What package?..a new wireless driver package for 802.11ac
Do you have any specific information about something to happen?Will a new wireless driver package for 802.11ac be released in 6.45 or is it planned for a later RouterOS version?
Normis told that in an another thread, but he did not say it will happen this yearDo you have any specific information about something to happen?Will a new wireless driver package for 802.11ac be released in 6.45 or is it planned for a later RouterOS version?
Maybe waiting MU-MIMO?What package?..a new wireless driver package for 802.11ac
The new package is in ROS v7 along with every other fix needed.
I reported this problem to mt support.*) bridge - fixed possible memory leak when using "ingress-filtering=yes" on bridge interface;
How did this bug manifest itself?? Been using this setup for a while and didnt notice any issues, on the other hand I dont really monitor that closely.
Found it:Normis told that in an another thread, but he did not say it will happen this yearDo you have any specific information about something to happen?Will a new wireless driver package for 802.11ac be released in 6.45 or is it planned for a later RouterOS version?
For testing purposes a second wireless package would be great.You are right, that MikroTik made wireless driver doesn't have Wave2 support, so new chipset benefits are not there. We are working on a new driver.
There are .ax Chipsets available for a while now. I guess all WISP vendors do at least some testing in Lab now. So they have to touch wireless package to make them work.Do you have any specific information about something to happen?Will a new wireless driver package for 802.11ac be released in 6.45 or is it planned for a later RouterOS version?
Don´t cry for next new Hardware, we had to wait over 12 Month for new Arm Chipsets to get running in most cases, most here had buyed 802.11n Hardware until there is no working 802.11ac available from Mikrotik, Wave2 is completely unsupported (most available devices from MT has Wave 2 Chipset).
So don´t cry for something new, cry for something working.
And this features will not work without working driver, and since MT write there own Drivers this features need to implement.
With 802.11ax the chipsetvendors have to put a lot of stuff into the chipset which helps WISPs. There is Scheduling, there is OFDMA. MT do not have to implement it. It is just there and it is vendor neutral. This is the way to go as fast as possible.
You try to ride a dead horse ...
would be great to get this fix also to stable 6.44. Very annoying.*) ipsec - fixed dynamic L2TP peer and identity configuration missing after reboot (introduced in v6.44);
Emils*) e-mail - fixed missing "from" address for sent e-mails (introduced in v6.44);
Hi emils, when this bgp problem will be fix ?Somehow we have lost these change log entries in 6.44beta50 release. I will add them to 6.44 change log. Sorry for the error.
*) e-mail - added support for multiple transactions on single connection;
*) log - accumulate multiple e-mail messages before sending;
This is excellent news - does this also work with DHCPv6 servers over PPP (ex. PPPoE)?*) dhcpv6-server - added RADIUS accounting support;
plz more info about this. syntax? format? etc*) dhcpv4-server - added "vendor-class-id" matcher (CLI only);
if substring(binary-to-ascii(16, 8, ":", hardware), 0, 9) = "1:0:4:13:" {
# 1: prefix = Ethernet, SNOM phone MAC address prefix (00:04:13)
filename "";
} elsif option unknown-93 = 00:07 {
#pxe-system-type or arch
filename "pxe/efi/bootx64.efi";
} else {
filename "pxe/pxelinux.0";
}
+++Would be really useful to have if then logic within DHCP.
The following snippet servers no file to Snom VoIP phone, x64 EFI PXE executable to UEFI PXE devices and normal PXE binary to compatibility devices.
From ISC DHCP subnet declaration:Code: Select allif substring(binary-to-ascii(16, 8, ":", hardware), 0, 9) = "1:0:4:13:" { # 1: prefix = Ethernet, SNOM phone MAC address prefix (00:04:13) filename ""; } elsif option unknown-93 = 00:07 { #pxe-system-type or arch filename "pxe/efi/bootx64.efi"; } else { filename "pxe/pxelinux.0"; }
OK, any plans to make use for IPSec possible? And for ed25519 curve?EC certificates can be used only for www services. Ipsec does not support them.
That is supposed that was fixed on 6.44 stable............
*) bridge - fixed possible memory leak when using "ingress-filtering=yes" on bridge interface;
EC key exchanges are much faster than RSA, because the keysize is much smaller.IKE2 rfc states the use of RSA.
What would be the client devices that support EC? Why exactly you need this?
This .
*) rb4011 - fixed SFP linking (introduced in v6.45beta6);
IKE2 rfc states the use of RSA.
What would be the client devices that support EC? Why exactly you need this?
In the scenario where an ISP doesn't provide a static IP to it's client, instead using Dynamic IP or PPPoE with a dynamic IP. In such cases, a DDNS hostname is always needed to achieve VPN/Online Cameras/RDP. But when it comes to doing an IPSec VPN setup with a Mikrotik router, the hostnames can't be used as you can't enter them into sa-dst-address, thereby forcing you to go make a script and putting that script on a scheduler.In what scenario? If it's road warrior (typical when src is unknown or when src has dynamic IP) then policies should be already auto generated.
Hi,
*) dhcpv4-server - added "vendor-class-id" matcher (CLI only);
++In the scenario where an ISP doesn't provide a static IP to it's client, instead using Dynamic IP or PPPoE with a dynamic IP. In such cases, a DDNS hostname is always needed to achieve VPN/Online Cameras/RDP. But when it comes to doing an IPSec VPN setup with a Mikrotik router, the hostnames can't be used as you can't enter them into sa-dst-address, thereby forcing you to go make a script and putting that script on a scheduler.In what scenario? If it's road warrior (typical when src is unknown or when src has dynamic IP) then policies should be already auto generated.
Edit: Non-road warrior basically.
Code: Select all
ROS Update, reboot
Wireless interface disappeared
Routerboot update, reboot
Wireless interface disappeared
reboot
Wireless interface disappeared
Log: DefConf gen: Unable to find Wireless interface(s)
You're right, but I usually need all my phones to be on the same network.You can specify DHCP option set per DHCP network.
RouterBOARD 962UiGS-5HacT2HnTafter the update to 6.45beta19 the wireless interface can no longer be found.
Model: SXT HG5 ac
Code: Select all
ROS Update, reboot
Wireless interface disappeared
Routerboot update, reboot
Wireless interface disappeared
reboot
Wireless interface disappeared
Log: DefConf gen: Unable to find Wireless interface(s)
The same problem on AR5008 (711GA-5HnD). Please check it.In RouterOS 6.45beta19 there is a known bug that 5GHz WLAN interface disappears. Affects only specific devices - those that have wireless 5GHz interface-type=Atheros AR9888.
Downgrading back to 6.45beta16 or earlier returns the interface.
Thank you Mikrotiker and kitit for reporting.
In RouterOS 6.45beta19 there is a known bug that 5GHz WLAN interface disappears. Affects only specific devices - those that have wireless 5GHz interface-type=Atheros AR9888.
Hi,Hi, all!
I can confirm, that 5ghz band does not work on RouterBOARD M33G with Athereros 5008 pci-e card installed.
