can you see if this works now?Site is quite slow here because it has an IPv6 address in DNS but IPv6 does not actually work for this server.
+1Is there a way to sign up for email announcements of new articles too?
+1Is there a way to sign up for email announcements of new articles too?
Great!!! Killer idea!We have made a blog, where we will publish the most important announcements regarding security and other topics.
Bookmark this link for Security related news:
https://blog.mikrotik.com/security/
Here is the RSS feed link:
https://blog.mikrotik.com/rss/?cat=security
Please clarify what you mean by that.EDIT: Please add newsletter widget to this "BLOG". I don't use RSS feeds.
there are people who examine security updates to see what exactly was fixed and quickly write exploits for them
to use the time window between release of the updates and installation by the majority of users
Yes it has certainly improved. It is not so long ago that MikroTik denied the existence of vulnerabilities.I know very well that some people are never fully satisfied, but please also try and appreciate the progress in this regard.
Same here. I only got an e-mail on March 29th about the www vulnerability. Never for the winbox vulnerability.I also never received an email about the winbox exploit. Mikrotik claims to have sent it, does anyone actually have a copy of it?
I would actually use this as an example of a bad changelog entry. It was very unclear, an "unsecured router" could mean an empty / weak admin password. My router was perfectly secure - strong admin password, firewalls for everything except the winbox port. If there was a vulnerability in OpenSSH, would you see a Linux distribution with a changelog that said "ssh - fixed vulnerability that allowed access to an insecure server"? No. The blame would be squarely on OpenSSH itself, not the security of the whole system. There are quite a few examples of users on this forum who in fact did see this changelog entry and ignored upgrading because they thought their router wasn't classified as "unsecured". If winbox was never meant to be exposed to untrusted networks, this is not documented anywhere.!) winbox - fixed vulnerability that allowed to gain access to an unsecured router;
...
Another example that shows how important is to read changelog. That is why we have tried to upgrade it a little bit after few last releases in order to highlight major fixes and improvements.
re notificationsI'm sorry you have not received that email, because we did send it on March 30, with specifically the content you asked for.
Please clarify what you mean by that.EDIT: Please add newsletter widget to this "BLOG". I don't use RSS feeds.
It would take certain time to reverse-engineer update and prepare new exploit. Maybe significant time.Doesn't that contradict with the other point made?
there are people who examine security updates to see what exactly was fixed and quickly write exploits for them
to use the time window between release of the updates and installation by the majority of users
Any port open to public networks is unsecure! The point is if port is closed by firewall or by disabling service then it is considered secure....ignored upgrading because they thought their router wasn't classified as "unsecured"...
That is only the situation after it went wrong. In fact I always configured my equipment like that and carried it forward into MikroTikAny port open to public networks is unsecure! The point is if port is closed by firewall or by disabling service then it is considered secure....ignored upgrading because they thought their router wasn't classified as "unsecured"...
So services like OpenVPN and IPsec in Mikrotik are "unsecure" as well? A router that drops all traffic on all interfaces is probably secure, but it also isn't much use to anyone.Any port open to public networks is unsecure! The point is if port is closed by firewall or by disabling service then it is considered secure....ignored upgrading because they thought their router wasn't classified as "unsecured"...
+1 for security announcement mailinglistRSS is good, but will be nice to have some mailing list for security announcement and firmware update
What a terrible ideaRouterOS calls home each day or week to check if there is something wrong. If so every http session gets a page displayed that an update is needed because the router is below the minimal required version.
If ignored then after two weeks the router only functions when you are initiating an update. After the update all the functions are restored.
It is a terrible idea but we have to start somewhere. It is a responsibility to each of us and hacked routers can do a lot of damage.What a terrible ideaRouterOS calls home each day or week to check if there is something wrong. If so every http session gets a page displayed that an update is needed because the router is below the minimal required version.
If ignored then after two weeks the router only functions when you are initiating an update. After the update all the functions are restored.
Those days are almost gone. HSTSTo go to a HTTPS page you most of the time need a initiate that on http.
Add me to this. I should have gotten an email instead of having to find out the hard way. Now we have 40-50 user CPE's, many mounted in trees that are probably unusable. Can't log into them to fix them. What a disaster!I am furious angry!
My router had admin disabled and most of the services such as SSH/Telnet etc. The username I used was a long name and the password had 16 chars. I had a proper configuration on firewall, lots of scripts etc. YET...
Today I went on Google and got the CAPTCHA. I knew right of the bat that something is not good.
