Hi, We are quite sure because over 15pcs of router has the same issue, before that we are using old version 6.3xx after upgrading to 6.49 the same issue reappearWhat makes you think this has anything to do with "hacking" ?
Some of the issues you mention is possible normal behavior with the latest "stable" ROS releases.![]()
Hi,Are you allowing access to the router from external sites?
If so how are you doing this?
Which kind of VPN are you using for this access??
/export hide-sensitive file=anynameyouwish
Your router was hacked before it was upgraded, due to bug in Winbox on older version.
A much kinder way of saying that, thanks Holeven, but not even close to satisfyingAdding an analogy, maybe it will become more clear:
Water is pouring from the tap, sink is spilling over.
What do you do first ?
Clean up the spilled water or close the tap ?
Right now it looks like you're only cleaning... you'll keep doing that until you close the tap.
Well, anybody that calls themselves an admin is allowed to make mistakes but whenI know.
Still learning that part too![]()
This can only mean (I think) one way or the other the malicious code is already inside AND is somehow being used to re-infect those routers.
So IF he effectively net-installed an infected one, deploy 6.47/6.48/6.49 on it, create strong usernames/password and lockdown services and it STILL gets infected ?!
Very strange story and probably we are not getting the full context here...
Well this has to be changed by MikroTik anyway, as it will be forbidden to sell devices in the EU from 2024 in the state as it is now (standard default password).There are information about windows malware, that knows how to connect to MT router with default password and make a configuration changes to add it to botnet.
So admin: no password to local network are not safe anymore.
Last time I checked Latvia is part of the EU so they should be more then aware.Well this has to be changed by MikroTik anyway, as it will be forbidden to sell devices in the EU from 2024 in the state as it is now (standard default password).There are information about windows malware, that knows how to connect to MT router with default password and make a configuration changes to add it to botnet.
So admin: no password to local network are not safe anymore.
Other manufacturers are already selling devices with default password printed on a sticker, not derived from MAC address or serial number.
Some recent "pre-configured" MikroTik devices have this as well, but the password is lost on a factory reset. So that still has to be improved.
reformat-hold-button-max (5s .. 600s; Default: 10m)
This feature is not to prevent something from being stolen. It is to protect your data. The feature allows to block device from using network boot to access your data without password. By using protected routerboot, a forgotten password will mean to nullify your NAND, then Netinstall. This way, if somebody steals your device, your config and passwords are safe.
# RouterOS 6.47.10 model: 911G-5HPnD firmware-type: ar9340 factory-firmware: 6.43.7 current-firmware: 6.47.10 upgrade-firmware: 6.47.10 /system routerboard settings set force-backup-booter=no protected-routerboot=enabled reformat-hold-button=20s reformat-hold-button-max=30s
Try to hold down a small button for 10 minutes without loosing the press (start over) or kill your finger.....reformat-hold-button-max (5s .. 600s; Default: 10m)
I use thisTry to hold down a small button for 10 minutes without loosing the press (start over) or kill your finger.....reformat-hold-button-max (5s .. 600s; Default: 10m)
Dear Znevna, at this time is clear that misusing protected-routerboard brick the device, and is unrecuperable with Netinstall.I'll open a ticket that the manual is wrong, based on your findings.
If reset button is damaged on "shorted" position, the routerboard never boot again...[...] If the reset button gets damaged / shorted you'd end up with a brick, this way it does no harm.[...]
read: viewtopic.php?p=890398#p890384But you wrote above:
pressed over 600s = boot normally like nothing is done
So?
From my view, this kind of protection is a bit too much for device like Mikrotik. I agree if it's to protect our configuration, but to protect the device cannot be reset, it's way too much
But a big difference, these times are fixed, so can not be changed by someone.From the Cisco Documentation for the 1850 Series:
To reset the AP to it’s default factory-shipped configuration, keep the mode button pressed for less than 20 seconds. The AP's configuration files are cleared.
To clear the AP’s internal storage, including all configuration files, keep the mode button pressed for more than 20 seconds, but less than 60 seconds.
If you keep the mode button pressed for more than 60 seconds, the mode button is assumed faulty and no changes are made.
