How much power and range can we lose due to these changes? Does this only affect the nRAY (which already seems weaker than LHG60)?*) w60g - limit power output when using region EU to match EN302567 on nRAY;
*) w60g - use EU region by default;
More a step to AC wifi2.*) winbox - allow setting MCS (24-31) to 4x4 Wireless interfaces;
A step to AX?
Totally agreed. The fact the same version/build was previously released and run by others in field, even if short while, is what gives me confidence about "long-term". Since ROS v7.1 certainly isn't bug free, the last thing anyone needs is some unstable v6 "long-term" build.I still think it is a bad policy to release a new version in the stable channel and declare it the long-term version at the same time.
You should move versions to the long-term channel only after they have proven to be free of obvious issues in the stable channel for some time.
(I know that long-term, stable and testing are not referring to quality of the software, but lots of users run long-term versions because they do not want to be concerned with bugs inadvertently included in a fresh release version)
I still think it is a bad policy to release a new version in the stable channel and declare it the long-term version at the same time.
You should move versions to the long-term channel only after they have proven to be free of obvious issues in the stable channel for some time.
(I know that long-term, stable and testing are not referring to quality of the software, but lots of users run long-term versions because they do not want to be concerned with bugs inadvertently included in a fresh release version)
What''s new in 6.48.5 (2021-Sep-21 13:50):
Changes since 6.47.10:
*) arm - added support for automatic CPU frequency stepping for IPQ4018/IPQ4019 devices;
*) arm - improved system stability;
*) arm - improved watchdog and kernel panic reporting in log after reboots on IPQ4018/IPQ4019 devices;
*) arm64 - improved reboot reason reporting in log;
*) bgp - fixed VPNV4 RD byte order;
*) bonding - improved system stability when disabling/enabling bonding ports;
*) bonding - improved system stability when disabling/enabling bonding ports;
*) bonding - added LACP monitoring;
*) branding - fixed missing branding skins if "skins" folder does not exist;
*) branding - fixed LCD logo loading from new style branding package;
*) branding - added option to upload custom files (newly generated branding package required);
*) branding - properly clean up old branding files before installing a new one;
*) branding - added option to upload custom files (newly generated branding package required);
*) bridge - added minor fixes and improvements for IGMP snooping with HW offloading;
*) bridge - added fixes and improvements for IGMP and MLD snooping;
*) bridge - added "multicast-router" monitoring value for bridge interface;
*) bridge - automatically remove extended interfaces when deleting PE device from CB;
*) bridge - correctly filter packets by L2MTU size;
*) bridge - improved bridge stability when host changes port (introduced in v6.47);
*) bridge - allow to exclude interfaces from extended ports;
*) bridge - added warning message when port is disabled by the BPDU guard;
*) bridge - added MAC and IP source addresses information for DHCP snooping log;
*) bridge - use "frame-types=admit-all" by default for extended bridge ports;
*) bridge - show "H" flag for extended bridge ports;
*) bridge - fixed "vlan-encap" setting for filter and NAT rules;
*) bridge - improved system stability when using IGMP snooping and changing bridge MAC address;
*) bridge - show error when switch do not support controlling bridge or port extension;
*) bridge - increased multicast table size to 4K entries;
*) bridge - improved BPDU guard logging;
*) bridge - fixed multicast table printing;
*) bridge - fixed local MAC address removal from host table when deleting bridge interface;
*) bridge - fixed link-local multicast forwarding when IGMP snooping and HW offloading is enabled;
*) bridge - fixed dynamic VLAN assignment when changing port to tagged VLAN member;
*) bridge - fixed dynamic VLAN assignment when changing port "frame-type" property (introduced in v6.46);
*) bridge - fixed "multicast-router" setting on bridge enable;
*) bridge - correctly remove dynamic VLAN assignment for bridge ports;
*) bridge - fixed MDB entry removal when using bridge port "fast-leave" property;
*) cap - fixed L2MTU setting from CAPsMAN;
*) capsman - use Bits instead of Bytes for "ap-tx-limit" and "client-tx-limit" parameters;
*) capsman - use proper units for "ap-tx-limit" and "client-tx-limit" parameters;
*) certificate - properly flush expired SCEP OTP entries;
*) certificate - generate CRL even when CRL URL not specified;
*) certificate - fixed CRL URL length limit;
*) certificate - fixed private key verification for CA certificate during signing process;
*) certificate - clear challenge password on renew;
*) chr - fixed VLAN tagged packet transmit on bridge for Hyper-V installations;
*) chr - fixed SSH key import on Azure;
*) chr - improved interface loading on startup on XEN;
*) chr - improved system stability when changing flow control settings on e1000;
*) cloud - improved backup generation process;
*) conntrack - automatically reduce connection tracking timeouts when table is full;
*) console - updated copyright notice;
*) console - do not clear environment values if any global variable is set;
*) console - require "write+ftp" permissions for exporting configuration to file;
*) console - require "write+ftp" permissions for exporting configuration to file;
*) console - updated copyright notice;
*) console - allow "once" parameter for bonding monitoring;
*) console - do not clear environment values if any global variable is set;
*) crs312 - fixed missing SwOS firmware on revision 2 devices;
*) crs3xx - correctly filter packets by L2MTU size;
*) crs3xx - fixed "custom-drop-packet" and "not-learned" switch stats for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed "mirror-source" property on switch port disable for CRS305, CRS326-24G-2S+, CRS328, CRS318 devices;
*) crs3xx - fixed "storm-rate" traffic limiting for switch-cpu port on CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - added initial Bridge Port Extender support;
*) crs3xx - added initial Controlling Bridge support for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed default MAC address calculation on management Ethernet for CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed CDP packet forwarding for CRS305, CRS318, CRS326-24G-2S+, CRS328 devices;
*) crs3xx - added switch-cpu port VLAN filtering (switch-cpu port is now mapped with bridge interface VLAN membership when vlan-filtering is enabled);
*) crs3xx - fixed interface LEDs for QSFP+ and SFP+ interfaces on CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - added "/system swos" menu for CRS354 devices, should only be used after SwOS 2.13 release;
*) crs3xx - improved system stability when receiving large frames on CPU for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - improved system stability when receiving large frames on CPU for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - improved 1Gbps Ethernet port group traffic forwarding for CRS354 devices;
*) crs3xx - fixed interface LEDs for QSFP+ and SFP+ interfaces on CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - added "/system swos" menu for CRS354 devices, should only be used after SwOS 2.13 release;
*) crs3xx - fixed "switch-cpu" VLAN membership on bridge disable;
*) crs3xx - fixed unknown multicast flood to CPU when IGMP snooping is used;
*) crs3xx - improved system stability when increasing interface L2MTU for CRS318 devices;
*) crs3xx - improved LACP linking between CRS3xx series switches;
*) crs3xx - improved system stability when bonding and IGMP snooping is used (introduced in v6.48);
*) crs3xx - improved load balancing on bonding interfaces for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed port-isolation on ether37-ether48 ports for CRS354 device;
*) crs3xx - fixed packet duplication when multiple bonding interfaces are created for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed duplicate host entries when creating static switch hosts;
*) crs3xx - fixed port isolation for "switch-cpu" port for CRS305, CRS326-24G-2S+, CRS328, CRS318 devices;
