Community discussions

MikroTik App
 
fe4r
newbie
Topic Author
Posts: 34
Joined: Mon Feb 25, 2008 7:02 pm

Password Recovery website

Sat Oct 08, 2011 12:33 am

Hi,

I don't know if this was already told here, but let's go try.

I'll explain a problem that I'm passing and I think Mikrotik's developers can solve it.

There are some people going my towers and other places that I have Mikrotik, they open our boxes and reset a Router Board manually.
After, they can access the reset RB and get the "backup-before-reset".
With this, they go to this website: http://mikrotikpasswordrecovery.com/default.aspx (I tested and it works with all versions).
and can get ALL MY RB PASSWORDS to a future access or to try know the others.

When it will be solved?

Thank you!
 
mgutz2
Frequent Visitor
Frequent Visitor
Posts: 97
Joined: Wed Jul 07, 2010 8:55 pm
Location: Nicaragua

Re: Password Recovery website

Sun Oct 09, 2011 4:36 am

uhmmm interesing.
 
CCDKP
Member Candidate
Member Candidate
Posts: 170
Joined: Fri Jan 28, 2011 11:24 pm
Location: Midwest, United States

Re: Password Recovery website

Tue Oct 11, 2011 7:23 pm

At the end of the day, physical access is king.

Even if Mikrotik used a hashing algorithm instead of the encoding they have now, brute force attacks could be used.
If they removed the backup-before-reset feature, then the attackers would just PXEboot into a linux distro and mount the flash directly
(See http://manio.skyboo.net/mikrotik/)

If people are breaking into your safe to steal the gold, there are only 2 real solutions:

1) Make the safe bigger:
Better locks / security, tamper tags, detection and response when the device goes offline. Either record or catch them in the act and have them prosecuted.

2) Take the gold out of the safe:
I know it makes management more difficult, but the real problem you have is that if you get one password, you get all of them. Stop reusing local passwords. Set the local admin password to something random and unique to the site, then enable centralized password management (RADIUS) for the rest of the user accounts.

This isn't an issue Mikrotik can really solve. All routers have similar problems and vulnerabilities, some are just more widely known than others. Start with the migration to RADIUS and you should see great improvement (plus it makes logging and managing user account access a great deal easier). Good Luck.
 
fe4r
newbie
Topic Author
Posts: 34
Joined: Mon Feb 25, 2008 7:02 pm

Re: Password Recovery website

Tue Oct 11, 2011 7:53 pm

I didi everything you said, the problems were "solved" but i think this is a big vulnerability that is so much visible (there is a website to do it!!!).

The question is the facility to do this, just 3 minutes they do this, and we think it was just a reboot problem e it's ok.

I think Mikrotik could do something to get this kind of security, higher. Remove the backup-before-reset starts with this problem, maybe remove passwords from the backup or the reset is just from serial (it's a little bit hard).
 
User avatar
honzam
Forum Guru
Forum Guru
Posts: 2396
Joined: Wed Feb 27, 2008 10:27 pm
Location: Czech Republic

Re: Password Recovery website

Tue Oct 11, 2011 8:37 pm

I know this page. It wants a solution from Mikrotik
 
User avatar
omega-00
Forum Guru
Forum Guru
Posts: 1167
Joined: Sat Jun 06, 2009 4:54 am
Location: Australia
Contact:

Re: Password Recovery website

Wed Oct 12, 2011 12:04 am

As CCDKP has noted, if they have physical access to your boxes there's next to nothing that's going to stop them accessing files on the device.

If you aren't able to lock up your devices..
a) use different passwords on each device (so it doesn't matter if they get access to one).
b) use radius authentication for access to your mikrotiks

If you wanted to give yourself backup access (in the event you're onsite and the box has no internet access) you could setup a backup radius client pointing to a local address which you assign your computer and run something like http://www.tcpdata.com/ras.html to act as a mini radius server to get access.

That said, this is a silly amount of work to go to when a better secured router would solve the problem :-)
 
fe4r
newbie
Topic Author
Posts: 34
Joined: Mon Feb 25, 2008 7:02 pm

Re: Password Recovery website

Wed Oct 12, 2011 6:23 pm

I already use:

1 - big, hard and different passwords each device.
2 - radius authentication (but, MK needs a full user in its user database)
3 - lock in devices boxes (now i'm improving it)
4 - different port for winbox access and access from just some IPs (and the other services too).

what else may i do?

but i still think, this is a big fail from MK!!
 