Also upgrade of any of my mipsbe (mAP 2n,mAP L-2nD) platform fails, because ipv6 package is broken.
-----------------
Mar/23/2019 10:54:24 system,error broken package system-6.45beta19-mipsbe.npk
Mar/23/2019 10:54:24 system,error can not install ipv6-6.45beta19: system-6.45beta19 is not installed, but is required
Mar/23/2019 10:54:24 system,info router rebooted
-----------------
Arnis
Thank you for this in beta 19!Will this be fixed please so that EC certificates can be used for IPSec auth?
Yes, can't wait to use this! Is there a way to use it with public key authentication?*) fetch - added SFTP support;
Version 6.45beta22 has been released.
!) ipv6 - fixed soft lockup when forwarding IPv6 packets (CVE-2018-19299);
!) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table (CVE-2018-19298);
Sorry, but CVE-2018-19299 is not fixed in 6.45beta22.will it be backported to versions 6.40.x and 6.43.x?Version 6.45beta22 has been released.
!) ipv6 - fixed soft lockup when forwarding IPv6 packets (CVE-2018-19299);
!) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table (CVE-2018-19298);
1. ipv6 - thanks for the CVE fixes, hope to see them in stable/long-term soon. Then, with this out of the way, please work on Delegated-IPv6-Prefix for PPPoE so many people can actually deploy IPv6What's new in 6.45beta22 (2019-Mar-29 08:37):
!) ipv6 - fixed soft lockup when forwarding IPv6 packets (CVE-2018-19299);
!) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table (CVE-2018-19298);
*) w60g - prefer AP with strongest signal when multiple APs with same SSID present;
As soon as it’s readyand when release for stable channel ?!
That's not what they are saying here viewtopic.php?f=2&t=147048it can not be considered as a bug or vulnerability
I agree with the technical assessment above: if someone else tries to reach 1 million hosts in your network and you have less than 500Mb of free RAM, then your router will crash.Seems that one of these was considered as CVE and another one was not. Since author of these CVEs still has a problem, seems that actually #1 was not included in this CVE. However, this "problem" actually is not much of an issue. RouterOS IPv6 route cache max size by default is 1 million. If you try to reach 1 million hosts in your network, route cache grows and can take up to 500 MB. If you have device that does not have such resources, it will reboot itself. If router has, for example, 1 GB of RAM - there is no problem. We will most likely allow to change cache size or will decide its size based on RAM size. However, it can not be considered as a bug or vulnerability. You make router work and then complain that resources are required to do the job. This is not a bug.
As a side note, now that MikroTik has publicly released full details about the vulnerability, I hope nobody is going to be worried about what I am presenting on April 9th. The content of the talk will not increase the risk to your networks.Seems that one of these was considered as CVE and another one was not. Since author of these CVEs still has a problem, seems that actually #1 was not included in this CVE. However, this "problem" actually is not much of an issue. RouterOS IPv6 route cache max size by default is 1 million. If you try to reach 1 million hosts in your network, route cache grows and can take up to 500 MB. If you have device that does not have such resources, it will reboot itself. If router has, for example, 1 GB of RAM - there is no problem. We will most likely allow to change cache size or will decide its size based on RAM size. However, it can not be considered as a bug or vulnerability. You make router work and then complain that resources are required to do the job. This is not a bug.
Actually there is at least one person in that thread that confirmed when taking their CHR from 300MB RAM to 3GB RAM the issue goes away. That does sound like a memory resource problem there. Let's just not assume that because they are running CHR they must have all the resources in the world. The youtube videos that were posted about this issue and showing the CHR crashing was a CHR with 256MB RAM. If people are saying their CCR's are crashing over this I would then ask, which model of the CCR? Because if it's the 1009 series, I could see it having an issue since it has 1GB RAM and this issue can eat up over 500MB on its own it could cause the CCR1009's to have issues.That's not what they are saying here viewtopic.php?f=2&t=147048it can not be considered as a bug or vulnerability
They are talking about CCR's and CHR's crashing I don't know what more resources people need.
These IPv6 problems aren’t new or present really a huge danger with properly configured environment. If you expect a small router with 64MB of the memory to handle a lot of incoming connections you’re already in trouble with contrack.
There were two IPv6 related issues resolved in this version:
1) IPv6 packet forwarding might get stuck (due to IPv6 route cache processing) that could lead to Watchdog reboot;
2) IPv6 neighbor table processing might get stuck (due to large neighbor table) that could lead to Watchdog reboot.
Seems that one of these was considered as CVE and another one was not. Since author of these CVEs still has a problem, seems that actually #1 was not included in this CVE. However, this "problem" actually is not much of an issue. RouterOS IPv6 route cache max size by default is 1 million. If you try to reach 1 million hosts in your network, route cache grows and can take up to 500 MB. If you have device that does not have such resources, it will reboot itself. If router has, for example, 1 GB of RAM - there is no problem. We will most likely allow to change cache size or will decide its size based on RAM size. However, it can not be considered as a bug or vulnerability. You make router work and then complain that resources are required to do the job. This is not a bug.
Actually, it's. In networking cache-based forwarding has been considered harmful for reasons such as this problem, and replaced by topology-based forwarding. So it at least one the bugs shouldn't even exist. But even topology-based systems require neighbour tables, so this one needs to be managed both in size and in rate, while also managing rate of packets targeted at in progress neighbours.There were two IPv6 related issues resolved in this version:
1) IPv6 packet forwarding might get stuck (due to IPv6 route cache processing) that could lead to Watchdog reboot;
2) IPv6 neighbor table processing might get stuck (due to large neighbor table) that could lead to Watchdog reboot.
Seems that one of these was considered as CVE and another one was not. Since author of these CVEs still has a problem, seems that actually #1 was not included in this CVE. However, this "problem" actually is not much of an issue. RouterOS IPv6 route cache max size by default is 1 million. If you try to reach 1 million hosts in your network, route cache grows and can take up to 500 MB. If you have device that does not have such resources, it will reboot itself. If router has, for example, 1 GB of RAM - there is no problem. We will most likely allow to change cache size or will decide its size based on RAM size. However, it can not be considered as a bug or vulnerability. You make router work and then complain that resources are required to do the job. This is not a bug.
Congratulations! I have tested this beta and I confirm that with 300 Mb RAM the router's memory doesn't fill. A CHR with 300 Mb of RAM with OSPF-v3 has 237 Mb of free-memory and during the attack it keeps on around 200 Mb.Version 6.45beta23 has been released.
What's new in 6.45beta23 (2019-Apr-01 05:51):
!) ipv6 - fixed soft lockup when forwarding IPv6 packets;
!) ipv6 - fixed soft lockup when processing large IPv6 Neighbor table;
----------------------
I concur.Congratulations! I have tested this beta and I confirm that with 300 Mb RAM the router's memory doesn't fill. A CHR with 300 Mb of RAM with OSPF-v3 has 237 Mb of free-memory and during the attack it keeps on around 200 Mb.
Hopefully this fix will be in long-term and current branches soon.
