Is there a way to trigger this without reinstalling the router, or generally to reset the DUID?dhcpv6-server - fixed DUID generation with timestamp;
Yes, that is the goal of this change. protected routerboot is abused by criminals asking ransom money to unlock compromised routers, so it requires physical presence to enable protected routerboot from now on...what if i am the admin and i want to enable protected routerboot to my routers remotely? not possible anymore?
update: please activate by turning power off or [b]pressing reset or mode button[/b]
It is now only in cli mode, no more in winbox. Probably another attempt to avoid remote tampering, this was also already done in v7.1rc6.i cant find the option "enable protected routerboot" in "system - routerboard - settings" like it used to be. where is it?
But the message about the need to press the button is not displayed in the console. Only displayed in the winbox. Not logicalIt is now only in cli mode, no more in winbox. Probably another attempt to avoid remote tampering, this was also already done in v7.1rc6.i cant find the option "enable protected routerboot" in "system - routerboard - settings" like it used to be. where is it?
When the protected-routerboot=enabled setting is done and then a print is done to display the current setting, it shows the message about the button in red.But the message about the need to press the button is not displayed in the console. Only displayed in the winbox. Not logical
Can you please share that support issue with me? My address is mail@username.de... Thanks!Earlier I tried to upgrade the hAP ac2 to v7.1rc6 encountering the same issue, which apparently is not a v6-to-v7 issue but just a "separate packages to bundle package on 16MB flash devices" issue. (SUP-66267)
The same die...Will MIPSBE devices continue to randomly die on routerboot upgrade with this release?
Have CCR long boot issues been fixed?
ok thanxi cant find the option "enable protected routerboot" in "system - routerboard - settings" like it used to be. where is it?
It is now only in cli mode, no more in winbox. Probably another attempt to avoid remote tampering, this was also already done in v7.1rc6.
What is considered "suspicious"? If I have firewall rules to allow myself remote access, how can RouterOS know if these are suspicious or not? This sounds very risky if it will disable configuration it thinks is suspicious, a great way to get locked out of a remote router.If suspicious configuration is detected, the suspicious configuration will be disabled and the flagged parameter will be set to "yes"
Hi,As a test, I tried to upgrade my hAP ac2 that now has just 5 separate packages 6.49 installed (advanced-tools,dhcp,security,system,wireless) to the manually uploaded bundle package for 6.49.1 and it fails with "not enough space for upgrade".
It looks like upgrading from separate packages to bundle package does not work on 16MB flash devices, I did the same on a RB2011 and a RB4011 without problem.
Earlier I tried to upgrade the hAP ac2 to v7.1rc6 encountering the same issue, which apparently is not a v6-to-v7 issue but just a "separate packages to bundle package on 16MB flash devices" issue. (SUP-66267)
Flags: X - disabled
# NAME VERSION SCHEDULED
0 system 6.49.1 1 advanced-tools 6.49.1
2 dhcp 6.49.1 3 multicast 6.49.1
4 ipv6 6.49.1 5 wireless 6.49.1
6 ppp 6.49.1 7 security 6.49.1
uptime: 34m55s
version: 6.49.1 (stable)
build-time: Nov/17/2021 10:06:00
factory-software: 6.45.9
free-memory: 67.4MiB
total-memory: 128.0MiB cpu: ARMv7
cpu-count: 4
cpu-frequency: 488MHz
cpu-load: 0%
free-hdd-space: 2232.0KiB
total-hdd-space: 15.3MiB
write-sect-since-reboot: 98
write-sect-total: 15340
bad-blocks: 0%
architecture-name: arm board-name: hAP ac2
platform: MikroTik
The upgrade itself is not an issue and works reliable. Switching back to the bundle package is what fails.I have the same device and setup as you, I use separate packages install on my ac2, and I didn't encounter the "not enough space" issue during upgrade. (And I upgraded twice already now, from 6.47.10 to 6.49, then to 6.49.1)
Hmm, I don't think that's what pe1chl was trying to do, if I'm understanding the post right. And even if that was the case that the user was trying to switch back from separate to bundle, then I think the right way would have been to netinstall the bundle package. 😊The upgrade itself is not an issue and works reliable. Switching back to the bundle package is what fails.
