I did not check the IPv6 firewall rules in depth, so I don’t know if they are MT default or something compeltely different (but from afar they do seem a very custom rules). My experience is that MT default IPv6 firewall rules are pretty secure.
As to the privacy: in IPv6 working ICMP is way more important than it’s in IPv6 … so anybody blindly blocking ICMPv6 is doing themself a bad favour. Which means it’s normal that those “check IPv6 connectivity” pages will successfully ping you (as client of their page). However, things are not as bleak: method of issuing IPv6 addresses (the only one supported by ROS) is to announce the prefix (sort of network address) and then devices “invent” their addresses according to this prefix. The method is known as SLAAC. And this method allows a feature, which helps with privacy: devices tend to assume a permanent IPv6 address (which is based on MAC address of the network interface), but they also use temporary IPv6 addresses which are (apart from prefix part) random … and are used only for some time. And they use these temporary addresses when starting egress connections (the permanent IPv6 address is only used to accept ingress connections if there are any), so they will use different addresses with time.
The prefix length is most often /64, which gives huge number of addresses possible to use (around 4 bilion times more than total number of IPv4 addresses … all available for your own LAN) … and this makes any port scanner efforts futile.
And, if using MT’s default IPv6 firewall filter rules, FW will still block any ingress connection (apart from ICMPv6 connections … and even with IPv4, blocking ICMP is not enhancing securiy in any meaningful way).
It’s letting anything from internet to access your LAN. Making most of the rest of rules irrelevant. Remember that anything not handled by explicit rules will be implicitly allowed/accepted (and that includes chain=input, i.e. connections to router itself). You have the ultimate “reject all else” rule (which is overshadowed by above quoted rule anyway) which puts unnecessary burden on your router by sending replies to sender … it’s customary to simply drop forbidden packets which both makes router less stressed and life of a port scanner harder (it has to wait for timeout to happen instead of moving to another port/address immediately after receiving ICMP reply).
I’m strongly recommending you to have a look at default rules (execute /system/default-configuration/print) for inspiration. I’d say they are waaay better than what you showed in your opening post.
That wont show any default firewall rules. Is there anywhere I can find the default ipv6 firewall rules?
I am confident that I have setup the ipv4 side decently. Those firewall rules are good. Its the ipv6 I am struggling a bit with. Isn’t the default-configurations settings only applying a default ipv4 router setup?
I disabled for now rule #4. It shows it had 25.4 GiB of traffic. It was doing something.
It also relies on (manually managed) interface lists LAN and WAN.
No, as soon as IPv6 is enabled on router (in ROS v6 it needed optional package, in v7 it’s default) it’ll have default config. However, if IPv6 functionality gets enabled after initial setup is already done, then default config doesn’t get applied (only if reset to factory default is performed).
It sure did … it accepted all the internet->LAN traffic. But it did so undiscriminately, making the later rules (which are supposed to block some traffic) NO-OP.
I am running the x86 version of RouterOS and payed Mikrotik for a license a couple of weeks back.
On this device I had pfsense and opensense running fine but I always wanted to get my feet wet with RouterOS.
I am looking at the RB5009*. That sure does look like a cool device to play with and to learn with, but not now. I need to do it all with this Chinese box.
Thank you for supplying the default ipv6 rules! I will edit them (change interfaces names etc) to reflect my current setup.
I am not sure, but I thought I saw a default ipv4 config just after the first setup of my x86 device a month ago, but no ipv6.. but I went the blank route.
I have decent experience with ipv4 and firewall/routing so that helped allot starting from a blank.
Based on the fine MikroTik documentation and YouTube (The Network Berg mainly) I made a good working ipv4 router/firewall. The next step was ipv6.
For now I disabled ipv6 completely. I will order a RB 5009 and go from there.