I will try upgrading to rc9 later (can't reboot now).[admin@gw1-vpr] > /ip dns set cache-size=2048KiB
value of cache-size contains invalid trailing characters
[admin@gw1-vpr] > /system resource print
uptime: 2w6d18h53m31s
version: 6.0rc7
build-time: Jan/18/2013 13:04:05
free-memory: 3072.7MiB
total-memory: 3964.0MiB
cpu: tilegx
cpu-count: 36
cpu-frequency: 1200MHz
cpu-load: 0%
free-hdd-space: 424.1MiB
total-hdd-space: 512.0MiB
architecture-name: tile
board-name: CCR1036-12G-4S
platform: MikroTik
Sure, but if you add "KiB" at the end (that it is what "/ip dns export verbose" outputs), the command is not accepted, it's a (small but annoying) bug."/ip dns set cache-size=2048"
RC09 , all ethernet not appear and can not access via winbox
/interface print command not responding
Excuse my ignorance, what most mean by CCR?NAT is not working on CCR with rc9.
CCR = Cloud Core RouterExcuse my ignorance, what most mean by CCR?NAT is not working on CCR with rc9.
I think it's not problemIs it normal, that E-mail password easy to see in .backup file? And Wi-Fi key too?
Is it not protected format?
"Important! The backup file contains sensitive information, do not store your backup files inside the router's Files directory, instead, download them, and keep them in a secure location. "Is it normal, that E-mail password easy to see in .backup file? And Wi-Fi key too?
Is it not protected format?
In security once you have physical access it's game over, Also this requires you to extract the file from the flash of an RB or the HDD of a x86 box (Alot easier on x86)a) hard to notice
b) Applies to RouterOS: 2.9, v3, v4
I have something which most of you might not know...
Read especially part III.
I bet ROS 5.x, 6.x are about the same security level....
http://felinemenace.org/~andrewg/MikroT ... sis_Part1/
http://felinemenace.org/~andrewg/MikroT ... sis_Part2/
http://felinemenace.org/~andrewg/MikroT ... sis_Part3/
still think it`s nothing?
imagine me breaking into your tower somewhere "in the woods" and stealing your microtik
I will gain access to your network and I will also gain access to all your routers because of same password used everywhere.
It will take me 5 minutes to scan your network for unpatched windows and by using some script kiddy tool like metasploit to hack a few customers in few hours, stealing their data.
This is how a WISP can be put out of service in one dark night...
So be warned!
Please clarify what is not working, and send a supout.rif file to support. We have CCR routers with NAT and it works fine, maybe there is something specific in your configuration.NAT is not working on CCR with rc9.
engineertote, please write to support about this. can we get remote SSH access to your device?RC09 , all ethernet not appear and can not access via winbox
/interface print command not responding
yes, it is normal. do not store the backup file in public location, and do not give it to anybody.Is it normal, that E-mail password easy to see in .backup file? And Wi-Fi key too?
Is it not protected format?
it has been fixed in RC10 (not released yet)after update to rc 9, status of Connections disappeared (marked in red)
Please clarify how you will break into something, if the backup file is not given to you? If you follow the manual, and store the file "in a secure location", no harm can be done. There is no solution to this, except by using encryption, which would require decryption keys.a) hard to notice
b) Applies to RouterOS: 2.9, v3, v4
I have something which most of you might not know...
Read especially part III.
I bet ROS 5.x, 6.x are about the same security level....
http://felinemenace.org/~andrewg/MikroT ... sis_Part1/
http://felinemenace.org/~andrewg/MikroT ... sis_Part2/
http://felinemenace.org/~andrewg/MikroT ... sis_Part3/
still think it`s nothing?
imagine me breaking into your tower somewhere "in the woods" and stealing your microtik
I will gain access to your network and I will also gain access to all your routers because of same password used everywhere.
It will take me 5 minutes to scan your network for unpatched windows and by using some script kiddy tool like metasploit to hack a few customers in few hours, stealing their data.
This is how a WISP can be put out of service in one dark night...
So be warned!
Sorry but this is not related to this topic. Your described method requires somebody to keep a backup file on the router, which is against documentation recommendation. Also, breaking the case open, will not help if there is a routerboard inside.No backup needed to compromise. It`s much easier to get access to physical equipment of a WISP. Most of the equipment is protected by nothing.
If I`m a script kiddy I do this:
a) Crack the case on the tower
b) http://manio.skyboo.net/mikrotik/
c) Do harm
d) Tell all my friends how good hacker I am.
Normis, read the three part article in more depth or give the links to somebody able to understand it. I do not care about the backups as they are "just another security flaw" and the is a much bigger hole in the system.If you follow the manual, and store the file "in a secure location", no harm can be done. There is no solution to this, except by using encryption, which would require decryption keys.
This is not a serious security hole. Anybody can break into a bank and steal all the money. This is basically the same. Just put security guard and more locks on the door.Normis, read the three part article in more depth or give the links to somebody able to understand it. I do not care about the backups as they are "just another security flaw" and the is a much bigger hole in the system.If you follow the manual, and store the file "in a secure location", no harm can be done. There is no solution to this, except by using encryption, which would require decryption keys.
Oh really??!?!!? Want work if there is a RB inside:Sorry but this is not related to this topic. Your described method requires somebody to keep a backup file on the router, which is against documentation recommendation. Also, breaking the case open, will not help if there is a routerboard inside.No backup needed to compromise. It`s much easier to get access to physical equipment of a WISP. Most of the equipment is protected by nothing.
If I`m a script kiddy I do this:
a) Crack the case on the tower
b) http://manio.skyboo.net/mikrotik/
c) Do harm
d) Tell all my friends how good hacker I am.
In many countries it is being called the crime.a) Crack the case on the tower
On my RB450G upgrade to version 6rc8 and 6rc9 leads to a loss in the channel. Returned to 6rc7Someone already updated RC9 in some RB450G? everything is normal with no problems?
what do you mean by "loss in the channel", please clarify?On my RB450G upgrade to version 6rc8 and 6rc9 leads to a loss in the channel. Returned to 6rc7
I think the problem with the queues - until the limit is reached, all is OK. As soon as someone loads the channel, at other users Internet disappears. I wrote about this in support. Ticket #2013021166000275what do you mean by "loss in the channel", please clarify?
Yes, you can. Put the file http://www.mikrotik.com/download/share/ ... 3_04_2.fwfHow many people have done this on a CCR? I'm stilling running RC7 as it's stable for me.
Also, can you update the boot FW without doing the OS?
both rc8 and rc9 downloads contain 'openflow' package which you need to install for OpenFlow supportI was very excited when I took at look at the Changelog for rc8 and saw initial Openflow support ... but now Changelog has been updated and that's no longer visible ....
I'd appreciate being involved in any Openflow testing
Quite right - unwrapped my CCR1036 this morning, installed RC9 and saw the Openflow packageboth rc8 and rc9 downloads contain 'openflow' package which you need to install for OpenFlow support
Here is the little information on how to use Openflow on RouterOS.Morning All!
I was very excited when I took at look at the Changelog for rc8 and saw initial Openflow support ... but now Changelog has been updated and that's no longer visible ....
I'd appreciate being involved in any Openflow testing
R
I means rules in mangle table, in forward chain. I have packet marking rules (due traffic shaping).The change MSS rules are in the "Mangle" table, while the other forward rules go into the "Filter" table.
According to the netfilter metamodel, mangle rules are applied before filter and NAT rules.