Logged to Mikrotik. First I spotted that most of FW rules were gone, then SOCKS enabled! Scripts are gone except some mikrotik.php thing. First thing... plug out internet cable.
After panic was over, went on LTE Internet to see what is going on. In 2 minutes I find that Mikrotik got compromised. I mean seriously?!
OK I think... many systems have security bugs. In fact this is the first one I have ever had through a Mikrotik. But what made me super angry wasnt't that there was a bug but Your replies to people saying "You should keep up to date" or "You should check our announcements" --EOT.
If the issue is there since April and you have my bloody email as I am registered on this forum, why I have not received an email saying "We have found a security vulnerability, so please update your Router OS immediately"? Seriously, why? I mean my IP worked as free SOCKS tunnel for god knows how long and god knows what went through it.
I just don't login to a router OS every day to check if everything is fine. You should not expect people to do that, you should not expect people to keep the router OS up to date (for many reasons e.g. the RouterBoard sits on the mast high up in the mountains and you simply don't do upgrade unless you are psychically there in case of something goes wrong), you should not expect people to look at your BLOG all of the time. It should be on your cards to let your customers know about such events.
EDIT: Please add newsletter widget to this "BLOG". I don't use RSS feeds.
Ok, I'm glad to hear that, but I'm pretty screwed now that I didn't get it.npyoung, just make sure you have not removed your mikrotik.com account or put mikrotik.com in some spam filter, because MikroTik did send mails about this and other vulnerabilities.
Also, since the issue was patched back in april, I suggest to also check our communication channels more often (social networks, forum).
Having been through this sort of thing with UBNT before, I have to say there's a world of difference in the response. UBNT almost immediately had a fix for infected devices, followed by improvement in their excellent NMS tool, AirControl, which allows an operator to keep all the devices up on their FW. (The Dude is a pale shadow of this software.) None of this, "well, you should have been brushing your teeth after each meal" and blaming the customer. I've been a customer of MT for 18 years now, and I've been impressed by how solid a product it is. But, I'm thinking at this point, after this very expensive fiasco, it's time to part ways, especially as it appears from the silence on a fix that I'd need to purchase new hardware. I'll be purchasing new hardware all right, but just not from MT!npyoung, just make sure you have not removed your mikrotik.com account or put mikrotik.com in some spam filter, because MikroTik did send mails about this and other vulnerabilities.
Also, since the issue was patched back in april, I suggest to also check our communication channels more often (social networks, forum).
+2+1 for security announcement mailinglistRSS is good, but will be nice to have some mailing list for security announcement and firmware update
Telnet?! (You're kidding, right?)Is there a way to log into these compromised devices remotely? The devices that were compromised today are not reachable using telnet, ssh, or winbox.
same old. we did not assign that CVE, so we don't mention it:CVE-2018-14847 - https://thehackernews.com/2018/09/mikro ... cking.html
Is the above a new vulnerability, tried searching the blog for the CVE Article number, but can't find it on the Mikrotik Security Blog or change logs
blog works fine over ipv6, make sure your ipv6 is configured correctly and you can ping 2a02:610:7501:1000::195ite is quite slow here because it has an IPv6 address in DNS but IPv6 does not actually work for this server.
can you see if this works now?
It is a copy/paste of an earlier exchange in this topic (page 1) between you and me. No idea why!blog works fine over ipv6, make sure your ipv6 is configured correctly and you can ping 2a02:610:7501:1000::195ite is quite slow here because it has an IPv6 address in DNS but IPv6 does not actually work for this server.
can you see if this works now?
probably spammerIt is a copy/paste of an earlier exchange in this topic (page 1) between you and me. No idea why!blog works fine over ipv6, make sure your ipv6 is configured correctly and you can ping 2a02:610:7501:1000::195ite is quite slow here because it has an IPv6 address in DNS but IPv6 does not actually work for this server.
can you see if this works now?
That IPv6 problem was solved immediately back then.
I think so, I now notice the same behaviour in another topic. Better ban that user.probably spammer
aug/25 17:52:12 system,info verified routeros-mipsbe-6.42.7.npk
aug/25 17:52:12 system,info installed routeros-mipsbe-6.42.7
aug/25 17:52:12 system,info router rebooted
[...]
aug/25 18:16:47 system,info script removed by admin
aug/25 18:17:07 system,info script removed from scheduler by admin
[...]