User avatar
omega-00
Forum Guru
Forum Guru
Posts: 1167
Joined: Sat Jun 06, 2009 4:54 am
Location: Australia
Contact:

Re: Password Recovery website

Wed Oct 12, 2011 7:44 pm

but i still think, this is a big fail from MK!!
This is like saying that it is Microsoft's fault if someone takes your computer and takes out the hard drive and gets your files :-O :-P

MikroTik cannot be responsible for access to your hardware. It is just silly! :-/
 
prawira
Member
Member
Posts: 361
Joined: Fri Feb 10, 2006 5:11 am
Contact:

Re: Password Recovery website

Thu Oct 13, 2011 5:34 am

Interesting....

the question is, how to get "backup-before-reset" file ?

Paul
 
User avatar
omega-00
Forum Guru
Forum Guru
Posts: 1167
Joined: Sat Jun 06, 2009 4:54 am
Location: Australia
Contact:

Re: Password Recovery website

Thu Oct 13, 2011 9:39 am

If you don't want them to be able to perform a reset...
/system routerboard settings set enable-jumper-reset=no 
 
fe4r
newbie
Topic Author
Posts: 34
Joined: Mon Feb 25, 2008 7:02 pm

Re: Password Recovery website

Thu Oct 13, 2011 3:10 pm

If you don't want them to be able to perform a reset...
/system routerboard settings set enable-jumper-reset=no 

so, this disable the manual reset (jumping the contacts)?
 
CCDKP
Member Candidate
Member Candidate
Posts: 170
Joined: Fri Jan 28, 2011 11:24 pm
Location: Midwest, United States

Re: Password Recovery website

Thu Oct 13, 2011 4:35 pm

So, this disable the manual reset (jumping the contacts)?
Yes, but the device is still prone to PXE booting a "hostile" image and manually retrieving the password file. Disabling the Reset jumper makes it significantly more difficult, but still not impossible.

Perhaps consider adding tamper seals to your boxes? (something like: http://www.americancasting.com/info-pad ... 01-TOC.asp).
While they don't prevent entry, they do let you know if someone has gotten into the box so you can take action accordingly (change local password, etc).
Additionally, what about adding logging of "system info account" to a centralized remote server? While again it won't stop the intrusion, it gives you notice that something occurred and an accurate timeline.
 
jandafields
Forum Guru
Forum Guru
Posts: 1515
Joined: Mon Sep 19, 2005 6:12 pm

Re: Password Recovery website

Tue Oct 18, 2011 4:30 am

At the end of the day, physical access is king.

Even if Mikrotik used a hashing algorithm instead of the encoding they have now, brute force attacks could be used.
If they removed the backup-before-reset feature, then the attackers would just PXEboot into a linux distro and mount the flash directly
(See http://manio.skyboo.net/mikrotik/)

If people are breaking into your safe to steal the gold, there are only 2 real solutions:

1) Make the safe bigger:
Better locks / security, tamper tags, detection and response when the device goes offline. Either record or catch them in the act and have them prosecuted.

2) Take the gold out of the safe:
I know it makes management more difficult, but the real problem you have is that if you get one password, you get all of them. Stop reusing local passwords. Set the local admin password to something random and unique to the site, then enable centralized password management (RADIUS) for the rest of the user accounts.

This isn't an issue Mikrotik can really solve. All routers have similar problems and vulnerabilities, some are just more widely known than others. Start with the migration to RADIUS and you should see great improvement (plus it makes logging and managing user account access a great deal easier). Good Luck.
If the user/admin passwords WERE 1-way hash'd stored within the router, they could only be brute cracked if they were short or easy passwords. I think this would be the answer. Sure, physical access is bad. They could do malicious things, maybe they could reset the password even, but with the 1-way hash of a GOOD password, they won't retrieve it...

Unless password retrieval is needed (like ppp secrets), then 1-way hash is always good security practice. Even the third party linysys-style router firmwares do password encryption within the config. You can change it, but you can never retrieve the old one.
 