*) crs3xx - fixed port isolation removal for "switch-cpu" port on CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed switch "copy-to-cpu" property for CRS305, CRS318, CRS326-24G-2S+, CRS328 devices;
*) crs3xx - fixed switch "not-learned" stats for CRS305, CRS326-24G-2S+, CRS328-24P-4S+, CRS328-4C-20S-4S+, CRS318 devices;
*) crs3xx - improved system stability on CRS354 devices;
*) crs3xx - improved system stability when receiving large frames for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices (introduced in v6.47.5);
*) crs3xx - fixed Ethernet LEDs after reboot for CRS354 devices;
*) crs3xx - fixed VLAN priority removal for CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - improved 1Gbps Ethernet port group traffic forwarding for CRS354 devices;
*) crs3xx - fixed port-isolation on bonding interfaces for CRS317, CRS309, CRS312, CRS326-24S+2Q+ and CRS354 devices;
*) crs3xx - fixed packet transmit in 5Gbps link rate for CRS312 device;
*) defconf - fixed default configuration loading on RBOmniTikPG-5HacD;
*) defconf - fixed default configuration loading on LHG R;
*) defconf - fixed default configuration loading on LHG R;
*) defconf - fixed default configuration loading on RBcAP-2nD and RBwAP-2nD;
*) defconf - improved default configuration generation on devices with non-default wireless interface names;
*) defconf - improved CAP interface bridging;
*) defconf - fixed minor typo in configuration description;
*) defconf - fixed default configuration loading on RBOmniTikPG-5HacD;
*) defconf - fixed static IP address setting in case default configuration loading fails;
*) detnet - fixed malformed dummy DHCP User Class option;
*) detnet - use MAC address from bridge interface instead of slave port;
*) dhcp - fixed link state checking for DHCP client;
*) dhcp - fixed DHCP packet forwarding to IPsec policies;
*) dhcp - fixed link state checking for DHCP client;
*) dhcpv4-server - improved "client-id" value parsing;
*) dhcpv6 server - added support for "Delegated-IPv6-Prefix" for PPP services;
*) dhcpv6-server - allow loose static binding "pool" parameter (introduced in v6.46.8);
*) dhcpv6-server - added support for "option18" and "option37" for RADIUS managed clients;
*) dhcpv6-server - make sure that calling station ID always contains DUID;
*) dhcpv6-server - fixed false missing IPv6 Pool warning for dynamic bindings;
*) dhcpv6-server - added ability to generate binding on first request;
*) discovery - added "lldp-med-net-policy-vlan" property for assigning VLAN ID;
*) discovery - use interface MAC address when sending MNDP from slave port;
*) discovery - send the same "Chassis ID" on all interfaces for LLDP packets;
*) discovery - fixed discovery when enabled only on master port;
*) discovery - fixed discovery packet sending on newly bridged port with "protocol-mode=none";
*) discovery - fixed discovery on mesh ports;
*) discovery - allow choosing which discovery protocol is used;
*) disk - fixed external EXT3 disk mounting on x86 systems;
*) dns - added IPv6 support for DoH;
*) dns - do not use type "A" for static entries with unspecified type;
*) dns - end ongoing queries when changing DoH configuration;
*) dns - fixed listening for DNS queries when only dynamic static entries exist (introduced in v6.47);
*) dns - fixed cache memory leak when resolving CNAME domains;
*) dns - fixed CNAME query when target record is not in cache;
*) dot1x - fixed "reject-vlan-id" for MAC authentication (introduced in v6.48);
*) dot1x - fixed reauthentication after server rejects a client into VLAN;
*) dot1x - fixed unicast destination EAP packet receiving when a client is running on a bridge port;
*) dot1x - accept priority tagged (VLAN 0) EAP packets on dot1x client;
*) dot1x - fixed MAC authentication fallback (introduced in v6.48);
*) dude - fixed configuration menu presence on ARM64 devices;
*) dude - fixed configuration menu presence on ARM64 devices;
*) ethernet - improved system stability when receiving large VLAN tagged packets on IPQ4018/IPQ4019 devices;
*) ethernet - improved system stability when receiving large VLAN tagged packets on IPQ4018/IPQ4019 devices;
*) ethernet - fixed cable-test for some devices (e.g. RB2011, RB951G-2HnD);
*) export - fixed RouterBOARD USB "type" parameter export;
*) fastpath - fixed IP packet receive on bridge and bonding interfaces when destination MAC address match with slave port MAC;
*) filesystem - improved long-term filesystem stability and data integrity;
*) filesystem - fixed repartition on non-first partition;
*) filesystem - fixed repartition on RB4011 series devices;
*) gps - fixed "init-channel" release when not used;
*) gps - improved interface monitoring;
*) health - improved temperature reporting;
*) health - improved temperature reporting;
*) health - fixed voltage monitor on BaseBox5 devices;
*) health - fixed voltage monitor on BaseBox5 devices;
*) health - removed unused "heater-control" and "heater-threshold" parameters;
*) health - changed PSU state parameter type to read-only;
*) hotspot - added support for captive portal advertising using DHCP (RFC7710);
*) hotspot - fixed "html-directory" parameter export;
*) hotspot - improved management service stability when receiving bogus packets;
*) hotspot - fixed special character parsing in "target" variable (CVE-2021-3014);
*) hotspot - fixed "idle-timeout" usage with RADIUS authentication;
*) hotspot - added "vlan-id" parameter support for hosts and HTML pages;
*) ike1 - fixed "my-id=address" parameter usage together with certificate authentication;
*) ike1 - fixed policy update with and without mode configuration;
*) ike1 - fixed memory leak on multiple CR payloads;
*) ike1 - rekey phase 1 as responder for Windows initiators;
*) ike1 - fixed ''rsa-signature-hybrid'' authentication method;
*) ike2 - fixed EAP MSK length validation (introduced in v6.48);
*) ike2 - added "MS-CHAP-Domain" attribute to RADIUS requests;
*) ike2 - fixed DH group negotiation with EAP;
*) ike2 - fixed phase 2 rekeying with enabled PFS (introduced in v6.48);
*) ike2 - improved stability when invalid certificate is configured (introduced in v6.48);
*) ike2 - properly register packet time after expensive CPU operations;
*) ike2 - improved EAP message integrity checking;
*) ike2 - check if TS is still valid after obtaining SPI;
*) ike2 - added "MS-CHAP-Domain" attribute to RADIUS requests;
*) ike2 - improved child SA rekeying process;
*) ike2 - fixed EAP MSK length validation;
*) ike2 - fixed too small payload parsing;
*) ike2 - added "prf-algorithm" support for phase 1;
*) ike2 - added support for IKEv2 Message Fragmentation (RFC7383);
*) ike2 - fixed initial traffic selector''s protocol and port in transport mode;
*) interface - added temperature warning and interface disable on overheat for SFP and SFP+ interfaces (CLI only);
*) interface - fixed pwr-line running state (introduced in v6.45);
*) interface - fixed pwr-line interface linking (introduced in v6.48);
*) ipsec - fixed multiple warning message display for peers;
*) ipsec - fixed SA address parameter exporting;
*) ipsec - refresh peer''s DNS only when phase 1 is down;
*) ipsec - fixed SA address parameter exporting;
*) ipsec - improved stability when processing IPv6 packets larger than interface MTU;
*) ipsec - added SHA384 hash algorithm support for phase 1;
*) ipsec - do not kill connection when peer''s "name" or "comment" is changed;
*) ipsec - fixed client certificate usage when certificate is renewed with SCEP;
*) ipsec - improved SA update by SPI;
*) ipsec - inactivate peer''s policy on disconnect;
*) ipv6 - improved system stability when parsing IPv6 options;
*) kidcontrol - allow creating static device entries without assigned user;
*) led - fixed default LED configuration for RB911-5HnD;
*) led - fixed state persistence after device reboot on NetMetal 5 ac devices;
*) leds - fixed "/system leds" menu on RBLHG-2nD;
*) lora - added additional predefined network servers;
*) lora - added additional predefined network servers;
*) lora - added option to hide CRC error messages in monitor;
*) lora - improved downlink transmission;
*) lora - fixed device going into "ERROR" state caused by FSK modulated downlinks;
*) lora - limited output power in RU region for range 868.7 MHz - 869.2 MHz according to regulations;
*) lte - added support for Alcatel IK41VE1;
*) lte - added "comment" parameter for APN profiles;
*) lte - added "age" column and "max-age" parameter to "cell-monitor" (CLI only);
*) lte - added support for Sharp 809SH;