The number is already in the posting and the content is the same (i.e. it mentions the scenario and what is failing).Can you please share that support issue with me? My address is mail@username.de... Thanks!
I do not see why for this particular scenario a netinstall would be the way to go, especially when that is not documented on some MikroTik page.Hmm, I don't think that's what pe1chl was trying to do, if I'm understanding the post right. And even if that was the case that the user was trying to switch back from separate to bundle, then I think the right way would have been to netinstall the bundle package. 😊The upgrade itself is not an issue and works reliable. Switching back to the bundle package is what fails.
I understand now, and defer to your greater experience, as mine is limited to 16MB hAPs. I have not tried switching back and forth this way, only by doing netinstall, as relying on my limited understanding, one couldn't unbundle a bundled package by merely deleting the undesired package, which is not allowed. It needs to be installed unbundled, like a newly formatted device, which a netinstall does.Remember, it works fine on routers with more than 16MB flash, you can switch back and forth between separate and bundle by just uploading the desired .npk files and reboot. I tested that on RB2011 and RB4011 but it probably works on all routers.
It is also no problem to switch from bundle to separate packages on a 16MB router.
one couldn't unbundle a bundled package by merely deleting the undesired package, which is not allowed. It needs to be installed unbundled, like a newly formatted device, which a netinstall does.
Well, there is actually enough free space. My guess is that the calculation of required space over-estimates the requirement when installing a bundle over separate packages, and then aborts with the "not enough space" message, while on routers with more than 16MB flash the calculated requirement is still within available space and the bundle is installed correctly (with all separate packages deleted).I'm guessing that re-bundling fails for the same reason as does upgrade of bundled installation on devices with low free space and is not actually related to re-bundling process.
Finally!! I have been talking multiple times to Mikrotik about this since long. Glad they took some measures now.*) routerboot - enabling "protected-routerboot" feature requires a press of a button;
If you take security seriously, all network equipment and servers etc should be in a locked space.There is still a risk you can be locked out by some malicious employers who can have physical access. I
If you take security seriously, all network equipment and servers etc should be in a locked space.
😁Yup. And not connected to any network. Or power grid.
I 've seen that on firmware upgrade on 6.49 as well ...Upgrade to 6.49.1 resulted in a boot loop of hEX S (RB760iGS).
Due to an automatically script for firmware update, I can't say if the issue occured after installing the software or the firmware.
No access to device was possible until Netinstall, which solved the issue.
You qoted me but did not read in full I guess. I am not talking about server placed by the bus station, I am talking about someone who has credentials to access the rack room as I am not the only one who does.If you take security seriously, all network equipment and servers etc should be in a locked space.There is still a risk you can be locked out by some malicious employers who can have physical access. I
Would you place a server outside in public, no. Just with an usb emulating mouse or keyboard you could install lots of stuff.
You can never ever trust some 100%, but you can take lot of measure to make your solution as secure as possible within the budget you have.I am not talking about server placed by the bus station, I am talking about someone who has credentials to access the rack room as I am not the only one who does.
breaks that model.*) routerboot - enabling "protected-routerboot" feature requires a press of a button;
Yeah, I don't like this "flagged" stuff either. With zero control over it, this sounds like a trap that's waiting to cut your access at the worst moment because some of your configuration is misdetected or you upload "wrong" file or something like that.What is considered "suspicious"? If I have firewall rules to allow myself remote access, how can RouterOS know if these are suspicious or not? This sounds very risky if it will disable configuration it thinks is suspicious, a great way to get locked out of a remote router.
PLEASE read this recommendation. I concur only to use the button when setting the time requirement on something more than 100 seconds for example. ISP's use this a lot and this would completely break the original purpose of this feature.*) routerboot - enabling "protected-routerboot" feature requires a press of a button;
I suggest that ONLY the alteration of defaults of reformat-hold-button and reformat-hold-button-max triggers the additional requirement to press a button and not the activation of protected-routerboot itself.
