error creating backup file
And thank you for being so transparent, deserves consideration !Thank you very much already ahead of time!
Is there any way to know if a given router is affected by some bad RouterOS version of the past? Even if we do or don't know, how can we clear/reset such influences so that our router only has traces of the latest version firmware influencing operation?? Surely you can agree that past versions of software should not influence current device software version and its operation ??P.S. We do believe that the issue might be already resolved and affects only routers which have had some "bad" RouterOS version installed on them in the past.
I guess this is the very point of this thread ... to find out which old version went haywire (if that's indeed the case) and to try to fix it so that when mass of less ssvvy users start to upgradevfrom v6 to v7 they don't fail miserably.Is there any way to know if a given router is affected by some bad RouterOS version of the past?
We should really not be comfortable with the notion that past versions of software can influence current device operation on latest installed software version... I'm surprised there's not already more noise about this. To what extent does RouterOS store past version configuration and to what extent can that configuration (which should arguably be rendered inert) still be able to influence/affect device operation when running on a new version? Are we talking about actual configuration, or just the underlying disk partitioning/layout? Can a Netinstall fix all of this or not? If MikroTik wants our assistance with this, we need some guidelines on where to look and how this important aspect of device operation and configuration integrity, operates beneath the scenesI guess this is the very point of this thread ... to find out which old version went haywire (if that's indeed the case) and to try to fix it so that when mass of less ssvvy users start to upgradevfrom v6 to v7 they don't fail miserably.Is there any way to know if a given router is affected by some bad RouterOS version of the past?
Is there any way to check this besides recalling from memory? I think I upgraded my rb5009 to newer version the moment I got it (arrived on 7.0.4) so it's unlikely that I would have done any config in that version which would have needed to be backed up and restored to the newer 7.x build, but that's months ago now and I, for one, can't recall for sure. Maybe someone else here can confirm this patternIs it possible that in all of these cases there was a backup file generated on versions 7.0.x or older? And is it possible that at some point configuration was loaded from this backup file on v7.1.x or later?
/routing/filter/rule/add chain=ospf-out rule="if ( gw-interface ether1 || gw-interface wg-RedShield ) { reject; } accept;"
if ( gw-interface ether1 ) { reject; } accept;
This is a routing rule-specific issue which is being fixed at the moment. Not related to this global problem which we have not managed to reliably reproduce.Okay, I repeated that on another CHR that I almost don't use, so should not be a problem to reproduce it for you. The router was upgraded to v7.2 first.
Create a WG interface named "wg-RedShield" (with an empty config) and add the following routing filter rule:Then reboot. A-a-and... It's gone No more rule, just that WG interface. Some race condition while interfaces are not yet added during a boot?Code: Select all/routing/filter/rule/add chain=ospf-out rule="if ( gw-interface ether1 || gw-interface wg-RedShield ) { reject; } accept;"
UPD: If there are another rules (like "accept;") around - they are still here.
UPD2: I can reproduce it even without WG interface, with a simple rule:Code: Select allif ( gw-interface ether1 ) { reject; } accept;
Yes, then you might lose configuration. And since we can not fix old versions, we can not do anything about that. The problem is resolved already and should not appear anymore when you upgrade from >=v7.1 to newer releases.So, we must pay attention if we upgrade from RouterOS < 7.1 (including RouterOS 6 ?) to any other version >= 7.1 ?
That IS NOT TRUE! Today I have upgraded 750G r3 from 7.2rc7 to 7.2 final and lost at least one interface configuration (had to restore backup config before upgrade). I had no chance (time) to do a backup after upgrade (with lost config) but I think you can do it by your self if I will send you my backup-before-upgrade (on 7.2rc7), you can put it to your 750G r3 and try to upgrade to 7.2 in your lab?Yes, then you might lose configuration. And since we can not fix old versions, we can not do anything about that. The problem is resolved already and should not appear anymore when you upgrade from >=v7.1 to newer releases.So, we must pay attention if we upgrade from RouterOS < 7.1 (including RouterOS 6 ?) to any other version >= 7.1 ?