*) lte - fixed "earfcn" to band translation for "cell-monitor";
*) lte - fixed "band" value reporting;
*) lte - fixed "earfcn" to band translation for "cell-monitor";
*) lte - increased "at+cops" reply timeout to 90 seconds;
*) m33g - added support for "/system gpio" menu (CLI only);
*) metarouter - allow creating RouterOS metarouter instances on devices with 16MB flash storage;
*) metarouter - fixed memory leak when tearing down metarouter instance;
*) netinstall - require Netinstall version to be the same or newer as "factory-software";
*) ospf - fixed type-7 LSA translation to type-5;
*) ovpn - fixed route cache entry leak when establishing a new session;
*) ovpn - fixed route cache entry leak when establishing a new session;
*) package - do not include multiple The Dude packages in HDD installer;
*) package - added new "iot" package with Bluetooth (KNOT only) and MQTT publisher support;
*) poe - do not perform PoE firmware upgrade procedure on RB960 and OmniTik devices without PoE out;
*) poe - do not perform PoE firmware upgrade procedure on RB960 and OmniTik devices without PoE out;
*) poe - update PoE firmware only on devices that supports it;
*) ppp - added "bridge-learning" parameter support;
*) ppp - added "ipv6-routes" parameter to "secrets" menu;
*) ppp - added support for "Framed-IPv6-Route" RADIUS attribute;
*) ppp - do not fail "at-chat" command when issued on disabled PPP interface;
*) ppp - do not fail "at-chat" command when issued on disabled PPP interface;
*) ppp - improved stability when receiving bogus response on modem channel;
*) ppp - store "last-caller-id" for PPP secrets;
*) ppp - store "last-disconnect-reason" for PPP secrets;
*) profile - added "lcd" process classificator;
*) profile - improved idle process detection on x86 processors;
*) profile - improved process classification on ARM devices;
*) ptp - improved management service stability when receiving bogus packets;
*) ptp - improved management service stability when receiving bogus packets;
*) qsfp - improved system stability when setting unsupported link rates;
*) quickset - prefer 5GHz interface for WiFi scan in CPE mode;
*) quickset - added "Port Mapping" to QuickSet;
*) quickset - fixed local IP address setting on master interface;
*) quickset - prefer 5GHz interface for WiFi scan in CPE mode;
*) rb3011 - improved system stability when changing RouterBOARD settings (introduced in v6.48);
*) rb4011 - improved SFP+ port stability after boot-up;
*) rb4011 - fixed SFP+ port MTU setting after link state change;
*) rb4011 - fixed SFP+ port MTU setting after link state change;
*) rb4011 - improved SFP+ port stability after boot-up;
*) route - improved stability when connected route is modified;
*) route - improved stability when 6to4 interface is configured with disabled IPv6 package;
*) route - improved stability when connected route is modified;
*) routerboard - fixed PCIe bus reset during power-on on MMIPS devices ("/system routerboard upgrade" required);
*) routerboard - fixed "reset-button" on hAP ac;
*) routerboard - force power-down on PCIe bus during reboot on LHGR devices ("/system routerboard upgrade" required);
*) script - added error message in the logs if startup script runtime limit was exceeded;
*) sfp - added "sfp-rate-select" setting (CLI only);
*) sfp - improved cable length monitoring as defined per SFF-8472 and SFF-8636;
*) sfp - improved SFP, SFP+, SFP28 and QSFP+ interface stability for CRS3xx and CCR2004 devices;
*) sfp - improved cable length monitoring as defined per SFF-8472 and SFF-8636;
*) sfp28 - changed FEC auto mode to disabled;
*) snmp - fixed SNMP trap agent address;
*) snmp - added information from IPsec "active-peers" menu to MIKROTIK-MIB;
*) snmp - fixed value types for "dot1qPvid";
*) snmp - fixed value types for "dot1dStp";
*) snmp - added new LTE monitoring OID''s to MIKROTIK-MIB;
*) snmp - fixed "send-trap" functionality (introduced in v6.48);
*) ssh - fixed returned output saving to file when "output-to-file" parameter is used;
*) ssh - return proper error code from executed command;
*) ssh - skip interactive authentication when not running in interactive mode;
*) supout - fixed "topic" column presence in "Log" section;
*) supout - improved autosupout.rif file generation process;
*) supout - added bonding interface monitor information;
*) supout - fixed "topic" column presence in "Log" section;
*) switch - improved system stability with 98PX1012 switch chip for CCR2004-1G-12S+2XS device;
*) switch - improved system stability with 98PX1012 switch chip for CCR2004-1G-12S+2XS device;
*) switch - fixed interface toggling for devices with multiple QCA8337, Atheros8327 or RTL8367 switch chips (introduced in v6.48);
*) switch - improved resource allocation on 98PX1012 switch chip for CCR2004-1G-12S+2XS device;
*) system - improved resource allocation (improves several service stability e.g. HTTPS, PPPoE, VPN);
*) system - improved resource allocation (improves several service stability e.g. HTTPS, PPPoE, VPN);
*) system - improved stability when receiving bogus packets;
*) telnet - do not send options if connecting to non standard port;
*) telnet - fixed "routing-table" parameter usage;
*) telnet - do not send options if connecting to non standard port;
*) telnet - fixed server when run on non standard port;
*) telnet - fixed server when run on non standard port;
*) tile - fixed bridge performance degradation (introduced in v6.47);
*) tile - fixed bridge performance degradation (introduced in v6.47);
*) timezone - updated timezone information from "tzdata2020d" release;
*) tr069-client - fixed RouterOS downgrade procedure;
*) tr069-client - added branding package build time parameter;
*) tr069-client - added wireless "noise-floor" and "overall-tx-ccq" information parameters;
*) tr069-client - allow passing LTE firmware update URL as XML;
*) tr069-client - added additional wireless registration table parameters;
*) tr069-client - fixed TotalBytesReceived parameter value;
*) tr069-client - send correct "ConnectionRequestURL" when using IPv6;
*) tr069-client - added LTE model and revision parameters;
*) tr069-client - added "X_MIKROTIK_MimoRSRP" parameter for LTE RSRP value reporting;
*) tr069-client - improved management service stability when receiving bogus packets;
*) tr069-client - improved management service stability when receiving bogus packets;
*) traffic-flow - added "sys-init-time" parameter support;
*) traffic-flow - added NAT event logging support for IPFIX;
*) traffic-generator - fixed 32Gbps limitation;
*) upgrade - improved "long-term" upgrade procedure on SMIPS devices;
*) upgrade - fixed upgrade procedure on 16MB devices;
*) upgrade - improved "long-term" upgrade procedure on SMIPS devices;
*) user - fixed "skin" configuration for user groups (introduced in v6.48);
*) user-manager - do not allow creating limitation that crosses midnight;
*) user-manager - updated PayPal''s root certificate authorities;
*) w60g - use EU region by default;
*) w60g - limit power output when using region EU to match EN302567 on nRAY;
*) w60g - improved stability in low temperature environments;
*) webfig - allow hiding QuickSet mode selector;
*) webfig - properly stop background processes when switching away from QuickSet tab;
*) webfig - allow hiding and renaming inline buttons;
*) webfig - fixed default value presence when creating new entries under "IP/Kid Control";
*) webfig - allow to specify "prefix" parameter under "IPv6/ND/Prefixes" menu;
*) webfig - do not corrupt settings when starting "Wireless Sniffer";
*) webfig - do not show newly created SMB shares as invalid;
*) webfig - do not move top right menu in opposite direction when scrolling horizontally;
*) webfig - fixed new interface addition;
*) webfig - show "Interfaces" menu by default after logging in;
*) webfig - do not show "units" twice in multi list entries;
*) webfig - do not move top right menu in opposite direction when scrolling horizontally;
*) webfig - show "network-mode" for LTE modems that support it;
*) webfig - fixed "PortMapping" button (introduced in v6.48.2);
*) webfig - allow to specify "prefix" parameter under "IPv6/ND/Prefixes" menu;
*) webfig - do not corrupt settings when starting "Wireless Sniffer";
*) webfig - show "network-mode" for LTE modems that support it;
*) winbox - added missing IGMP Snooping settings to "Bridge" menu;
*) winbox - added missing MSTP settings to "Bridge" menu;
