of used cache for 346 DNS entries. This is unreasonable large (>5kB/entry).The cache size is default, 2048, 346 items recently. Looking into the ip/dns output though, it seems, that the cache is full .....
[admin@Turmels of Fayetteville] /ip/dhcp-server/lease>
BootROM 1.41
Booting from SPI flash
BootROM: Image checksum verification PASSED
RouterBOOT booter 7.17
CRS328-24P-4S+
CPU frequency: 800 MHz
Memory size: 512 MiB
Storage size: 16 MiB
Press Ctrl+E to enter etherboot mode
Press any key within 2 seconds to enter setup..
loading kernel... OK
setting up elf image... OK
jumping to kernel code
system,error,critical router was rebooted without proper shutdown by watchdog timer
# 2025-01-21 17:14:56 by RouterOS 7.17
# software id = MJ1C-VXZR
#
# model = CRS328-24P-4S+
# serial number = C7810B2D860A
/interface bridge
add admin-mac=C4:AD:34:9A:7E:10 auto-mac=no comment="Main Switch w/ VLANs" \
ingress-filtering=no name=br0 port-cost-mode=short vlan-filtering=yes
/interface ethernet
set [ find default-name=ether1 ] comment=\
"Living Rm South Wall at Stairs Lower Port" l2mtu=10218 mtu=9216
set [ find default-name=ether2 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether3 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether4 ] comment="Dining Rm West Wall Solo Port" \
l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether5 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether6 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether7 ] comment="Dining Rm East Wall Upper Port" \
l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether8 ] comment="Dining Rm East Wall Center Port" \
l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether9 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether10 ] comment=\
"Living Rm South Wall West Right Port" l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether11 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether12 ] comment="Man Cave East Wall Upper Port" \
l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether13 ] comment="Foyer/Hall East Wall Red" l2mtu=\
10218 mtu=9216
set [ find default-name=ether14 ] comment="Foyer/Hall East Wall White" l2mtu=\
10218 mtu=9216 poe-out=off
set [ find default-name=ether15 ] comment=Unallocated l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether16 ] comment="Brutus LAN1" l2mtu=10218 mtu=9216 \
poe-out=off
set [ find default-name=ether17 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether18 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether19 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether20 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether21 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether22 ] comment="Unallocated PoE" l2mtu=10218 mtu=\
9216
set [ find default-name=ether23 ] comment="Living Rm West B (Mantel) BluRay" \
l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=ether24 ] comment=\
"Living Rm West A (Mantel) Television" l2mtu=10218 mtu=9216 poe-out=off
set [ find default-name=sfp-sfpplus1 ] comment="Brutus Trunk" l2mtu=10218 \
mtu=9216 sfp-ignore-rx-los=yes
set [ find default-name=sfp-sfpplus2 ] comment=\
"Man Cave East Wall Middle Port (Trunk)" l2mtu=10218 mtu=9216 \
sfp-ignore-rx-los=yes
set [ find default-name=sfp-sfpplus3 ] comment="AT&T Fiber Uplink 5Gb" l2mtu=\
10218 mtu=9216 sfp-ignore-rx-los=yes
set [ find default-name=sfp-sfpplus4 ] comment=Unallocated l2mtu=10218 mtu=\
9216 sfp-ignore-rx-los=yes
/interface ovpn-client
add certificate="Home VPN" comment="AutoPros Road Warrior via OpenVPN" \
connect-to=router.automation-pros.com mac-address=FE:0D:63:23:59:A1 name=\
AutoProsVPN port=1195 use-peer-dns=no user=vpnuser \
verify-server-certificate=yes
/interface vlan
add comment="Household LAN for DHCP Server" interface=br0 name=vlan1 vlan-id=\
1
add comment="AT&T Fiber WAN for DHCP Client" interface=br0 name=vlan2 \
vlan-id=2
/interface list
add comment="Switch to Switch ports" name=TRUNK
add comment="Upstream Network" name=WAN
add comment=Household name=LAN
add comment=Trusted name=TUNNEL
/interface lte apn
set [ find default=yes ] ip-type=ipv4 use-network-apn=no
/ip pool
add comment="Household Address Pool" name=dhcp_pool0 ranges=\
192.168.20.200-192.168.20.249
/ip dhcp-server
add address-pool=dhcp_pool0 authoritative=after-2sec-delay comment=\
"Household Pool" interface=vlan1 name=House
/ip smb users
set [ find default=yes ] disabled=yes
/port
set 0 name=serial0
/routing bgp template
set default disabled=no output.network=bgp-networks
/routing ospf instance
add disabled=no name=default-v2
/routing ospf area
add disabled=yes instance=default-v2 name=backbone-v2
/interface bridge port
add bridge=br0 comment="Living Rm South Wall at Stairs Lower Port" \
frame-types=admit-only-untagged-and-priority-tagged interface=ether1 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether2 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether3 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Dining Rm West Wall Solo Port" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether4 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether5 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether6 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Dining Rm East Wall Upper Port" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether7 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Dining Rm East Wall Center Port" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether8 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether9 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Living Rm South Wall West Right Port" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether10 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether11 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Man Cave East Wall Upper Port (on hold)" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether12 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Foyer/Hall East Wall Red" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether13 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Foyer/Hall East Wall White" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether14 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment=Unallocated frame-types=\
admit-only-untagged-and-priority-tagged interface=ether15 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Brutus LAN1" frame-types=admit-only-vlan-tagged \
interface=ether16 internal-path-cost=10 path-cost=10
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether17 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether18 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether19 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether20 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether21 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Unallocated PoE" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether22 \
internal-path-cost=10 path-cost=10 pvid=3
add bridge=br0 comment="Living Rm West B (Mantel) BluRay" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether23 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Living Rm West A (Mantel) Television" frame-types=\
admit-only-untagged-and-priority-tagged interface=ether24 \
internal-path-cost=10 path-cost=10
add bridge=br0 comment="Brutus Trunk" frame-types=admit-only-vlan-tagged \
interface=sfp-sfpplus1 internal-path-cost=10 path-cost=10
add bridge=br0 comment="Man Cave East Wall Middle Port (Trunk)" frame-types=\
admit-only-vlan-tagged interface=sfp-sfpplus2 internal-path-cost=10 \
path-cost=10
add bridge=br0 comment="AT&T Fiber Uplink 5Gb" frame-types=\
admit-only-untagged-and-priority-tagged interface=sfp-sfpplus3 \
internal-path-cost=10 path-cost=10 pvid=2
add bridge=br0 comment="Man Cave East Wall Upper Port" frame-types=\
admit-only-untagged-and-priority-tagged interface=sfp-sfpplus4 \
internal-path-cost=10 path-cost=10
/ip firewall connection tracking
set udp-timeout=10s
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/ip settings
set max-neighbor-entries=8192
/ipv6 settings
set disable-ipv6=yes
/interface bridge vlan
add bridge=br0 comment="Household Default Network" tagged=\
br0,ether16,sfp-sfpplus1,sfp-sfpplus2,sfp-sfpplus4 vlan-ids=1-4094
/interface list member
add comment="AT&T Fiber Uplink" interface=vlan2 list=WAN
