Community discussions

MikroTik App
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 291
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

v6.49.13 [stable] is released!

Tue Feb 06, 2024 9:52 am

RouterOS version 6.49.13 has been released in the "v6 stable" channel!

Before an upgrade:
1) Remember to make backup/export files before an upgrade and save them on another storage device;
2) Make sure the device will not lose power during upgrade process;
3) Device has enough free storage space for all RouterOS packages to be downloaded.

What's new in 6.49.13 (2024-Feb-05 15:39):

*) defconf - fixed firewall rule for IPv6 UDP traceroute;

To upgrade, click "Check for updates" at /system package in your RouterOS configuration interface, or head to our download page: http://www.mikrotik.com/download

If you experience version related issues, then please send supout file from your router to support@mikrotik.com. File must be generated while a router is not working as suspected or after some problem has appeared on the device

Please keep this forum topic strictly related to this particular RouterOS release.
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 11:51 am

Please explain:

Why are v7 release topics renamed and used throughout 7.13.x patch releases (7.13.1, 7.13.2, etc.) but on v6 there is still a separate topic for each release. 6.49.12 (and before all 6.49.x) got its own topic and now 6.49.13.

Just want to understand.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 12:10 pm

Also: why is a new stable release made for such an irrelevant bug? According to many, "nobody uses IPv6". Today's end-user never uses "traceroute". And a change in defconf will not affect people that just upgrade, only those that reset to defaults. That fact is not even mentioned in the article.
It would have been easier (and better) to publish a recommended change in the firewall rules.

Just want to understand.
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 12:51 pm

I diffed for you all:

6.49.10:
filter add chain=input action=accept protocol=udp port=33434-33534 comment="defconf: accept UDP traceroute"
6.49.13:
filter add chain=input action=accept protocol=udp dst-port=33434-33534 comment="defconf: accept UDP traceroute"
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 12:58 pm

It would have been easier (and better) to publish a recommended change in the firewall rules.
+1

So as discussed many times before: a user that never touched the default firewall rules won't ever get this change automatically. It will stay broken until the user throws the device away or the user reviews his firewall filter rules and finds out: "hey, there was a change. need to adjust my rules.".

Why not just auto-migrate rules with the exact comment "defconf: accept UDP traceroute" (when not modified by user)? And even when the user has modified the firewall default rule: why not just show a red alert-line in winbox/cli that warns the user: "ding ding ding! alert! outdated firewall rule! here is a link to upgrade guide: insert URL to docs here"

Or is this rule already auto-migrated on upgrade to 6.49.13?

Or at very least minimum: write better changelogs. It is easy to maintain a separate page in MT docs (maybe called: "defconf changelog"). There you can reflect the exact change with a side by side diff (before/after). So anyone can see at a glance how default config changed over version/time.

Let's start writing proper documentation. Everyone can profit from it.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 11646
Joined: Thu Mar 03, 2016 10:23 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 2:32 pm

I diffed for you all:

Tanks 1000x! Now I can skip upgrade and do the right thing (which is harden the firewall) which wouldn't happen as @infabo rightfully points out).

And, BTW, 7.13.2 has same (erroneous) IPv6 firewall rule in default config.

And documentation as of writing this has the same rule ... https://help.mikrotik.com/docs/display/ ... ttheDevice
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:09 pm

It would have been easier (and better) to publish a recommended change in the firewall rules.
+1

So as discussed many times before: a user that never touched the default firewall rules won't ever get this change automatically. It will stay broken until the user throws the device away or the user reviews his firewall filter rules and finds out: "hey, there was a change. need to adjust my rules.".
It is even worse! Most users of v6 (or those that migrated from v6) will have no IPv6 firewall AT ALL, because v6 comes with IPv6 disabled, and when you enable it (and reboot) it WILL NOT apply the default IPv6 configuration. So the firewall is empty.
Only when you reset to default config after enabling IPv6 (and also upgrading to the current version) you will get the default firewall config.