This way protected-routerboot can be set remotely (that's extremely useful for ISPs and service providers for automated deployments) and there is no fear of criminal/etc abuse.
Just remember, that protected-routerboot was initially there to protect the router configuration itself, and that's perfectly fine with the defaults of reformat-hold-button/-max. If someone wants to actually make really difficult to reset/netinstall the router (by altering reformat-hold-button/-max), then a button should be pressed.
Ah... must have missed this... my bad. Peace in the world is restored.you mean like setting flagging-enabled to no?
As written in the docs? https://help.mikrotik.com/docs/pages/vi ... evice-mode
I believe you can do this now in v7 with webfig skins, as they work in winbox. I'm not sure if this works with the MikroTik app yet though.PLEASE ADD THE OPPORTUNITY TO DISABLE QUICKSET,
Manual is clear about this.interesting, /sys shutdown, doesn't affect device-mode, which is greater!
If you could do a soft reboot, it would not have worked as intended.After changing the device-mode, you need to confirm it, by pressing a button on the device itself, or perform a "cold reboot" - that is, unplug the power:
Any more info on that ?*) winbox - added "Modbus" menu support;
As I said... it all depends on your situation.@bpwl what's the big issue? if you configure remote devices someone has to plug them in for you.
So the button push is easy, whoever plugs the device gets a call to push the button when asked. woah, magic.
If something else could be the trigger of 'press of a button' requirement instead of protected-routerboot=enabled, then it should be the alteration of defaults ( reformat-hold-button=20s, reformat-hold-button-max=10m ). It can't be any other value, as it would be arguable if it is 100s or 50s or ..PLEASE read this recommendation. I concur only to use the button when setting the time requirement on something more than 100 seconds for example. ISP's use this a lot and this would completely break the original purpose of this feature.*) routerboot - enabling "protected-routerboot" feature requires a press of a button;
I suggest that ONLY the alteration of defaults of reformat-hold-button and reformat-hold-button-max triggers the additional requirement to press a button and not the activation of protected-routerboot itself.
This way protected-routerboot can be set remotely (that's extremely useful for ISPs and service providers for automated deployments) and there is no fear of criminal/etc abuse.
Just remember, that protected-routerboot was initially there to protect the router configuration itself, and that's perfectly fine with the defaults of reformat-hold-button/-max. If someone wants to actually make really difficult to reset/netinstall the router (by altering reformat-hold-button/-max), then a button should be pressed.
I think there is no way that you can install MikroTik devices with default config from factory, and then immediately do remote management on them."Protected-Routerboot will have to be set while physically cabling the device (That is not done by the owner)., or better after the config is tested, if a physical button press is needed.
This is way off-topic. But just to answer. They just have to plug them in (power on), as long as there is another well configured MT AP within wifi reach. In one response in this forum I helped someone who forgot to configure his 5 wAP devices and did send them over. Just make a station connect to the default open Mikrotik WLAN, and use the Telnet app (works like a proxy) on the good AP to configure the defaulted device. I can do this only with RouterOS, but it is as magic and gives me a sorcerers status. :-)I think there is no way that you can install MikroTik devices with default config from factory, and then immediately do remote management on them.
Looks like v7 won't get into 'stable' or 'long-term' for v6*) upgrade - added new "upgrade" channel for upgrades between major versions;
Yeah, but the criminals love it as well. That is why this kind of thing has to end.I rolled out the "routerboot protection" later as mitigation, fully remotely, on all devices. I love the amount of control you have with RouteOS !
It was probably done to make way for an in-place one-click upgrade to v7 (no need to manually download a package and upload it to the router, as it is now).Looks like v7 won't get into 'stable' or 'long-term' for v6*) upgrade - added new "upgrade" channel for upgrades between major versions;
I know. (I'm a CISSP) Let me be clear DOS and Ransom must be avoided at all cost. So the "special" actions for these critical lock settings are a must.Yeah, but the criminals love it as well. That is why this kind of thing has to end.I rolled out the "routerboot protection" later as mitigation, fully remotely, on all devices. I love the amount of control you have with RouteOS !
