Am I dreaming ;-)))))Read our latest newsletter and learn more about:
- the most anticipated spring devices: cAP ax and the outdoor RB5009;
- upcoming Train the Trainer classes
- new regulations on default passwords
- your MikroTik setup submissions
- latest MikroTips videos
- wAP LTE kit & Aerones wind turbine care systems, and more!
- zerotrust cloudflare tunnel options package for all devices! <<<
https://mt.lv/news112
112_majaslapai.png
I'm going to have a similar issue. I have an automated script to provision new routers and this is going to cause some trouble.Doesn't matter how passwords are generated. For ISP routers it is the biggest BS ever. Imagine that you have to configure 20+ new routers for clients or technician connects new router to the network or resets configuration of existing router and admin has to configure it via MAC telnet form the neighbor device. Thank you EU or actually FU EU.
It matters a lot. If the algorithm used is easily predicted, it would be worse to have the default password than none - since people wouldn't change, as it is "secure".Doesn't matter how passwords are generated.
me too but until it will fully implemented with capsman, I simply cannotLooking forward to trying out the cAP ax.
Hummm ...Hummm ... in specs for cAP ax (and comparison to cAP ac), shouldn't the row be titled "Tx Power (2.4 / 5 Ghz dBm)" rather than "Tx Gain" ? And it's capital "B" in (deci)Bell(miliwatts) ...
Also you, the same:milliWatts or milli-Watts not milliwatts
You prefer to fix your post?...Last edited by sid5632 on 04 Apr 2023, 13:03, edited 1 time in total.
In this case they would already have PCBs ready to go - feature-set is set in stone by PCB layout. Also USB chips that they can utilize were set in stone as PCB layout only designed for particular size and pinout of the chip. If that particular type of chip is nowhere to be found, you ether scrap production or produce without USB.Ok.. so... CCR2004 without USB port is a shame but quite understandable... guess there are not quite enough USB ports laying around...
... But what if you'd just upgrade CCR2004 instead of nerfing it - add M.2 or SATA port instead?
On a lighter note, I think Mikrotik is setting the new minimal storage to 128MB. Finally we will be able to use partitioning on everything!
Well, I think it be good to know if/where the generated password is persisted e.g. if provided to distributors/resellers and/or Mikrotik stores a copy etc... – if there in some database, even a strong algo wouldn't matter.It matters a lot. If the algorithm used is easily predicted, it would be worse to have the default password than none - since people wouldn't change, as it is "secure".Doesn't matter how passwords are generated.
Isn't the upgrade downloaded to memory? Of course, You can manually download it and write on the flash. But when the user clicks the "upgrade" button it's downloaded to RAM, isn't it?Maybe ... or maybe not. Audience has 128MB of storage, with intalled ROS 7.8 and wifiwave2 it has 79.7MB free ... upgrade needs to download around 27MB worth of packages. Which means 64MB partition is too small (I tried it somewhere around 7.3, it ran fine but couldn't upgrade).
So, it's the best of both worlds: the device isn't shipped blank, ready to be taken, AND it asks the user to use a new password. Looks quite good to me.But in terms of workflow, if an end-user opens webfig/winbox, the default/generated password is still flagged as expired, so a password change is STILL suggested like before. While someone could click cancel, the same is true for no password. In other words, the "change password dialog" remains on first login.
Only on 16 MB FLASH devices with more than 32 MB RAM (i.e. hEX Lite and iirc hEX as well, but not hAP Lite which has 32 MB RAM). All NAND devices download upgrades to root storage which is NAND.
Isn't the upgrade downloaded to memory? Of course, You can manually download it and write on the flash. But when the user clicks the "upgrade" button it's downloaded to RAM, isn't it?
Isn't the upgrade downloaded to memory? Of course, You can manually download it and write on the flash. But when the user clicks the "upgrade" button it's downloaded to RAM, isn't it?Maybe ... or maybe not. Audience has 128MB of storage, with intalled ROS 7.8 and wifiwave2 it has 79.7MB free ... upgrade needs to download around 27MB worth of packages. Which means 64MB partition is too small (I tried it somewhere around 7.3, it ran fine but couldn't upgrade).
Complain to the California goverment: https://specopssoft.com/blog/california ... sword-law/. You can expect this type of change from all vendors.This new password system is a major problem for us (in the US) and may drive us from using MikroTik products for our end-user home users as now we can no longer quickly provision them out of the box. This needs to be corrected/fixed ASAP. This is not a feature, this is a disaster. If this continues we will move elsewhere for end-users products.
