Totally concur!Thank you for promoting 6.47 to long term - had a lot of success with this release stream - has given me an opportunity to easily rollback/forward between 6.48.x while work continues - safe and easy fallback to 6.47 :-)
Try rebooting to find out?Bug (/system health) in WebFig and Winbox for the Mikrotik hEX RB750Gr3
Firmware v6.47.9
Bootloader v6.46.7
WebFig and Winbox
(/System health) from WebFig and Winbox does not display system voltage or system temperature
Terminal
(/system health print) does display system voltage and system temperature
Does the bootloader need to be updated?
Upgraded firmware to v6.47.9 still no display from WebFig (/system health)Try rebooting to find out?Bug (/system health) in WebFig and Winbox for the Mikrotik hEX RB750Gr3
Firmware v6.47.9
Bootloader v6.46.7
WebFig and Winbox
(/System health) from WebFig and Winbox does not display system voltage or system temperature
Terminal
(/system health print) does display system voltage and system temperature
Does the bootloader need to be updated?
Your bootloader wasn't even on latest for the 6.46 minor release; 6.46.8 was previous.
It's hard to call this a bug for sure when your bootloader is a minor-release behind.
I've been in a not-too-dissimilar boat.It's been 84 years...
Have been waiting for long-term 6.47.X to release, so I could upgrade to it directly from stable 6.46.5 on RB760iGS and cAP AC, given how poor a lot of recent stable 6.47.X (and .48, oh man, oh god) releases were received. But, generally speaking, is it a good idea (meaning "is it safe?") to do both things at the same time - to upgrade to next major version (from .46 to .47) and to hop to different release tree? Well, there are backups of course, so it's just my curiousity itching.
We live good with a very lazy update strategy. So we will install 6.46.8 for some months from now. As a long time MT user ...I've been in a not-too-dissimilar boat.It's been 84 years...
Have been waiting for long-term 6.47.X to release, so I could upgrade to it directly from stable 6.46.5 on RB760iGS and cAP AC, given how poor a lot of recent stable 6.47.X (and .48, oh man, oh god) releases were received. But, generally speaking, is it a good idea (meaning "is it safe?") to do both things at the same time - to upgrade to next major version (from .46 to .47) and to hop to different release tree? Well, there are backups of course, so it's just my curiousity itching.
I've been waiting for a good time to hop to long-term as well. I held off on the 6.48 jump really hoping 6.47 would get promoted to long-term. I'm glad i did. Just upgraded my whole infrastructure, some of it was on 6.47.8, the rest (wifi/caps) was all 6.46.8.
Now everything is happy all together on a single slow-moving and hopefully well-understood train. :-)
I upgraded a hAP mini from 6.47.8 and got the same WiFi problem as with 6.48, fixed by downgrading.
No idea, and I don't think it should be required to do that on upgrade.After upgrading RouterOS and RouterBOARD, then doing a reset, then adding back your config via console, do you still have the same issues?
Correct is to send this to support@mikrotik.comI did not find where to report bugs so...
/ip dns
set allow-remote-requests=yes use-doh-server=https://dns.adguard.com/dns-query verify-doh-cert=yes
/ip dns static
add address=94.140.14.14 name=dns.adguard.com
add address=94.140.15.15 name=dns.adguard.com
/certificate settings
set crl-download=yes crl-store=system crl-use=yes
/certificate> pr det
Flags: K - private-key, L - crl, C - smart-card-key, A - authority, I - issued, R - revoked, E - expired, T - trusted
0 T name="DigiCert Global Root CA" issuer=C=US,O=DigiCert Inc,OU=www.digicert.com,CN=DigiCert Global Root CA
digest-algorithm=sha1 key-type=rsa country="US" organization="DigiCert Inc" unit="www.digicert.com"