add comment=Household interface=vlan1 list=LAN
add comment=Trusted interface=AutoProsVPN list=TUNNEL
/interface ovpn-server server
add auth=sha1,md5 mac-address=FE:41:32:50:C0:27 name=ovpn-server1
/ip address
add address=192.168.20.254/24 comment="House LAN" interface=vlan1 network=\
192.168.20.0
/ip dhcp-client
add comment="AT&T Fiber Delegate" interface=vlan2
/ip dhcp-server lease
add address=192.168.20.161 mac-address=FE:54:00:FA:00:01
add address=192.168.20.160 mac-address=D4:93:90:4E:3D:97
/ip dhcp-server network
add address=192.168.20.0/24 comment=Household gateway=192.168.20.254 netmask=\
24
/ip dns
set allow-remote-requests=yes cache-size=32768KiB
/ip dns adlist
add ssl-verify=no url=\
https://www.automation-pros.com/autopros-unified-hosts.txt
add ssl-verify=no url="https://raw.githubusercontent.com/StevenBlack/hosts/mas\
ter/alternates/gambling-porn/hosts"
/ip dns static
add address=192.168.19.1 name=polaris.automation-pros.com type=A
add address=192.168.19.1 name=ks.automation-pros.com type=A
add address=192.168.19.2 name=orion.automation-pros.com type=A
add address=192.168.19.3 name=superm.automation-pros.com type=A
add address=192.168.19.4 name=wap54g.automation-pros.com type=A
add address=192.168.19.5 name=alliedtelesis.automation-pros.com type=A
add address=192.168.19.6 name=prosafe.automation-pros.com type=A
add address=192.168.19.7 name=intellinet.automation-pros.com type=A
add address=192.168.19.8 name=gs108pe.automation-pros.com type=A
add address=192.168.19.9 name=ignfastui.automation-pros.com type=A
add address=192.168.19.11 name=ceg-grn.automation-pros.com type=A
add address=192.168.19.20 name=plc1.automation-pros.com type=A
add address=192.168.19.21 name=ge364.automation-pros.com type=A
add address=192.168.19.22 name=mtscale.automation-pros.com type=A
add address=192.168.19.23 name=vivotek1.automation-pros.com type=A
add address=192.168.19.27 name=nport.automation-pros.com type=A
add address=192.168.19.28 name=cp5225.automation-pros.com type=A
add address=192.168.19.29 name=p1000.automation-pros.com type=A
add address=192.168.19.40 name=office790.automation-pros.com type=A
add address=192.168.19.41 name=tagimporter.automation-pros.com type=A
add address=192.168.19.46 name=office796.automation-pros.com type=A
add address=192.168.19.48 name=office798.automation-pros.com type=A
add address=192.168.19.50 name=office800.automation-pros.com type=A
add address=192.168.19.51 name=pi8.automation-pros.com type=A
add address=192.168.19.52 name=office7912.automation-pros.com type=A
add address=192.168.19.53 name=office80x.automation-pros.com type=A
add address=192.168.19.55 name=rmaster.automation-pros.com type=A
add address=192.168.19.56 name=rbackup.automation-pros.com type=A
add address=192.168.19.57 name=borgdb.automation-pros.com type=A
add address=192.168.19.58 name=hbgw.automation-pros.com type=A
add address=192.168.19.59 name=hbdb.automation-pros.com type=A
add address=192.168.19.60 name=hbio.automation-pros.com type=A
add address=192.168.19.64 name=ptgw.automation-pros.com type=A
add address=192.168.19.65 name=ptdb.automation-pros.com type=A
add address=192.168.19.66 name=moxa.automation-pros.com type=A
add address=192.168.19.67 name=densogw.automation-pros.com type=A
add address=192.168.19.68 name=densodb.automation-pros.com type=A
add address=192.168.19.70 name=zeus.automation-pros.com type=A
add address=192.168.19.73 name=athena.automation-pros.com type=A
add address=192.168.19.74 name=armdev.automation-pros.com type=A
add address=192.168.19.75 name=zm.automation-pros.com type=A
add address=192.168.19.85 name=albint-fakeio.automation-pros.com type=A
add address=192.168.19.86 name=albint8115.automation-pros.com type=A
add address=192.168.19.87 name=polaris81y.automation-pros.com type=A
add address=192.168.19.88 name=superm81x.automation-pros.com type=A
add address=192.168.19.89 name=edgeiiot.automation-pros.com type=A
add address=192.168.19.90 name=edgepanel.automation-pros.com type=A
add address=192.168.19.139 name=kv8k.automation-pros.com type=A
add address=192.168.19.146 name=okic830.automation-pros.com type=A
add address=192.168.19.148 name=bro3075.automation-pros.com type=A
add address=192.168.19.160 name=grim-enp24s0.dhcp.automation-pros.com type=A
add address=192.168.19.161 name=porthos-office1.dhcp.automation-pros.com \
type=A
add address=192.168.19.162 name=grim-office1.dhcp.automation-pros.com type=A
add address=192.168.19.254 name=mt354.automation-pros.com type=A
add address=192.168.20.1 name=r7000.turmel.org type=A
add address=192.168.20.2 name=brutus.turmel.org type=A
add address=192.168.20.160 name=grim-enp24s0.dhcp.turmel.org type=A
add address=192.168.20.161 name=porthos-home1.dhcp.turmel.org type=A
add address=192.168.20.162 name=grim-home1.dhcp.turmel.org type=A
add address=192.168.20.253 name=u6pro.turmel.org type=A
add address=192.168.20.254 name=mt328.turmel.org type=A
add address=10.1.1.1 name=nano-l320erm.automation-pros.com type=A
add address=10.1.1.150 name=nano-ocean.automation-pros.com type=A
add address=10.1.1.250 name=nano-porthos.automation-pros.com type=A
add address=10.1.1.251 name=nano-aramis.automation-pros.com type=A
add address=192.168.70.2 name=vlan9.porthos.automation-pros.com type=A
add address=192.168.70.3 name=vlan9.polaris.automation-pros.com type=A
add address=192.168.70.19 name=ceg-grn-db.automation-pros.com type=A
add address=192.168.70.27 name=srv02.greenstone.ceg-engineers.com type=A
add address=192.168.70.28 name=ppc01.greenstone.ceg-engineers.com type=A
add address=192.168.70.35 name=env01.greenstone.ceg-engineers.com type=A
add address=192.168.70.36 name=env02.greenstone.ceg-engineers.com type=A
add address=192.168.70.37 name=env03.greenstone.ceg-engineers.com type=A
add address=192.168.70.35 name=env04.greenstone.ceg-engineers.com type=A
add address=192.168.70.141 name=r30bat01.greenstone.ceg-engineers.com type=A
add address=192.168.70.142 name=r30bat02.greenstone.ceg-engineers.com type=A
add address=192.168.70.143 name=r30bat03.greenstone.ceg-engineers.com type=A
add address=192.168.70.144 name=r30bat04.greenstone.ceg-engineers.com type=A
add address=192.168.70.145 name=r30bat05.greenstone.ceg-engineers.com type=A
add address=192.168.70.146 name=r30bat06.greenstone.ceg-engineers.com type=A
add address=192.168.70.147 name=r30bat07.greenstone.ceg-engineers.com type=A
add address=192.168.71.3 name=inv01.greenstone.ceg-engineers.com type=A
add address=192.168.71.4 name=inv02.greenstone.ceg-engineers.com type=A
add address=192.168.71.5 name=inv03.greenstone.ceg-engineers.com type=A
add address=192.168.71.6 name=inv04.greenstone.ceg-engineers.com type=A
add address=192.168.71.7 name=inv05.greenstone.ceg-engineers.com type=A
add address=192.168.71.8 name=inv06.greenstone.ceg-engineers.com type=A
add address=192.168.71.9 name=inv07.greenstone.ceg-engineers.com type=A
add address=192.168.71.132 name=trk01.greenstone.ceg-engineers.com type=A
add address=192.168.71.133 name=trk02.greenstone.ceg-engineers.com type=A
add address=192.168.71.134 name=trk03.greenstone.ceg-engineers.com type=A
add address=192.168.71.135 name=trk04.greenstone.ceg-engineers.com type=A
add address=192.168.71.136 name=trk05.greenstone.ceg-engineers.com type=A
add address=192.168.71.137 name=trk06.greenstone.ceg-engineers.com type=A
add address=192.168.71.138 name=trk07.greenstone.ceg-engineers.com type=A
add address=192.168.71.139 name=trk08.greenstone.ceg-engineers.com type=A
add address=192.168.71.140 name=trk09.greenstone.ceg-engineers.com type=A
add address=192.168.71.141 name=trk10.greenstone.ceg-engineers.com type=A
add address=192.168.71.142 name=trk11.greenstone.ceg-engineers.com type=A
add address=192.168.71.143 name=trk12.greenstone.ceg-engineers.com type=A
add address=192.168.71.144 name=trk13.greenstone.ceg-engineers.com type=A
add address=192.168.71.145 name=trk14.greenstone.ceg-engineers.com type=A
add address=10.16.7.2 name=lab-l72.automation-pros.com type=A
add address=10.16.7.3 name=lab-l24.automation-pros.com type=A
add address=10.16.7.4 name=lab-l320erm.automation-pros.com type=A
add address=10.16.7.5 name=lab-l81e.automation-pros.com type=A
add address=10.16.7.6 name=lab-drum.automation-pros.com type=A
add address=10.16.7.7 name=lab-gong.automation-pros.com type=A