Mikrotik, oh Mikrotik,
Your CCR2004-16G-2S+ now ships without the USB port trick.
USB ports are scarce as they can be,
But that doesn't stop you, still a king in the industry.
The world may be without enough USB ports,
But your router is still top-notch of sorts.
Without the port, it does even more,
And its performance is smoother than before.
So let's celebrate, no USB port is just fine,
Mikrotik has shown us there's another way to shine.
For router enthusiasts, it's not a bad thing,
For the CCR2004-16G-2S+ remains the king of the networking ring!
Poem by ChatGPT :)
Well California isn't exact the poster child for how to do things any more than the EU.Complain to the California goverment: https://specopssoft.com/blog/california ... sword-law/. You can expect this type of change from all vendors.This new password system is a major problem for us (in the US) and may drive us from using MikroTik products for our end-user home users as now we can no longer quickly provision them out of the box. This needs to be corrected/fixed ASAP. This is not a feature, this is a disaster. If this continues we will move elsewhere for end-users products.
I have some RB1100AHx2, but they are on 6.x series. They are partitioned, but there is nothing there but the OS. Upgrade was never a problem.
Only on 16 MB FLASH devices with more than 32 MB RAM (i.e. hEX Lite and iirc hEX as well, but not hAP Lite which has 32 MB RAM). All NAND devices download upgrades to root storage which is NAND.
You will notice which ones do when you have it, those devices have a flash/ directory which is permanent storage, whereas the root is a ramdisk that gets erased on reboots (updates are downloaded onto the ramdisk but somehow RouterOS knows how to perform upgrades from there.
The whole upgrade is done before rebooting. The reboot is just to load the new system. This is why I thought it would be stored on RAM. Why write to flash, if it will be read and open, just to write over?BTW, I thing that unpacking of upgrade files is done before rebooting, reboot is simply an act to load newly installed ROS. Most probably shutdown/reboot procedure checks for npk files and if any are found, it tries to install them. But I don't know how exactly is the log about successfull or failed upgrade preserved over boot. I suspect it's written to flash storage and read back into logs after ROS boots.
I don't think they have problems sourcing the small metal USB cage. It probably is the USB controller chip that can´t be found.Will the USB port still function if we solder one to the board ourselves?
I guess print journalism is dead. But Jānis's MTU YouTube video explains the situation with AX2 and USB...I don't think they have problems sourcing the small metal USB cage. It probably is the USB controller chip that can´t be found.Will the USB port still function if we solder one to the board ourselves?
Well California isn't exact the poster child for how to do things any more than the EU.
which has been law for a while and covered by prompt to change at first login. So I'm blaming Europeans ;)The device contains a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time. -Cal.Civ.C §1798.91.04(b)
You have Zero Trust on videos :lol: :lol: :lol:If Viktors is dressed up in a costume and looks like a USB key, I will watch it!!
OK... so iit seems you can use Flashfig.... is it possible MikroTik could somehow take this one step further and allow Flashfig to work over a network with some kind of DHCP option? That would allow for zero touch install of devices across the network.It is right that there is documentation, but in the meantime I just wrote it to you...
According to docs, POE out on RB5009-power only works if source is 2-pin (maybe DC jack too). POE-in is for router only.If it can't, can the mikrotik Poe splitters be used in reverse? And then I connect the DC side to it
Normis, Like several others here, we do automated deployment of devices, the process is we plug in 20 routers at a time into our bench PoE switch on ether1, then we load up our in-house deployment tool, and plug in a 2nd cable into ether 2-4 (this is for hAP routers btw), the deployment tool tries every 15 seconds to connect to 192.168.88.1 with admin and a blank password, once connected it then checks the OS version, upgrading or downgrading as necessary from the factory software to have it running v6.49.7, then when that's complete it automatically loads the branding package dpk with the rest of our deployment config and reboots. After it's gone through all 20 routers, it then monitors and alerts the technician when they all are completed. After that they are boxed and labeled.Also UK has something similar, and basically everywhere the governments are working on ways to improve security:
https://techcrunch.com/2018/10/05/calif ... ccounter=1
https://www.bbc.com/news/technology-59400762
https://www.lexology.com/library/detail ... 09983ab184
You all may be smart and responsible professionals, but A LOT of home wireless AP never get configured and remain without passwords, leaving them open to malware from LAN side.
IF there was a way to trigger it without logging in, that might be an option, however that would still be far slower process then we are using right now.The netinstall procedure would be fine if it was possible to initiate it without having to press any buttons on the device itself. Only then it could be automated.