*) winbox - added support for LTE Cell Monitor;
*) winbox - allow adding bonding interface with one slave interface;
*) winbox - allow performing "USB Power Reset" on "0" bus on RBM33G;
*) winbox - do not show "network-mode" parameter for LTE interfaces that do not support it;
*) winbox - fixed "IP->Kid Control->Devices" table automatic refreshing;
*) winbox - fixed "interface" and "on-interface" parameter presence under "Bridge/Hosts" menu;
*) winbox - fixed "receive-errors" setting persistence under "Wireless/Wireless Sniffer/Settings" menu;
*) winbox - fixed "tls-version" parameter setting under "IP/Services" menu;
*) winbox - fixed minor typo in "Users" menu;
*) winbox - provide sane default values for bridge "VLAN IDs" parameter;
*) winbox - use health values reported by gauges for "System/Health" menu;
*) winbox - added "Cloud Backup" options under "Files" menu;
*) winbox - fixed health reporting on RB960, hEX and hEX S devices;
*) winbox - show "current-channel" column by default for CAP interfaces;
*) winbox - show "System/Health/Settings" only on boards that have configurable values;
*) winbox - do not show "GPS antenna" selection for devices without selection support;
*) winbox - allow setting MCS (24-31) to 4x4 Wireless interfaces;
*) winbox - added "name" and "file-name" parameter when importing and exporting certificates;
*) winbox - show "System/Health" only on boards that have health monitoring;
*) winbox - fixed "Switch" menu on RBwAPG;
*) winbox - fixed enable/disable button presence for "Bridge/Hosts" menu;
*) winbox - show "activity" column by default under "IP/Kid Control/Devices" menu;
*) winbox - show "System/Health" only on boards that have health monitoring;
*) winbox - show "LCD" only on boards that have LCD;
*) winbox - renamed IP protocol 41 to "ipv6-encap";
*) winbox - increased "target" field limit to 128 under "Queues" menu;
*) winbox - hide "Allow Roaming" parameter on LTE modems that do not support it;
*) winbox - fixed duplicate "Trusted" setting under "Interface/Bridge/Ports" menu;
*) winbox - fixed QCA-8511 switch chip type reporting under "Switch/Settings" menu;
*) winbox - fixed "reachable-time" value unit under "IPv6/ND" menu;
*) winbox - do not show empty "CPU Frequency" parameter under "System/Resources" menu;
*) winbox - added "Channel" parameter under "System/Console" menu;
*) winbox - added "interworking-profile" parameter under "Wireless" menu;
*) winbox - added support for PTP;
*) winbox - do not show "Functionality" field for LTE interface if it is not provided;
*) winbox - fixed "vid" parameter under "Bridge/Hosts" menu;
*) winbox - show "System/Health" only on boards that have health monitoring;
*) winbox - do not allow to set empty "init-string" field under "System/GPS" menu;
*) winbox - added "src-mac-address" parameter under "IP/DHCP-Server/Leases" menu;
*) winbox - do not show "network-mode" parameter for LTE interfaces that do not support it;
*) winbox - do not show empty "CPU Frequency" parameter under "System/Resources" menu;
*) winbox - fixed "reachable-time" value unit under "IPv6/ND" menu;
*) winbox - fixed QCA-8511 switch chip type reporting under "Switch/Settings" menu;
*) winbox - fixed health reporting on RB960, hEX and hEX S devices;
*) winbox - hide "Allow Roaming" parameter on LTE modems that do not support it;
*) winbox - increased "target" field limit to 128 under "Queues" menu;
*) winbox - show "LCD" only on boards that have LCD;
*) winbox - show "System/Health" only on boards that have health monitoring;
*) winbox - show "activity" column by default under "IP/Kid Control/Devices" menu;
*) wireless - added U-NII-2 support for US and Canada country profiles for mANTBox series devices;
*) wireless - improved WPS process stability;
*) wireless - added U-NII-2 support for US and Canada country profiles for hAP ac lite;
*) wireless - increased "group-key-update" maximum value to 1 day;
*) wireless - updated "indonesia5" regulatory domain information;
*) wireless - updated "no_country_set" regulatory domain information;
*) wireless - do not override MTU and ARP values from CAPsMAN with local forwarding;
*) wireless - added U-NII-2 support for US and Canada country profiles for hap ac, hAP ac^3 LTE6, Audience and Audience LTE6;
*) wireless - updated "israel" regulatory domain information;
*) wireless - renamed "macedonia" regulatory domain information to "north macedonia";
*) wireless - added U-NII-2 support for US and Canada country profiles for hAP ac^3;
*) wireless - create "connect-list" rule when address specified for "setup-repeater";
*) wireless - fixed issue with multicast traffic delivery to client devices using power-save;
*) wireless - improved iOS compatibility with HotSpot 2.0 networks;
*) wireless - fixed issue with multicast traffic delivery to client devices using power-save;
*) wireless - improved iOS compatibility with HotSpot 2.0 networks;
*) www - added "X-Frame-Options" header information to disallow website embedding in other pages;
*) www - added "X-Frame-Options" header information to disallow website embedding in other pages;
# first let's add some new A and AAAA dns records for www.example.com
/ip dns static add name=www.example.com address=93.184.216.34
/ip dns static add name=www.example.com address=2606:2800:220:1:248:1893:25c8:1946
# and run some tests on the dns STATIC table...
/ip dns static print terse where name=www.example.com
0 name=www.example.com address=93.184.216.34 ttl=1d # <---- notice this is not a 'type A' record
1 name=www.example.com type=AAAA address=2606:2800:220:1:248:1893:25c8:1946 ttl=1d
/ip dns static print terse where name=www.example.com type=A # <---- issue right here (no output)
/ip dns static print terse where name=www.example.com type!=A # <---- another issue here
0 name=www.example.com address=93.184.216.34 ttl=1d
1 name=www.example.com type=AAAA address=2606:2800:220:1:248:1893:25c8:1946 ttl=1d
/ip dns static print terse where name=www.example.com type=AAAA
0 name=www.example.com type=AAAA address=2606:2800:220:1:248:1893:25c8:1946 ttl=1d
/ip dns static print terse where name=www.example.com type!=AAAA
0 name=www.example.com address=93.184.216.34 ttl=1d
# Now Let's verify the output of these exact same commands run on the dns CACHE table:
/ip dns cache print terse where name=www.example.com
0 S type=A data=93.184.216.34 name=www.example.com ttl=1d
1 S type=AAAA data=2606:2800:220:1:248:1893:25c8:1946 name=www.example.com ttl=1d
/ip dns cache print terse where name=www.example.com type=A
0 S type=A data=93.184.216.34 name=www.example.com ttl=1d
/ip dns cache print terse where name=www.example.com type!=A
0 S type=AAAA data=2606:2800:220:1:248:1893:25c8:1946 name=www.example.com ttl=1d
/ip dns cache print terse where name=www.example.com type=AAAA
0 S type=AAAA data=2606:2800:220:1:248:1893:25c8:1946 name=www.example.com ttl=1d
/ip dns cache print terse where name=www.example.com type!=AAAA
0 S type=A data=93.184.216.34 name=www.example.com ttl=1d
# The output of "/ip dns static print" and "/ip dns cache print" commands is expected to be identical, but it's not.
# At the same time the output of "/ip dns cache print" seems to be correct.
What's new in 6.48 (2020-Dec-22 11:20):
*) dns - do not use type "A" for static entries with unspecified type;
/ip dns static add name=www.example.com address=93.184.216.34
/ip dns static add name=www.example.com address=93.184.216.34 type=A
is either a bug, or in a very early Alpha, (not even "Beta") stage.*) dns - do not use type "A" for static entries with unspecified type;
--*) dns - hide default static entry "type" from export;
Nice post.So lets see how the actual release notes for long-term v6.48.5 upgrade from v6.47.10 looks like:
Well, what I find most irritating is that the stable release was 6.48.4 (and it had some known problems e.g. in DNS resolver) and now it is quickly upgraded to 6.48.5 and declared long-term.What is different this time is that Mikrotik gave less than two months to last stable release 6.48.4 to pass it on the long term release. Previous releases gave more time to the preceding stable version if I recall it correctly. Maybe they didn't have much tickets from 6.48.4 or maybe they just have strengthen their testing team ( I hope ).
Well, what I find most irritating is that the stable release was 6.48.4 (and it had some known problems e.g. in DNS resolver) and now it is quickly upgraded to 6.48.5 and declared long-term.