add address=10.16.7.9 name=lab-fastui.automation-pros.com type=A
add address=10.16.7.10 name=lab-point-aent.automation-pros.com type=A
add address=10.16.7.11 name=lab-enet.automation-pros.com type=A
add address=10.16.7.12 name=lab-enbt.automation-pros.com type=A
add address=10.16.7.19 name=lab-bango.automation-pros.com type=A
add address=10.16.7.20 name=lab-flute.automation-pros.com type=A
add address=10.16.7.26 name=lab-zeus.automation-pros.com type=A
add address=10.16.7.27 name=lab-vision.automation-pros.com type=A
add address=10.16.7.28 name=lab-athena.automation-pros.com type=A
add address=10.16.7.34 name=lab-densogw.automation-pros.com type=A
add address=10.16.7.35 name=lab-superm81x.automation-pros.com type=A
add address=10.16.7.36 name=lab-polaris81y.automation-pros.com type=A
add address=10.16.7.40 name=lab-porthos79x.automation-pros.com type=A
add address=10.16.7.41 name=lab-porthos80x.automation-pros.com type=A
add address=10.16.7.42 name=lab-porthos81x.automation-pros.com type=A
add address=10.16.7.43 name=lab-porthos81y.automation-pros.com type=A
add address=10.16.7.44 name=lab-porthos81z.automation-pros.com type=A
add address=10.16.7.51 name=lab-m850.automation-pros.com type=A
add address=10.16.7.89 name=lab-edgeiiot.automation-pros.com type=A
add address=10.16.7.90 name=lab-edgepanel.automation-pros.com type=A
add address=10.16.7.235 name=lab-t2200.automation-pros.com type=A
add address=10.16.7.240 name=lab-corvus.automation-pros.com type=A
add address=10.16.7.243 name=lab-aramis.automation-pros.com type=A
add address=10.16.7.252 name=at-lab.automation-pros.com type=A
add address=10.16.7.253 name=tmachine.automation-pros.com type=A
add address=192.168.31.3 name=superm81x.zm.automation-pros.com type=A
add address=192.168.31.10 name=backN.zm.automation-pros.com type=A
add address=192.168.31.11 name=backSW.zm.automation-pros.com type=A
add address=192.168.31.12 name=backPTZ.zm.automation-pros.com type=A
add address=192.168.31.13 name=frontNE.zm.automation-pros.com type=A
add address=192.168.31.14 name=frontS.zm.automation-pros.com type=A
add address=172.16.70.129 name=lab-en2t.automation-pros.com type=A
add address=172.16.71.89 name=lab2-edgeiiot.automation-pros.com type=A
add address=172.16.71.90 name=lab2-edgepanel.automation-pros.com type=A
add address=172.16.71.252 name=lab-en3tr.automation-pros.com type=A
/ip firewall address-list
add address=0.0.0.0/8 comment=RFC6890 list=no_forward_ipv4
add address=169.254.0.0/16 comment=RFC6890 list=no_forward_ipv4
add address=224.0.0.0/4 comment=Multicast list=no_forward_ipv4
add address=255.255.255.255 comment=RFC6890 list=no_forward_ipv4
add address=192.168.20.0/24 comment="Home Local Network" list=\
local_ranges_ipv4
add address=127.0.0.0/8 comment=RFC6890 list=bad_ipv4
add address=192.0.0.0/24 comment=RFC6890 list=bad_ipv4
add address=192.0.2.0/24 comment="RFC6890 documentation" list=bad_ipv4
add address=198.51.100.0/24 comment="RFC6890 documentation" list=bad_ipv4
add address=203.0.113.0/24 comment="RFC6890 documentation" list=bad_ipv4
add address=240.0.0.0/4 comment="RFC6890 reserved" list=bad_ipv4
add address=0.0.0.0/8 comment=RFC6890 list=not_global_ipv4
add address=10.0.0.0/8 comment=RFC6890 list=not_global_ipv4
add address=100.64.0.0/10 comment=RFC6890 list=not_global_ipv4
add address=169.254.0.0/16 comment=RFC6890 list=not_global_ipv4
add address=172.16.0.0/12 comment=RFC6890 list=not_global_ipv4
add address=192.0.0.0/29 comment=RFC6890 list=not_global_ipv4
add address=192.168.0.0/16 comment=RFC6890 list=not_global_ipv4
add address=198.18.0.0/15 comment="RFC6890 benchmark" list=not_global_ipv4
add address=255.255.255.255 comment=RFC6890 list=not_global_ipv4
add address=224.0.0.0/4 comment=multicast list=bad_src_ipv4
add address=255.255.255.255 comment=RFC6890 list=bad_src_ipv4
add address=0.0.0.0/8 comment=RFC6890 list=bad_dst_ipv4
add address=224.0.0.0/4 comment=RFC6890 list=bad_dst_ipv4
/ip firewall filter
add action=accept chain=input comment="Accept ICMP after RAW" protocol=icmp
add action=accept chain=input comment="Accept established,related,untracked" \
connection-state=established,related,untracked
add action=drop chain=input comment="Drop all not coming from LAN" disabled=\
yes in-interface-list=!LAN
add action=accept chain=forward comment=\
"Accept all that matches IPSec policy" disabled=yes ipsec-policy=in,ipsec
add action=fasttrack-connection chain=forward comment=fasttrack \
connection-state=established,related hw-offload=yes
add action=accept chain=forward comment=\
"Accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=drop chain=forward comment=" drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="Drop bad forward IPs" \
src-address-list=no_forward_ipv4
add action=drop chain=forward comment="Drop bad forward IPs" \
dst-address-list=no_forward_ipv4
/ip firewall nat
add action=accept chain=srcnat comment="Accept all that matches IPSec policy" \
disabled=yes ipsec-policy=out,ipsec
add action=masquerade chain=srcnat comment=Masquerade out-interface-list=WAN
/ip firewall raw
add action=drop chain=bad_tcp comment="TCP flag filter" protocol=tcp \
tcp-flags=!fin,!syn,!rst,!ack
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
fin,syn
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
fin,rst
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
fin,!ack
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
fin,urg
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
syn,rst
add action=drop chain=bad_tcp comment="Bad TCP Flags" protocol=tcp tcp-flags=\
rst,urg
add action=drop chain=bad_tcp comment="TCP port 0 drop" port=0 protocol=tcp
add action=accept chain=icmp4 comment="Echo reply" icmp-options=0:0 limit=\
5,10:packet protocol=icmp
add action=accept chain=icmp4 comment="Net unreachable" icmp-options=3:0 \
protocol=icmp
add action=accept chain=icmp4 comment="Host unreachable" icmp-options=3:1 \
protocol=icmp
add action=accept chain=icmp4 comment="Protocol unreachable" icmp-options=3:2 \
protocol=icmp
add action=accept chain=icmp4 comment="Port unreachable" icmp-options=3:3 \
protocol=icmp
add action=accept chain=icmp4 comment="Fragmentation needed" icmp-options=3:4 \
protocol=icmp
add action=accept chain=icmp4 comment=Echo icmp-options=8:0 limit=5,10:packet \
protocol=icmp
add action=accept chain=icmp4 comment="Time exceeded " icmp-options=11:0-255 \
protocol=icmp
add action=drop chain=icmp4 comment="Drop other icmp" protocol=icmp
add action=accept chain=prerouting comment="enable for transparent firewall" \
disabled=yes
add action=accept chain=prerouting comment=\
"Accept everything from Trusted Links" in-interface-list=TUNNEL \
log-prefix="Accept Trusted Tunnels"
add action=accept chain=prerouting comment="Accept DHCP discover" \
dst-address=255.255.255.255 dst-port=67 in-interface-list=LAN protocol=\
udp src-address=0.0.0.0 src-port=68
add action=drop chain=prerouting comment="Drop bogon IP's" src-address-list=\
bad_ipv4
add action=drop chain=prerouting comment="Drop bogon IP's" dst-address-list=\
bad_ipv4
add action=drop chain=prerouting comment="Drop bogon IP's" src-address-list=\
bad_src_ipv4
add action=drop chain=prerouting comment="Drop bogon IP's" dst-address-list=\
bad_dst_ipv4
add action=drop chain=prerouting comment="Drop non global from WAN" disabled=\
yes in-interface-list=WAN src-address-list=not_global_ipv4
add action=drop chain=prerouting comment="Drop forward to local lan from WAN" \
disabled=yes dst-address-list=local_ranges_ipv4 in-interface-list=WAN
add action=drop chain=prerouting comment=\
"Drop local if not from default IP range" in-interface-list=LAN \
src-address-list=!local_ranges_ipv4
add action=drop chain=prerouting comment="Drop bad UDP" port=0 protocol=udp
add action=jump chain=prerouting comment="jump to ICMP chain" jump-target=\
icmp4 protocol=icmp
add action=jump chain=prerouting comment="jump to TCP chain" jump-target=\
bad_tcp protocol=tcp
add action=accept chain=prerouting comment="Accept everything else from LAN" \
in-interface-list=LAN
add action=accept chain=prerouting comment="Accept everything else from WAN" \
in-interface-list=WAN
add action=accept chain=prerouting comment="Allow SIP UDP" port=5060 \
protocol=udp
add action=drop chain=prerouting comment="Drop the rest"
/ip ipsec profile
