yes, check 6.40.9 changelog (or 6.42.7) again, CVE was added afterwards, guess due to coordination? late addition?.6.40.8 is vulnerable to this?
Definitely knowing if best practices avoid the vulnerabilities beforehand would be great, or at least when will that post be published?MAJOR CHANGES IN v6.40.9:
----------------------
!) security - fixed vulnerabilities CVE-2018-1156, CVE-2018-1157, CVE-2018-1158, CVE-2018-1159;
----------------------
mind sharing? been meaning to start one, havent decided how i wanted to do it yet.Ah jeez , time to ring customers and tell them to brace for another set of sec patches.
Well at least the ansible script to autpatch everything will now come in handy I wrote a while ago.
1. YesIf your webserver on the Router is turned off... none of these CVEs are exploitable?
Also the word "authenticated" was used a bunch of times.
Thank you for the clarification!1. YesIf your webserver on the Router is turned off... none of these CVEs are exploitable?
Also the word "authenticated" was used a bunch of times.
2. It means that a RouterOS username and password must be known. The user must log in. Then they can cause www server to crash. Basically this applies only to people with open Webfig interface for Read-only viewing, or such
only webfigHi, great job always!
The fixed vulnerabilities only are involved with webfix at port 80 or also hotspot www service ?
*) hotspot - fixed user authentication when queue from old session is not removed yet;
Hi Normis have you received any supouts of any equipment suffer www/telnet failure after the 6.40.9 ?only webfigHi, great job always!
The fixed vulnerabilities only are involved with webfix at port 80 or also hotspot www service ?
And hopefully not before the new bridge features have completely replaced the functionality of the old bridge menu.Only when 6.41 is mature and stable enough that it itself becomes bugfix
.Hi Normis have you received any supouts of any equipment suffer www/telnet failure after the 6.40.9 ?
.... it seems that we managed to reproduce this problem. We will work on a fix for it and release patched RouterOS version as soon as possible. Please upgrade when you see fix for WWW service becoming unavailable in RouterOS upcoming releases changelog.
Can't you simply use the bridge without VLAN filtering, and continue to use the switch VLAN? I would think the bridge without VLAN filtering would act very similarly to the master port function and should maintain the hardware offload.And hopefully not before the new bridge features have completely replaced the functionality of the old bridge menu.
Right now we are stuck halfway between the old switch method and the new bridge method and this has forced us to keep a number of RB2011 routers where
switch VLAN functionality (at wirespeed) is in use at the bugfix release, and it would be bad when there would be no such release anymore.
Maybe introduce a new release branch at that time? (which keeps classic masterport/switch function until new bridge supports VLAN hw offload)
Indeed. When I upgraded my VLAN infested RB951G from 6.40.x (whatever x was at the time 6.41 became "current") to 6.41, the upgrade process changed bridge config to the new style while it didn't touch VLAN config on switch chip. The same setup happily humms running 6.42.7 and is fully HW offloaded.Can't you simply use the bridge without VLAN filtering, and continue to use the switch VLAN?
Yes to both, I am nearly 100% sure.Yes, but it is unclear if you can re-create this configuration because masterport is no longer defined.
And also if it will still be wirespeed with the bridge interface between it.
If you have bridge VLAN filtering disabled and you it is no longer accelerated at 6.41+, it is because of spanning tree being turned on. Turn off spanning tree on the bridge. We had that issue with an RB3011.On one RB2011 I changed to new config and it is no longer accelerated! (I use ports 2-5+SFP for wirespeed gigabit and ports 6-10 for 100 Mbit individual link ports)
There is no difference between spanning tree off or on. It is off on my RB2011 but it still does not accellerate VLAN switching as it did before 6.41 with the switch setup.If you have bridge VLAN filtering disabled and you it is no longer accelerated at 6.41+, it is because of spanning tree being turned on. Turn off spanning tree on the bridge. We had that issue with an RB3011.On one RB2011 I changed to new config and it is no longer accelerated! (I use ports 2-5+SFP for wirespeed gigabit and ports 6-10 for 100 Mbit individual link ports)
There still is a bridge between it that I did not have in the old config. My old config had only a master-port to which VLAN subinterfaces were directly connected, noThere is no need to stay on bugfix indefinitely, you can move to the new version, just as long as you continue to use the switch VLANs, and have bridge VLAN filtering disabled and STP off, it should act the same as before with full hardware acceleration.
Port Switch1 Interface name
+----------------------+
ether2 ---+ ether2 switch1 cpu +--- ether2
ether3 ---+ ether3 +
ether4 ---+ ether4 +
+----------------------+
Port Switch1 Interface name
+----------------------+
ether2 ---+ ether2 switch1 cpu +--- bridge1
ether3 ---+ ether3 +
ether4 ---+ ether4 +
+----------------------+
I believe I can explain. I'm going to assume that previously you had eth2 as a master port for eth3-5 and eth6 as a master port for 7-10.There still is a bridge between it that I did not have in the old config. My old config had only a master-port to which VLAN subinterfaces were directly connected, no
bridge defined at all. When I update such a config to newer RouterOS (I tried that!) it will create a bridge containing all the ports that had master-port set and this is
an extra layer that I did not have before. You are right that it does not touch the switch setup but it is now unclear what layers the data has to go through.
Yes, I agree completely.It would be better when the switch config is translated into bridge VLAN filter config, and it is accellerated.
The switch menu can then be removed.
No, I have no bridges at all!Now I presume you have two bridges, bridge1 for eth 2-5 and bridge2 for 6-10?
I am confused. You said when you upgraded the device it created a bridge. Now you say you have no bridges on the upgraded device. Which is it?No, I have no bridges at all!
i didnt find any way to restart the service without reboot, isnt it?We need a fast update for web service that is getting down...
OK, thanks!Fix will be included in next version.
add action=mark-connection chain=postrouting comment="QoS_4_5 Small-Large HTTP\
-S, FTP, SSH, Telnet, SMTP, POP3-S, IMAP-S, SMTP-S" connection-mark=\
no-mark new-connection-mark=QoS_4_5-UP out-interface=all-ppp passthrough=\
yes port=20,21,22,23,25,80,110,143,443,465,587,993,995,8080 protocol=tcp
add action=mark-packet chain=postrouting connection-bytes=0-5000000 \
connection-mark=QoS_4_5-UP new-packet-mark=QoS_4-UP passthrough=no
add action=mark-packet chain=postrouting connection-bytes=5000000-0 \
connection-mark=QoS_4_5-UP new-packet-mark=QoS_5-UP passthrough=no
add action=mark-connection chain=prerouting comment="QoS_DW All Download" \
in-interface=all-ppp new-connection-mark=QoS-DW passthrough=yes
add action=mark-packet chain=prerouting connection-mark=QoS-DW \
new-packet-mark=QoS-DW passthrough=no
Is your problem new for 6.40.9? If not, then please do not discuss it in this topic but make your own new topic.I can't explain this:
I have this code in ipv4 mangle:
I dont know if the problem is new or old.Is your problem new for 6.40.9? If not, then please do not discuss it in this topic but make your own new topic.I can't explain this:
I have this code in ipv4 mangle:
You called 6.40.X versions as "Long-Term". How long-term it will be? One year? 2 years ?