(passwords changed here)
[...]
sep/01 22:07:44 firewall,info ---WinBox port--- input: in:ether1 out:(unknown 0), src-mac 6c:9c:ed:34:bb:71, proto TCP (SYN), 5.101.6.170:56680-> xxx.xxx.xxx.xxx:8291, len 40
[...]
sep/10 00:36:04 firewall,info ---WinBox port--- input: in:ether1 out:(unknown 0), src-mac 6c:9c:ed:34:bb:71, proto TCP (SYN), 5.101.6.170:53804->xxx.xxx.xxx.xxx:8291, len 40
[...]
sep/10 01:53:20 firewall,info ---WinBox port--- input: in:ether1 out:(unknown 0), src-mac 6c:9c:ed:34:bb:71, proto TCP (SYN), 5.101.6.170:50515->xxx.xxx.xxx.xxx:8291, len 40
[...]
sep/10 10:53:08 firewall,info ---WinBox port--- input: in:ether1 out:(unknown 0), src-mac 6c:9c:ed:34:bb:71, proto TCP (SYN), 5.101.6.170:50832->xxx.xxx.xxx.xxx:8291, len 60
[...]
sep/11 07:02:10 system,info,account user test logged in from 5.101.6.170 via api
sep/11 07:02:10 system,error,critical login failure for user admin from 5.101.6.170 via api
sep/11 07:02:11 system,info,account user test logged out from 5.101.6.170 via api
[...]
sep/11 15:42:48 system,info,account user test logged in from 5.101.6.170 via api
sep/11 15:42:49 system,error,critical login failure for user admin from 5.101.6.170 via api
sep/11 15:42:50 system,info,account user test logged out from 5.101.6.170 via api
What other releases did you expect? There have been no other releases!BUGFIX UPDATE 6.40.9 RELEASED -- https://blog.mikrotik.com/software/bugf ... eased.html
Well, that was the first and last blog entry about a release...
6.43 for Stable and 6.44beta6 for Testing. I'm on the stable channel because I got automatically inserted into it. Don't you see the flaw? Aren't those releases as well? Or are we Stable and Testing users not special enough, like those fancy Long-term ones?What other releases did you expect? There have been no other releases!
Now we're talking. I was subscribed to it until it stopped sending me emails, without me unsubscribing. Where can I find that list? That solves the complete issue. I just thought they've dropped the list.Email list
Yes, it exists (not "test", I changed the name to "test" for anonymizing purposes).Did the user 'test' already exist?
Yes, every user has changed password.Did you change the password of user 'test' or only 'admin'?
Fortunately only "login", "read" and "reboot"... probably this is the reason, that intruder can not made any alterings in the config.What rights does user 'test' have?
I subscribed to both and I got the same e-mail with an other link to confirm. I used dedicated e-mail addresses so I will know which one is used.Now we're talking. I was subscribed to it until it stopped sending me emails, without me unsubscribing. Where can I find that list? That solves the complete issue. I just thought they've dropped the list.Email list
Is it this one? https://mikrotik.com/client/ecom_notify.php
I got that link from my last email from 2015, but removed the unregn query string parameter.
I can't find any "official" link to the URL I mentioned above. It appears to be part of the "Account" section, but I have no account on the mikrotik.com website (only on the forum).
Oh jesus christ. It's in big red at the bottom of the page... I'm a genius... as in stable genius...
Thankfully those CVEs appear to be fixed in 6.40.9 and 6.42.7.
I have no idea what vulnerability is it about and to be honest, I don't want to know. However, if what you say is true, then there is such issue for almost half year? Sounds almost unbelievable....Meanwhile, I'm still waiting for MikroTik to confirm when Ticket#2018041622003823 (unauthenticated remote crash, does not require any management interface to be open to the attacker) will be fixed.
If I send IPv6 packets at a gigabit across a gigabit-capable router with the same src+dst addresses, everything is fine. Your routers route packets just fine.Yes, it is exactly that. Denial of service from some type of IPv6 packet flood, where router runs out of resources. It was answered, that we accept this as a bug, but we would not call it a vulnerability, because there are many ways how to exhaust resources of any device.
It can be firewalled by not routing any IPv6. But if you have a RouterOS device anywhere in the path between one subnet and another subnet, even if not directly connected to that router, and it is forwarding IPv6 packets, it is vulnerable to being crashed.Can it be prevented with firewall?
I'm starting to believe that this is the only way forward, sadly.Maybe you need to publish it to generate some pressure...
I have just run a trial with two MikroTik devices, all running latest release candidate.
