I have scanned my router from external network with nmap and discovered that port 443 is opened.
I have no forwarding (dstnat) rules for 443 port and have disabled everyting in IP->Services except winbox on default port 8291.
Still have 443 port opened and accepting connections. Checked with curl:
Can i get a list of opened ports by system processes on RouterOS (guess no)?
What this could be if there’s no dsnat rules for port 443 ?
How to check router was not compomized by some malware (it has long and random password)?
When we try curl we have no meaningful answer due to tls handshake failure. When we do curl http://:443 , we do not have any answer (“Empty reply from server”).
Router has many configuration changes, should we send a dump of it? Kind of dangerous, there will be secrets for VPNs and etc…
We’ve checked forwaring rules , only have forwarding for several explicit external IPs and incoming ports like 22443:
If we block it explicitly in firewall, nmap stops showing it as open and connections with curl are being rejected.
But you got “enabled=yes” for that SSTP according to the CLI config and I would trust that more than winbox.
You could try to enable www-ssl and set that to a different port like 8443 or such and login using https://:8443 or whatever port you select and see what webfig tells you about this setting in the GUI?
Another thing to test is to (if possible) reboot the device and see if winbox fixes its display if this feature is enabled or not, or connect from another mgmt-client.
Before you do it would be interresting if you can set this feature to “enabled=no” and then do a new portscan to see if the 443/TCP goes away from the results?
The default for sstp-server on a CRS326 running 7.15.2 stable is (as reference):
/interface sstp-server server
set authentication=pap,chap,mschap1,mschap2 certificate=none ciphers=aes256-sha,aes256-gcm-sha384 default-profile=default enabled=no keepalive-timeout=60 max-mru=1500 max-mtu=1500 mrru=disabled pfs=no port=443 tls-version=any verify-client-certificate=no
Bonus: Another hint was that your portscan detected TLS 1.3 which the builtin webfig when runned as www-ssl or api-ssl only seems to support up to TLS 1.2 as of writing. That is there is some other service being runned.