Would this fix address issues like I've seen on upgrade to 6.38.3?*) filesystem - implemented procedures to verify and restore internal file structure integrity upon upgrading;
what? DHCPv6 in mikrotik? Or DHCPv6-PD??*) dhcpv6-server - require "address-pool" to be specified;
snmpwalk -v2c -c public 192.168.88.1 1.3.6.1.4.1.14988.1.1.1.5.1.1
iso.3.6.1.4.1.14988.1.1.1.5.1.1 = No Such Instance currently exists at this OID
Can we please get confirmation on this? I'd like to get our equipment updated as soon as possible, or at least have a way to mitigate the CIA's exploit before it gets publicly released. People are speculating that disabling the HTTP server (port 80) will fix it, but I'd like to have an official annoucement.I strongly believe this update was released now in response to the CIA Vault 7 / Wikileaks leak that became known yesterday.
I expect we may have a further update from Mikrotik has more info about the tools used when Wikileaks makes them available for analysis but kudos to them for the fast turnaround on getting something pushed out to address this.
There's more info in the official post basically reiterating the same thing - ensure publicly available interfaces are locked down, as more information becomes available MikroTik will post an update.We will continue to strengthen RouterOS services and have already released RouterOS version 6.38.4 which removes any malicious files in devices that have been compromised
mar/09 00:15:55 ipsec,info respond new phase 1 (Identity Protection): y.y.y.y[500]<=>x.x.x.x[29243]
mar/09 00:15:55 ipsec,info ISAKMP-SA established y.y.y.y[4500]-x.x.x.x[24396] spi:c8dc4a12a919f674:041afe17fc36e624
mar/09 00:15:55 ipsec,info XAuth login succeeded for user: ipsecuser
mar/09 00:15:55 ipsec,info acquired y.y.z.z address for x.x.x.x[24396]
mar/09 00:15:56 ipsec,error x.x.x.x failed to pre-process ph2 packet.
mar/09 00:15:59 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:02 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:05 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:08 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:11 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:14 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:17 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:20 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:16:23 ipsec,error x.x.x.x peer sent packet for dead phase2
mar/09 00:18:20 ipsec,info purging ISAKMP-SA y.y.y.y[4500]<=>x.x.x.x[24396] spi=c8dc4a12a919f674:041afe17fc36e624:fefba073.
mar/09 00:18:21 ipsec,info ISAKMP-SA deleted y.y.y.y[4500]-x.x.x.x[24396] spi:c8dc4a12a919f674:041afe17fc36e624 rekey:1
IPsec Xauth PSK NAT-T roadwarrior config (the Android-compatible one) still seems to be broken (since v6.38), phase 2 fails. Also tried on 6.38.3, 6.38.4 and 6.39rc45, same results.
Reverting to v6.37.4 (or 6.37.3 or older) removes the problem. No changes are done to the configuration.
The same issue was already reported by GioMac in the v6.38 thread (I haven't noticed any reply or acknowledgement):Code: Select allmar/09 00:15:55 ipsec,info respond new phase 1 (Identity Protection): y.y.y.y[500]<=>x.x.x.x[29243] mar/09 00:15:55 ipsec,info ISAKMP-SA established y.y.y.y[4500]-x.x.x.x[24396] spi:c8dc4a12a919f674:041afe17fc36e624 mar/09 00:15:55 ipsec,info XAuth login succeeded for user: ipsecuser mar/09 00:15:55 ipsec,info acquired y.y.z.z address for x.x.x.x[24396] mar/09 00:15:56 ipsec,error x.x.x.x failed to pre-process ph2 packet. mar/09 00:15:59 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:02 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:05 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:08 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:11 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:14 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:17 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:20 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:16:23 ipsec,error x.x.x.x peer sent packet for dead phase2 mar/09 00:18:20 ipsec,info purging ISAKMP-SA y.y.y.y[4500]<=>x.x.x.x[24396] spi=c8dc4a12a919f674:041afe17fc36e624:fefba073. mar/09 00:18:21 ipsec,info ISAKMP-SA deleted y.y.y.y[4500]-x.x.x.x[24396] spi:c8dc4a12a919f674:041afe17fc36e624 rekey:1
viewtopic.php?t=116354#p575566
Does v6.38+ need some configuration changes for this type of IPsec setup or is this a bug?