common-name="DigiCert Global Root CA" key-size=2048 subject-alt-name="" days-valid=9131 trusted=yes
key-usage=digital-signature,key-cert-sign,crl-sign serial-number="083BE056904246B1A1756AC95991C74A"
fingerprint="4348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161"
akid=03de503556d14cbb66f0a3e21b1bc397b23dd155 skid=03de503556d14cbb66f0a3e21b1bc397b23dd155
invalid-before=nov/10/2006 01:00:00 invalid-after=nov/10/2031 01:00:00 expires-after=560w2d11h1m35s
1 L T name="DigiCertTLSHybridECCSHA3842020CA1 (1).crt_0"
issuer=C=US,O=DigiCert Inc,OU=www.digicert.com,CN=DigiCert Global Root CA digest-algorithm=sha384 key-type=ec
country="US" organization="DigiCert Inc" common-name="DigiCert TLS Hybrid ECC SHA384 2020 CA1" key-size=secp384r1
subject-alt-name="" days-valid=3651 trusted=yes
key-usage=digital-signature,key-cert-sign,crl-sign,tls-server,tls-client
serial-number="0A275FE704D6EECB23D5CD5B4B1A4E04"
fingerprint="d79a2d5e03295c0e9feae36d021ebd5209700ab1a9e817a43f30fa3c66f78d21"
akid=03de503556d14cbb66f0a3e21b1bc397b23dd155 skid=0abc0829178ca5396d7a0ece33c72eb3edfbc37a
invalid-before=sep/23/2020 01:00:00 invalid-after=sep/23/2030 00:59:59 expires-after=501w2d11h1m34s
/certificate crl> pr det
Flags: E - expired, D - dynamic, I - invalid
0 D cert=DigiCertTLSHybridECCSHA3842020CA1 (1).crt_0 url="http://crl3.digicert.com/DigiCertGlobalRootCA.crl" num=557 revoked=3
next-update=mar/05/2021 02:29:49 last-update=feb/12/2021 05:54:06 fingerprint="65e210870319eb7c4a8622071fe4b4fa3b2995c9"
signature="e182e50b0462f80521116059a3fe28df8bee8c96f840614347defb57bd1023da7a45c2bab89cf16012a6edb2161aded65ab512f2ca788fa20
444467b0cd961ba0c44155149ee196bd04f721ad8037c20acd6a38047f11c7f401a967114c646ef3ea16f25f8856c490c525a5b2ab6f3b987b1e44a94
94a76e563a5ce0a116a4dce417b578a9be2d6945ec55d1d70c5a087125a9ac301affbf90c0c5c490ba256a6b0702aaa451f9cae56b9a741fc13ca08dc
1416743f3ebc7c764743f88995e4e79cc72e89e0218394c64e7e77499905a7c2d2dc1a3bd8e997b26726c9ecda42f73ccf1047e80917aa2ae4f44e5de
9dcc51559dac7b3b49010102897acce6fd5f"
1 D cert=DigiCertTLSHybridECCSHA3842020CA1 (1).crt_0 url="http://crl4.digicert.com/DigiCertGlobalRootCA.crl" num=557 revoked=3
next-update=mar/05/2021 02:29:49 last-update=feb/12/2021 04:54:05 fingerprint="65e210870319eb7c4a8622071fe4b4fa3b2995c9"
signature="e182e50b0462f80521116059a3fe28df8bee8c96f840614347defb57bd1023da7a45c2bab89cf16012a6edb2161aded65ab512f2ca788fa20
444467b0cd961ba0c44155149ee196bd04f721ad8037c20acd6a38047f11c7f401a967114c646ef3ea16f25f8856c490c525a5b2ab6f3b987b1e44a94
94a76e563a5ce0a116a4dce417b578a9be2d6945ec55d1d70c5a087125a9ac301affbf90c0c5c490ba256a6b0702aaa451f9cae56b9a741fc13ca08dc
1416743f3ebc7c764743f88995e4e79cc72e89e0218394c64e7e77499905a7c2d2dc1a3bd8e997b26726c9ecda42f73ccf1047e80917aa2ae4f44e5de
9dcc51559dac7b3b49010102897acce6fd5f"
That is a plus, but strange it was not in the change log.With 6.47.9, there is currently no indication of memory leaking when DoH is used.
Didn't memory issue appear in 6.48 branch, not 6.47?That is a plus, but strange it was not in the change log.With 6.47.9, there is currently no indication of memory leaking when DoH is used.
Memory leakage may have come with the fist version of 6.47 (that wast the first with DoH support), but since not everyone measure memory level its not easy say when it was there first (at least som 6.47.x version and above. It does not break the router, but usage of memory slowly increases over days, before it drop down and goes up again. Saw-toot wave.Didn't memory issue appear in 6.48 branch, not 6.47?
I upgraded all my devices to 6.47.9 with no immediate issues.
Not only ARMs devices, at RB951G-2HnD the same situationstrange, I still see no increase in memory usage. The screenshot I posted is from a 750G r3 (hEX). Does this only occur on arm devices?