RaspberryPi ---- hAP ac2 ---- hEX
On the raspberry pi, eth0 = 2a01:9e02:0:4242:xxxx:xxxx:xxxx:xxxx/64 (autoconf address, doesn't matter)
On the hAPac2, bridge = 2a01:9e02:0:4242::1/64
On the hAPac2, ether2 = 2a01:9e02:0:1::2/64
On the hEX, ether2 = 2a01:9e02:0:1::1/64
On the hEX, target (a bridge) = 2a01:9e02:0:666::666/64
There are static routes on the hAPac2 and hEX so that 2a01:9e02:0:666::/64 and 2a01:9e02:0:4242::/64 can route to each other.
If I run this on the Raspberry Pi:
XXXREDACTEDXXX 2a01:9e02:0:666::/64
Then the hAPac2 crashes. This is a problem, because I have used TTL-exceeded packets (cannot be firewalled), and I have crashed a router which is transiting the packets. The target of the ICMP flood, 2a01:9e02:0:666::/64, is not directly connected to the router which crashed. A supout is attached.
This is a remote denial of service attack against RouterOS. I believe MikroTik should get a CVE, and fix this urgently.
Happens with IPv6 set to NOTRACK. It's not tracking causing this.As Normis already wrote, these are not really bugs but you are merely exhausting the capacity of the router, either for IPv6 ND or for IPv6 connection tracking.
So it is ND (also indicated by the name of the tool).Happens with IPv6 set to NOTRACK. It's not tracking causing this.As Normis already wrote, these are not really bugs but you are merely exhausting the capacity of the router, either for IPv6 ND or for IPv6 connection tracking.
No, you're doing exactly the same thing MikroTik support did — that is, not reading the addresses that are being targetted. Despite using a tool for ND crashing, it is not ND which is causing the problem — it's just an easy to find tool which will send ICMPv6 packets to lots of different destination addresses.So it is ND (also indicated by the name of the tool).
I can confirm the problem, in one case forwarding of ipv6 traffic eats all the memory. There is also another case when kernel is crashing, but also can be related to low memory.
We will look into this problem.
To refer you back to my post, and why ND is not to blame (despite using an "ND exhaustion tool"):ND is like ARP. It is used to find the hardware address corresponding to the IPv6 address. Transit routers to not use it. (but they could use tracking)
The question I had for MikroTik was: why is the hAP ac2 crashing? The target subnet is connected to the hEX. The hEX is doing ND, the hAP ac2 is not doing ND. Yes, the hEX crashes (it should not — the IPv6 neighbor table should not grow without bound!). But the hAP ac2 also crashes, and for a different reason to ND exhaustion. Guess what? CCRs used for transit also crash. That means a customer of an ISP running MikroTik routers as their BGP edge can use the ND exhaustion tool (targeting a subnet "out on the Internet") and crash their own ISP's MikroTiks.RaspberryPi ---- hAP ac2 ---- hEX
If I run this on the Raspberry Pi:
XXXREDACTEDXXX 2a01:9e02:0:666::/64
Then the hAPac2 crashes.
@pe1chl thank you for your response.Not "someone access the router". When "some user" logs in to the router they cannot see this info. They have to be an administrator to see it.
The reason why this data is stored in plaintext is that it has to be available in plaintext for the protocols it is used for (IPsec, xCHAPx).
So you cannot store a hash value of those values.
This is an out-of-the-box configuration, plus IPv6, NOTRACK, and some static routes.I have never seen increasing memory usage due to IPv6 forwarding. But apparently your use case or configuration is different.
Fri Sep 14, 2018 9:45 amNow we're talking. I was subscribed to it until it stopped sending me emails, without me unsubscribing. Where can I find that list? That solves the complete issue. I just thought they've dropped the list.Email list
Is it this one? https://mikrotik.com/client/ecom_notify.php
I got that link from my last email from 2015, but removed the unregn query string parameter.
I can't find any "official" link to the URL I mentioned above. It appears to be part of the "Account" section, but I have no account on the mikrotik.com website (only on the forum).
Oh jesus christ. It's in big red at the bottom of the page... I'm a genius... as in stable genius...
Complete closure does not prevent attackers from trying though ...This tells me that you should close it 100% and use VPN.
Actually it is closed by the book, every possible measure taken. Cannot be 100% sure off course. This IP is known circulating in honeypots and its in every possible scam database, however this bot specifically works as a winbox scanner. By the way, the default port is changed also. Something to think about for those who think they secured their winbox.This tells me that you should close it 100% from outside and use VPN.
Yes it iscan you see if this works now?Site is quite slow here because it has an IPv6 address in DNS but IPv6 does not actually work for this server.