Or targeting somebody else, but transiting your routers on the way. But you make good points. It's still a serious issue though.You need someone targeting you with an attack.
Quite simple. Do a traceroute to a customer. Identify the BGP-Gateway. Start Attack. Any WISP doing not IPV6 now ?Its not that your router will go down if you do not install a fix for IPv6 to your router.
You need IPv6 enabled.
You need some that know you are running IPv6.
You need someone targeting you with an attack.
That is true.You will find humans doing this just for fun.
New connection: 5.188.86.165:64944 (10.10.10.50:2222) [session: 42d69d743f2c]
Remote SSH version: 'SSH-2.0-Go'
login attempt [root/admin] succeeded
direct-tcp connection request to ya.ru:80 from 0.0.0.0:0
Connection lost after 0 seconds
New connection: 189.46.216.87:38040 (10.10.10.50:2223) [session: 8a47a991d959]
login attempt [root/1234] succeeded
enable
system
shell
sh
cat /proc/mounts; /bin/busybox LPPBJ
cd /dev/shm; cat .s || cp /bin/echo .s; /bin/busybox LPPBJ
tftp; wget; /bin/busybox LPPBJ
dd bs=52 count=1 if=.s || cat .s || while read i; do echo $i; done < .s
/bin/busybox LPPBJ
rm .s; exit
Connection lost after 2 seconds
New connection: 46.48.231.3:43837 (10.10.10.50:2222) [session: ababf7a7cf75]
Remote SSH version: 'SSH-2.0-libssh2_1.8.1'
login attempt [root/root] failed
login attempt [root/admin] succeeded
/ip cloud print
ifconfig
uname -a
cat /proc/cpuinfo
ps | grep '[Mm]iner'
ps -ef | grep '[Mm]iner'
echo Hi | cat -n
Connection lost after 33 seconds
New connection: 189.46.216.87:38040 (10.10.10.50:2223) [session: 8a47a991d959]
login attempt [root/1234] succeeded
enable
system
shell
sh
cat /proc/mounts; /bin/busybox LPPBJ
cd /dev/shm; cat .s || cp /bin/echo .s; /bin/busybox LPPBJ
tftp; wget; /bin/busybox LPPBJ
dd bs=52 count=1 if=.s || cat .s || while read i; do echo $i; done < .s
/bin/busybox LPPBJ
rm .s; exit
Connection lost after 2 seconds
New connection: 46.48.231.3:43837 (10.10.10.50:2222) [session: ababf7a7cf75]
Remote SSH version: 'SSH-2.0-libssh2_1.8.1'
login attempt [root/root] failed
login attempt [root/admin] succeeded
/ip cloud print
ifconfig
uname -a
cat /proc/cpuinfo
ps | grep '[Mm]iner'
ps -ef | grep '[Mm]iner'
echo Hi | cat -n
Connection lost after 33 seconds
/ip neighbor discovery-settings
set discover-interface-list=WAN
set discover-interface-list=!WAN
Before we start discussing any advanced features... How does this work at all? Looks like mode=sftp is not a valid syntax for fetch.Yes, can't wait to use this! Is there a way to use it with public key authentication?*) fetch - added SFTP support;
Version 6.45beta31 has been released.
*) wireless - improved wireless country settings for EU countries;
Not all frequency ranges had designation "indoor only" or "outdoor only". One range was incorrectly labeled, this is fixed now. 5250-5330 now is correctly marked as indoor.
A dream come true!Version 6.45beta31 has been released.
*) ipsec - replaced policy SA address parameters with peer setting;
What, exactly, these two mean?Version 6.45beta31 has been released.
*) ipsec - general improvements in policy handling;
*) ipsec - use tunnel name for dynamic IPsec peer name;
!) dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
after upgrading RB3011 from Beta 27 to Beta 31, I was no longer been able to access the device by IP nor mac address via winbox or browser.Version 6.45beta31 has been released.
I had the same issue on a RB4011, plugging pc in another port did the trick.after upgrading RB3011 from Beta 27 to Beta 31, I was no longer been able to access the device by IP nor mac address via winbox or browser.Version 6.45beta31 has been released.
There was no error on the device display, dhcp server failed to assign any IP and setting manual ip address did not help either. So I reset the config and restored the backup config file, same issue.
The only solution was: downgrade to Beta 27 and restore the backup.
The issue on my RB3011 affects all of the ports, connecting to different port/switch didn't fix the issue for me.
I had the same issue on a RB4011, plugging pc in another port did the trick.
Happens to me, too.I have an CHR install which capsman is running. On 6.45beta27 I noticed that when I try to see on winbox the "Configurations" tab under Capsman settings or "CAP Interface", winbox close/crash without any error on Log window. I also updated to latest beta (6.45beta31) and sitll issue persist. My winbox is v3.18.
Anyone has same issue?
By my experience, sometime, crash of winbox produces autosupout. If you get it, it would be good if you can send it to mikrotik support so they can fix itHappens to me, too.I have an CHR install which capsman is running. On 6.45beta27 I noticed that when I try to see on winbox the "Configurations" tab under Capsman settings or "CAP Interface", winbox close/crash without any error on Log window. I also updated to latest beta (6.45beta31) and sitll issue persist. My winbox is v3.18.
Anyone has same issue?
I just send the autosupport.rif. thank you for your adviceBy my experience, sometime, crash of winbox produces autosupout. If you get it, it would be good if you can send it to mikrotik support so they can fix itHappens to me, too.I have an CHR install which capsman is running. On 6.45beta27 I noticed that when I try to see on winbox the "Configurations" tab under Capsman settings or "CAP Interface", winbox close/crash without any error on Log window. I also updated to latest beta (6.45beta31) and sitll issue persist. My winbox is v3.18.
Anyone has same issue?
I think this hit me a lot in the past... Hope this will make its way into next stable release.*) lte - fixed session reactivation on R11e-LTE in UMTS mode;
Quite probably ... when 6.45 branch will be the stable branch.I think this hit me a lot in the past... Hope this will make its way into next stable release.
I hope for 6.44.3.Quite probably ... when 6.45 branch will be the stable branch.I think this hit me a lot in the past... Hope this will make its way into next stable release.
Oh man, that would be awesome!!) dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
I hope I can use this to authenticate to AT&T fiber services directly. I'll need a certificate, but that's obtainable.
So this means wired 802.1x is now supported I guess. Any idea how we can configure this through CLI ?
What's new in 6.45beta31 (2019-Apr-12 10:29):
MAJOR CHANGES IN v6.45:
----------------------
!) dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
----------------------
Changes in this release:
!) dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
So this means wired 802.1x is now supported I guess. Any idea how we can configure this through CLI ?
Also is there a planned GUI support version of it coming soon ?
Before anyone asks. Configuration options for dot1x are not yet enabled in this release. Coming in next beta, most likely next week.