They key question here: HOW did you get to that 7.2rc7 version ?That IS NOT TRUE! Today I have upgraded 750G r3 from 7.2rc7 to 7.2 final and lost at least one interface configuration (had to restore backup config before upgrade). I had no chance (time) to do a backup after upgrade (with lost config) but I think you can do it by your self if I will send you my backup-before-upgrade (on 7.2rc7), you can put it to your 750G r3 and try to upgrade to 7.2 in your lab?
Strods did not say a netinstall was required. He said an upgrade from >=7.1 to current versions should not have the issue, which was the case by IntLDaniel.They key question here: HOW did you get to that 7.2rc7 version ?
Coming from ROS6 OR ROS7 <7.1 and then upgrade upgrade upgrade ?
Or netinstall from a version >=7.1 and then moving on to 7.2rc7 ??
I am going to assume the first option. And then it DOES apply, if I understood it well.
FWIW: 0.0 % Bad blocks, Check Installation reports "installation is ok". Maybe it wasn't ok before the first upgrade though. Who knows..Another speculation: Configuration database is on damaged/corrupted NAND / Flash area and fsck fix it marking as damaged block and deleting the config database?
We need LTE MBIM support so forced to use V7... so been a "long time" V7 user & I can't recall a lost configuration FWIW. Various problems with V7 for sure, but this has NOT been one. Not saying their ain't potential bugs here... more just sharing that I haven't seen "lost config" in likely hundreds of various V7 beta/rc/"stable" upgrades, on half dozen different hardware types.For example, it was not lost due to a safe mode being enabled, some other administrator making changes on the router, etc. Report only if you are 100% sure that this is the case of missing configuration.
P.S. We do believe that the issue might be already resolved and affects only routers which have had some "bad" RouterOS version installed on them in the past.
There are some changes in the .fwf files (RouterBoard Firmware) but that's it.
YES, came from 6.49.2 to 7.x and then upgrade and upgrade.They key question here: HOW did you get to that 7.2rc7 version ?That IS NOT TRUE! Today I have upgraded 750G r3 from 7.2rc7 to 7.2 final and lost at least one interface configuration (had to restore backup config before upgrade). I had no chance (time) to do a backup after upgrade (with lost config) but I think you can do it by your self if I will send you my backup-before-upgrade (on 7.2rc7), you can put it to your 750G r3 and try to upgrade to 7.2 in your lab?
Coming from ROS6 OR ROS7 <7.1 and then upgrade upgrade upgrade ?
Or netinstall from a version >=7.1 and then moving on to 7.2rc7 ??
I am going to assume the first option. And then it DOES apply, if I understood it well.