(Cisco Controller) >config ap rst-button ?
disable Disables the Reset Button for an AP
enable Enables the Reset Button for an AP
Do not buy MikroTik products.What is the solution?
Don't run a network if you can't secure access to your devices properly and can't afford someone to do it for you. (and no, anav, a magic blacklist doesn't help, no).What is the solution?
At work we have (amongst other things) a flower shop. I can assure that is not for nitwits either.Run a flower shop or something.
The Solution: Know what you are doing ! ... if you do not know then find someone who does know.What is the solution?
so damn true xt22, i couldn't agree more, not to mention the downtime and time needed to fulfil the new unit through corporate fulfilment process.damn... this is exactly the reason why it is so stupid idea trying to force manufacturers to create backdoors by goverments.. whatever seems like a good idea/intention first, is always abused.
This is a really bad function, i hope those crying ISPs will regret that after getting $2000 CCRs remotely sw bricked like this from a fired employee..
Hack recovery with ROS prior to this "function":
- netinstall, set, secure & harden
Hack recovery with ROS including this "function":
- buy all new hardware or pay ransom (or spend a day with every device guessing the time :d )
Yeah, all devices should be secured, can't agree more on this.. but this still doesn't seem right. What will happen, when some real dangerous exploitable ROS bug for well-secured routers will finally be found? Will Mikrotik pay for all the bricked and un-resetable CCRs in datacenters instead of just issuing a patch?
+1 Like the common sense solution, simpler than my key code or cloud code suggestion.in next v6 and v7 versions, protected bootloader function will have to be confirmed with press of a button. Nobody who has your password will be able to set it, if he has no physical access to the device.
Don't blame MikroTik for your own (or the network administrators) negligence.
The only devices that don't have features like this are supermarket routers. Any "enterprise" / bussiness grade decent device has security features in order to protect it from beeing reset/log into it, even when someone gains physical access to it. Like I've mentioned those Cisco APs earlier, HP has "Front panel security" you can look it up if needed. Other vendors have other names for this.
Like @holvoetn wrote above, you still don't know how you were compromised, you had no internal check, no logs, no nothing, and after your "corporate fulfilment process" is done your new shiny router might have the same fate.
Too much rapid this responsein next v6 and v7 versions, protected bootloader function will have to be confirmed with press of a button. Nobody who has your password will be able to set it, if he has no physical access to the device.
@Znevnapressed undefinitely and never released = do not boot, uselessly blink
From the Cisco Documentation for the 1850 Series:
If you keep the mode button pressed for more than 60 seconds, the mode button is assumed faulty and no changes are made.
Scenario:in next v6 and v7 versions, protected bootloader function will have to be confirmed with press of a button. Nobody who has your password will be able to set it, if he has no physical access to the device.
I would hope any changes to this menu would require a button press.Scenario:
Bob reads about this, Bob updates his unsecured router, Bob sets protected routerboot thinking at it as a security measure, confirms it with the press of the button.
Pedro gets in Bobs unsecured router easily, sees the protected bootloader set, changes the reformat-hold-button and reformat-hold-button-max, Pedro asks for money.
Bob knows that he set protected routerboot and thinks that he can reformat anyway.
But, oh wait, he can't, because he doesn't know the format window anymore.
Bob still ends up with a brick.
Is my scenario right? Or those values can't be changed from RouterOS once Protected Routerboot has been set?