/ip ipsec peer
add exchange-mode=ike2 name=router passive=yes
/ip ipsec policy group
add name=RoadWarrior
/ip pool
add name=vpn2 ranges=192.168.90.2-192.168.90.254
/ip ipsec mode-config
add address-pool=vpn2 name=RW-cfg split-include=\
192.168.88.0/24,192.168.89.0/24,192.168.90.0/24
/ip ipsec identity
add generate-policy=port-strict mode-config=RW-cfg my-id=\
fqdn:router.mydns.com peer=router policy-template-group=RoadWarrior
/ip ipsec policy
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \
template=yes
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \
template=yes
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \
template=yes
add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\
0.0.0.0/0 template=yes
/ip ipsec policy group
add name=RoadWarrior
/ip pool
add name=vpn2 ranges=192.168.90.2-192.168.90.254
/ip ipsec mode-config
add address-pool=vpn2 name=RW-cfg split-include=\
192.168.88.0/24,192.168.89.0/24,192.168.90.0/24
/ip ipsec peer
add exchange-mode=ike2 passive=yes
/ip ipsec policy
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \
template=yes
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \
template=yes
add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \
template=yes
add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\
0.0.0.0/0 template=yes
Almost certain way would be netinstall directly to desired ROS version. And then import config from textual export.Any way to empty ipsec and upgrade to 6.44.2 or 6.45betas without CPU spinning at 100%?
I'm leaving the place where the machine that failed to upgrade yesterday is in a few hours, not to return in more than one month... I could upgrade/downgrade remotely, but certainly not netinstall.Almost certain way would be netinstall directly to desired ROS version. And then import config from textual export.Any way to empty ipsec and upgrade to 6.44.2 or 6.45betas without CPU spinning at 100%?
Looks similar to the problem I had with 6.44. Bad news is, I had to netinstall to get rid of the broken parts, caused by the migration of configuration, when I up/down-graded the firmware.After I had big problems with ipsec in 6.44.1/hAP ac I remained using 44.1 for a while. Thinking that beta31 had already those issues fixed, I tried to upgrade with the following IPsec configuration:
After the upgrade, the CPU was 100%, most of it in ipsec, and / export would stopCode: Select all/ip ipsec peer add exchange-mode=ike2 name=router passive=yes /ip ipsec policy group add name=RoadWarrior /ip pool add name=vpn2 ranges=192.168.90.2-192.168.90.254 /ip ipsec mode-config add address-pool=vpn2 name=RW-cfg split-include=\ 192.168.88.0/24,192.168.89.0/24,192.168.90.0/24 /ip ipsec identity add generate-policy=port-strict mode-config=RW-cfg my-id=\ fqdn:router.mydns.com peer=router policy-template-group=RoadWarrior /ip ipsec policy add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \ template=yes add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\ 0.0.0.0/0 template=yes
after /ip hotspot, just where /ip ipsec should be printed, until I Ctrl-C it.
Same problem as before. The router was sluggish but I could select long-term and downgrade to 6.43.13.
Then the machine went up, but ssh was not responding. I got suspicious and checked: telnet was working. When
I got in, security was disabled. I went in, re-ebabled it, rebooted and the following IPsec configuration appeared:I copied away the ipsec config, which was broken in any case, and tried an experiment: remove all ipsec config, piece by pieceCode: Select all/ip ipsec policy group add name=RoadWarrior /ip pool add name=vpn2 ranges=192.168.90.2-192.168.90.254 /ip ipsec mode-config add address-pool=vpn2 name=RW-cfg split-include=\ 192.168.88.0/24,192.168.89.0/24,192.168.90.0/24 /ip ipsec peer add exchange-mode=ike2 passive=yes /ip ipsec policy add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \ template=yes add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\ 0.0.0.0/0 template=yes
until /ip ipsec export would produce an empty comment. Then I upgraded to get:
* 6.44.2 (100% CPU, could not get /ip ipsec export working)
* 6.45beta31 (same, 100% CPU, could not get /ip ipsec export working).
Is RouterOS keeping all configs hidden somethere, or where is this 100% CPU spinning coming from?
I settled by returning to long term and reconstructing my ipsec config, changing it to xauth and adding users. It is now working well... I was trying to test ike2,
but instead I'm now stuck in long-term.
Any way to empty ipsec and upgrade to 6.44.2 or 6.45betas without CPU spinning at 100%?
Thanks for any help, things are getting messy in this router. Other routers are having no problems at all with ipsec/6.44/6.54beta. I have a production h AP ac running 6.44, as I'm afraid to update it and get the same behaviour
When dot1x become official, will it be applied to all switches (Router OS based as well as Switch OS)?Before anyone asks. Configuration options for dot1x are not yet enabled in this release. Coming in next beta, most likely next week.
Also, I tried to netinstall once and was not working, it seems to be really tricky with linux machines and difficult reset procedures...
@pcunite - Can you provide a pointer to how to obtain the certificate? Currently, Still need to have the AT&T Modem attached while booting, but thereafter running directly on the fiber via the OSP port (behind a Cienna 5000 series building concentrator)!) dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
I hope I can use this to authenticate to AT&T fiber services directly. I'll need a certificate, but that's obtainable.
I have no switch, I connected them straight, which gives perfect connection. Not sure if this could interfere with netinstallConnect your machine and router to an switch, then run netinstall with Wine as sudo and will work flawlessly.Also, I tried to netinstall once and was not working, it seems to be really tricky with linux machines and difficult reset procedures...
I could not in a mAP Lite which I have as laboratory in several tries.
I didn't had problems with netinstall on 3 mAP and all of them installed ROS on the first try with no fails.
I'm using wine 4.5 with staging patch.
dot1x - added support for IEEE 802.1X Port-Based Network Access Control (CLI only);
I hope I can use this to authenticate to AT&T fiber services directly. I'll need a certificate, but that's obtainable.
@pcunite - Can you provide a pointer to how to obtain the certificate? Currently, Still need to have the AT&T Modem attached while booting, but thereafter running directly on the fiber via the OSP port (behind a Cienna 5000 series building concentrator)
Anyone seeing trouble with IPSec in 6.45beta34?
I received a new RB 4011 today - updated to 6.45beta34 right away - rebuilt my config (copy / pasted snippets from .asc file, piece by piece).
My IPSec tunnels come (GRE, cert auth) come up partially to "SA established" on the server - and then get "deleted" from the RB 4011 side. And it repeats like this, with policy stuck as "no phase 2".
Tried switching from ECDSA to RSA certificates (I have a script) - no difference.
Downgraded to 6.44.2 - after fixing "local address" in polices (required in 6.44, can be left as 0.0.0.0/0 in 6.45) - they got to "established" immediately.
Upgraded to 6.45beta34 again - broken again.
Should I send a support request with supout.rif?
PS - one of my two *idential* tunnels - I mean they use same CA, just different "remote" certs - got to "established" once or twice without my doing anything. But disabling / re-enabling the policy brought the problem back.
PPS - changed SA proposal from aes128-ctr to aes256-gcm and now both policies / peers are working, I can disable / re-enable.
But I had them at aes256-gcm initially! Changed back to aes128-ctr and working again!
Seems like there is something funny going on in 6.45-31 maybe with programming the cpu according to encryption settings (both aes-ctr and aes-gcm are HW accel on this device).