And MikroTik is quite late to the security party, that is why there are now hundreds of thousands of MikroTik routers in a botnet, and we see the
first victims here (undoubtedly there are many more that we don't see on the forum) who can either pay a ransom or bin all their MikroTik equipment.
Sure that was after insecure configuration, but still that is not an acceptable situation.
In hAP ac2, I don't see "upgrade" channel after updating to the latest stable (6.49.1). Am I missing something?*) upgrade - added new "upgrade" channel for upgrades between major versions;
Reading the hangelog and it seems to me they did not fix this bug at all.It is worrisome that it sounds like 6.49.1 has not fixed all of the upgrade issues where devices go into boot loops. Perhaps there were two causes of this and MikroTik has fixed only one.
The question is if all possible cases are covered or not, securely not.*) system - improved system stability if device is upgraded from RouterOS and/or RouterBOOT v6.41.4 or older;
That does not seem like that issue at all. We are arguing semantics now but when that issue will get fixed(if?) it will probably be written more like this(at least I would write it like this):You have really readed something?
The question is if all possible cases are covered or not, securely not.*) system - improved system stability if device is upgraded from RouterOS and/or RouterBOOT v6.41.4 or older;
Many users are having this problem and it seems thay stillhave that problem.Hi, everyone.
mkamenjak, the issue with upgrades from old RouterOS/RouterBOOT versions has been fixed in this release. Also, the problem in the 6.49/6.48.5 versions did not appear due to the RouterBOOT upgrade, it simply started after the second reboot.
East2, I did not manage to create a reboot loop on my hAP ac lite when upgrading to 6.49.1 (from old or new RouterOS/RouterBOOT versions). So something else might be causing this problem. Can you share more details? What RouterOS/RouterBOOD version did you use before the upgrade? Did this happen with other versions as well? Perhaps the problem is related to a specific configuration?
Out of memory it was a standard public IP-NAT-DHCP configuration.
6.46.x, most likely 6.46.6.What RouterOS/RouterBOOD version did you use before the upgrade?
For me this happened while upgrading RouterBOOT firmware on 6.48.5l. Others have discovered the same issue on 6.49 and it seems 6.49.1 as well.Did this happen with other versions as well?
What kind of configuration could stop a device from booting?Perhaps the problem is related to a specific configuration?
Ok now the interesting question of course is: do you tell them to change something in the default config that allows others to access the management interface of the router from the internet (e.g. to allow you access when they need help), or are they using the default configuration including the default firewall as it as in the last couple of releases?So all my friends and relatives have Mikrotik Routers at home, mostly they know their way around quickset and how to upgrade that is bassically it.
One of them have contacted me because their device showed that they as FLAGGED, and it looks like in was part of Meris botnet, with configuration in system schedule, pptp tunnel to unknown location and some SOCKS configuration.
So i contacted most of my friends with MT and asked them to upgrade to this version. 2 more came in as FLAGGED.... out if 16.
Don't push your luck ... :lol:My "Core" Router CRS326-24S+2Q+ (MIBSBE) will be updated later.....when I´ll get a downtime.
The downtime was approved from my family faster as expected, upgrade on my Core router was also done without problems. :-)Don't push your luck ... :lol:My "Core" Router CRS326-24S+2Q+ (MIBSBE) will be updated later.....when I´ll get a downtime.
Updated on these models without any issues:Upgrade to 6.49.1 resulted in a boot loop of hEX S (RB760iGS).
Due to an automatically script for firmware update, I can't say if the issue occured after installing the software or the firmware.
No access to device was possible until Netinstall, which solved the issue.
Hi, for the CCR and long boot issue: I can confirm the issue is gone!!Will MIPSBE devices continue to randomly die on routerboot upgrade with this release?