What's new in 6.38.5 (2017-Mar-09 11:32):
!) www - fixed http server vulnerability;
Loading system with initrd
XZ-compressed data is corrupt
-- System halted_
I think so, however this is common problem, not specific to my case: check it... install a fresh 6.38.3 CHR in ESXi 6.5... then update to 6.38.5... boom!virtman - We test also CHR before release. This is something specific in your case. Please write to support@mikrotik.com and describe problem and CHR.
system resource print
uptime: 17m2s
version: 6.38.5 (stable)
system routerboard print
;;; Current RouterBOOT does not support this feature
routerboard: yes
model: CCR1009-8G-1S
serial-number:
firmware-type: tilegx
factory-firmware: 3.22
current-firmware: 3.33
upgrade-firmware: 3.33
18:09:17 echo: system,info,critical Current RouterBOOT does not support this feature
Hi,RSTP on bridges still blocking traffic.
Two RB951g connected with VLANs declared on bridges. Traffic doesn't pass while RSTP is enabled.
If it is disabled everything is fine. Going back to 6.37.4 bugfix fixes the issue. So, what is the problem?
Can anyone clear this issue? This started with 6.38. I know changes have been made regarding RSTP in 6.38
but the routers used all have the same ROS version.
Your device is too old (i.e. it was manufactured before the protected RouterBOOT feature was introduced). If you absolutely need this feature, you will have to update the backup RouterBOOT, which is dangerous (may irrecoverably brick your device if anything goes wrong). You can find more info and the links to a special update packages here.i trying enable secure boot, but i get error
Before i do something i usually read carefully instruction)))Your device is too old (i.e. it was manufactured before the protected RouterBOOT feature was introduced). If you absolutely need this feature, you will have to update the backup RouterBOOT, which is dangerous (may irrecoverably brick your device if anything goes wrong). You can find more info and the links to a special update packages here.
Thank you for this, but as I say RSTP is off on all devices and I upgrade all devices to the lastest version.Switch rstp off. Or upgrade all routers to the same Ros version.
wireless,info wlan1: WPS virtual button pushed
wireless,debug wlan1: 00:12:FE:AF:35:59 attempts to associate
wireless,info wlan1: WPS association from 00:12:FE:AF:35:59
wireless,debug wlan1: 00:12:FE:AF:35:59 not in local ACL, by default accept
wireless,info 00:12:FE:AF:35:59@wlan1: connected
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 started, associated
wireless,debug wlan1: 00:12:FE:AF:35:59 attempts to associate
wireless,info 00:12:FE:AF:35:59@wlan1: reassociating
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 interrupted
wireless,info 00:12:FE:AF:35:59@wlan1: disconnected, ok
wireless,info wlan1: WPS association from 00:12:FE:AF:35:59
wireless,debug wlan1: 00:12:FE:AF:35:59 not in local ACL, by default accept
wireless,info 00:12:FE:AF:35:59@wlan1: connected
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 started, associated
wireless,debug wlan1: 00:12:FE:AF:35:59 attempts to associate
wireless,info 00:12:FE:AF:35:59@wlan1: reassociating
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 interrupted
wireless,info 00:12:FE:AF:35:59@wlan1: disconnected, ok
wireless,info wlan1: WPS association from 00:12:FE:AF:35:59
wireless,debug wlan1: 00:12:FE:AF:35:59 not in local ACL, by default accept
wireless,info 00:12:FE:AF:35:59@wlan1: connected
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 started, associated
wireless,debug wlan1: 00:12:FE:AF:35:59 attempts to associate
wireless,info 00:12:FE:AF:35:59@wlan1: reassociating
wireless,info wlan1: WPS of 00:12:FE:AF:35:59 interrupted
wireless,info 00:12:FE:AF:35:59@wlan1: disconnected, ok
12:59:22 ipsec receive Information.
12:59:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
12:59:22 ipsec sendto Information notify.
12:59:22 ipsec sendto Information notify.
12:59:22 ipsec receive Information.
12:59:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
12:59:42 ipsec receive Information.
12:59:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
12:59:42 ipsec sendto Information notify.
12:59:42 ipsec sendto Information notify.
12:59:42 ipsec receive Information.
12:59:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:00:02 ipsec receive Information.
13:00:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:00:02 ipsec sendto Information notify.
13:00:02 ipsec sendto Information notify.
13:00:02 ipsec receive Information.
13:00:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:00:22 ipsec receive Information.
13:00:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:00:22 ipsec sendto Information notify.
13:00:22 ipsec sendto Information notify.
13:00:22 ipsec receive Information.
13:00:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:00:42 ipsec receive Information.
13:00:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:00:42 ipsec sendto Information notify.
13:00:42 ipsec sendto Information notify.
13:00:42 ipsec receive Information.
13:00:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:01:02 ipsec receive Information.
13:01:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:01:02 ipsec sendto Information notify.