Change main mode frome IKE2 to main for example. Should be work. I think that on the newest beta IKE2 doesn't workLooks similar to the problem I had with 6.44. Bad news is, I had to netinstall to get rid of the broken parts, caused by the migration of configuration, when I up/down-graded the firmware.After I had big problems with ipsec in 6.44.1/hAP ac I remained using 44.1 for a while. Thinking that beta31 had already those issues fixed, I tried to upgrade with the following IPsec configuration:
After the upgrade, the CPU was 100%, most of it in ipsec, and / export would stopCode: Select all/ip ipsec peer add exchange-mode=ike2 name=router passive=yes /ip ipsec policy group add name=RoadWarrior /ip pool add name=vpn2 ranges=192.168.90.2-192.168.90.254 /ip ipsec mode-config add address-pool=vpn2 name=RW-cfg split-include=\ 192.168.88.0/24,192.168.89.0/24,192.168.90.0/24 /ip ipsec identity add generate-policy=port-strict mode-config=RW-cfg my-id=\ fqdn:router.mydns.com peer=router policy-template-group=RoadWarrior /ip ipsec policy add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \ template=yes add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\ 0.0.0.0/0 template=yes
after /ip hotspot, just where /ip ipsec should be printed, until I Ctrl-C it.
Same problem as before. The router was sluggish but I could select long-term and downgrade to 6.43.13.
Then the machine went up, but ssh was not responding. I got suspicious and checked: telnet was working. When
I got in, security was disabled. I went in, re-ebabled it, rebooted and the following IPsec configuration appeared:I copied away the ipsec config, which was broken in any case, and tried an experiment: remove all ipsec config, piece by pieceCode: Select all/ip ipsec policy group add name=RoadWarrior /ip pool add name=vpn2 ranges=192.168.90.2-192.168.90.254 /ip ipsec mode-config add address-pool=vpn2 name=RW-cfg split-include=\ 192.168.88.0/24,192.168.89.0/24,192.168.90.0/24 /ip ipsec peer add exchange-mode=ike2 passive=yes /ip ipsec policy add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.88.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.89.0/24 \ template=yes add dst-address=192.168.90.0/24 group=RoadWarrior src-address=192.168.90.0/24 \ template=yes add disabled=yes dst-address=192.168.90.0/24 group=RoadWarrior src-address=\ 0.0.0.0/0 template=yes
until /ip ipsec export would produce an empty comment. Then I upgraded to get:
* 6.44.2 (100% CPU, could not get /ip ipsec export working)
* 6.45beta31 (same, 100% CPU, could not get /ip ipsec export working).
Is RouterOS keeping all configs hidden somethere, or where is this 100% CPU spinning coming from?
I settled by returning to long term and reconstructing my ipsec config, changing it to xauth and adding users. It is now working well... I was trying to test ike2,
but instead I'm now stuck in long-term.
Any way to empty ipsec and upgrade to 6.44.2 or 6.45betas without CPU spinning at 100%?
Thanks for any help, things are getting messy in this router. Other routers are having no problems at all with ipsec/6.44/6.54beta. I have a production h AP ac running 6.44, as I'm afraid to update it and get the same behaviour
viewtopic.php?f=21&t=145793&start=150#p719370
If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while router is not working as expected or after crash.
I think changing IPSec settings (I tried crypto) makes it more likely to "estabilsh". But then it breaks again later (when the lifetime expires? happened while I was sleeping).Change main mode frome IKE2 to main for example. Should be work. I think that on the newest beta IKE2 doesn't work
Could be related to:I think changing IPSec settings (I tried crypto) makes it more likely to "estabilsh". But then it breaks again later (when the lifetime expires? happened while I was sleeping).Change main mode frome IKE2 to main for example. Should be work. I think that on the newest beta IKE2 doesn't work
It's even funny - changing one tunnel's server settings from IKEv2 to v1 fixed both tunnels. Don't think it'll last though.
// RB 4011
*) ike1 - fixed rekeying process when NAT is detected (introduced in v6.45beta16);
emils - just to be clear about the bug's scenario:Thank you very much for reporting the issues. It seems that IKEv2 over NAT is broken in v6.45beta34. We will resolve the issue in the next beta.
I sent a bug report with supout on Friday, April 19, 2019 8:49 AM (Moscow time). Don't have the ticket # sorry.Can you post your IPsec debug logs (topics=ipsec,!packet) from when the tunnel is established and dropped so we can make sure it is the same issue?
Edit: managed to reproduce the issue without NAT as well.
Confirming - appears fixed ( RB 4011, AC ^ 2 ).Version 6.45beta37 has been released.
*) ike2 - fixed first child SA generation (introduced in v6.45beta34);
can you add EAP-MSCHAPv2 to the authentication method list?
Does this means that Mikrotik can be removed from the not supported router list at NordVPN and is going to use ike2 to connect?Yes, it is coming as well.can you add EAP-MSCHAPv2 to the authentication method list?
One problem with both protocols? Are you sure?the problem with BGP and OSPF?
still waiting, hope can fix soon in v6One problem with both protocols? Are you sure?the problem with BGP and OSPF?
Done. [Ticket#2019051022005463]osc86, I can not reproduce the issue. Can you please send a supout.rif file to support@mikrotik.com?
Waiting for what? A miracle?still waiting, hope can fix soon in v6One problem with both protocols? Are you sure?the problem with BGP and OSPF?
no, KidControl.......which is even more important for you?
maybe another fix LCD?
A proper network admin likes watching graphs and stuff on an LCD Much more important than stability. Want stability, buy a Nintendo Switch. Nintendo is expert in stability updates! ahahahaI'm waiting for 8 months when the bug 2018101022007579 will be fixed.
I started refusing from CCR wherever such an opportunity arises
And the funny thing is that in half a year, the support responded only once “Sorry, we will reconsider the priorities”
Your top router dies completely from two packages and you can reproduce it, which is even more important for you?
maybe another fix LCD?
even dlink's support is better.
I agree. KidControl needs major improvement, like the full removal of it.no, KidControl.......which is even more important for you?
maybe another fix LCD?
Can you elaborate on what was changed here? The last time conntrack was changed with the loose TCP tracking option it introduced a regression, so I'd like to know exactly what changed and what to look out for.conntrack - significant stability and performance improvements;
YES, We would like to know what exactly was changed?!Can you elaborate on what was changed here? The last time conntrack was changed with the loose TCP tracking option it introduced a regression, so I'd like to know exactly what changed and what to look out for.conntrack - significant stability and performance improvements;
What do you consider as large? How many connections are we talking about? 1000, 10000, 100000, 1000000?There are no new features added with this conntrack fix as you are comparing to TCP loose setting. The fix addresses some stability issues in setups with large connection tracking tables. It also improves connection tracking processing performance.
Mikrotik must be aware that the product they have is not only a CPE, but they also have another advanced product with different purposed than CPE such as CCR, a quick fix on the underlying problem should be a priority without having to wait for version 7 which is never clear.A proper network admin likes watching graphs and stuff on an LCD Much more important than stability. Want stability, buy a Nintendo Switch. Nintendo is expert in stability updates! ahahahaI'm waiting for 8 months when the bug 2018101022007579 will be fixed.