Absolutely. 100% right.in my experience, bridges and wireguard interfaces seem to be most commonly affected by the corruption, along with some firewall rules
/interface bridge add name=LAN priority=0x7000 protocol-mode=mstp region-name=US-NY vlan-filtering=yes
/interface ethernet set [ find default-name=sfp-sfpplus1 ] name=WAN speed=100Mbps
/interface ethernet set [ find default-name=ether5 ] name="ZyXEL GS1920-24 Port 25" speed=100Mbps
/interface ethernet set [ find default-name=ether6 ] name="ZyXEL GS1920-24 Port 26" speed=100Mbps
/interface ethernet set [ find default-name=ether1 ] name="ZyXEL GS1920-24HP Port 23" speed=100Mbps
/interface ethernet set [ find default-name=ether2 ] name="ZyXEL GS1920-24HP Port 25" speed=100Mbps
/interface ethernet set [ find default-name=ether3 ] name="ZyXEL GS1920-24HP Port 26" speed=100Mbps
/interface ethernet set [ find default-name=ether4 ] disabled=yes name=eth4 speed=100Mbps
/interface ethernet set [ find default-name=ether7 ] disabled=yes name=eth7 speed=100Mbps
/interface ethernet set [ find default-name=ether8 ] name=eth8 speed=100Mbps
/interface 6to4 add comment="Hurricane Electric IPv6 Tunnel Broker" !keepalive local-address=*Private* mtu=1280 name=sit1 remote-address=*Private*
/interface wireguard add comment="KeepSolidVPN - Germany" disabled=yes listen-port=51821 mtu=1420 name=KeepSolidVPN-Germany private-key=*Private*
/interface wireguard add comment="KeepSolidVPN - France" disabled=yes listen-port=51822 mtu=1420 name=KeepSolidVPN-P2P private-key=*Private*
/interface wireguard add comment="KeepSolidVPN - Poland" disabled=yes listen-port=51823 mtu=1420 name=KeepSolidVPN-Poland private-key=*Private*
/interface wireguard add comment="KeepSolidVPN - UK" disabled=yes listen-port=51824 mtu=1420 name=KeepSolidVPN-UK private-key=*Private*
/interface wireguard add comment="VPN - Home Main Network" listen-port=52850 mtu=1420 name=wg0 private-key=*Private*
/interface wireguard add comment="VPN - Home Guest Network" listen-port=52860 mtu=1420 name=wg1 private-key=*Private*
/interface bonding add lacp-rate=1sec mode=802.3ad name="ZyXEL GS1920-24" slaves="ZyXEL GS1920-24 Port 25,ZyXEL GS1920-24 Port 26"
/interface bonding add lacp-rate=1sec mode=802.3ad name="ZyXEL GS1920-24HP" slaves="ZyXEL GS1920-24HP Port 23,ZyXEL GS1920-24HP Port 25,ZyXEL GS1920-24HP Port 26"
/interface list add name=WAN-list
/interface list add name=LAN-list
/interface list add comment="Own WireGuard VPN servers" name=WireGuard-Server
/interface list add comment="WireGuard VPN clients' connections" name=WireGuard-Clients
/interface list add name=WAN-interface-list
/interface list add name=WAN-Internet-list
/interface wireless security-profiles set [ find default=yes ] supplicant-identity=MikroTik
/interface bridge nat add action=accept chain=srcnat
/interface bridge port add bridge=LAN interface="ZyXEL GS1920-24HP"
/interface bridge port add bridge=LAN interface="ZyXEL GS1920-24"
/interface bridge port add bridge=LAN interface=eth4
/interface bridge port add bridge=LAN interface=eth7
/interface bridge port add bridge=LAN interface=eth8
/interface detect-internet set detect-interface-list=all internet-interface-list=WAN-interface-list lan-interface-list=LAN-list wan-interface-list=all
/interface list member add interface=WAN list=WAN-list
/interface list member add interface=LAN list=LAN-list
/interface list member add comment="VPN - Home Main Network" interface=wg0 list=WireGuard-Server
/interface list member add comment="VPN - Home Guest Network" interface=wg1 list=WireGuard-Server
/interface list member add interface=WAN list=WAN-Internet-list
/interface list member add interface=sit1 list=WAN-interface-list
/interface list member add interface=WAN list=WAN-interface-list
/interface list member add interface="ZyXEL GS1920-24" list=LAN-list
/interface list member add interface="ZyXEL GS1920-24HP" list=LAN-list
/interface list member add interface=eth4 list=LAN-list
/interface list member add interface=eth7 list=LAN-list
/interface list member add interface=eth8 list=LAN-list
/interface list member add interface=wg0 list=WAN-interface-list
/interface list member add interface=wg1 list=WAN-interface-list
/interface list member add interface=KeepSolidVPN-Germany list=WireGuard-Clients
/interface list member add interface=KeepSolidVPN-P2P list=WireGuard-Clients
/interface list member add interface=KeepSolidVPN-Poland list=WireGuard-Clients
/interface list member add interface=KeepSolidVPN-UK list=WireGuard-Clients
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg0 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg1 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg1 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=*Private* interface=wg1 persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=0.0.0.0/0 comment="KeepSolidVPN - Poland" endpoint-address=*Private* endpoint-port=51820 interface=KeepSolidVPN-Poland persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=0.0.0.0/0 comment="KeepSolidVPN - UK" endpoint-address=*Private* endpoint-port=51820 interface=KeepSolidVPN-UK persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=0.0.0.0/0 comment="KeepSolidVPN - Germany" endpoint-address=*Private* endpoint-port=51820 interface=KeepSolidVPN-Germany persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
/interface wireguard peers add allowed-address=0.0.0.0/0 comment="KeepSolidVPN - France" endpoint-address=*Private* endpoint-port=51820 interface=KeepSolidVPN-France persistent-keepalive=25s preshared-key=*Private* public-key=*Private*
I have configs for you (prior failure and post). Please contact me via DM or e-mail (pmajran @ gmail . com). I don't want to censor too much to post here.Try to notice if the configuration indeed was lost or simply was returned back to the configuration which was present on the router in the past.
