I have noticed whenever i have a complex password up to like 28 characters or so, RouterOS does not accept the password
I need to modify to allow even up to 256 characters or more!!!
How do i do this?
Nopes not april foolsAt first I though you were serious, then due to your uber name, I believe when you posted it was 1-APR-2022 where you are, so I assume this is an "april fools joke".
System => Password
System => Users => Password
System => Users => Password
[rex@net] /user> set test password="1234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890"
[rex@net] /user>
@holvoetn, you have two accounts?I already provided a working example.
Use that as well for testing.
Nope.@holvoetn, you have two accounts?I already provided a working example.
Use that as well for testing.
I ask to do that to @uberwebguru, you have used wrong browser to reply...
Or I have misunderstand your reply......
???Ok, but on your example are missing all characters usable on routeros....
Th1s!s@VeryL0ngP@$$W0rdTh1s!s@VeryL0ngP@$$W0rdTh1s!s@VeryL0ngP@$$W0rd
:put "!\"#\$%&'()*+,-./0123456789:;<=>\?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~"
/user
set test password="!\"#\$%&'()*+,-./0123456789:;<=>\?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~"
I know that, but for be clear for the others than read this topic, on console the ? \ " and $ must be escaped...
And probably the OP only talk about winbox, but as you notice, no problem (I use both 32 and 64 3.35)
No, "System / Password" is for the current used user for open winboxI think (but could be wrong) Winbox / System / Passwd is for setting the default admin password (an account which I by default ALWAYS DELETE when I configure a new device).
Or webfig.... has same menu structure, I do a test...OP did indeed use Winbox (but he needs to confirm that).
I use winbox not CLI@uberwebguru
Without wasting time, publish the command line with the password that gives you the error instead of writing novels.
Don't use as an excuse that you don't want to show (rightly) the password, create another one that gives you an error and show that.
You do know we are both talking about the same thing, right ?
OP did indeed use Winbox (but he needs to confirm that).
And from CLI some characters need to be escaped, I am aware, but that was not his question.
So, if you want to set good password, that can be used from ssh, console, winbox etc. with a password manager, set the password manager's "password policy" for RouterOS not to use ? \ " $ and most password managers probably won't use <tab> <space> or <nul> or other non-printing characters.I know that, but for be clear for the others than read this topic, on console the ? \ " and $ must be escaped...
On v7 probably the ? can not be escaped.
And probably the OP only talk about winbox, but as you notice, no problem (I use both 32 and 64 3.35)
Totally agree. If you look at logs on any internet facing device, you will see many attempts for user "root" and "admin" using dictionary attacks.But the better password is a non standard username, deleting admin, and not using other standard names like root, user, guest, etc.