I started refusing from CCR wherever such an opportunity arises
And the funny thing is that in half a year, the support responded only once “Sorry, we will reconsider the priorities”
Your top router dies completely from two packages and you can reproduce it, which is even more important for you?
maybe another fix LCD?
even dlink's support is better.
And Kids control in CCR is something very important! How would you control all of your employees?!?
Ahhh.... The joys of visiting this forum Priceless!
Similar issues encountered in my linux clients. When the network service restarts in linux, no ip address is assigned by routerOS DHCP serverWith 6.45beta42 two Linux installs had trouble getting DHCP over Ethernet.
Sorry can't provide supout - already downgraded to 6.43.* stable, will stay on that.
The only "custom" DHCP setting I have is - lease time is 7 days.
No trouble with WiFi clients.
Router: AC^2.
It would be better if you opened a new support ticket by sending an e-mail to support@mikrotik.com. Also please enable IPsec debug logs and generate a new supout.rif file each time the issue occurs (for example, an Android client failed to connect) and attach the file to the e-mail.Not working with Android clients (using https://play.google.com/store/apps/deta ... an.android .
Any tips towards getting Android working would be appreciated.
Also I noticed occasional VPN connections failing using beta42 and 45. Downgrading to 6.44.3 made that issue go away but hopefully it will get fixed in the betas.
Have you already reported your findings to MikroTik support? (support@mikrotik.com)Similar issues encountered in my linux clients. When the network service restarts in linux, no ip address is assigned by routerOS DHCP serverWith 6.45beta42 two Linux installs had trouble getting DHCP over Ethernet.
Sorry can't provide supout - already downgraded to 6.43.* stable, will stay on that.
The only "custom" DHCP setting I have is - lease time is 7 days.
No trouble with WiFi clients.
Router: AC^2.
Is this have something to do with multiple IPsec peers sometimes getting stuck after reboot / after public IP changes?*) conntrack - significant stability and performance improvements;
add auth-method=eap certificate="" disabled=yes eap-methods=eap-mschapv2 peer=PureIKEv2 remote-id=fqdn:*.pointtoserver.com username=purevpnxxxxxxxxxxx
Sure, I have some spare routers to do experiment with, will upgrade to beta tonight and see if it fixed my issues. Thanks.mezzovide no, conntrack has nothing to do with it, however we have already fixes for your described issues in previous betas. Did you try the latest beta and can verify the issue is still present?
I think an accurate answer would be that RouterOS running on a x86 is not itself vulnerable, but the vulnerability could be exploited in the unlatched host or another VM to disclose RouterOS information.Hi Mikrotik
Are you aware if Router OS is patched for this threat?
https://www.tomsguide.com/us/zombieload ... 30082.html
So only if it is CHR and the VM HOST is not patched could the CHR be expoilted?I think an accurate answer would be that RouterOS running on a x86 is not itself vulnerable, but the vulnerability could be exploited in the unlatched host or another VM to disclose RouterOS information.Hi Mikrotik
Are you aware if Router OS is patched for this threat?
https://www.tomsguide.com/us/zombieload ... 30082.html
Sent from my Redmi Note 5 using Tapatalk
I tried that and it still complains that it can't get local certificate from configuration and it not a dealbreaker and it goes on till it processes payloads: NOTIFY and then I get the error that the notify is TS_UNACCEPTABLE and the next line it is a got error:TS_UNACCEPTABLETry setting the remote-id to ignore.
Check out the src-address-list parameter under mode-config.Update: I have it now working and writing this with a IKEv2 connection through PureVPN. I have still to adapt the manually generated Ipsec Policy and it a PITA to do because sometimes a 0.0.0.0/ is expected but then I receive the TS_UNEXPECTED error. After several time going round and round the Src. Address match and the tunnel is made.
I can see the success when I get in the log get my IP and the two DNS IP addresses show and the tunnel is connected.
Thanks Emils, I tried that before and now again but it did not change the IP to on out of the range.....O I see there is a new line inserted into NAT. When I use different addresslists I can split horizon...I think.Check out the src-address-list parameter under mode-config.Update: I have it now working and writing this with a IKEv2 connection through PureVPN. I have still to adapt the manually generated Ipsec Policy and it a PITA to do because sometimes a 0.0.0.0/ is expected but then I receive the TS_UNEXPECTED error. After several time going round and round the Src. Address match and the tunnel is made.
I can see the success when I get in the log get my IP and the two DNS IP addresses show and the tunnel is connected.
https://wiki.mikrotik.com/wiki/Manual:I ... de_configs
*) dhcpv4-server - added RADIUS accounting support with queue based statistics;
fine! thanks emils We are waiting for a stable branch.
*) rb4011 - fixed MAC address duplication between sfp-sfpplus1 and wlan1 interfaces (wlan1 configuration reset required);
Is this a fix for the problem 2018101022007579?*) ccr - improved packet processing after overloading interface;
Which CVE - a new one, or more fixes for the already known ones?*) ipv6 - improved system stability when receiving bogus packets;
When you are working on dhcpv6-client: I would like to see an option in the client so that it does NOT save the obtained information in nonvolatile storage,*) dhcpv6-client - added option to disable rapid-commit (CLI only);
Please confirm this. Thanks*) dhcpv4-server - added RADIUS accounting support with queue based statistics;
I tried to test it, but it's not working yet. Is it an added feature that works if we use RADIUS for accounting and lease?
*) firewall - process packets by firewall when accepted by RAW with disabled connection tracking;
[admin@CORE] /snmp community> pr d
Flags: * - default
0 * name="librenms" addresses=::/0 security=private read-access=yes write-access=no authentication-protocol=SHA1 encryption-protocol=AES
authentication-password="mysecretpassword" encryption-password="anothersecretpassword"
Code: Select all
15:37:39 snmp packet(v4) from: 192.168.2.111
15:37:39 snmp v3 user: librenms
15:37:39 snmp,debug unsupported v3 security level
15:37:39 snmp,packet 30 71 02 01 03 30 11 02 04 5b e1 da 3b 02 03 00
15:37:39 snmp,packet ff e3 04 01 07 02 01 03 04 31 30 2f 04 05 80 00
15:37:39 snmp,packet 3a 8c 04 02 01 00 02 01 04 04 08 6c 69 62 72 65
15:37:39 snmp,packet 6e 6d 73 04 0c 7a 37 32 ff d4 32 65 1f 54 e8 1d
15:37:39 snmp,packet 01 04 08 a1 62 da 91 4e 10 b8 7b 30 24 04 05 80
15:37:39 snmp,packet 00 3a 8c 04 04 00 a1 19 02 04 47 a1 60 24 02 01
15:37:39 snmp,packet 00 02 01 00 30 0b 30 09 06 05 2b 06 01 02 01 05
15:37:39 snmp,packet 00
15:37:39 snmp,debug v3 err: 0 unsupported security level
15:37:39 snmp,debug bad packet
Yes, I'm aware of it. Are you referring to this queue?rdelacruz - Please note that accounting will work only for those users which has a queue. Data for accounting is taken from queue statistics
I have it working with mode configs. I made a different setup because I could not use PCC on source port for distribute the traffic over multiple channels.Check out the src-address-list parameter under mode-config.Update: I have it now working and writing this with a IKEv2 connection through PureVPN. I have still to adapt the manually generated Ipsec Policy and it a PITA to do because sometimes a 0.0.0.0/ is expected but then I receive the TS_UNEXPECTED error. After several time going round and round the Src. Address match and the tunnel is made.