Try to compare the functionality and what they can do. The other does not even reach to knees of RouterOS in number of function compared to price.When I looked on some threads, you make very basic bugs in every new firmware...Is this normal programming? Because when I buy some crap Asus, TP-Link...it has more stable firmware, than this...
wait @Jotne... compared to price.
Try to compare the functionality and what they can do. The other does not even reach to knees of RouterOS in number of function compared to price.
Everyone is free to select what they like best. I do love RouterOS...
Yes, but when I don't need all this functions, so it is ok for me. Mikrotik has good HW. Others no...When you buy TPLink you may get 1 or 2 updates in the lifecycle of the device. Then it is EOL. The reason to buy "crap" from TPLink, Asus and Co. is simply: when such a device has OpenWrt support - then you get a well performing device for cheap with some futureproof opensource firmware on it.
Hi,
Just applied the upgrade. Why is the multicast package missing? I have to use IGMP Proxy and now it's not available.
EDIT: I had to re-download the multicast package included in all_packages.zip, then applied it and everything back to normal. If I remember right the last time I did an upgrade I did not have to upgrade the multicast package separately. Can somebody confirm? Maybe I'm wrong about that. I'm also a quite new MT user, so sorry for that.
Might also be the case that last time I upgraded via system/packages/check for updates/download and install, which might be different from downloading and applying manually.
Thanks
Normally, they all do get upgraded/downgraded – if you had any extra packages installed. And, normally, should be complete safe to upgrade to the latest "long-term". That sound like a bug...
Just applied the upgrade. Why is the multicast package missing? I have to use IGMP Proxy and now it's not available.
EDIT: I had to re-download the multicast package included in all_packages.zip, then applied it and everything back to normal. If I remember right the last time I did an upgrade I did not have to upgrade the multicast package separately. Can somebody confirm? Maybe I'm wrong about that. I'm also a quite new MT user, so sorry for that.
Might also be the case that last time I upgraded via system/packages/check for updates/download and install, which might be different from downloading and applying manually.
That is stretching the reality by quite some lengths beyond imagination.
Mikrotik has more options, yes...But only non functionality feature!
I am not complaining that there are bugs or missing features, there always are.Changing one version from stable to longterm is nothing new, and with all changes there was bugs before, and new bugs after...Well, what I find most irritating is that the stable release was 6.48.4 (and it had some known problems e.g. in DNS resolver) and now it is quickly upgraded to 6.48.5 and declared long-term.
I do also see people complaining than stable changes to long term. If that is not the way to do it, how to do it then.
Hopefully it will be better with time...
Yes, OpenWrt is ok for this device and it's also for simple user and the function is good. This is problem on the both sides...TP-Link, Asus..cheap HW, but on SW sides is ok. TP-Link is dead after 2 years of using (HW problems).. Mikrotik has very good HW and the SW is buggy...Not open for open source, or different SW.@winap
All these original firmware on devices like Linksys, Asus, Tplink just suck. Always bubbly weird customer oriented webinterfaces. After years you have a whole a lot of security concerns running these devices with their many years outdated software. no, these devices suck out of the box. Openwrt - yes is great. you can't compare apples with pears.
I mean , If i reading posts on this forum, some people has problems with auto restarting, non functional internet after few days, non function sensors of voltage/temp..Non functional Jumbo frame..this are a simple mistakes and it has no deep problem in programming. This must can do every HW router...I have rb5009 and wifi, but I must waiting for better software on it, because I don't want to be a beta-tester like windows users. Some unit has only 16MB flash and if I reinstall SW every month, we know, so the bad blocks will be only decrease it.That is stretching the reality by quite some lengths beyond imagination.
I do run small and big networks based on Mikrotik and hardly can recall any bug impacting the network, performance wise there are things I wish they can do better, but bugs to bring down a network? Not any I can think of.
Yes, OpenWrt is ok for this device and it's also for simple user and the function is good. This is problem on the both sides...TP-Link, Asus..cheap HW, but on SW sides is ok. TP-Link is dead after 2 years of using (HW problems).. Mikrotik has very good HW and the SW is buggy...Not open for open source, or different SW.
So like woman : good hardware, but the software is bad. HW is good, but I don't know, what will be in next update.
What is buggy? Which issues are you having? My RB4011 runs fine without reboots or anything (even with "ultra buggy" WiFi that needs a little love to setup). It ran on its own on 6.48.3 this summer for 63 days without a single problem while I was on vacation. Isn't that usable and stable? I don't use all the features, so others might have issues that I don't.To Moba:
Nobody, but find good HW is very hard. I don't need router with wifi, so almost every router has wifi part. I wanted strong router, but also a good software on it.
So I choosed mikrotik, but I don't know, how buggy is. I still hoping, it will be better...
If I buy router around 200USD, I also hope, the software will be usable and stable. And that's my standarts.
I can reproduce. I have upgraded one RB 2011, routeros upgraded successfully, although it took 2min+ to upgrade. Routerboot upgrade bricked the device. It is a remote device so I can not press any reset button.Ok so Files upgraded as expected but when i upgraded the routerboard version on two devices RB2011 access to devices was lost. Device is booting with ether boot displayed - have so far been unsucessful in factory reset and therfore cant use Netinstall iether. They both appear to be bricked.
I discussed about this with Normis some time ago and he insisted Mikrotik does it properly, there shouldn't be cumulative changelogs, we should read all changelogs by ourselves. The reason is - in cumulative changelog it is impossible to see all changes if version goes from one channel to another. I.e., some feature is introduced while v.6.48 was in stable channel, then patched 3 times still in stable, then v.6.48 goes to long-term, and in cumulative changelog we will see only this new feature introduced and nothing about it's evolution from initial trough these 3 patches. This was how I understood his arguments.
Especially since even the changelog references a non-existing long-term release in relation to changes from v6.48.4 and not the actual predecessor v6.47.10 .
https://mikrotik.com/download/changelog ... lease-tree
So lets see how the actual release notes for long-term v6.48.5 upgrade from v6.47.10 looks like:
Post configuration (i.e. example) or it didn't happen.I discussed about this with Normis some time ago and he insisted Mikrotik does it properly, there shouldn't be cumulative changelogs, we should read all changelogs by ourselves. The reason is - in cumulative changelog it is impossible to see all changes if version goes from one channel to another. I.e., some feature is introduced while v.6.48 was in stable channel, then patched 3 times still in stable, then v.6.48 goes to long-term, and in cumulative changelog we will see only this new feature introduced and nothing about it's evolution from initial trough these 3 patches. This was how I understood his arguments.
Especially since even the changelog references a non-existing long-term release in relation to changes from v6.48.4 and not the actual predecessor v6.47.10 .
https://mikrotik.com/download/changelog ... lease-tree
So lets see how the actual release notes for long-term v6.48.5 upgrade from v6.47.10 looks like:
I think MikroTik should put all changelog items in a database keyed with version number where they are added and version number where they become superseded, and then provide a webpage where you can enter two version numbers and get a customized changelog between those two versions.I discussed about this with Normis some time ago and he insisted Mikrotik does it properly, there shouldn't be cumulative changelogs, we should read all changelogs by ourselves.
No time to search exact sample, but in stable channel changelogs these 'fixed (or reverting) something, introduced in some previous release' occurs quite often. Why I should trace down all these introduced-fixed-removed I don't understand but MT knows better :)Post configuration (i.e. example) or it didn't happen.
Yes! I hope people from Mikrotik will read this.I think MikroTik should put all changelog items in a database keyed with version number where they are added and version number where they become superseded, and then provide a webpage where you can enter two version numbers and get a customized changelog between those two versions.
Channel (stable, long-term, testing) does not matter in this case.
Ideally, some items in the database would have a more detailed description, a link to documentation, or other info. You can get that by clicking somewhere in the listed changes.
Perhaps thisNo time to search exact sample, but in stable channel changelogs these 'fixed (or reverting) something, introduced in some previous release' occurs quite often. Why I should trace down all these introduced-fixed-removed I don't understand but MT knows better :)Post configuration (i.e. example) or it didn't happen.
I discussed about this with Normis some time ago and he insisted Mikrotik does it properly, there shouldn't be cumulative changelogs, we should read all changelogs by ourselves.