Please keep this topic strictly related to this problem and provide information only if you are 100% sure that the configuration indeed was lost. For example, it was not lost due to a safe mode being enabled, some other administrator making changes on the router, etc. Report only if you are 100% sure that this is the case of missing configuration.
P.S. We do believe that the issue might be already resolved and affects only routers which have had some "bad" RouterOS version installed on them in the past.
Thank you very much already ahead of time!
I had very similar experiences but it does not matter if it is WinBox or WinFig or Terminal.So I did lost config also just via edit and reboot (without upgrade), so maybe the reason for lost config issue could be the WinBox 3.35 x64 itself ??
It sounds like a workaround - instead of reboot everytime do a Restore "just saved" configuration and do this step everytime before upgrade?I had very similar experiences but it does not matter if it is WinBox or WinFig or Terminal.So I did lost config also just via edit and reboot (without upgrade), so maybe the reason for lost config issue could be the WinBox 3.35 x64 itself ??
Basically for me to make it stick is to create a backup via WinBox and then Restore it. That makes it permanent.
I have all configs saved for MT people if they want it.
The proper procedure for config to stick:It sounds like a workaround - instead of reboot everytime do a Restore "just saved" configuration and do this step everytime before upgrade?
I had my issues with restore from .rsc - mainly with interfaces - problems with bridge, bonding, wireguard. Hence WinBox backup/restore works for me better.Ok, but instead: 1), 2), 3), netinstall, 5b) restore from .rsc, 6)
After 4000+ installations, .rsc is better than any type of backup, but these three conditions must be true:I had my issues with restore from .rsc - mainly with interfaces - problems with bridge, bonding, wireguard. Hence WinBox backup/restore works for me better.
I don't have such extensive background, but I prepared special .rsc files just in case in a form of backup.After 4000+ installations, .rsc is better than any type of backup, but these three conditions must be true:I had my issues with restore from .rsc - mainly with interfaces - problems with bridge, bonding, wireguard. Hence WinBox backup/restore works for me better.
A) Restore on the same device and keep the original MACs
B) Restore all necessary directories
C) Import SSH host key, Certificates, User Manager and Dude databases and files (.lng, .mib, etc.).
I try to explain myself better, as far as I understand.Really? I had never lost config during upgrade from v6 to v6. But if it is relevant, they shoud fix v6 as well.
Advice from this post applies (pe1chl has written it quite nicely so no need to type it over :lol: ):I just upgraded my RB3011 from 7.3.1 to 7.4 and I lose all *password* settings for my ppp secret.
So, I had my ppp secret configured but I losed the password configuration on all of them.
Luckily I had a backup but damn what an ugly bug :(
I also noticed that this is not the first time this has happened to me, unfortunately the first time I didn't take note about the ROS version because I thought it was my mistake, but now I'm pretty sure it wasn't me...