User avatar
omega-00
Forum Guru
Forum Guru
Posts: 1167
Joined: Sat Jun 06, 2009 4:54 am
Location: Australia
Contact:

Re: Password Recovery website

Tue Oct 18, 2011 8:46 am

Even the third party linysys-style router firmwares do password encryption within the config. You can change it, but you can never retrieve the old one.
I'm sorry? :-)

http://www.cisco.com/en/US/products/sw/ ... 46e6.shtml

You'll note, similar to fe4r's situation, these recovery methods most always require physical access to the devices.
 
CCDKP
Member Candidate
Member Candidate
Posts: 170
Joined: Fri Jan 28, 2011 11:24 pm
Location: Midwest, United States

Re: Password Recovery website

Tue Oct 18, 2011 4:27 pm

Even the third party linysys-style router firmwares do password encryption within the config. You can change it, but you can never retrieve the old one.
I'm sorry? :-)

http://www.cisco.com/en/US/products/sw/ ... 46e6.shtml

You'll note, similar to fe4r's situation, these recovery methods most always require physical access to the devices.
Most of those password reset procedures don't give you the password back, they just let you read the config and overwrite them.

The Cisco 7 algorithm is trivial to decode back to a password. It is used to store standard login credentials.
(http://www.hope.co.nz/projects/tools/ciscopw.php

The Cisco 5 MD5 hash is used for the enable password. It does provide better security since it's a one-way hash, but with how cheap GPU power is getting, md5 doesn't stand up terribly long anymore.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26815
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: Password Recovery website

Wed Oct 19, 2011 9:37 am

As others have noted, you have bigger problems than stolen passwords, if somebody just comes and takes your router. Start with those issues first.
 
fe4r
newbie
Topic Author
Posts: 34
Joined: Mon Feb 25, 2008 7:02 pm

Re: Password Recovery website

Wed Oct 19, 2011 1:38 pm

As others have noted, you have bigger problems than stolen passwords, if somebody just comes and takes your router. Start with those issues first.

Sure, we are solving this issue.

But i still think something in RouterOs could be made to make it harder to get passwords.
I tested the command to stop reseting from jumper and it seems work.

thanks.
 
User avatar
Caci99
Forum Guru
Forum Guru
Posts: 1076
Joined: Wed Feb 21, 2007 2:26 pm
Location: Tirane
Contact:

Re: Password Recovery website

Fri Oct 21, 2011 8:21 pm

Thank you fe4r for letting us know that MikroTik password are not so strong any more.
It is important to know security problems, although someone would argue that this is more
a physical access security issue.
What if someone puts his hands on your regular backup files? He doesn't need to climb
a tower to have that backup file, he may simply have access to your backup files.
I know some ISP (small or big) create a second account for the customer so that he can
configure the router at his own requests. This would give them access to the other account
of the ISP itself.
 
User avatar
omega-00
Forum Guru
Forum Guru
Posts: 1167
Joined: Sat Jun 06, 2009 4:54 am
Location: Australia
Contact:

Re: Password Recovery website

Sat Oct 22, 2011 8:21 am

so that he can configure the router at his own requests.
That is what metarouter can be used for :-)
 
User avatar
Caci99
Forum Guru
Forum Guru
Posts: 1076
Joined: Wed Feb 21, 2007 2:26 pm
Location: Tirane
Contact:

Re: Password Recovery website

Sat Oct 22, 2011 11:45 am

Metarouter is a feature implemented lately. There are a lot of routers out there before metarouter was released.
Also, you have to deal with real facts of life, not everyone is using it, it is an option.
Now people have to be aware of such security issue so that they can act accordingly, and what's more
MikroTik can take their steps on their side too.

What I pointed out, was that thanks to the topic of fe4r I came aware of this problem.
 
jandafields
Forum Guru
Forum Guru
Posts: 1515
Joined: Mon Sep 19, 2005 6:12 pm

Re: Password Recovery website

Sun Oct 23, 2011 11:18 pm

so that he can configure the router at his own requests.
That is what metarouter can be used for :-)
Is anyone using Metarouter? I have seen SO MANY posts about it being very unstable.

Who is online

Users browsing this forum: axlerose, Bing [Bot], Google [Bot], Josephny, Majestic-12 [Bot], sindy and 50 guests