Noticeable DNS performance decrease screams placebo and/or other network issues. You need to back up that claim with some hard data homieI discussed about this with Normis some time ago and he insisted Mikrotik does it properly, there shouldn't be cumulative changelogs, we should read all changelogs by ourselves.
Certainly Mikrotik has the authority to choose the best RouterOS release and upgrade cycle in the best interest of their business. At the same time I've noticed a decrease in DNS performance of up to 25% between v6.46.8 and 6.48.5 both of which were released in the "long-term channel". Moreover I am willing to accept the Mikrotik's definition of "long-term", with one caveat: the definition of "long-term channel" should be clearly communicated so users can make an informed decision.
In my book, a noticeable performance decrease should put a question mark for a "stable", and certainly not qualified for the "long-term" channel.
An acceptable solution, and perhaps the the best strategy overall (with regards to release channels, updates within channels, and changes to IPv6 DNS in particular) would be releasing the changes under optional packages. Users would then decide whether to stay with an old package, or use a new DNS package and take a performance hit. The responsibility for the outcome would be with the user. The role of Mikrotik would be to provide users with package options and facilitate their decision by keeping them informed.
The current "situation" can best summarized as: the changes are "pushed" into "long-term" channel, while users are not fully aware of what goes on. This bring us back to the same point: What is the definition of "long-term" channel?
Thanks
a noticeable performance decrease
You need to back up that claim with some hard data
Same here with 4xx series.. I wrote comment above about this... Only they die when the 6.49 firmware upgrade is done.'SXT lite5 bricked. only option was to netinstall to lower release. Figured just a one off, then second sxt bricked. Then tried the "stable" 6.49 and yet another sxt bricked. Never had an sxt die fron an update before.
Dissapointed as a couple of the fixes are useful to me. No doubt MT will patch the problem but have lost faith in the long term channel for now, :-(
The sxts were upgraded from quite old releases 6.27 was the oldest, maybe there needs to be an interim update like 6.48.4, will have a play with some sxts i have on the shelve, see if there is some pattern
As a tester I also tried 6.49 stable on a mantbox and that went well,
Agree that DNS may not be the root cause, and an issue may be something else. The important detail here is that the issue goes away after downgrade to 6.47.10, or 6.46.8."Noticeable" screams placebo and/or other issues. You need to back up that claim with some hard data homie
What's new in 6.48 (2020-Dec-22 11:20):
*) arm - added support for automatic CPU frequency stepping for IPQ4018/IPQ4019 devices;
{
:local x www.example.com;
/ip dns static
:put "adding a temorary dns record..."
:do { add name=$x address=[:resolve server=9.9.9.9 domain-name=$x]; # add a temorary dns record
} on-error={:put "found the existing record..."}
:put "testing..."
:for i from=0 to=9 do={:put [:time {find name=$x}]}; # measure the time to find it (run 10 times)
:put "finished, removing temorary dns record..."
remove [find name=$x]; # done testing, remove the temorary record
}
what exactly is meant by this? What is new with POE firmware? Have these bug viewtopic.php?t=179211 been fixed?*) poe - update PoE firmware only on devices that supports it;
I tested it myself and NO! The problem still remains!what exactly is meant by this? What is new with POE firmware? Have these bug viewtopic.php?t=179211 been fixed?*) poe - update PoE firmware only on devices that supports it;
I would like to chime in for all saying Etherboot on the LCD screen == bricked......no. it just means you should backup config before an upgrade. which was mentioned in the very first post on this thread and other recent ROS release announcements.
Then you get to netinstall your device and restore the export you made. definitely not a brick as that implies the device is not recoverable.
as @pe1chl mentioned, they can't test for all possible configs. they likely test the upgrade process on the default config. its literally not possible for them to even know, much less test against, every possible config that could be set on our devices.
Also it seems that version of routerboot matters and obviously routerboot doesn't care if you run DNS or anything else... so likely other software performance is also affected.
routerboard: yes
model: 2011UiAS-2HnD
serial-number: 4XXXXXXXXX6
firmware-type: ar9344
factory-firmware: 3.10
current-firmware: 6.47.1
upgrade-firmware: 6.47.1
This is commonly called a softbrick, meaning it can be recovered using tools like netboot.I would like to chime in for all saying Etherboot on the LCD screen == bricked......no. it just means you should backup config before an upgrade. which was mentioned in the very first post on this thread and other recent ROS release announcements.
I'm open to ideas on how to do this remote.Then you get to netinstall your device and restore the export you made. definitely not a brick as that implies the device is not recoverable.
viewtopic.php?t=178450I'm open to ideas on how to do this remote.
I have a couple of devices mounted on my brother's roof and my dad's roof that are difficult for me to reach. I understand its not the same kind of difficulty that a wisp or similar will face with remote devices. But I still don't upgrade them unless I have to. They're staying at 6.47.10 for the foreseeable future, which is the last urgent bugfix I saw.People hit the "update" button very very fast. Dont understand why! I can't see any urgent security fixes in the changelog.
It has already been discussed above. For MikroTik, "long-term" does not really mean "maximally stable". It is more like a release with mostly long-existing features thatHow does MIkrotik test releases? I mean, lets see the academic explaination what long-term channel actually means for Mikrotik. For many people, longterm means: most battletestes. most stable. mostly bugfree. So to say a "rock solid" release. But then you realize, Mikrotik just shift over a release from stable to longterm - without any known requirements when this happens.
Yap, agreeI still think it is a bad policy to release a new version in the stable channel and declare it the long-term version at the same time.
You should move versions to the long-term channel only after they have proven to be free of obvious issues in the stable channel for some time.
(I know that long-term, stable and testing are not referring to quality of the software, but lots of users run long-term versions because they do not want to be concerned with bugs inadvertently included in a fresh release version)
Thanks for the post pe1chl
Disappointing that LT is treated the way it is but it is what it is I guess though I don't get people who just smash that upgrade button for no reason.
Granted we only update when a) There is a major security fix or serious bug we are hitting in prod b) It's passed lab testing before slowly rolling out in prod
I'll have to look at the firmware thing because I'm almost certain our ansible scripts update the firmware along with the OS version as we've had issues in the past when the two don't line up. Might have to realign that strategy.
Now thats what im talking about! Great work!!You need to back up that claim with some hard data
I took some time to capture a full 1 hour video to demonstrate
the difference between 2 versions:
----------------------------------------------------------------------
total_dns_boot time_version 6.46.8___~ 1 minute
total_dns_boot time_version 6.48.5___~ 13 minutes
----------------------------------------------------------------------
single record look-up in version 6.46.8___9.5 seconds
single record look-up in version 6.48.5___13.5 seconds
----------------------------------------------------------------------
video file: ROSv6485_TroubleShoot.mp4 (210Mb)
archive: ROSv6485_TroubleShoot.rar (94Mb)
download link: https://ufile.io/3zeohstq
* pass for archive: i_Love_RouterOS_6485
0~7 min. tests running in version 6.46.8
@ ~ 7 min. version upgrade to 6.48.5
~ 7~21 waiting for RouterOS to boot
21~40 min. test running in version 6.48.5
@ ~40 min. noticed CPU throttle
@ ~43 min. downgrade back to 6.46.8
43 ~End - testing 6.46.8 again.
----------------------------------------------------------------------
Recording this took a good chunk of my family life, and I would really appreciate developers study it in detail.
and rebooted them twice (software uprgrade + bootloader upgrade)./system routerboard settings auto-upgrade=yes
Maybe not related, but "changing cpu frequency" was a hint to upgrade my hAP ac2 from 6.45.6 (very Stable) to 6.48.5 (LT), and to change the CPU frequency to "auto"
The RB450Gx4 router is ARM based IPQ4000L and I would not rule out that this change is responsible for performance drop:
What's new in 6.48 (2020-Dec-22 11:20):
*) arm - added support for automatic CPU frequency stepping for IPQ4018/IPQ4019 devices;
I did some more testing, and these are the results:
1. Upgrading from ROS 6.46.8 ---> ROS 6.48.5 (with the firmware v6.46.8) did not help.
* Changing cpu frequency from Auto to default 716Mhz did not help.