I can see the success when I get in the log get my IP and the two DNS IP addresses show and the tunnel is connected.
https://wiki.mikrotik.com/wiki/Manual:I ... de_configs
@slackR Did you already open a ticket at Mikrotik Support?I can also confirm snmpv3 does not work in 6.45rc50 with Observium or snmpwalk.
Regards,!) user - removed insecure password storage;
This is the final step for this changlog entry from 6.43:Hello Emils,
Could You explain this?Regards,!) user - removed insecure password storage;
*) user - all passwords are now hashed and encrypted, plaintext passwords are kept for downgrade (will be removed in later upgrades);
What's new in 6.43 (2018-Sep-06 12:44):
*) user - all passwords are now hashed and encrypted, plaintext passwords are kept for downgrade (will be removed in later upgrades);
Could we get password hashes exported with the user accounts now please? E.g.:!) user - removed insecure password storage;
[admin@gate] > /user export
# may/28/2019 20:15:28 by RouterOS 6.45
...
/user
add comment="system default user" group=full name=admin password_hash=<base64-encoded-hash>
...
Let's hope this is not related to TLS protocol downgrade attacks...*) www - improved client-initiated renegotiation within the SSL and TLS protocols;
MikroTik team - could You explain? - please.
Let's hope it is? Better to find, and close, than to leave it open...Let's hope this is not related to TLS protocol downgrade attacks...*) www - improved client-initiated renegotiation within the SSL and TLS protocols;
MikroTik team - could You explain? - please.
+1We ask, We hope, but MiktoTik... is silent...
This issue fixes DoS possibility in Webfig, related to CVE-2011-1473. We will update the changelog, CVE was not included by mistake.*) www - improved client-initiated renegotiation within the SSL and TLS protocols;
In many countries Thu May 30 was a holiday. Some businesses are closed on friday (today) as well.We ask, We hope, but MiktoTik... is silent...
:local ip "XXX.XX.XX.X";
:local con "IKEV2";
:local addressPOLICY [/ip ipsec policy get [find where peer="$con"] value-name=src-address];
:local addressCONTRACK [/ip firewall connection get [find where src-address="$ip"] value-name=reply-dst-address];
:local address ("$addressCONTRACK".""."/32")
:if ("$addressPOLICY" != "$address") do={ /ip firewall connection remove [find where src-address="$ip"]; :log info "Removed $con address $addressCONTRACK who became stuck in connection tracking"};
You need to update your scripts (the logon method). You could have done that earlier.php api login failure at 6.45beta54.
Login failed, incorrect username or password.
please confirm.
thank you. ^^You need to update your scripts (the logon method). You could have done that earlier.php api login failure at 6.45beta54.
Login failed, incorrect username or password.
please confirm.
Great, much appreciated! Can't wait for it...msatter we have already plans for such feature. But connection marks will be used instead of routing marks.
Mikrotik support have acknowledged the VTI request, but said it requires a newer kernel.I hope I'm not missing the point, but isn't this IKEv2 & policy routing something that would be best solved by what's known as route/interface-based VPN, VTI, etc? I remember it used to be popular request here few years ago. If I understand it correctly, Linux implementation provides interfaces for IPSec connections, but internally it's still regular policy-based tunnels (often with 0.0.0.0/0 on both sides, but it can be anything). And some marks transparently assigned to outgoing traffic via that interface (it basically serves as additional filter for policy) are used to control what traffic it will actually apply to. So this should nicely cover the use case for multiple outgoing IPSec connections (like popular commercial VPN services). But not only that, distinct interfaces would make everything more clear and admin friendly. More interoperable too. And the whole thing doesn't even sound too complicated.
Currently looks like no, it will not make it into 6.45. We are already finalizing the 6.45 version. VTI support requires new kernel and we are still not sure whether it should or should not be implemented in version 7.
Great, much appreciated! Can't wait for it...
Will we see this before version 6.45 final release?
Well, I remember the days when all Linux systems did that, but it was changed because others (BSD, Cisco) were not using separate interfaces but only those policies.But not only that, distinct interfaces would make everything more clear and admin friendly. More interoperable too. And the whole thing doesn't even sound too complicated.
Why only in tr069? Export in SNMP too, with all other info.
*) tr069-client - added LTE CQI and IMSI parameter support;
+1One thing I would like to see in 6.45 is some hardware SNMP improvement for the CCR1072.
As stated in ticket #2019032822004818, many hardware OIDs are missing for this device, compared to what Winbox shows :
- Board temperature
- Board temparature 2
- Fan speed 3
- Fan speed 4
- PSU1 status (should be OID .15 (*))
- PSU2 status (should be OID .16 (*))
(*) as seen on other models such as the CRS317-1G-16S+.
We are then clearly at risk with our CCR1072-1G-8S+, not being able to monitor all their hardware components, which is a rather tricky situation for core devices.
I found other topics complaining about this : viewtopic.php?f=1&t=143899 / viewtopic.php?f=2&t=117322
Many thanks for your support Mikrotik dev' team !
We use SNMP for all our (network) devices from our enterprise monitoring & reporting solution, I think as many other companies.If you can see this system info in the cli, you can easily send it out to a monitor system using script and Syslog.
Will it also work for "rsa-signature-hybrid"?*) ipsec - added support for RADIUS accounting for "eap-radius" and "pre-shared-key-xauth" authentication methods;
*) winbox - do not allow setting "dns-lookup-interval" to "0";
What kind of issue was there actually?Version 6.45beta62 has been released.
*) bridge - correctly handle bridge host table;
+1KWill it ever be possible to filter ipsec logs by peer? Debugging is pretty much impossible if you have a ton of tunnels active.
+1Will it ever be possible to filter ipsec logs by peer? Debugging is pretty much impossible if you have a ton of tunnels active.
You can do this :Please implement "advertise-local-dns" option in IPv6 ND that makes router advertise the local address (same as gateway) as DNS server, instead of the IPv6 DNS servers configured in /ip dns.
(to make IPv6 systems use the local DNS resolver instead of going directly to the ISP DNS servers)
This is necessary to make locally configured DNS static names visible to IPv6 capable clients.
For better debugging and analysis you should consider sending to a remote log server. Makes life much easier.+1KWill it ever be possible to filter ipsec logs by peer? Debugging is pretty much impossible if you have a ton of tunnels active.