13:01:02 ipsec sendto Information notify.
13:01:02 ipsec receive Information.
13:01:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:01:22 ipsec receive Information.
13:01:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:01:22 ipsec sendto Information notify.
13:01:22 ipsec sendto Information notify.
13:01:22 ipsec receive Information.
13:01:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:01:42 ipsec receive Information.
13:01:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:01:42 ipsec sendto Information notify.
13:01:42 ipsec sendto Information notify.
13:01:42 ipsec receive Information.
13:01:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:02:02 ipsec receive Information.
13:02:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:02:02 ipsec sendto Information notify.
13:02:02 ipsec sendto Information notify.
13:02:02 ipsec receive Information.
13:02:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:02:22 ipsec receive Information.
13:02:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:02:22 ipsec sendto Information notify.
13:02:22 ipsec sendto Information notify.
13:02:22 ipsec receive Information.
13:02:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:02:42 ipsec receive Information.
13:02:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:02:42 ipsec sendto Information notify.
13:02:42 ipsec sendto Information notify.
13:02:42 ipsec receive Information.
13:02:42 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:03:02 ipsec receive Information.
13:03:02 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:03:02 ipsec sendto Information notify.
13:03:02 ipsec sendto Information notify.
13:03:03 ipsec receive Information.
13:03:03 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
13:03:22 ipsec receive Information.
13:03:22 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE
13:03:22 ipsec sendto Information notify.
13:03:23 ipsec sendto Information notify.
13:03:23 ipsec receive Information.
13:03:23 ipsec xxx.xxx.xxx.xxx notify: R_U_THERE_ACK
enabled: yes
mode: unicast
primary-ntp: 91.189.91.157
secondary-ntp: 91.189.89.198
dynamic-servers:
status: synchronized
same issue here, log is full of that but under wlan1. RB951GSo, I upgraded to 6.38.5. CAPSMAN log gives me this:
Hi,virtman - We test also CHR before release. This is something specific in your case. Please write to support@mikrotik.com and describe problem and CHR.
So if all parameters on this tab are default ones (default-small and no max-limit), 'Total' queue is actually not being installed. No queue - no statistics.One configuration item in /queue simple' can create from 0 to 3 separate queues - one queue in global-in, one queue in global-out and one queue in global-total. If all properties of a queue have default values (no set limits, queue type is default), and queue has no children, then it is not actually created. This way, for example, creation of global-total queues can be avoided if only upload/download limitation is used.
are those limits in 'total' part, or 'download/upload' only? for the latter, two queues (up and down) are being created, third queue (total) is notbut i have limits in queues. I shape via PCQ
Radar detection is required on some frequencies. Some require just a minute of scanning, others 10 minutes. If no radar is found the AP will go into "running - AP" mode.5GHZ does not work for me - "detecting RADAR".
The same on v6.38.3.
v6.38.1 seems to work though.
P.S. Country: Sweden
viewtopic.php?f=2&t=94303&p=580437&hili ... ot#p580430Before i do something i usually read carefully instruction)))Your device is too old (i.e. it was manufactured before the protected RouterBOOT feature was introduced). If you absolutely need this feature, you will have to update the backup RouterBOOT, which is dangerous (may irrecoverably brick your device if anything goes wrong). You can find more info and the links to a special update packages here.
So, what i do
1) Upgrade ROS to current version
2) Download http://www.mikrotik.com/download/share/ ... 3_tile.dpk and drag'n'drop to file section this file to my routerboard
3) reboot my RB by command /system reboot
4) In logs i don't see any errors, file disappear from file section in winbox.
Forgot to write - it did not help me ((
ip ipsec peer set 0 policy-template-group =*FFFFFFFF
Last Link Down Time Aug/24/2019 15:48:17
Last Link Up Time Aug/24/2019 15:57:16
Time 10:06:17
Date Apr/18/2017
It is not a vulnerability. It is the given devices inability to handle the traffic that your ISP can provide. I suggest to choose a better router for your high speed line. There is no specific version or hardware here. All internet connected devices "suffer" from this. It is simple exhaustion of resources when too much traffic is sent to a public port. Even version 6.34 or older has always acted in the same way. Your issues is most likely unrelated.Anyone seen that Vulnerability? :
http://www.cvedetails.com/cve/CVE-2017-7285/
My RB751G-2HnD gave up on last Saturday. No Packets out from any Port anymore - It ran RouterOS v6.38.5 MIPsBE. Only Netinstall helped, to get it working again ...
Should i downgrade to 6.37.5 to get safe at the moment?
regards, Klemens