My mom always said, upgrade was like a box of chocolates. You never know what you're gonna get. :DMy Dad says ... always look on the bright side of upgrade :) :)
They did it in the past. 6.45.6 is a super stable version, the LT made out of that 6.45.8 was problematic. (viewtopic.php?t=156825&#p782153)But in this case, before that was done there were some "quick fixes" to the existing stable version 6.48.4 and it was made 6.48.5 and put into long-term.
Of course these quick fixes also introduced new problems. It would have been better to release 6.48.5 as stable,
There may be an opportunity for MT here to provide paid access (subscription or per-release) to some kind of ultra-stable channel with security bugfixes only for those who really can't risk running unproven releases.
I can certainly think of a bunch of devices worth paying to keep running safe and secure releases, even if they have to forgo feature updates for years.
I cannot reproduce that here in 6.49. I presume this is visible in the /ip ipsec listings as a blank IP instead of the resolved IP in the remote address columns, butThere is one major L2TP/IPSec regression in 6.48.x that has not yet been fixed in 6.48.5 (or anything newer):
Using ROS 6.48.x, 6.49.x, 7.x and configuring IPSec peers with DNS name as remote address (not using fixed remote IP) the L2TP/IPSec connectivity stops working because any DNS addressed IPSec remote peer gets matched as peer for the incoming L2TP/IPSec connection instead of automatically generated L2TP peer.
I was thinking more another tier beyond the existing long-term channel - it would take MT extra work to back-port security patches and perform additional testing to an ultra-stable channel (and ultra-stable-candidate channel?) as well as provide a degree of contractural guarantee in the additional purchase, so that may warrant additional charges to cover that expense. There's no reason someone couldn't either remain on a given older version (without security fixes) or track the relatively more dynamic Long Term and Stable channels. You bought the hardware with either the existing channel arrangement or an even smaller set of channels, so adding one more paid tier wouldn't lose you anything you don't already have.Certainly not in the long-term channel. I've already paid mikrotik for the hardware. I come here in this release channel to actually make it work like advertised.
However, this is off-topic here so I'll drop it now.
[if@tv-cpe] > /export
# oct/30/2021 23:10:20 by RouterOS 6.48.5
# software id = foo
#
# model = RB941-2nD
# serial number = bar
/interface bridge
add name=bridge1
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-onlyn channel-width=20/40mhz-XX \
country=austria disabled=no frequency=auto installation=indoor mode=\
station-bridge ssid=jupiter wireless-protocol=802.11
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk disable-pmkid=\
yes group-ciphers=tkip,aes-ccm mode=dynamic-keys supplicant-identity=\
MikroTik unicast-ciphers=tkip,aes-ccm wpa-pre-shared-key=baz \
wpa2-pre-shared-key=baz
/user group
set full skin=tv-cpe
/interface bridge filter
add action=drop chain=input dst-port=68 in-interface=!wlan1 ip-protocol=udp \
mac-protocol=ip
/interface bridge port
add bridge=bridge1 interface=wlan1
add bridge=bridge1 interface=ether1
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/interface list member
add interface=wlan1 list=WAN
add list=LAN
add interface=ether1 list=LAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether4 list=LAN
/ip dhcp-client
add disabled=no interface=bridge1
/ip ssh
set strong-crypto=yes
/system clock
set time-zone-name=Europe/Vienna
#error exporting /system identity
#interrupted
I've had the same problem on 3 devices. Port flapping, bringing down device. Worst ROS "long-term" update I've ever tried. Stay away from this version!Updating two NetMetal 5 from 6.44 to 6.48.5 were okay. but when I update bootloader the device start to flip flop on ether1, so I had to bring them down netinstall to 6.47.10 and everything seems okay then! I do not recommend anyone to install this long-term version!
I use split packages as well but still on my hAP ac2 with only 4 packages for use as a wireless AP it fails to install RouterOS v7 "due to lack of space" :-(I have updated 10 hap ac2s and a few hap lites, and didn't have this problem with any of them. I'm using split packages on all of them.
I don't use bundle package anymore with 16MB flash devices.
free-memory: 77.8MiB
total-memory: 128.0MiB
free-hdd-space: 2656.0KiB
total-hdd-space: 15.3MiB
Have a look at my topic about upgade path from split packages.Uploading OK, reboot and then it is back in v6 with an error message indicating lack of space...
100% this.. I have been asking for this since way before there was a Long term channel. There needs to be a known stable channel where the last version that has been in the field some time with no instabilities or show stopping issues is kept. Only incrementing when the next actual stable version is detected.I still think it is a bad policy to release a new version in the stable channel and declare it the long-term version at the same time.
You should move versions to the long-term channel only after they have proven to be free of obvious issues in the stable channel for some time.
(I know that long-term, stable and testing are not referring to quality of the software, but lots of users run long-term versions because they do not want to be concerned with bugs inadvertently included in a fresh release version)
Surprised? Nothing has really changed since when we first got an RB532 and RB112 with Ros 2 , except they now reserve being rude to you in private and ignore you on the forum perhaps?They always read the forum, but for support problem, email then at support@mikrotik.com and you will get a ticket number and they will reply.
welcome to the world of bricked unrecoverable routers, got a stack of em here now..Ok so Files upgraded as expected but when i upgraded the routerboard version on two devices RB2011 access to devices was lost. Device is booting with ether boot displayed - have so far been unsucessful in factory reset and therfore cant use Netinstall iether. They both appear to be bricked.
Agreed, Pretty poor form when the 7.1rc5 firmware is more reliable than the supposedly Long Term and Stable bootcode..What I do not understand: why does MT not revoke this release or at least speak out an official warning? Instead they are silent and people keep bricking their devices? It is quite a month out now - there should be enough information collected to pin down: which platforms are affected by the firmware issues? And how to resolve. 1 month without hotfix.
This it not what I have seen from MT. They always tries to help out if you ask polite for help.Surprised? Nothing has really changed since when we first got an RB532 and RB112 with Ros 2 , except they now reserve being rude to you in private and ignore you on the forum perhaps?
The issue with unavailable devices after 2nd reboot has been reproduced and it seems to be related when upgrading from 6.41.4 (or older) RouterOS/RouterBOOT versions. Our apologies for the caused issues, the fix will be included in upcoming releases.
So anyone using older than 6.42 RouterOS or RouterBOOT versions, please first upgrade RouterOS and RouterBOOT to 6.48.4 or 6.47.10, and only then use the latest version.
Can’t you just netinstall the device to recover it? Others were reporting that that was working.Unless you can instruct distributors to accept free returns/swaps of bricked hardware for swap for the duration?
Before an upgrade:Updated an edge router at a client from 6.47.10 to 6.48.5, didn't show back up in VPNs (1 OVPN, 2 L2TP). Assuming it's crashed or worse. Have a backup, but not quite up to date... Building is closed for the weekend, will still drive there (40min) and try my luck through the admin WLANs.
That's what you get from updating sort of in a hurry on a Friday afternoon, I guess. Never had an issue remotely like this on the long-term branch though.
If you see the thread for 6.49 (which has the same issues), MikroTik found that this issue only happens when you are upgrading from a device that has a very old RouterBOOT firmware (6.41.4 or older). If the RouterBOOT firmware is newer than 6.41.4 it *should* upgrade without issue.this version is a disaster....
That would have helped me 0% here because the device got inacessible remotely. It still was responsive through the local net, though. All the bridges and ports failed to load after update reboot, so all the adresses and routes were of course inactive. I had seen that once before, at around 6.43 or so on current branch. Another reboot actually fixed it and the routerboot luckily also didn't break, but I still downgraded to 6.47.10 to be safe. Also enabled ping watchdog, which might have caught this, but I generally try to avoid on big hotspot edge routers.Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
When you have hundreds of devices you should arrange for a backup mechanism that runs regularly (depending on the frequency of your config changes) and that you can easily kick off as part of your upgrade procedure.Also, backuping everything at every update becomes impractical quite quickly when updating hundreds of small devices.
I've never had any issues with long-term released until today!! I would expect this from beta's but NOT from long-term releases... long-term is like legacy releases kinda to mebugs inadvertently included in a fresh release version)
Well v6.48.5 is a mess... I was on 6.44.6 and went to 6.48.5If you see the thread for 6.49 (which has the same issues), MikroTik found that this issue only happens when you are upgrading from a device that has a very old RouterBOOT firmware (6.41.4 or older). If the RouterBOOT firmware is newer than 6.41.4 it *should* upgrade without issue.this version is a disaster....
