What's the recommend way of using device-mode if it's for security?security related stuff is an exception.
True, but why would some need to ENABLE it. What security problem does it address?
If a vendor says something is "for security" in nearly all cases there is some notice about vulnerabilities a *security* feature address. If it's just a feature, then don't mention security.You're just trolling right now, right?
And the Meris article doesn't say "we recommend using device-lock" to address this. If so, they should say explicitly.Device mode does not target any explicit vulnerability. It is a security measure. Just read the wiki article about what device mode does and look for meris botnet here in the forum. It may answer your questions.
IF (and that's a big IF) this would be the case, don't you think they FIRST would make sure to have the fix in place BEFORE making public what the problem is ?I worry Mikrotik knows about new vulnerability and device-lock is some fix for it. And, they don't want to say what the vulnerability is yet.
Something strange with multicasti was using accept in dst address in NAT for local ip tv to make ip tv see all users ip address after update to 6.48.6 i cant open ip tv downgade fix it or remove accept rule and use !dst address in Masquerade rule, what makes this happen ?
And by all PPP you mean L2TP, SSTP, OVPN, PPTP, PPPoE or actually PPP that runs over serial connection?6.48.6 broke all PPP only for me? Сyclic PPP reconnections (client or server - it doesn't matter).
downgrade to 6.48.5 - fixed problem
ovpn server + l2tp server + l2tp client in my case. after update to 6.48.6 - just didn't work.. (tested on rb3011)And by all PPP you mean L2TP, SSTP, OVPN, PPTP, PPPoE or actually PPP that runs over serial connection?
/route bgp peer
add hold-time=1m in-filter=home.nets.in instance=home.nets keepalive-time=5s name=peer1 out-filter=home.nets.out remote-address=::ffff:0.0.0.0 remote-as=65402 ttl=default
And you did test the software on equal routers with same config and software version at a local site before you did the upgrade?Thank You Mikrotik staff for releasing routeros in long-term branch that makes my life so much more interesting.
I was just about to say the same thing that Jotne stated. You just don't upgrade without test before doing a mass update!!!!And you did test the software on equal routers with same config and software version at a local site before you did the upgrade?Thank You Mikrotik staff for releasing routeros in long-term branch that makes my life so much more interesting.
And you did also upgrade at the same time as software was released?
And you did read all message on the forum, the first day?
If not, this is much your fault.
RouterOS is a complex router with lots of function. I know may big company that has released software that has give breakdown of bigger network. To just mention one, Cisco. No one can garanti that all possible has been tested and all bugs are removed.
So wait some time before upgrade, read forum and do a test before upgrade lots of routers.
Why did you not upgrade before? 6.41.4 was released more than 3 1/2 year ago.The question is what was the CAUSE that anything prior to 6.41.4 was bricked.
And, whose to know how/why they were at 6.41, possible the previous vendor got fired that did that ;). Regardless, something did have to get done – those security updates might make someone move with more urgency in deployment. Anyway, lots of factors that got to needing netinstall...Why did you not upgrade before? 6.41.4 was released more than 3 1/2 year ago.The question is what was the CAUSE that anything prior to 6.41.4 was bricked.
You have missed out lots of security fixes.
Yes, but not in old releases, Is this mean the way is changed ? or this is a problem and support will fix it ?Something strange with multicast
Faith and trust are your problem.once again, I admit it was my fault. to much faith. i'm with mikrotik since routerOS 2.9.27 or so. So I had many many situations up to now, with buggy routerOS. I Should have learn it.
So last time after many succesfull hand made upgrades decided to do it on mass. Stupid I was.
And since that time mikrotik long-term release refers for me to "dont try it on production. EVER"
Yes ofcourse Mikrotik is no top-shelf company but could at least do that SIMPLE test if release is upgradable from every earlier ROS, at least from the same generation.
but hey! let our customers be again betatesters in a hardway.
thank You mikrotik again, unforgettable moments, very close to my cusotemers, during last two weeks. especially important during another wave of covid.
This issue has been reported already with 6.48 version ... see viewtopic.php?t=171035#p8373196.48.6 broke all PPP only for me? Сyclic PPP reconnections (client or server - it doesn't matter).
downgrade to 6.48.5 - fixed problem
I would say, unless we see a new testing branch for v6, that v6 feature development is winding down. But hopefully Mikrotik will make some kind of statement about that so their customers can plan accordingly.When will RouterOS v6 reach end of life?
Your guess should be correct.IF (and that's a big IF) this would be the case, don't you think they FIRST would make sure to have the fix in place BEFORE making public what the problem is ?I worry Mikrotik knows about new vulnerability and device-lock is some fix for it. And, they don't want to say what the vulnerability is yet.
Logical sequence of communicating.
Not saying there IS a vulnerability at play here. But it does make perfect sense to provide the fix first.
I also had very good luck with long-term 6.47.10, and then seemingly rush out a "long term" without promoting a "stable". Mikroitk doesn't seem big on disclosure, so that was my worry.Your guess should be correct.
IF (and that's a big IF) this would be the case, don't you think they FIRST would make sure to have the fix in place BEFORE making public what the problem is ?
Logical sequence of communicating.
Not saying there IS a vulnerability at play here. But it does make perfect sense to provide the fix first.
I also had very good luck with long-term 6.47.10, and then seemingly rush out a "long term" without promoting a "stable". Mikroitk doesn't seem big on disclosure, so that was my worry.
