You mean the one the patched back in April 2018? Or the one that was patched in March 2017? What really is sad is the amount of Mikrotik users who have let their devices sit unwatched/maintained/updated for months and years on end.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
Have a look at the posting times and my posting is probably the trigger to have Mikrotik posting and take hopefully more public steps.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
What public steps? They fixed it in April!!!!! They are just now telling us "Hey, this is still happening. Make sure you updated." This is just another repeat of VPNFilter when the patch was released a year ago but the malware made news in May (a year later) and people demanded to know what Mikrotik was doing *RIGHT NOW* about it despite the fact they addressed it a year ago.Have a look at the posting times and my posting is probably the trigger to have Mikrotik posting and take hopefully more public steps.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
Who could dream (nightmare) that your router hands out it's most secret information to everyone that asked for it.You mean the one the patched back in April 2018? Or the one that was patched in March 2017? What really is sad is the amount of Mikrotik users who have let their devices sit unwatched/maintained/updated for months and years on end.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
And that statement right there is the crux of the issue.The sad part is that owners/admins DO NOT CARE.
I'm not arguing the point that there was a vulnerability that was pretty major but it was addressed months ago when it became public knowledge. Asking what they are doing today over something they addressed already just means no one is really paying attention to what Mikrotik is doing and putting out. They seem only care (freak out) when a random website blog tells them about it.Who could dream (nightmare) that your router hands out it's most secret information to everyone that asked for it.You mean the one the patched back in April 2018? Or the one that was patched in March 2017? What really is sad is the amount of Mikrotik users who have let their devices sit unwatched/maintained/updated for months and years on end.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
Sorry, but you must have seen that we are pushing to get up to speed in communicating important stuff.What public steps? They fixed it in April!!!!! They are just now telling us "Hey, this is still happening. Make sure you updated." This is just another repeat of VPNFilter when the patch was released a year ago but the malware made news in May (a year later) and people demanded to know what Mikrotik was doing *RIGHT NOW* about it despite the fact they addressed it a year ago.Have a look at the posting times and my posting is probably the trigger to have Mikrotik posting and take hopefully more public steps.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
Now they care and have seen some go mad in their first posting.And that statement right there is the crux of the issue.The sad part is that owners/admins DO NOT CARE.
I am sure the Win box could display minimal recommend RouterOS version in Winbox and keep that in view as long you are legging behind.@msatter:
How do you expect that Mikrotik could MORE persuade people to upgrade if they (users not Mikrotik) do not care? It is not a matter how many infos Mikrotik will publish. If admin/user/owner do not care than it is not a problem of Mikrotik.
Do you think that other comapnies call or mail each customer to inform about their security problems?
You understand how this works, right? Cisco isn't going to get an alert from some security group/person on Monday that's "Oh there's a major exploit" and then announce it on Tuesday to their users. Why? Because they probably don't have a fix for it yet and announcing it could make something that only a small group (Cisco and the reporters) may know exists just puts a target on all the possibly infected devices before they could push a fix for them. It might take Cisco *weeks* to disclose this exploit to their users so they can determine how serious it is, how to fix it and release said fix for the users so the announcement is "There's an exploit, please update to X version for the fix along with X, Y, Z to ensure you're not compromised".Sorry, but you must have seen that we are pushing to get up to speed in communicating important stuff.What public steps? They fixed it in April!!!!! They are just now telling us "Hey, this is still happening. Make sure you updated." This is just another repeat of VPNFilter when the patch was released a year ago but the malware made news in May (a year later) and people demanded to know what Mikrotik was doing *RIGHT NOW* about it despite the fact they addressed it a year ago.Have a look at the posting times and my posting is probably the trigger to have Mikrotik posting and take hopefully more public steps.Mikrotik staff already posted a reminder for users to upgrade.
More info here viewtopic.php?f=21&t=137572
The sad part it's that the exploit is more than two months old....
IT IS TOO LATE NOW and the bad news had to been pushed down everyones throat in the past months
Hmmmmmm you are giving me an idea.@msatter
Do you think that all 70 000 users of hacked devices in Brazil do even know what WinBox is?
I did think which reading this post that maybe the firewall should default to deny with no rules, so you have to explicitly allow everything you want to go through.I think he means the default action of "if not filters apply", which is a non issue given the factory "default" firewall filters.
I did think which reading this post that maybe the firewall should default to deny with no rules, so you have to explicitly allow everything you want to go through.I think he means the default action of "if not filters apply", which is a non issue given the factory "default" firewall filters.
Some people would just stick an allow all in of course. It's amazing how many people leave the router open (even IT people) because it's easier for them to get remote access, or don't want to spend the time creating rules to match only the specific services they need to use.
As it was already pointed out, the default firewall rules do that. They block all until allowed by the user.I did think which reading this post that maybe the firewall should default to deny with no rules, so you have to explicitly allow everything you want to go through.I think he means the default action of "if not filters apply", which is a non issue given the factory "default" firewall filters.