Long-term branch should NOT have these problems... one would expect long-term to be exactly the same as stable that's maybe 1-2 releases behind and proven to be stable without any reported issues. But that's not the case, long-term is older version where some fixes and features are backported and added, so it may happen to be even worse than current stable.
To make things even worse, Mikrotik completely fails to put up any warnings even if there are known serious issues with the release. Now that they know what's causing the problem, I would have expected big warning at the top of this thread, maybe also on the download page. But no, this is Mikrotik... everything is fine, people are still flooding forum with new threads about bricked devices, but who cares...
ExactlyLong-term branch should NOT have these problems
I agree with some colleagues, if there is an error, it has been identified, then it is urgent:The issue with unavailable devices after 2nd reboot has been reproduced and it seems to be related when upgrading from 6.41.4 (or older) RouterOS/RouterBOOT versions. Our apologies for the caused issues, the fix will be included in upcoming releases.
So anyone using older than 6.42 RouterOS or RouterBOOT versions, please first upgrade RouterOS and RouterBOOT to 6.48.4 or 6.47.10, and only then use the latest version.
If I want make a good SW, I must testing a very long time to sell good SW without bugs ..But Mikrotik doesn't care about trouble of people..ALL this is financial and image losses, creating a shadow of the unprofessionalism of the IT industry.
Ref post above 6.41.4 (or older) gives problem when upgrading to 6.48.5. 6.47.10 should work, post a support case to MTHave the same problem.
RB951Ui-2HnD 6.47.10 —> 6.48.5, 6.40.7 —> 6.48.5 same problem: no boot after 2nd reboot. Hap AC lite, RB751 — no problem
Very funnythis is a user forum, mikrotik support is support@mikrotik.com
Here, for example: viewtopic.php?p=889344#p889344where is the people from Mikrotik in this forum!?!
thank youHere, for example: viewtopic.php?p=889344#p889344where is the people from Mikrotik in this forum!?!
I agree with some colleagues, if there is an error, it has been identified, then it is urgent:
1) revoke 6.48.5 (remove the firmware file itself from publicity) (it is impossible for devices to be updated)
2) urgently make a correction and release 6.48.5.1, since the Long-Term market segment = these are important commercial routers. (especially since you have already done such fixes)
3) warn on the website / in the shell that there may be problems when installing 6.48.5. Because not everyone reads forums and so on. Although it is more correct, part 1 is to revoke the update that the router turns into a BRICK and make a correct Corrected update.
Because they make what makes sense: Changes are tested in development and/or testing channel, the changes are cherry-picked to stable and long-term then.Now why they choose to release v7 instead of quick fix for long-term... ?!!
I dont see the problem.Well, if it's going to take a week before long-term is fixed, just pull the release. At least for affected architectures. Just disable download and update within ROS.
Remember... I was on v6.44.6 when I went to v6.48.5 when my router got bricked! ....v6.44.6 is not that ancient old...I dont see the problem.Well, if it's going to take a week before long-term is fixed, just pull the release. At least for affected architectures. Just disable download and update within ROS.
First 6.41.4 is very old, so some one has missed out many many version.
Second, I do not auto upgrade, and always read the forum and wait some weeks before upgrade.
But I do agree that this should have not show up in fist place.
You are right about this, only partially. In such case changelog should start with "warning, if you upgrade from versions older than..."I dont see the problem.
First 6.41.4 is very old, so some one has missed out many many version.
Does anyone read the forum before updating customer's equipment?Does anyone test this before going public?
That would be ideal but in reality would be an absolute nightmare to maintain. e.g. if there was a bug introduced in 6.48.2 that was fixed in 6.48.5 it shouldn't be mentioned at all in a 6.47.10 to 6.48.5 changelog.Nice post.So lets see how the actual release notes for long-term v6.48.5 upgrade from v6.47.10 looks like:
What MT should do is to make a web page where you select two different release and it will then show all changes between those two releases.
Some like to see difference between 6.48.4 to 6.48.5 other 6.47.10 and 6.48.5. Some my upgrade from 6.48.2 to 6.48.5, so then those changes should be shown.
Sadly answer is Yes, you have to if you have any Mikrotik hardware in your network, otherwise you are risking downtime, bricked devices and more.Are you kidding? Should I read 150 forum entries before I install the officially released version of the software? is it beta or long-term ??
It depends on what you want. You can choose to live the risky life and just install what is released, or you can decide to first read other people's experience with the software and then decide if you want to install it, or want to wait for the next release.Are you kidding? Should I read 150 forum entries before I install the officially released version of the software? is it beta or long-term ??
I think it would be possible (I have written this in other topics as well) to put all changelog lines in a database where for every line there are some keyfields like what release this pertains to, what release negates this change (initially empty, can later be filled), what release the problem was introduced in, what models it pertains to, maybe some other things.That would be ideal but in reality would be an absolute nightmare to maintain. e.g. if there was a bug introduced in 6.48.2 that was fixed in 6.48.5 it shouldn't be mentioned at all in a 6.47.10 to 6.48.5 changelog.
In this world full of serious vulnerabilities this approach is not possible anymore, unless you do not care about security and you do not mind to sacrifice your device for some botnet like "Meris" https://blog.mikrotik.com/security/meris-botnet.html. And this is the Sophie's Choice ... struggle with potential buggy upgrade or stay unprotected. Even if you have your own staging environment and you test new MikroTik builds before production deployment you can get into situation where new bits are not usable and old ones are vulnerable or having any other serious issue. Here is why I blame MikroTik for lausy cooperation with customers. The silence from MikroTik side in this thread as an example.don't touch what's not broken
So lets see if they deliver...Hello,
Suggested stable versions for upgrade are > 6.44.4, 6.46.6, 6.48.4, 6.49.
We will check and fix issues with upgrading in the next versions of ROS.
Best regards,
Oskars K.
soooo inconvenient and messedup I'd say... its like saying, if you want win10, you need to install windows 95 first and then upgrade and upgrade and upgrade until you reach win10I suggest you to progress 6.44.6, 6.46.8, 6.47.10, 6.48.5
soooo inconvenient and messedup I'd say... its like saying, if you want win10, you need to install windows 95 first and then upgrade and upgrade and upgrade until you reach win10I suggest you to progress 6.44.6, 6.46.8, 6.47.10, 6.48.5
Its not that we need proof....it's that we need hard data to confirm, troubleshoot and ultimately to fix. Someone just complaining that xyz doesnt work solves nothing. A vast majority of the people here work professionally in IT, we should do better.I feel the forum is taking a turn for the worse. Asking commentators to post a config or it didn't happen and other forms of proof. All is a bit harsh. Hats off to those that did apply the proof that they were telling the truth! Geez. Have some faith in people. MT forums are usually populated by professionals so their observations should be accurate.
I experienced the same thing with 18 RB953GS-5HnT-RP - All required a netinstall after upgrading and 2nd reboot seemingly wiped out the NAND storage. Error on serial terminal was "Kernel Not Found". Luckily in this case I was wiping the config and redeploying with a different configuration anyway.today 12 pieces of rb951 (upgraded to 6.48.5 before 10 days) used as caps soft-bricked after the second reboot happened by power outage. i netinstalled all of them and they are back to business.
curious if the original ROS version was particular older (eg not the previous long-term) - i’ve seen weirdness when going making big leaps in firmware?I experienced the same thing with 18 RB953GS-5HnT-RP -today 12 pieces of rb951 (upgraded to 6.48.5 before 10 days) used as caps soft-bricked after the second reboot happened by power outage. i netinstalled all of them and they are back to business.
the version the rb951ui-2hnd they had was ROS 6.43.16curious if the original ROS version was particular older (eg not the previous long-term) - i’ve seen weirdness when going making big leaps in firmware?
I experienced the same thing with 18 RB953GS-5HnT-RP -
The 2nd reboot is likely when the firmware auto-upgrade kicking in - so the 2nd reboot is a curious detail here.