set [ find default=yes ] dpd-interval=2m dpd-maximum-failures=5
/ip smb shares
set [ find default=yes ] directory=/flash/pub
/ipv6 firewall address-list
add address=fe80::/10 comment="RFC6890 Linked-Scoped Unicast" list=\
no_forward_ipv6
add address=ff00::/8 comment=Multicast list=no_forward_ipv6
add address=::1/128 comment="RFC6890 lo" list=bad_ipv6
add address=::ffff:0.0.0.0/96 comment="RFC6890 IPv4 mapped" list=bad_ipv6
add address=2001::/23 comment=RFC6890 list=bad_ipv6
add address=2001:db8::/32 comment="RFC6890 documentation" list=bad_ipv6
add address=2001:10::/28 comment="RFC6890 orchid" list=bad_ipv6
add address=::/96 comment="ipv4 compat" list=bad_ipv6
add address=100::/64 comment="RFC6890 Discard-only" list=not_global_ipv6
add address=2001::/32 comment="RFC6890 TEREDO" list=not_global_ipv6
add address=2001:2::/48 comment="RFC6890 Benchmark" list=not_global_ipv6
add address=fc00::/7 comment="RFC6890 Unique-Local" list=not_global_ipv6
add address=::/128 comment=Unspecified list=bad_dst_ipv6
add address=::/128 comment=Unspecified list=bad_src_ipv6
add address=ff00::/8 comment=Multicast list=bad_src_ipv6
/ipv6 firewall filter
add action=accept chain=input comment="Accept ICMPv6 after RAW" protocol=\
icmpv6
add action=accept chain=input comment="Accept established,related,untracked" \
connection-state=established,related,untracked
add action=accept chain=input comment="Accept UDP traceroute" dst-port=\
33434-33534 protocol=udp
add action=accept chain=input comment=\
"Accept DHCPv6-Client prefix delegation." dst-port=546 protocol=udp \
src-address=fe80::/10
add action=accept chain=input comment="Accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=input comment="Accept IPSec AH" protocol=ipsec-ah
add action=accept chain=input comment="Accept IPSec ESP" protocol=ipsec-esp
add action=drop chain=input comment="Drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment=\
"Accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="Drop invalid" connection-state=invalid
add action=drop chain=forward comment="Drop bad forward IPs" \
src-address-list=no_forward_ipv6
add action=drop chain=forward comment="Drop bad forward IPs" \
dst-address-list=no_forward_ipv6
add action=drop chain=forward comment="RFC4890 drop hop-limit=1" hop-limit=\
equal:1 protocol=icmpv6
add action=accept chain=forward comment="Accept ICMPv6 after RAW" protocol=\
icmpv6
add action=accept chain=forward comment="Accept HIP" protocol=139
add action=accept chain=forward comment="Accept IKE" dst-port=500,4500 \
protocol=udp
add action=accept chain=forward comment="Accept AH" protocol=ipsec-ah
add action=accept chain=forward comment="Accept ESP" protocol=ipsec-esp
add action=accept chain=forward comment=\
"Accept all that matches IPSec policy" ipsec-policy=in,ipsec
add action=drop chain=forward comment=\
"Drop everything else not coming from LAN" in-interface-list=!LAN
/ipv6 firewall raw
add action=drop chain=icmp6 comment="RFC4890 drop ll if hop-limit!=255" \
dst-address=fe80::/10 hop-limit=not-equal:255 protocol=icmpv6
add action=accept chain=icmp6 comment="Dst unreachable" icmp-options=1:0-255 \
protocol=icmpv6
add action=accept chain=icmp6 comment="Packet too big" icmp-options=2:0-255 \
protocol=icmpv6
add action=accept chain=icmp6 comment="Limit exceeded" icmp-options=3:0-1 \
protocol=icmpv6
add action=accept chain=icmp6 comment="Bad header" icmp-options=4:0-2 \
protocol=icmpv6
add action=accept chain=icmp6 comment="Mobile home agent address discovery" \
icmp-options=144:0-255 protocol=icmpv6
add action=accept chain=icmp6 comment="Mobile home agent address discovery" \
icmp-options=145:0-255 protocol=icmpv6
add action=accept chain=icmp6 comment="Mobile prefix solic" icmp-options=\
146:0-255 protocol=icmpv6
add action=accept chain=icmp6 comment="Mobile prefix advert" icmp-options=\
147:0-255 protocol=icmpv6
add action=accept chain=icmp6 comment="Echo request limit 5,10" icmp-options=\
128:0-255 limit=5,10:packet protocol=icmpv6
add action=accept chain=icmp6 comment="Echo reply limit 5,10" icmp-options=\
129:0-255 limit=5,10:packet protocol=icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 router solic limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=133:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 router advert limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=134:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 neighbor solic limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=135:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 neighbor advert limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=136:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 inverse ND solic limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=141:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=accept chain=icmp6 comment=\
"RFC4890 inverse ND advert limit 5,10 only LAN" hop-limit=equal:255 \
icmp-options=142:0-255 in-interface-list=LAN limit=5,10:packet protocol=\
icmpv6
add action=drop chain=icmp6 comment="Drop other icmp" protocol=icmpv6
add action=accept chain=prerouting comment="Enable for transparent firewall" \
disabled=yes
add action=accept chain=prerouting comment="RFC4291, section 2.7.1" \
dst-address=ff02::1:ff00:0/104 icmp-options=135 protocol=icmpv6 \
src-address=::/128
add action=drop chain=prerouting comment="Drop bogon IP's" src-address-list=\
bad_ipv6
add action=drop chain=prerouting comment="Drop bogon IP's" dst-address-list=\
bad_ipv6
add action=drop chain=prerouting comment="Drop packets with bad SRC ipv6" \
src-address-list=bad_src_ipv6
add action=drop chain=prerouting comment="Drop packets with bad dst ipv6" \
dst-address-list=bad_dst_ipv6
add action=drop chain=prerouting comment="Drop non global from WAN" \
in-interface-list=WAN src-address-list=not_global_ipv6
add action=jump chain=prerouting comment="jump to ICMPv6 chain" jump-target=\
icmp6 protocol=icmpv6
add action=accept chain=prerouting comment="Accept local multicast scope" \
dst-address=ff02::/16
add action=drop chain=prerouting comment="Drop other multicast destinations" \
dst-address=ff00::/8
add action=accept chain=prerouting comment="Accept everything else from WAN" \
in-interface-list=WAN
add action=accept chain=prerouting comment="Accept everything else from LAN" \
in-interface-list=LAN
add action=drop chain=prerouting comment="Drop the rest"
/routing bfd configuration
add disabled=no interfaces=all min-rx=200ms min-tx=200ms multiplier=5
/system clock
set time-zone-name=America/New_York
/system identity
set name="Turmels of Fayetteville"
/system note
set show-at-login=no
/system ntp client
set enabled=yes
/system ntp client servers
add address=north-america.pool.ntp.org
/system routerboard settings
set boot-device=nand-only
/system script
add comment="Copy Ether Port Comments to Bridge Ports" \
dont-require-permissions=no name=fixbports owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="/\
interface bridge port\
\n:foreach i in=[find] do={\
\n :local iface [get \$i interface]\
\n :local comment [/interface get [/interface find name=\$iface] comment]\
\n :put \"\$iface : \$comment\"\
\n set \$i comment=\$comment\
\n}\
\n"
add comment="Clear Firewall Rules" dont-require-permissions=yes name=\
NoFirewall owner=admin policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source="#\
\_Wipe all firewall rules and address lists\
\n\
\n/ip firewall filter remove [find dynamic=no]\
\n/ip firewall nat remove [find dynamic=no]\
\n/ip firewall raw remove [find dynamic=no]\
\n/ipv6 firewall filter remove [find dynamic=no]\
\n/ipv6 firewall nat remove [find dynamic=no]\
\n/ipv6 firewall raw remove [find dynamic=no]\
\n/ip firewall address-list remove [find dynamic=no]\
\n/ipv6 firewall address-list remove [find dynamic=no]\
\n"
/tool graphing interface
add interface=sfp-sfpplus3 store-on-disk=no
My SMB shares stopped successful authentication when accessed from any Android, iPhone, iPad, GoogleTV. It prompted me to enter the username and password, but never went through to the directory content and always asks for inputting the credentials.*) smb - stability improvements for client/server;
The SMB client run by Infuse player app on Apple TV stopped working. macOS native SMB client connects without problems.
Below are dissections from Wireshark.