[admin@MikroTik] /system/routerboard/settings> set protected-routerboot=enabled
[admin@MikroTik] /system/routerboard/settings> set reformat-hold-button-max=60s
[admin@MikroTik] /system/routerboard/settings> print
;;; press button within 60 seconds to confirm protected routerboot enable
protected-routerboot: enabled
reformat-hold-button: 20s
reformat-hold-button-max: 1m
[admin@MikroTik] /system/routerboard/settings> print
protected-routerboot: disabled
reformat-hold-button: 20s
reformat-hold-button-max: 1m
[admin@MikroTik] /system/routerboard/settings> set protected-routerboot=enabled
[admin@MikroTik] /system/routerboard/settings> print
;;; press button within 60 seconds to confirm protected routerboot enable
protected-routerboot: enabled
reformat-hold-button: 20s
reformat-hold-button-max: 1m
[admin@MikroTik] /system/routerboard/settings> print
protected-routerboot: enabled
reformat-hold-button: 20s
reformat-hold-button-max: 1m
[admin@MikroTik] /system/routerboard/settings> set reformat-hold-button-max=45s
[admin@MikroTik] /system/routerboard/settings> set reformat-hold-button=35s
[admin@MikroTik] /system/routerboard/settings> print
protected-routerboot: enabled
reformat-hold-button: 35s
reformat-hold-button-max: 45s
I want to suggest a extra setting how to enforce. Two possibilities, defined on activation:in next v6 and v7 versions, protected bootloader function will have to be confirmed with press of a button. Nobody who has your password will be able to set it, if he has no physical access to the device.
it will mean that you must hold the button 60 to 65 seconds, not less and not more, making guesses impossible
Exactly this on 6.47.10 i used for tests/system/reset-configuration does not alter routerboard settings, that includes protected routerboot.
Like actually already is: RouterOS can be downgradable not after factory RouerOS,Someone asks:
Even with the new requirement for the protected bootloader to press a button, someone with bad intentions can still downgrade and .. you know?
All these button pressing confirmation because Bob here didn't update his routers in 6 years.[...]
Hi, We are quite sure because over 15pcs of router has the same issue, before that we are using old version 6.3xx after upgrading to 6.49 the same issue reappear
If FACTORY RouterBOOT are older than 6.43.7, the v7 can not do anything about successfully reuse,
Never say never.of course not that it will be hacked but just sayin..........
[...]
is why is released on the past for the first time the FACTORY RouterBOOT upgrade,
because prior to 6.43.7, a "bug" make protected-routerboot useless...
[...]
viewtopic.php?t=94303#p580430
This isn't always the case - it is actually sometimes possible to downgrade RouterOS below the factory version (my coworker did it before), but it is not true for RouterBOOT - it is always impossible to downgrade RouterBOOT below the factory version. I'm not sure what rules dictate which downgrades are OK for RouterOS itself.Is not possible downgrade RouterBOOT or RouterOS prior to factory version.
Again: do not confure RouterOS with RouerBOOT.This isn't always the case - it is actually sometimes possible to downgrade RouterOS below the factory version (my coworker did it before), but it is not true for RouterBOOT - it is always impossible to downgrade RouterBOOT below the factory version. I'm not sure what rules dictate which downgrades are OK for RouterOS itself.Is not possible downgrade RouterBOOT or RouterOS prior to factory version.
[...]
Desold the SPI flash, change the bytes that in bootloader configuration block that lock the device and solder it back.
At least it's just SPI chip that's not that hard to work with and can be programmed with cheap CH341A programmer
(just make sure if you buy one off ebay to fix it so it's 3.3V, as default is 5V and that WILL fry your SPI memory!).
[...]
The tower generate more money on that way than a standard tower... ahahahahah.......Easy way to build a tower???
Yes, it was architectural stupidity but marketing genius LOLThe tower generate more money on that way than a standard tower... ahahahahah.......Easy way to build a tower???![]()
This is REALLY bad practice. I hate that they are doing with this LHG60 products and really, really hope they don't introduce random passwords to devicesWell this has to be changed by MikroTik anyway, as it will be forbidden to sell devices in the EU from 2024 in the state as it is now (standard default password).There are information about windows malware, that knows how to connect to MT router with default password and make a configuration changes to add it to botnet.
So admin: no password to local network are not safe anymore.
Other manufacturers are already selling devices with default password printed on a sticker, not derived from MAC address or serial number.
Some recent "pre-configured" MikroTik devices have this as well, but the password is lost on a factory reset. So that still has to be improved.
That horse has already left the barn long time ago.So you can expect this to be implemented, and you will need to keep an administration of the default passwords of all equipment you have in service.
Of course you should still change the password to something you only know yourself. But as you indicate, you might need the default password after the device has been reset.
Hello Normis,in next v6 and v7 versions, protected bootloader function will have to be confirmed with press of a button. Nobody who has your password will be able to set it, if he has no physical access to the device.