Have CCR long boot issues been fixed?
Thanks for the info! (I have some CCR in use for which I postponed update)Hi, for the CCR and long boot issue: I can confirm the issue is gone!!
Yesterday, I upgraded my CCR2004-1G-12X-2XS, and reboot was very quick.Thanks for the info! (I have some CCR in use for which I postponed update)Hi, for the CCR and long boot issue: I can confirm the issue is gone!!
CapsMan ... wifi users who are registered in "access list" did not listed "Registration table" IF they are connected to another microtik (mAP in my case) in repeater mode.
if capsMan wifi network extended via wifi extender, connected allowed users not visible.
You seem to expect that wifi extender is sort of signal booster. Well, it's not, it simply wouldn't work like that.The way wifi extenders work is that they act both as WiFi client (connected to "normal" AP) and WiFi AP. The "big feature" is that they copy off security profile from AP they connect to so they seem the same as AP to wireless clients. Then they simply forward frames between client and AP, possibly performing MAC address translation. If client is connected to extender, then AP will only see extender as connected client.yes, yes ... but client wifi private passphrase works. it can connect to wireless SSID
DHCP client "offered" and then disappears, is well known (certainly with wifi-extenders, when the "offer" never reaches the client because the MAC address of the client is used and not the one from the the wifi-extender. The client behind a wifi-extender (pseudo bridge) can only be reached with the extender MAC address and the client IP address , or with full broadcast. (IP and MAC ! The broadcast MAC is has been missing with MT DHCP server))Sometimes I can see in winbox that Client is bound but after few second disappear.
We can confirm -274° temp readings in System/Health and SNMP fixed on RB4011 with 6.49.1 (in our case introduced with 6.49.0)*)health - improved temperature reporting
I can't confirm that... RB4011 with 6.49 reports temperature correctly...We can confirm -274° temp readings in System/Health and SNMP fixed on RB4011 with 6.49.1 (in our case introduced with 6.49.0)*)health - improved temperature reporting
So for your device it is most interesting to know if it still works ok with 6.49.1I can't confirm that... RB4011 with 6.49 reports temperature correctly...
For me it works on RB4011 with 6.49 and actually also with 6.49.1So for your device it is most interesting to know if it still works ok with 6.49.1I can't confirm that... RB4011 with 6.49 reports temperature correctly...
Because it seems to be rocket-science to make a temperature reading working correctly on all models and hardware versions.
It is mainly interesting to hear from people for which it does NOT work in some version. It is clear that there are different situations with different results, probably different hardware revisions.For me it works on RB4011 with 6.49 and actually also with 6.49.1
DHCP client "offered" and then disappears, is well known (certainly with wifi-extenders, when the "offer" never reaches the client because the MAC address of the client is used and not the one from the the wifi-extender. The client behind a wifi-extender (pseudo bridge) can only be reached with the extender MAC address and the client IP address , or with full broadcast. (IP and MAC ! The broadcast MAC is has been missing with MT DHCP server))Sometimes I can see in winbox that Client is bound but after few second disappear.
Then it should also be possible to change those conditions.I think it will check for a combination of things like "the /ip socks facility is enabled", "an SSTP client is configured", "a scheduled job is present" etc.
When it matches the pattern for malware, the flag status is enabled.
Mikrotik was without configuration 6.48.3 only dhcp-client and that's it, connected via POE. After the first restart, everything was fine, after the restart with the RouterBoard update and after it a cyclic reboot.
It will probably only work in KNOT, so still no regular MODBUS TCP :(*) winbox - added "Modbus" menu support;
Thanks for replay. Is there a any solution except netinstall? I downgraded router to 6.48.5 and problem persist. I do not have any extender etc.DHCP client "offered" and then disappears, is well known (certainly with wifi-extenders, when the "offer" never reaches the client because the MAC address of the client is used and not the one from the the wifi-extender. The client behind a wifi-extender (pseudo bridge) can only be reached with the extender MAC address and the client IP address , or with full broadcast. (IP and MAC ! The broadcast MAC is has been missing with MT DHCP server))Sometimes I can see in winbox that Client is bound but after few second disappear.
