Currently running RouterOS 5.19, we are planning to do some API operations over Internet, and our boss is worried about passwords, if they are sent in plaintext and/or it is secure enough to do it.
We don’t want people sniff our passwords and do unwanted operations to our devices
Note that even without an SSH tunnel, the RouterOS password is never sent in plain text. The whole procedure is a CHAP challenge, similarly to the one in hotspot. Without a tunnel, all other data is sent and received without any form of encryption though.
True, but at least it’s not clear text, and it still requires brute force, without rainbow tables and the like.
(Using an SSH tunnel is still better than no tunnel. I’m just saying that without a tunnel, the situation is one notch less dangerous than “everything is clear text”.)
Excuse me to take this long to reply.
Actualy we are doing tests and considering the best option to secure our Mikrotik devices. I would gladly thank everyone for their replies and time.
Also, one of our options is to use an Ubuntu Server as PPTP Server, and all Mikrotik connect to it using PPTP Client, forcing all devices to use MS-CHAPv2 as encryption protocol, to enseure secure communications.
In light of recent work against MS-CHAPv2, and the fact that even Microsoft has deprecated PPTP (in favor of SSTP which is a little more sane from a protocol design standpoint), I’d be very wary of using PPTP in production for anything actually sensitive.
MS-CHAP was weak the day it was announced, which is why MS-CHAPv2 happened in the first place. PPTP is, well, PPTP. It’s byzantine from the perspective of protocol design, and when one works through the actual entropy involved in the keyspace, it’s ridiculously small.