Your guess should be correct.
Apparently FTP and SMB effected by a DoS vector in 6.47.10. See https://www.cvedetails.com/vulnerabilit ... rotik.html with details here https://github.com/colorlight/mikrotik_ ... o_vulns.md
If suspicious configuration is detected, the suspicious configuration will be disabled and the flagged parameter will be set to "yes". The device has now a Flagged state and enforces certain limitations.
To exit the flagged state, you must perform the command "/system/device-mode/update flagged=no". The system will ask to either press a button, or issue a hard reboot (cut power physically or do a hard reboot of the virtual machine).
forum was not my 1st choice,because of the "kind" comment above. :)Seems like you're running a command without fully understanding its parameters?
forum was not my 1st choice,because of the "kind" comment above. :)Seems like you're running a command without fully understanding its parameters?
i did RTFM and then i went here.So your idea is to have somebody else read the docs for you?
since i am not SpiderMan and can't climb 5meters up the walls in our halls to push button on all our 150+ AP i will contact MT support.Back to the problem you're having: as device mode is pretty new functionality, it might have some bug. So perhaps you should try the other possibility (press the button). And be sure to do it within indicated time interval (5 minutes). If that doesn't work, then register trouble ticket with Mikrotik support.
A:The intention of the official design is to make sure that you are operating the device locally before the restart will take effect. rather than remote settings.Disabling PoE does not comply with "cold reboot" ?
/system device-mode update mode=home scheduler=yes romon=yes bandwidth-test=yes flagged=yes
or am i missing something? AP boots back info enterprise mode....
- Cut off DC power
/system device-mode> pri@mkx
are you guessing or have you checked already? i got v6.48.6 and it's not there , then why im asking here
#You can try iti got that, and wehre is "locking mechanism"?
that has been here since device-mode pops up
I worry Mikrotik knows about new vulnerability and device-lock is some fix for it. And, they don't want to say what the vulnerability is yet.
thanks for your answer.Those devices don't have Wave2 wireless chips.
No. It is still supported, on hardware where it works.v6 has it reached the end?
v6 has it reached the end?
There is no declared hardware offload.
uplinks in bonding for the scalability purpose
Bonding is done on CPU, not on bridge, is not hardware-offloaded.
You can see the H, when supported and enabled, only on hardware ports, and also not all switch models support more than one bridge on hardware offload.
I not remember all models at memory, check the docs.
@tangent is mixing L2hw offloading (e.g. ethernet link bonding) and L3hw offloading (IP routing).
several Mikrotik devices with v7.2, firmware were crashed and randomly rebooted once a week due to memory leaks.
Using of V7 is risky.
1x10G vs Nx1G It's less reliable because of possible sfp faults, line cards faults, optics faults.
Also 1x10G costs more than several 1G.
bonding1 belongs to bridge1.
AFAIK the limitation about HW offload only being available for one bridge (per switch chip) still applies.
Now contrast the RB5009, where you're back to 1 bridge, since everything's now on a single switch chip.
(traffic passing between ports on different switch chips hits CPU ... pretty hard if CPU is not very fast).
I was upgrading from 6.11 to 6.48.6.
That would be my suggestion after seeing such a big jump.Ok this day is too late but tomorrow will be test from netinstall.
Are there any noteworthy bugs in latest v6 versions? Or is it that you're missing new features, I believe (and hope) those will only be presented in v7.The last RouterOS v6 (long-term) was released nearly a year ago. Is Mikrotik going to release a newer RouterOS v6 (long-term) version?
What's new in 6.48.6 (2021-Dec-03 12:15):
Apparently it's vulnerable to CVE-2022-45313 and CVE-2022-45315Are there any noteworthy bugs in latest v6 versions?
Yes, the usual "if I shoot myself in the foot I'll break my toes" bugs.Apparently it's vulnerable to CVE-2022-45315Are there any noteworthy bugs in latest v6 versions?
So we always start from the fact that first of all the user must be authenticated...It's possible for an authenticated user to achieve code execution.
The seventh version is also good. 302 days and 170 TB of data. It could have been longer if Russia had not destroyed our energy.good version
💔It could have been longer if Russia had not destroyed our energy.
Completely false, where do you read this bullshit? Why don't you check before posting?... RouterOS enables this [SNMP?] by default ...
I too am interested in this bug. I have been digging for more info.The last RouterOS v6 (long-term) was released nearly a year ago. Is Mikrotik going to release a newer RouterOS v6 (long-term) version?
Zero-Day Initiative:
SUCCESS - DEVCORE becomes the first team ever to successfully execute two different Stack-based buffer overflow attacks against a Mikrotik router and a Canon printer in the brand new SOHO SMASHUP category. They earn a cool $100K cash and 10 Master of Pwn points.
https://www.zerodayinitiative.com/blog/ ... ne-results
Does anybody know about this Stack-based buffer overflow attacks against a Mikrotik router?
{ :local test1 do={:put "test1"} :local test2 do={:put "test2"} :local test3 do={:put "test3"} :local test4 do={:put "test4"} :local test5 do={:put "test5"} [] [] }
I would say not. This thread are for the release of 6.48.6 and are normally used when new version are released for quick discover problems that arise.I see censorship is starting to work on this forum and inconvenient facts are pushed to other threads.