I think your DHCP problem is not related to the 6.49.1 or 6.48.5 release.Thanks for replay. Is there a any solution except netinstall? I downgraded router to 6.48.5 and problem persist. I do not have any extender etc.
There are many possible reasons why the DHCP process doesn't succeed, so the first thing to do is sniffing to reveal what actually happens. I'd say open a dedicated topic as your issue doesn't seem to be specific to 6.49.1 and it will need some talk on what to do and what are the results.Is there a any solution except netinstall?
You are right. Problem was not related to the 6.49.1 release. It helped to remove pools and import them back and set correct pool to the DHCP.I think your DHCP problem is not related to the 6.49.1 or 6.48.5 release.Thanks for replay. Is there a any solution except netinstall? I downgraded router to 6.48.5 and problem persist. I do not have any extender etc.
The issues are much older. viewtopic.php?t=116963
And I believe (besides the STP disable action) that this here gets to some attempt to mitigate it (set the ff:ff:ff:ff:ff:ff broadcast MAC address) : viewtopic.php?t=160180#p842558
Its still there...Please, where can I find a voltage and temp measure? I mean in previous FW it was in health, but now I can't see it..
Thank you.
RBSXTsqG-5acD...but where is the health now please? :DIts still there...Please, where can I find a voltage and temp measure? I mean in previous FW it was in health, but now I can't see it..
Thank you.
What is the device Model ?
Getting voltage and temperature measurements to work across all possible device models and revisions appears to be like rocket science!Please, where can I find a voltage and temp measure? I mean in previous FW it was in health, but now I can't see it..
You found any problems on this version ?So is this version a "real stable" version? (Concept referred to in this post about how 6.48.5 is NOT a "real stable" version):
viewtopic.php?t=179260#p886907
After seeing what it takes to recover from a stupid lockout with "routerboot protected" enabled , I changed strategy.Netinstall prohibited is a quite hard lockout. Recover from a stupid (firewall or VLAN filtering enable) lockout by mistake could be lengthy then if "protect routerboot" enabled?
The reset button will work ( during boot ) even if disabled, for example for netinstall or reset to defaults...After seeing what it takes to recover from a stupid lockout with "routerboot protected" enabled , I changed strategy.Netinstall prohibited is a quite hard lockout. Recover from a stupid (firewall or VLAN filtering enable) lockout by mistake could be lengthy then if "protect routerboot" enabled?
(Only want to avoid that people erase the config by accident, when trying to "solve some wifi problem" on their own with the 2 available buttons on a hAP ac2.)
Since 6.47.10 the "reset" button can also be linked to own instructions (script or command line) . So I inserted "/system reboot" for the reset button.
Question now is , what happens if I set the hold time from 0.6 till 60 sec. Is it still possible to erase the config by holding longer than one minute ??
i.o.w. is the normal reset function (reset/CAPs mode/NETinstall) of the reset button delayed or disabled ????
Can the reset function still be invoked with pressing before power is applied?
In that case you may want to deliver your devices with a modified default config script that installs the config that YOU want to be the default.(Only want to avoid that people erase the config by accident, when trying to "solve some wifi problem" on their own with the 2 available buttons on a hAP ac2.)
Hello,Hello
How can i find any reson why it was rebooted ?
version 6.49.1
On which device?MicrosoftTeams-image.png
MicrosoftTeams-image.png
after upgrading.
anyone has this problem?
Packet flow follows the usual routing...I wish netwatch added a menu to select the interface used to monitor the network on a multi wan system to be able to run commands when one of the wans is off
Got similar issue upgrading a 317 to 6.49.1. from 6.42.something As this is remote and hard to reach we havent checked it yet as it still seems to forward traffic fine but management is not reachable.Anyone have experience of jumping large release versions?
I've never come across this before - usually a router can be upgraded from any version to the latest without incident.
Can someone clarify the supported upgrade path for me?