Infuse:Code: Select all--Request by Infuse--> SMB (Server Message Block Protocol) SMB Header Server Component: SMB SMB Command: Negotiate Protocol (0x72) NT Status: STATUS_SUCCESS (0x00000000) Flags: 0x18, Canonicalized Pathnames, Case Sensitivity 0... .... = Request/Response: Message is a request to the server .0.. .... = Notify: Notify client only on open ..0. .... = Oplocks: OpLock not requested/granted ...1 .... = Canonicalized Pathnames: Pathnames are canonicalized .... 1... = Case Sensitivity: Path names are caseless .... ..0. = Receive Buffer Posted: Receive buffer has not been posted .... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported Flags2: 0xc843, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Used, Extended Attributes, Long Names Allowed 1... .... .... .... = Unicode Strings: Strings are Unicode .1.. .... .... .... = Error Code Type: Error codes are NT error codes ..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only ...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs .... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported .... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path .... .... .1.. .... = Long Names Used: Path names in request are long file names .... .... ...0 .... = Security Signatures Required: Security signatures are not required .... .... .... 0... = Compressed: Compression is not requested .... .... .... .0.. = Security Signatures: Security signatures are not supported .... .... .... ..1. = Extended Attributes: Extended attributes are supported .... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response Process ID High: 0 Signature: 0000000000000000 Reserved: 0000 Tree ID: 0 Process ID: 1344 User ID: 0 Multiplex ID: 0 Negotiate Protocol Request (0x72) Word Count (WCT): 0 Byte Count (BCC): 34 Requested Dialects Dialect: NT LM 0.12 Buffer Format: Dialect (2) Name: NT LM 0.12 Dialect: SMB 2.002 Buffer Format: Dialect (2) Name: SMB 2.002 Dialect: SMB 2.??? Buffer Format: Dialect (2) Name: SMB 2.??? <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 0 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 Negotiate Protocol Response (0x00) StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB2 wildcard (0x02ff) Reserved: 0 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:31:13.155350300 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore Reserved2: 0x00000000 --Request by Infuse--> SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 Channel Sequence: 0 Reserved: 0000 Command: Negotiate Protocol (0) Credits requested: 99 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Response: This is a REQUEST .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response in: 28] Negotiate Protocol Request (0x00) [Preauth Hash: d5a10eba0dae463de64e00a9d6f28d86caf27f31cbee57633eee39494cbf27b6c601bf7ee95418c314a20508a331866661c4abd3b99240566b0f96e46bb3f036] StructureSize: 0x0024 0000 0000 0010 010. = Fixed Part Length: 18 .... .... .... ...0 = Dynamic Part: False Dialect count: 4 Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Reserved: 0000 Capabilities: 0x00000045, DFS, LARGE MTU, ENCRYPTION .... .... .... .... .... .... .... ...1 = DFS: This host supports DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 0... = MULTI CHANNEL: This host does NOT support MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Client Guid: 51497ea5-5cef-b244-b964-6e8ce408a16f NegotiateContextOffset: 0x00000000 NegotiateContextCount: 0 Reserved: 0000 Dialect: SMB 2.0.2 (0x0202) Dialect: SMB 2.1 (0x0210) Dialect: SMB 3.0 (0x0300) Dialect: SMB 3.0.2 (0x0302) <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_INSUFFICIENT_RESOURCES (0xc000009a) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response to: 24] [Time from request: 0.000004000 seconds] Negotiate Protocol Response (0x00) [Preauth Hash: f4c7dbdcf3ecb837e5cb129c6cc7c78a3a6f3b2b56109787fd24bcdf2ce7ac44650bd5b25beafbb863ca3411f0f53ebfc1a15743abe42cd58eb4777cdc21ddc2] StructureSize: 0x0009 0000 0000 0000 100. = Fixed Part Length: 4 .... .... .... ...1 = Dynamic Part: True Error Context Count: 0 Reserved: 0x00 Byte Count: 0 Error Data: 00
macOS's Finder:
SUP-176851Code: Select all--Request by macOS--> SMB (Server Message Block Protocol) SMB Header Server Component: SMB SMB Command: Negotiate Protocol (0x72) NT Status: STATUS_SUCCESS (0x00000000) Flags: 0x08, Case Sensitivity 0... .... = Request/Response: Message is a request to the server .0.. .... = Notify: Notify client only on open ..0. .... = Oplocks: OpLock not requested/granted ...0 .... = Canonicalized Pathnames: Pathnames are not canonicalized .... 1... = Case Sensitivity: Path names are caseless .... ..0. = Receive Buffer Posted: Receive buffer has not been posted .... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported Flags2: 0xc801, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Allowed 1... .... .... .... = Unicode Strings: Strings are Unicode .1.. .... .... .... = Error Code Type: Error codes are NT error codes ..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only ...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs .... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported .... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path .... .... .0.. .... = Long Names Used: Path names in request are not long file names .... .... ...0 .... = Security Signatures Required: Security signatures are not required .... .... .... 0... = Compressed: Compression is not requested .... .... .... .0.. = Security Signatures: Security signatures are not supported .... .... .... ..0. = Extended Attributes: Extended attributes are not supported .... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response Process ID High: 0 Signature: 0000000000000000 Reserved: 0000 Tree ID: 65535 Process ID: 1 User ID: 65535 Multiplex ID: 0 Negotiate Protocol Request (0x72) Word Count (WCT): 0 Byte Count (BCC): 34 Requested Dialects Dialect: NT LM 0.12 Buffer Format: Dialect (2) Name: NT LM 0.12 Dialect: SMB 2.002 Buffer Format: Dialect (2) Name: SMB 2.002 Dialect: SMB 2.??? Buffer Format: Dialect (2) Name: SMB 2.??? <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 0 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 Negotiate Protocol Response (0x00) StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB2 wildcard (0x02ff) Reserved: 0 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:12:36.815501500 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore Reserved2: 0x00000000 --Request by macOS--> SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 Channel Sequence: 0 Reserved: 0000 Command: Negotiate Protocol (0) Credits requested: 0 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Response: This is a REQUEST .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x0000feff Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response in: 58] Negotiate Protocol Request (0x00) [Preauth Hash: d31c2830b42fa5c6603ae5e67d9fbbd519687ecc35f3a604d91d0b2cf677831d9ee858e922cf7f1e2fbd9e18b9c1fef59ddb991a3fe69433da1d3eac9afa60c8] StructureSize: 0x0024 0000 0000 0010 010. = Fixed Part Length: 18 .... .... .... ...0 = Dynamic Part: False Dialect count: 5 Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Reserved: 0000 Capabilities: 0x0000007f, DFS, LEASING, LARGE MTU, MULTI CHANNEL, PERSISTENT HANDLES, DIRECTORY LEASING, ENCRYPTION .... .... .... .... .... .... .... ...1 = DFS: This host supports DFS .... .... .... .... .... .... .... ..1. = LEASING: This host supports LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...1 .... = PERSISTENT HANDLES: This host supports PERSISTENT HANDLES .... .... .... .... .... .... ..1. .... = DIRECTORY LEASING: This host supports DIRECTORY LEASING .... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Client Guid: 5918f3a6-8558-bf44-bce9-89cb9c46119a NegotiateContextOffset: 0x00000070 NegotiateContextCount: 5 Reserved: 0000 Dialect: SMB 2.0.2 (0x0202) Dialect: SMB 2.1 (0x0210) Dialect: SMB 3.0 (0x0300) Dialect: SMB 3.0.2 (0x0302) Dialect: SMB 3.1.1 (0x0311) Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001) DataLength: 38 Reserved: 00000000 HashAlgorithmCount: 1 SaltLength: 32 HashAlgorithm: SHA-512 (0x0001) Salt: b2967270afec39d772b756b248b7e7f8c6868f28a5bd3dae84be2c94061cdd38 Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002) DataLength: 10 Reserved: 00000000 CipherCount: 4 CipherId: AES-256-GCM (0x0004) CipherId: AES-256-CCM (0x0003) CipherId: AES-128-GCM (0x0002) CipherId: AES-128-CCM (0x0001) Negotiate Context: SMB2_COMPRESSION_CAPABILITIES Type: SMB2_COMPRESSION_CAPABILITIES (0x0003) DataLength: 10 Reserved: 00000000 CompressionAlgorithmCount: 1 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Chained: False 0000 0000 0000 0000 0000 0000 0000 000. = Reserved: 0x00000000 CompressionAlgorithmId: None (0x0000) Negotiate Context: SMB2_SIGNING_CAPABILITIES Type: SMB2_SIGNING_CAPABILITIES (0x0008) DataLength: 6 Reserved: 00000000 SigningAlgorithmCount: 2 SigningAlgorithmId: AES-GMAC (0x0002) SigningAlgorithmId: AES-CMAC (0x0001) Negotiate Context: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID Type: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID (0x0005) DataLength: 58 Reserved: 00000000 Netname: Shared Movies._smb._tcp.local <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x0000feff Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response to: 54] [Time from request: 0.000007000 seconds] Negotiate Protocol Response (0x00) [Preauth Hash: 5c8cf3670d9ca5d3b91e2199ac05900e9dc87288dfab3e1ebf702d0fba52eaeafe46ae3070c36de4b1460af9540cd3ceeb601c97b62ba1d73ab22a9a011d192f] StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB 3.1.1 (0x0311) NegotiateContextCount: 3 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:12:36.820239300 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore NegotiateContextOffset: 0x000000d0 Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001) DataLength: 38 Reserved: 00000000 HashAlgorithmCount: 1 SaltLength: 32 HashAlgorithm: SHA-512 (0x0001) Salt: edb44f22adfc8867776d42525d298d1ee4b228e0690e951e33ad271ab36e6f6a Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002) DataLength: 4 Reserved: 00000000 CipherCount: 1 CipherId: AES-128-GCM (0x0002) Negotiate Context: SMB2_SIGNING_CAPABILITIES Type: SMB2_SIGNING_CAPABILITIES (0x0008) DataLength: 4 Reserved: 00000000 SigningAlgorithmCount: 1 SigningAlgorithmId: AES-CMAC (0x0001)
/sys log action set [find] disk-file-name="/log"
/ip hotspot profile set [find default=yes] html-directory="/hotspot"
/interface wifi capsman set package-path="/package"
/interface lte settings set firmware-path="/firmware"
/tool sniffer set file-name="/pcap/sniffer.pcap"
/ip proxy set cache-path="/web-proxy"
/ip smb shares set [ find default=yes ] directory="/pub"
Quick report: on CRS310
on a bridge interface does not work anymore after an upgrade to 7.16, VLAN filtering seems to be enforced anyway (which is a problem for stuff like FTTx that often comes with funky VLANs dictated by ISPs who don't seem to care too much about RFCs).Code: Select allingress-filtering=no
I only tested this with the CRS310, this may or may not impact other devices, I have a couple RBs and CCRs as well, I'll test them when I have a minute.