I was referring to a implicit block that everything hits even if the firewall is empty (of course thought would have to be put in to what to do if someone deletes all the rules). Lots of people replace the firewall rules, and for some reason some decide to try and block certain things, rather than just allow what they want and drop the rest. It's also very common for people to mess with the firewall until their requirements work, but not consider what has been left open in the process. Not that I'm genuinely suggesting it; I like having full control over the firewall - but then I always end with a drop *ALL* forward/input anyway.As it was already pointed out, the default firewall rules do that. They block all until allowed by the user.
If hackers can login and change the config. then all anybody else needs to do is login and update the software. Job done. Simple.I'm not really sure what Mikrotik can do about the kit out there that still isn't patched. These routers probably haven't been logged into at all for years.
This is basically the set of default rules I have found on every device I've gotten from Mikrotik. Until I add proper rules, either firewall or NAT, I cannot access the router or the devices behind it remotely because it would drop all my traffic since it lacks proper rules.
This already addressed for quite some time using interface lists in default configuration.Also the default rules are all very well until you add a pppoe client
This already addressed for quite some time using interface lists in default configuration
As you stated "people to mess with the firewall", default allow changed to default drop will not improve anything.
1200 is not a home router, if you buy it you have to know what you are doing.
@AlainCasault
1200 is not a home router, if you buy it you have to know what you are doing.
Unfortunately the default configuration is determined when the device is first powered up.This already addressed for quite some time using interface lists in default configuration.Also the default rules are all very well until you add a pppoe client
If you, as average driver using standard cars, buy big american truck with 24 or more step gearbox, do you expect that this truck will have all bells and whistles installed to protect itself from being destroyed? Should gearbox constructor expect that someone unfamiliar with this technology and untrained will use it with 30 ton load?You have to know what you're doing with all this kit really unless you can just plug it in with the default config and not touch it, which goes back to the original issue. Lots of people buy this kit with no real expertise, and lots of people have these routers installed with no ongoing support and don't even know what it is.
Since the post has gone away from the initial topic and deviated into trying to find solutions to improve the overall experience, this might be the time to argue that indeed there are place were Mikrotik could do better.(a similar issue exists in the IPv6 default config which is not loaded unless you reset to defaults AFTER enabling the IPv6 package, which
lots of users probably will not do, and they end up with an empty allow-all firewall for IPv6)
True but this is just one video that I found by a quick search, I have seen another (that I did not find so quickly now) that works from a default config but still forgets to correct the firewall.That particular video has nothing to do with default configuration. He removes default configuration and makes everything from scratch, basically showing how not to configure your router.
That was the basic firewall :
...........you will will be using the old firewall config, as is aptly shown above where user Samot pasts his default firewall which is the old vulnerable type.
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=input comment="defconf: drop all from WAN" in-interface=ether1
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related" connection-state=established,related
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface=ether1
add action=accept chain=input comment="defconf: accept established,related,untracked" connection-state=established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" connection-state=established,related
add action=accept chain=forward comment="defconf: accept established,related, untracked" connection-state=established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
Does the latest bugfix fix this, or do we need to be on 6.42? I don't really like using non-bugfix releases. If it isn't, can you guys work to update bugfix?There was a bug that allowed to find out passwords configured on the router. After that hacker can use them and log into router as a normal user. Then he can do whatever he wants. Upgrade will close this vulnerability, but if password is not changed, then hacker can still connect.
Hacker connects to the router and adds configuration - scripts, schedulers, enables SOCKS, etc. RouterOS filesystem is not affected. Only changes made by hacker are into RouterOS configuration.
What's new in 6.40.8 (2018-Apr-23 11:34):
!) winbox - fixed vulnerability that allowed to gain access to an unsecured router
It is already like that! There could be a minor improvement: to update the default firewall when a new version is loaded with another default firewall.Is it not possible to integrate Firewall default rules into Mikrotik devices so that the user can not delete them, just turn off (ON-Off)?
Create default options so that we only open what is needed. No default open 21.22.23 port. For example, if you need to add a firewall filter, this could be done as before, but it would not affect the default configuration in any way.
It would be ideal if mikrotik were to think of a case like a built-in firewall from the factory, which can be disabled if necessary, but then the normal user saw the message - your router is not protected or similar. That would improve the situation.
I am all for an auto-update function. Configurable of course.The same goes for downloading updates. Create a simple section with a check-in option - Allow auto updates. If you do not want to - no check-in
I have bookmarked for Mikrotik and AVM now. AVM had a good run after the last containment of the VOIP vulnerability. ISP often offer also VOIP and the had to compensate customers for the expenseive calls made due to this vulnerability.Hands up who is daily following CVE news?
As you care about IT-security, and you're right to do so. I asume you're using some sort of password-manager so the password isn't related to you.According to the European Commission, "personal data is any information relating to an individual, whether it relates to his or her private, professional or public life. It can be anything from a name, a home address, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer's IP address."[7]
tell that to the several routers which were compromised today, running 6.40.8.Yes, last bugfix 6.40.8 is fine (+ change your passwords after upgrading, restore your configuration and inspect it for unknown settings, implement a good firewall)
What's new in 6.40.8 (2018-Apr-23 11:34):
!) winbox - fixed vulnerability that allowed to gain access to an unsecured router