I think the log part need to be rebuild, for betther debugging
That's the point. With ND you can not specify the DNS server, with DHCPv6 you can. Consider to switch...I don't think I understand what is going on there. I use ND, not DHCPv6, for setting those parameters.
~85% of our users have Android. then maybe 10% Apple and 5% Windows.That's the point. With ND you can not specify the DNS server, with DHCPv6 you can. Consider to switch...I don't think I understand what is going on there. I use ND, not DHCPv6, for setting those parameters.
Works just fine, I've set it up this way as well. Only Android does not support DHCPv6 and does not get this specific setting.
Well, I agree that when you are running a lot of tunnels and you try to debug one of them, enabling packet-level debugging makes a terrible mess and/or load, even with remote log server.For better debugging and analysis you should consider sending to a remote log server. Makes life much easier.+1KWill it ever be possible to filter ipsec logs by peer? Debugging is pretty much impossible if you have a ton of tunnels active.
I think the log part need to be rebuild, for betther debugging
Have you successfully tested this one?Yes, I'm aware of it. Are you referring to this queue?rdelacruz - Please note that accounting will work only for those users which has a queue. Data for accounting is taken from queue statistics
If yes, can you please confirm that this added feature will work if we use RADIUS for accounting and lease? Thanks
Under some occasions, hosts did not timed out correctly. Now bridge will make sure hosts are removed.What kind of issue was there actually?Version 6.45beta62 has been released.
*) bridge - correctly handle bridge host table;
Ability to define IP address would bring in all sorts of problems, probability of mis-configuration is just too big.Can we get the ability to define an ip instead of using the detected IP for ip cloud ddns updates.
I'd like the ability to force the update before i deploy the unit to the field on it's static ip.
It would also be handy if we could force delete a published DDNS Record.
Did you try with auto-negotiation disabled?Hello!
I have RB4011iGS+5HacQ2HnD with dlink DPN-100 (TW2362H-CDEL-CLX) GPON SFP module (WAN).
IP address receive via DHCP. ALL WORK GREAT! ---> firmware 6.44.3
If im update firmware to 6.45beta62, SFP module have status "link ok", but DHCP address not received, DHCP client all time in status "searching", packet (in module window) TXed, but not RXed.
Can you fix it?
Thank you.
There is now a wiki-page how to set. I can't place the word 'local' in the last sentence because all is local.Currently looks like no, it will not make it into 6.45. We are already finalizing the 6.45 version. VTI support requires new kernel and we are still not sure whether it should or should not be implemented in version 7.
Great, much appreciated! Can't wait for it...
Will we see this before version 6.45 final release?
Ability to define IP address would bring in all sorts of problems, probability of mis-configuration is just too big.Can we get the ability to define an ip instead of using the detected IP for ip cloud ddns updates.
I'd like the ability to force the update before i deploy the unit to the field on it's static ip.
It would also be handy if we could force delete a published DDNS Record.
And, BTW, what benefit would one get by having DDNS configured before unit was up&running instead a minute or two later?
It's been explained that DDNS record gets removed when DDNS is disabled on the unit (but it needs internet connectivity at zhat time).
For dynamic created ones there is naming available in the PPP menu as name. Limit displaying it to a certain amount of characters. Now I have to identify peers by other means because "peer1205 etc." is not much to go on in relation to the used names in PPP.The comment from the Identity that was used for the peer to identify itself is carried over to the active-peers menu. For example, if you have a comment "L2TP server" for the IPsec identity, then this comment will be shown for all active peers which used this Identity. Obviously, it is not possible to set such comment for the dynamic Identity created by L2TP server's "use-ipsec" parameter.
Thanks
Statistics counters for IKEv1 with no unique ID's will be fixed shortly.
That was belonging to the picture and as long there is a unique identification in the background I am happy.Not sure what you meant with the third paragraph. Can you clarify?
It looked already familiar to me being multple My-ID pressent and I have never any content in there. I am only using it as client so this may be for server.
There is nothing we can do about the multiple My-ID fields under Identity menu at this moment because of multiple data types stored in this parameter.
I try it. No effect.Did you try with auto-negotiation disabled?Hello!
I have RB4011iGS+5HacQ2HnD with dlink DPN-100 (TW2362H-CDEL-CLX) GPON SFP module (WAN).
IP address receive via DHCP. ALL WORK GREAT! ---> firmware 6.44.3
If im update firmware to 6.45beta62, SFP module have status "link ok", but DHCP address not received, DHCP client all time in status "searching", packet (in module window) TXed, but not RXed.
Can you fix it?
Thank you.
15:04:27 system,error broken package routeros-mipsbe-6.45beta62.npk
will be nice to see multiple queues on each port to make QoSFirst time I see tx-queue1-packet being used in a CRS326 switch. It was always the tx-queue0-packet all the time. The switch seems to work faster now in some tests I have done.
I have two devices upgraded to 6.45beta62, but today I'm seeing this error (several times) while trying to upgrade another one:
Has the download file became corrupt? Is it some problem in this device?Code: Select all15:04:27 system,error broken package routeros-mipsbe-6.45beta62.npk
I did it this way and I worked, so I guess either the CDN or the copy in the download site itself got corrupted...You can try to manually download the package from download.mikrotik.com - choose extra packages which is a ZIP file. Then extract all the packages (npk files) you need - get the list of installed and enabled packages from router itself. Upload those npk files to router and reboot the router afterwards.
If it doesn't upgrade during reboot, check the log for any information.
It was a very "funny" bug actually - a device added to Dude via Winbox with default settings caused instant 100% CPU load with 50% going to Dude server and another 50% to DNS resolver as Dude was polling it with zero interval.Does anyone knows where to find this setting? I am looking for it for years now.Update:*) winbox - do not allow setting "dns-lookup-interval" to "0";
Found it on a Polish site and it a setting not applying to what I was looking for.
Upload is corrupt - CDN (upgrade.mikrotik.com) serve broken files:Has the download file became corrupt? Is it some problem in this device?
# ls -1las routeros-mipsbe-6.45beta62.npk-*
12056166 Jun 14 08:28 routeros-mipsbe-6.45beta62.npk-download.mikrotik.com
11583488 Jun 14 08:31 routeros-mipsbe-6.45beta62.npk-upgrade.mikrotik.com
# md5sum routeros-mipsbe-6.45beta62.npk-*
d7b9284935f8123cbf4df0c735c995c3 routeros-mipsbe-6.45beta62.npk-download.mikrotik.com
637a0bbb58bb0a3012ae9289dc9e7cbc routeros-mipsbe-6.45beta62.npk-upgrade.mikrotik.com
HW Offloading doesnt work on HAP AC on RouterBOARD 962UiGS-5HacT2HnT ROS 6.45beta62 . On stable Stable 6.44.3 HW Offloading is working. I was send an email to your support with rif files
I can connect to a vpn server in windows using ikev2 with username and password only, can this work on routeros?Version 6.45beta62 has been released.
!) ike2 - added support for EAP authentication methods (eap-tls, eap-ttls, eap-peap, eap-mschapv2) as initiator;