Reverted back to 7.15.3, it works just fine.
Did you get the new OIDs for wifi clients?
*) snmp - added wifi fields to MIKROTIK-MIB;
Where can I view the .mib-file? Which OIDs?
UPD /ip/ipsec/proposal enc-algorithms=chacha20poly1305 doesn't work.IKEv2 tunnels fail to establish after upgrading to 7.17 (between 7.17<->7.17 and 7.17<->7.16.2). However, 7.17 does establish IKEv2 with Huawei AR (same settings).
Rolling back to 7.16.2 does fix the issue.
Auth method is PSK, 7.17 peer sends "Delete" right after successful IKE_AUTH. Tested on both live RBs and GNS3 lab.
Am I the only one with this issue?
Sounds plausible. I will procure some MikroTik native copper SFP+ transceivers and see if that makes a difference.Regarding the watchdog stuff:
... trim ...
However many SFP modules are "bad at I2C-ing", holding the bus seized/blocked for long amounts of time.
It will!Sounds plausible. I will procure some MikroTik native copper SFP+ transceivers and see if that makes a difference.Regarding the watchdog stuff:
... trim ...
However many SFP modules are "bad at I2C-ing", holding the bus seized/blocked for long amounts of time.
oh man, mikrotik, those are basics... I also had a lot of troubles because a lifetime mikrotik prof was trying to teach my vlan concepts on mikrotik.Bug report: vlan ingress filtering set to no still broken with this release, at the very least on crs310 as confirmed by my tests, it literally has no effect.
Been broken since 7.16 (was working with 7.15).
Original report from the 7.16 release:
Quick report: on CRS310
on a bridge interface does not work anymore after an upgrade to 7.16, VLAN filtering seems to be enforced anyway (which is a problem for stuff like FTTx that often comes with funky VLANs dictated by ISPs who don't seem to care too much about RFCs).Code: Select allingress-filtering=no
I only tested this with the CRS310, this may or may not impact other devices, I have a couple RBs and CCRs as well, I'll test them when I have a minute.
Reverted back to 7.15.3, it works just fine.
My SMB shares stopped successful authentication when accessed from any Android, iPhone, iPad, GoogleTV. It prompted me to enter the username and password, but never went through to the directory content and always asks for inputting the credentials.
I have the same issue after upgrading to the latest. SMB stopped working. I even upgraded to 7.18 Beta2, and that did not did the trick either.
This is what I see in the packet captures:
...E.SMBr.....C...............'......"..NT LM 0.12..SMB 2.002..SMB 2.???.
.....SMB@...........................................................A.................................@...@.|(...l............J.....`H..+......>0<..0..
+.....7..
.*0(.&.$not_defined_in_RFC4178@please_ignore
...l.SMB@.........c.................................................$.......E....]z-8.Ag.._q..s.................
...I.SMB@........................................................... ........
The SMB client run by Infuse player app on Apple TV stopped working. macOS native SMB client connects without problems.
Below are dissections from Wireshark.
Infuse:Code: Select all--Request by Infuse--> SMB (Server Message Block Protocol) SMB Header Server Component: SMB SMB Command: Negotiate Protocol (0x72) NT Status: STATUS_SUCCESS (0x00000000) Flags: 0x18, Canonicalized Pathnames, Case Sensitivity 0... .... = Request/Response: Message is a request to the server .0.. .... = Notify: Notify client only on open ..0. .... = Oplocks: OpLock not requested/granted ...1 .... = Canonicalized Pathnames: Pathnames are canonicalized .... 1... = Case Sensitivity: Path names are caseless .... ..0. = Receive Buffer Posted: Receive buffer has not been posted .... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported Flags2: 0xc843, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Used, Extended Attributes, Long Names Allowed 1... .... .... .... = Unicode Strings: Strings are Unicode .1.. .... .... .... = Error Code Type: Error codes are NT error codes ..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only ...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs .... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported .... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path .... .... .1.. .... = Long Names Used: Path names in request are long file names .... .... ...0 .... = Security Signatures Required: Security signatures are not required .... .... .... 0... = Compressed: Compression is not requested .... .... .... .0.. = Security Signatures: Security signatures are not supported .... .... .... ..1. = Extended Attributes: Extended attributes are supported .... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response Process ID High: 0 Signature: 0000000000000000 Reserved: 0000 Tree ID: 0 Process ID: 1344 User ID: 0 Multiplex ID: 0 Negotiate Protocol Request (0x72) Word Count (WCT): 0 Byte Count (BCC): 34 Requested Dialects Dialect: NT LM 0.12 Buffer Format: Dialect (2) Name: NT LM 0.12 Dialect: SMB 2.002 Buffer Format: Dialect (2) Name: SMB 2.002 Dialect: SMB 2.??? Buffer Format: Dialect (2) Name: SMB 2.??? <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 0 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 Negotiate Protocol Response (0x00) StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB2 wildcard (0x02ff) Reserved: 0 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:31:13.155350300 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore Reserved2: 0x00000000 --Request by Infuse--> SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 Channel Sequence: 0 Reserved: 0000 Command: Negotiate Protocol (0) Credits requested: 99 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Response: This is a REQUEST .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response in: 28] Negotiate Protocol Request (0x00) [Preauth Hash: d5a10eba0dae463de64e00a9d6f28d86caf27f31cbee57633eee39494cbf27b6c601bf7ee95418c314a20508a331866661c4abd3b99240566b0f96e46bb3f036] StructureSize: 0x0024 0000 0000 0010 010. = Fixed Part Length: 18 .... .... .... ...0 = Dynamic Part: False Dialect count: 4 Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Reserved: 0000 Capabilities: 0x00000045, DFS, LARGE MTU, ENCRYPTION .... .... .... .... .... .... .... ...1 = DFS: This host supports DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 0... = MULTI CHANNEL: This host does NOT support MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Client Guid: 51497ea5-5cef-b244-b964-6e8ce408a16f NegotiateContextOffset: 0x00000000 NegotiateContextCount: 0 Reserved: 0000 Dialect: SMB 2.0.2 (0x0202) Dialect: SMB 2.1 (0x0210) Dialect: SMB 3.0 (0x0300) Dialect: SMB 3.0.2 (0x0302) <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_INSUFFICIENT_RESOURCES (0xc000009a) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response to: 24] [Time from request: 0.000004000 seconds] Negotiate Protocol Response (0x00) [Preauth Hash: f4c7dbdcf3ecb837e5cb129c6cc7c78a3a6f3b2b56109787fd24bcdf2ce7ac44650bd5b25beafbb863ca3411f0f53ebfc1a15743abe42cd58eb4777cdc21ddc2] StructureSize: 0x0009 0000 0000 0000 100. = Fixed Part Length: 4 .... .... .... ...1 = Dynamic Part: True Error Context Count: 0 Reserved: 0x00 Byte Count: 0 Error Data: 00
macOS's Finder:
SUP-176851Code: Select all--Request by macOS--> SMB (Server Message Block Protocol) SMB Header Server Component: SMB SMB Command: Negotiate Protocol (0x72) NT Status: STATUS_SUCCESS (0x00000000) Flags: 0x08, Case Sensitivity 0... .... = Request/Response: Message is a request to the server .0.. .... = Notify: Notify client only on open ..0. .... = Oplocks: OpLock not requested/granted ...0 .... = Canonicalized Pathnames: Pathnames are not canonicalized .... 1... = Case Sensitivity: Path names are caseless .... ..0. = Receive Buffer Posted: Receive buffer has not been posted .... ...0 = Lock and Read: Lock&Read, Write&Unlock are not supported Flags2: 0xc801, Unicode Strings, Error Code Type, Extended Security Negotiation, Long Names Allowed 1... .... .... .... = Unicode Strings: Strings are Unicode .1.. .... .... .... = Error Code Type: Error codes are NT error codes ..0. .... .... .... = Execute-only Reads: Don't permit reads if execute-only ...0 .... .... .... = Dfs: Don't resolve pathnames with Dfs .... 1... .... .... = Extended Security Negotiation: Extended security negotiation is supported .... .0.. .... .... = Reparse Path: The request does not use a @GMT reparse path .... .... .0.. .... = Long Names Used: Path names in request are not long file names .... .... ...0 .... = Security Signatures Required: Security signatures are not required .... .... .... 0... = Compressed: Compression is not requested .... .... .... .0.. = Security Signatures: Security signatures are not supported .... .... .... ..0. = Extended Attributes: Extended attributes are not supported .... .... .... ...1 = Long Names Allowed: Long file names are allowed in the response Process ID High: 0 Signature: 0000000000000000 Reserved: 0000 Tree ID: 65535 Process ID: 1 User ID: 65535 Multiplex ID: 0 Negotiate Protocol Request (0x72) Word Count (WCT): 0 Byte Count (BCC): 34 Requested Dialects Dialect: NT LM 0.12 Buffer Format: Dialect (2) Name: NT LM 0.12 Dialect: SMB 2.002 Buffer Format: Dialect (2) Name: SMB 2.002 Dialect: SMB 2.??? Buffer Format: Dialect (2) Name: SMB 2.??? <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 0 Reserved: 0x00000000 Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 Negotiate Protocol Response (0x00) StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB2 wildcard (0x02ff) Reserved: 0 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:12:36.815501500 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore Reserved2: 0x00000000 --Request by macOS--> SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 Channel Sequence: 0 Reserved: 0000 Command: Negotiate Protocol (0) Credits requested: 0 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Response: This is a REQUEST .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x0000feff Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response in: 58] Negotiate Protocol Request (0x00) [Preauth Hash: d31c2830b42fa5c6603ae5e67d9fbbd519687ecc35f3a604d91d0b2cf677831d9ee858e922cf7f1e2fbd9e18b9c1fef59ddb991a3fe69433da1d3eac9afa60c8] StructureSize: 0x0024 0000 0000 0010 010. = Fixed Part Length: 18 .... .... .... ...0 = Dynamic Part: False Dialect count: 5 Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Reserved: 0000 Capabilities: 0x0000007f, DFS, LEASING, LARGE MTU, MULTI CHANNEL, PERSISTENT HANDLES, DIRECTORY LEASING, ENCRYPTION .... .... .... .... .... .... .... ...1 = DFS: This host supports DFS .... .... .... .... .... .... .... ..1. = LEASING: This host supports LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...1 .... = PERSISTENT HANDLES: This host supports PERSISTENT HANDLES .... .... .... .... .... .... ..1. .... = DIRECTORY LEASING: This host supports DIRECTORY LEASING .... .... .... .... .... .... .1.. .... = ENCRYPTION: This host supports ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Client Guid: 5918f3a6-8558-bf44-bce9-89cb9c46119a NegotiateContextOffset: 0x00000070 NegotiateContextCount: 5 Reserved: 0000 Dialect: SMB 2.0.2 (0x0202) Dialect: SMB 2.1 (0x0210) Dialect: SMB 3.0 (0x0300) Dialect: SMB 3.0.2 (0x0302) Dialect: SMB 3.1.1 (0x0311) Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001) DataLength: 38 Reserved: 00000000 HashAlgorithmCount: 1 SaltLength: 32 HashAlgorithm: SHA-512 (0x0001) Salt: b2967270afec39d772b756b248b7e7f8c6868f28a5bd3dae84be2c94061cdd38 Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002) DataLength: 10 Reserved: 00000000 CipherCount: 4 CipherId: AES-256-GCM (0x0004) CipherId: AES-256-CCM (0x0003) CipherId: AES-128-GCM (0x0002) CipherId: AES-128-CCM (0x0001) Negotiate Context: SMB2_COMPRESSION_CAPABILITIES Type: SMB2_COMPRESSION_CAPABILITIES (0x0003) DataLength: 10 Reserved: 00000000 CompressionAlgorithmCount: 1 Flags: 0x00000000 .... .... .... .... .... .... .... ...0 = Chained: False 0000 0000 0000 0000 0000 0000 0000 000. = Reserved: 0x00000000 CompressionAlgorithmId: None (0x0000) Negotiate Context: SMB2_SIGNING_CAPABILITIES Type: SMB2_SIGNING_CAPABILITIES (0x0008) DataLength: 6 Reserved: 00000000 SigningAlgorithmCount: 2 SigningAlgorithmId: AES-GMAC (0x0002) SigningAlgorithmId: AES-CMAC (0x0001) Negotiate Context: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID Type: SMB2_NETNAME_NEGOTIATE_CONTEXT_ID (0x0005) DataLength: 58 Reserved: 00000000 Netname: Shared Movies._smb._tcp.local <--Reply by RouterOS-- SMB2 (Server Message Block Protocol version 2) SMB2 Header ProtocolId: 0xfe534d42 Header Length: 64 Credit Charge: 0 NT Status: STATUS_SUCCESS (0x00000000) Command: Negotiate Protocol (0) Credits granted: 1 Flags: 0x00000001, Response .... .... .... .... .... .... .... ...1 = Response: This is a RESPONSE .... .... .... .... .... .... .... ..0. = Async command: This is a SYNC command .... .... .... .... .... .... .... .0.. = Chained: This pdu is NOT a chained command .... .... .... .... .... .... .... 0... = Signing: This pdu is NOT signed .... .... .... .... .... .... .000 .... = Priority: This pdu does NOT contain a PRIORITY ...0 .... .... .... .... .... .... .... = DFS operation: This is a normal operation ..0. .... .... .... .... .... .... .... = Replay operation: This is NOT a replay operation Chain Offset: 0x00000000 Message ID: 1 Reserved: 0x0000feff Tree Id: 0x00000000 Session Id: 0x0000000000000000 Signature: 00000000000000000000000000000000 [Response to: 54] [Time from request: 0.000007000 seconds] Negotiate Protocol Response (0x00) [Preauth Hash: 5c8cf3670d9ca5d3b91e2199ac05900e9dc87288dfab3e1ebf702d0fba52eaeafe46ae3070c36de4b1460af9540cd3ceeb601c97b62ba1d73ab22a9a011d192f] StructureSize: 0x0041 0000 0000 0100 000. = Fixed Part Length: 32 .... .... .... ...1 = Dynamic Part: True Security mode: 0x01, Signing enabled .... ...1 = Signing enabled: True .... ..0. = Signing required: False Dialect: SMB 3.1.1 (0x0311) NegotiateContextCount: 3 Server Guid: 00000000-0000-0000-0000-000000000000 Capabilities: 0x0000000c, LARGE MTU, MULTI CHANNEL .... .... .... .... .... .... .... ...0 = DFS: This host does NOT support DFS .... .... .... .... .... .... .... ..0. = LEASING: This host does NOT support LEASING .... .... .... .... .... .... .... .1.. = LARGE MTU: This host supports LARGE_MTU .... .... .... .... .... .... .... 1... = MULTI CHANNEL: This host supports MULTI CHANNEL .... .... .... .... .... .... ...0 .... = PERSISTENT HANDLES: This host does NOT support PERSISTENT HANDLES .... .... .... .... .... .... ..0. .... = DIRECTORY LEASING: This host does NOT support DIRECTORY LEASING .... .... .... .... .... .... .0.. .... = ENCRYPTION: This host does NOT support ENCRYPTION .... .... .... .... .... .... 0... .... = NOTIFICATIONS: This host does NOT support receiving NOTIFICATIONS Max Transaction Size: 1048576 Max Read Size: 4194304 Max Write Size: 4194304 Current Time: Jan 19, 2025 19:12:36.820239300 PST Boot Time: No time specified (0) Blob Offset: 0x00000080 Blob Length: 74 Security Blob: 604806062b0601050502a03e303ca00e300c060a2b06010401823702020aa32a3028a0261b246e6f745f646566696e65645f696e5f5246433431373840706c656173655f69676e6f7265 GSS-API Generic Security Service Application Program Interface OID: 1.3.6.1.5.5.2 (SPNEGO - Simple Protected Negotiation) Simple Protected Negotiation negTokenInit mechTypes: 1 item MechType: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) negHints hintName: not_defined_in_RFC4178@please_ignore NegotiateContextOffset: 0x000000d0 Negotiate Context: SMB2_PREAUTH_INTEGRITY_CAPABILITIES Type: SMB2_PREAUTH_INTEGRITY_CAPABILITIES (0x0001) DataLength: 38 Reserved: 00000000 HashAlgorithmCount: 1 SaltLength: 32 HashAlgorithm: SHA-512 (0x0001) Salt: edb44f22adfc8867776d42525d298d1ee4b228e0690e951e33ad271ab36e6f6a Negotiate Context: SMB2_ENCRYPTION_CAPABILITIES Type: SMB2_ENCRYPTION_CAPABILITIES (0x0002) DataLength: 4 Reserved: 00000000 CipherCount: 1 CipherId: AES-128-GCM (0x0002) Negotiate Context: SMB2_SIGNING_CAPABILITIES Type: SMB2_SIGNING_CAPABILITIES (0x0008) DataLength: 4 Reserved: 00000000 SigningAlgorithmCount: 1 SigningAlgorithmId: AES-CMAC (0x0001)
However it still works from Windows 11 or Kali Linux. Invested several hours into troubleshooting without any luck. Decided to downgrade back to 7.16.2 and it worked right away.