Think of something like having user "netinstall" with fixed password "Run_it_now!" that can only login once after reboot, only using MAC-telnet and only if no other user have logged into device, during say first 5 minutes after reboot into default configuration. Authenticating as "netinstall" would instantly trigger reboot into netinstall mode and nothing else.
All these restrictions would limit any possible misuse, similar to mode-switch, requiring only local MAC access + time window after reboot + fresh default config only. Triggering it on configured device would be equal to having hardware access to it (unless you invent scenarios like hacking remote UPS or powerstrip control... but in that case you have other problems to worry about first).
I would presume they are referring to the same type of deployments we started doing ~15 years ago with APs up on the tower running NStream and CPEs at each subscriber, at the bottom of the tower we had PoE injectors to power the APs connected to a switch and a x86 ROS deployment with 4 ethernet interfaces running as the PPPoE server and site router. Translate that same model 15 years forward and you would not need hardly any of that base equipment, you could use the new 5009 as the PoE switch and the PPPoE router in one, eliminating the need for the big weatherproof enclosure and simplifying power management, and overall costs at the same time. How you optimally configure the APs and CPEs I'm probably out of touch on, as I haven't done any WISP deployments in some time now, I'm only dealing with wired installations these days.The idea of using the new RB5009 as a PPPoE termination is interresting. So t clarify, you use it as a termination and for example plug it to a 10G switch like the CRS13 ?
oh, that makes sense. That's very inspiring...I would presume they are referring to the same type of deployments we started doing ~15 years ago with APs up on the tower running NStream and CPEs at each subscriber, at the bottom of the tower we had PoE injectors to power the APs connected to a switch and a x86 ROS deployment with 4 ethernet interfaces running as the PPPoE server and site router. Translate that same model 15 years forward and you would not need hardly any of that base equipment, you could use the new 5009 as the PoE switch and the PPPoE router in one, eliminating the need for the big weatherproof enclosure and simplifying power management, and overall costs at the same time. How you optimally configure the APs and CPEs I'm probably out of touch on, as I haven't done any WISP deployments in some time now, I'm only dealing with wired installations these days.The idea of using the new RB5009 as a PPPoE termination is interresting. So t clarify, you use it as a termination and for example plug it to a 10G switch like the CRS13 ?
An idea :-)- new regulations on default passwords
this is what is (was?) doing QNAP.An idea :-)- new regulations on default passwords
Why not using the MAC for the default password together with a simple brute force protection?
The MAC is printed on all devices, easy to implement and much more secure than the default password (not secure at all, but much better).
I believe I suggested more or less the same thing earlier in this thread (or might have been the dedicated password thread). They are unique, and they can only be discovered with physical or layer2 access to the device so should be undecipherable over the internet if someone left it unchanged. It's a great balance of compromise, and sadly that's also why I highly doubt it will be implemented this way.An idea :-)- new regulations on default passwords
Why not using the MAC for the default password together with a simple brute force protection?
The MAC is printed on all devices, easy to implement and much more secure than the default password (not secure at all, but much better).
1 & 2) We're only talking about default passwords when the devices are shipped, and no one is arguing against mandating them to be changed on 1st login, this is just about how they ship & do their first boot. In order to find out the MAC address of a device remotely you have to be connected to the same layer 2 network segment as that device, MAC addresses are not transmitted over the internet, therefore any informed compromise can only come from inside your network. Across the internet or even just on a different routed subnet the only hack would be brute force. Yes an already infected computer on the LAN could compromise a router moments after connecting it, but if you require the password to be changed at 1st login then you are only risking that a device can also be compromised by an already infected computer already connected to the same network the new device is, and only in the initial minutes after installing the new router before it's logged into and the password changed. I'll also remind you this is something that is already more than possible given the historically blank admin password and was never given much concern (opposed to the risk of attaching that router to the internet where it would likely be compromised in a short amount of time).Using the MAC address as password is a bad idea.
1) One can find out the maker of the router, just looking at the MAC Address (they are tight controlled, and every business receives a block of them to use).
2) Knowing this, it would be easy to create a worm/virus/exploit to infect the user's computer - and through them, the router.
A) No, no one would have to know your routerś brand: just infect a bunch of people and hope for the "best".
B) No, it wouldn't need to broadcast something on the network: it's the router. Sure it's MAC address would be on the arp cache.
For the same reason, it wouldn't work MAC + salt, since the user would need to know the salt, in order to type the password. And then we would be back to step 1.
The infected desktop wouldn't need to keep broadcasting something, in order to find out the Mikrotik router. As it's a router the MAC address would surely already be on the client's arp table.B) I don't understand what point you're trying to make, but see 1&2 again.