We use this device at work to provide internet access to guests, not too much traffic, around 100GB/month.
Maybe, in my cases usage of CRL is disabled. I use a Cloudflare DoH servershap ac2, exact same dns configuration. There must be something different on those devices showing this problem. Maybe it's a service or setting interacting with the dns, which is disabled on my devices.. just a guess.
Unfortunetly not long. About 10 meters.If cable connecting hEX PoE and camera is long, then detecton/negotiation can fail due to excessive cable resistence. In such case forcing PoE out can help but it also depends on voltage drop over cable, 802.3 af/at requires at least 37V at PD (camera).
Just tried to install 6.46.7. Same problem... PoE out status - waiting for load.The PoE issue was introduced in 6.46.8, as the comments from that release prove it.
Going back to 6.46.7 fixes it. Someone complained in IRC too about that.
One of the reasons I was hoping for a 6.46.9 bugfix release.
The PoE issue was introduced in 6.46.8, as the comments from that release prove it.
I also have only one of many hEX PoE routers which works without problems with the same cameras (Hikvision) in "auto on" PoE mode with ROS 6.47.8. It doesn't depend on cameras or power supply. I tryed to change it. This gives reason to think this is hardware bug.The PoE issue was introduced in 6.46.8, as the comments from that release prove it.
Using a hEX PoE to power two Dahua SD1A203T-GN. PoE set to auto on. Firmware v6.47.9 without issue. I think these units are 2 or 3 years old. Factory firmware was 6.42.7.
Interesting... I have big issues with IKEv2 behind NAT on both sides with actual 6.48.1, but still no news from MT. Was you able to run IKEv2 OK with this latest long term? Do you have your responder (server) behind nat on LTE connection? (see my other post viewtopic.php?f=2&p=844118#p844118)Thank you for not breaking the IKE 2. On the stable version, dynamic connections with LTE, without real IP addresses disappear, I don't know how to solve.
Just get the column name from CLI, Winbox, Webfig, ...1. How do you know that this attribute changes on this version?
2. where is the documentation for read it about the changes that affect to the attribute on the new RouterOS version?
I also have a similar problem with 2 hap light and 1 hap classic.Hi, today unfortunately we tried to update 3 Haplite and they all crashed after updating to version 6.47.9 from 6.40.8. They no longer respond to the winbox and the connected ethernet ports go up and down continuously.
If instead we switch to version 6.48.1 everything is ok. Has this happened to anyone? this is very concerning.
I also have a similar problem with 2 hap light and 1 hap classic.Hi, today unfortunately we tried to update 3 Haplite and they all crashed after updating to version 6.47.9 from 6.40.8. They no longer respond to the winbox and the connected ethernet ports go up and down continuously.
If instead we switch to version 6.48.1 everything is ok. Has this happened to anyone? this is very concerning.
The problem is one to one as you describe.
I would recommend to do a manual upgrade in any case. You can control what version gets installed rather than the actual version offered by MikroTik, which could change halfway through your update project.Hi, is there a confirmation from MikroTik of this issue and if so, is there any plan for fixing long-term stream? I have planned remote upgrade of hap lite devices and want to make sure that it is safe. Thank You
I would recommend to do a manual upgrade in any case. You can control what version gets installed rather than the actual version offered by MikroTik, which could change halfway through your update project.Hi, is there a confirmation from MikroTik of this issue and if so, is there any plan for fixing long-term stream? I have planned remote upgrade of hap lite devices and want to make sure that it is safe. Thank You
You can write some script that will upload the desired version to the devices and issues a reboot command, or to make the devices download it and reboot.
I would advise to check if you can use a subset of the available packages (e.g. you do not need routing or mpls or ipv6 etc) and install only those packages that you require instead of the whole "combined" package.
That will save some valuable space on these tiny devices.
Same exact thing happened to me with hap lite. It was 2 of 3 bricked and I stopped.8 out of ~100 hap lite were bricked during upgrade from 6.46.8 to 6.47.9 and required netinstall.
In some cases (seems totally random) Avaya IP phones can't get IP address from Mikrotik with ROS 6.47.9, ROS 6.46.8 is working fine.
Will revert to 6.46.8 everywhere.
But in v6.47.9 in Webfig there is NOT the option.v6.47
*) ipsec - added "split-dns" parameter support for mode configuration;