Mikrotik team , please take a good look on the new SMB implementation which you mark as smb - stability improvements for client/server, cause in reality it worsens the experience somehow.
Is this change the reason why I can no longer add e.g. on port 23 vlans in the range of 1-2000 and on port 24 vlans in the range of 10-20?bridge - disallow duplicate static VLAN entries;
After the upgrade, SMB worked fine for me. I can connect from MacOS, and I believe other users in this thread can connect from Windows Machines, too. However, all my media servers are running Infuse, and Infuse can't connect to MikroTik shares anymore.SMB shares stopped working
It hits me too after upgrade from 7.1x to 7.17.
I removed shares and users, disabled the service and reconfiguring everything from scratch and now works fine again.
I hope this help.
Hi, thanks for asking. On my other router (hAP ax³, version 7.16.2) the certificates are named cacert.pem_0 to cacert.pem_150.No, what are the certs name (not the issuer, but the name on routeros)?
I opened SUP-177102 about the VRRP connection sync issue.It seems that 7.17 has broken the VRRP Sync Connection tracking mechanism. On my VRRP interfaces with Torch and I don't see any protocol-112 (vrrp) or UDP/8275 traffic. What gives??
Meaning dont have to tag ports per vlan 1 by 1.. this is HUGE!!! and a range command?!?! im thrilled.. I use the CRS switches so this is a big deal to me..> *) bridge - added interface-list support for VLANs;
What does this mean?
Yes, you read this topic and apply the script.I'm just wondering if I did something in the past to import all those certs, and I just cannot remember it. 😊
/system device-mode update activation-timeout=60s mode=advanced install-any-version=yes partitions=yes routerboard=yes
That is a Winbox 4 bug. They are there when using Winbox 3.CRS112..
Where are all the vlan settings under switch gone?
I run the command and tried to get into netinstall mode but it never goes in netinstall mode it boot into the router os 7.17 instead@evilsabc
For use netinstall to reinstall 7.15.3 and reload backup, you must first enable it on device-mode.press reset button after run this code
/system device-mode update activation-timeout=60s mode=advanced install-any-version=yes partitions=yes routerboard=yes
/system ; package print detail ; device-mode print ; routerboard ; print ; settings print ; /partition print detail
[admin@MikroTik] /system> device-mode printDO NOT POST SERIAL NUMBER!
results?Code: Select all/system ; package print ; device-mode print ; routerboard ; print ; settings print
/system ; package print detail ; routerboard settings print ; /partition print detail
[admin@MikroTik] /system> /partition printand?Code: Select all/system ; package print detail ; routerboard ; print ; settings print ; /partition print detail
(if I write that line, you must copy and paste all line...)
I will do all you want to get my old configuration back online loldevice-mode is Ok, RouterBOOT (firmware) is Ok, Partition is OK, still missing the rest.......................................
if you still do want do it manually one by one....
/system package print detail
/system routerboard settings print
It works !!Ok, also RouterBOOT setttings and packages are ok.
You have one backup of the configuration? Old config can not reappear just putting back 7.15.3....
Download those, drag and drop inside winbox, and after that go on system / packages and press downgrade
https://download.mikrotik.com/routeros/ ... -arm64.npk
https://download.mikrotik.com/routeros/ ... -arm64.npk
If all work as expected, when reboot the RouterBOARD have 7.15.3 as RouterOS and you can reload the backup you have done before upgrade.
Thanks... But for what??? 🤷♂️@rextended Thank you, and well done!
Helping @evilsabc, a generous and substantial commitment IMO.Thanks... But for what??? 🤷♂️
Ah, I thought you had a similar problem, but I either didn't read it or inadvertently ignored it.Helping @evilsabc, a generous and substantial commitment IMO.Thanks... But for what??? 🤷♂️
Replace EOIP with VPLS. VPLS is more efficient for joining two sites in a single layer 2 domain using a layer 3 tunnel.For me so far, on CCR2004's, it added a new problem.
I have one at my office - one at my home. I use EOIP (yes, I know I should subnet it, but for now I need it all on the same layer 2) with encryption to link the two locations together.
Version 7.16.2 the best on a 1gb symmetrical connection I could get was 400MB/sec between the two locations.
Version 7.17 made some huge improvements, I'm seeing 700-800MB/sec....
BUT connections are dropping. Not packet loss - connections get closed. You'll be winboxed in and poof - you're disconnected to the remote site.
Roll back to 7.16.2 - my speeds are back to what they were - and it's stable again.
Thoughts anyone?
Winner winner chicken dinner. Enabling forward-reserved-addresses does indeed work. Thank you very much.@dag, I cannot reproduce same behavior. The ingress-filtering=no/yes works as expected.
My guess is that you are affected by some other switch/bridge change since v7.16, maybe this one?
*) bridge - added forward-reserved-addresses property which controls forwarding of MAC 01:80:C2:00:00:0x range (separated from "protocol-mode=none" functionality, disabled by default after upgrade);
Send supout.rif file to support, or create a separate topic.
Not stable!
had a bad upgrade experience. Upgrade to 7.17 - no name resolution for the router or lan clients, no helpful error message - receiving nxdomain, disable/enable, change dns servers for the internal service - nada. Downgrade to 7.16/7.15 - all works fine. Upgrade to 7.17 again - no workie. Again, no dns related messages in console except for tcp syn flood on port 53!.
Tried to disable all static entries - now clients get servfail instead of nxdomain. Disable and enable again - ok, now get resolution. Going on to enable static entries one-by-one - ah, a new error appears - a duplicate entry! What? That has never been the case, and second, why do you care - ignore it, if it is truly duplicate it does not cause any indeterminate state in the config (yes, they were truly duplicate). Why is that error not in console log when the system boots and service is brought up and chokes?
You can't drop the ball like that Mikrotik. This is a simple situation your QAs should test. And not only that but if you roll service with such hairbrained changes it should be a parallel optional service that you ask the users to manually enable in place of the tried and true which should be the default - then the few that actually like to thinker with config will try it and provide feedback and give you the missing test cases that you did not cover, and only that you change what is the default. And at least put some error messages in the console. This is simply not how you produce quality!
Platform: arm32
Is that what it does?? That is bad... I would have expected it to enable SYN COOKIES in that situation.I have a similar issue like i4ko:
One device tries to connect to our server with a bunch of packets, because it want to establish a couple of tunnels. The 7.17 (and 7.16.2 too) version detects a TCP syn flood and shuts down any tcp syn ack traffic on that interface (Log message "possible SYN flooding on tcp port ..."). Even for other devices, that want to connect.
Is that what it does?? That is bad... I would have expected it to enable SYN COOKIES in that situation.I have a similar issue like i4ko:
One device tries to connect to our server with a bunch of packets, because it want to establish a couple of tunnels. The 7.17 (and 7.16.2 too) version detects a TCP syn flood and shuts down any tcp syn ack traffic on that interface (Log message "possible SYN flooding on tcp port ..."). Even for other devices, that want to connect.
Well I am not running 7.17 but I am testing 7.18beta2 and it shows that "syn flood" error for port 53 (DNS) once after every reboot, however when I later try the port 53 answers as normal.
So there must be more than that going on.
@pe1chl there are many valid reasons for doing both, and in older ROS versions this worked fine. Note that even if you're isolating rogue dhcp servers, one may still want to receive an alert when they feature on your network.OF COURSE that does not work when DHCP Snooping is enabled!
DHCP Snooping is an active technique to avoid the problem of Rogue DHCP servers.
You would not use both at the same time...
I've got that log entry as well on a CRS309 switch with a lean configuration consisting of a bridge only, and like you had found no evidence that a ovpn server exists or has ever existed (never used or configured any ovpn). Since I've reverted back to an older version again for other reasons, I can't reproduce this anymore or provide any data for analysis.In all devices in network I see this in log
system,info ovpn server added by (/interface ovpn-server server set)
I look and see OpenVPN server add to list, not see any one logged in time of creation on device.
Anyone else ?