Reading the research by infabo it actually is a security issue. But as usual that was not mentioned in the release notes.
The default config, when it has been applied, opens e.g. the DNS resolver when source-port 33434-33534 is used, and it can be abused for DDoS amplification.
However, publishing an updated version will do nothing to rectify that.
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:19 pm

As already mentioned by mkx, this rule is also part of ROS 7 default config. And IPv6 is there enabled by default.

Oh, "port" matches src- or dst-port. I see. Quite a bummer.
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:42 pm

Why is Mikrotik so cryptic in their changelogs?

For example: https://nvd.nist.gov/vuln/detail/CVE-2023-30799

This was some serious CVE score. But still the changelog of 6.49.7 (viewtopic.php?t=189970) looked like this:
What's new in 6.49.7 (2022-Oct-11 17:37):

*) branding - fixed execution of "autorun.scr" file when installing branding package (introduced in v6.47);
*) routerboot - prevent enabling "protected-routerboot" on unsupported factory firmware versions;
*) routerboot - properly reset system configuration when protected bootloader is enabled and reset button used;
*) system - improved handling of user policies;
*) wireless - fixed disconnection of connected client while running background scan on wAP ac and wAP R ac devices;
*) wireless - fixed missing wireless interface on some RB921GS-5HPacD devices;
A CVE score 7+ and the only mentioning is:
*) system - improved handling of user policies;
This would make me cry - if I would be a professional IT infrastructure admin.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:45 pm

This is very old. There is even a blog entry about it https://blog.mikrotik.com/security/cve-2023-30799.html
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:51 pm

It was an example. Generally, MikroTik do not tell us in releasenotes what "improved handing" or "improved stability" mean w.r.t. security.
That is not right... and in the case of 6.49.13 it solves a security issue only for devices shipped with 6.49.13 installed. Are there any?
(no need to repeat what I think should be done with release notes - I explained that several times already)
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 4:52 pm

Indeed, it is very old.

But there is a gap in release of the fixed ROS version "6.49.7 (2022-Oct-11 17:37)" and the blog article from 27th Jul, 2023. I don't know why there is this time offset in fixing and announcing that something critical was fixed.
 
User avatar
Jotne
Forum Guru
Forum Guru
Posts: 3300
Joined: Sat Dec 24, 2016 11:17 am
Location: Magrathean

Re: v6.49.13 [stable] is released!

Tue Feb 06, 2024 6:12 pm

Please explain:

Why are v7 release topics renamed and used throughout 7.13.x patch releases (7.13.1, 7.13.2, etc.) but on v6 there is still a separate topic for each release. 6.49.12 (and before all 6.49.x) got its own topic and now 6.49.13.

Just want to understand.
This I want to know as well. It is much better with a new topic for every non RC/Beta release.

Also why 6.49.7 6.49.8 6.49.9 6.49.10 and 6.49.11 are long term releases, but
6.49.12 and 6.49.13 are just stable releases.
 
User avatar
strods
MikroTik Support
MikroTik Support
Posts: 1630
Joined: Wed Jul 16, 2014 7:22 am
Location: Riga, Latvia

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 8:38 am

Usually such issues are fixed even before CVE is created. Thus, there is no CVE number to refer to. When there is an actual CVE available at the time of the release, then it is mentioned in the changelog. You can go through changelog history and see that by yourselves.

We do not "update" chagelogs after release, since they are usually right away re-published in many other sites and are out of our hands.

Also, CVE usually mentions versions affected.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 8:41 am

Indeed, it is very old.

But there is a gap in release of the fixed ROS version "6.49.7 (2022-Oct-11 17:37)" and the blog article from 27th Jul, 2023. I don't know why there is this time offset in fixing and announcing that something critical was fixed.
It was not critical. It requires full admin access. It's like you own your phone and you yourself would like to jailbreak it. In this case v7 was fixed immediately, because v7 is the current version. v6 is lower priority, since it is the EOL version.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 8:42 am

By the way guys, did you know anyone can publish a CVE, even if it's not? Just that it has a CVE number has zero meaning.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 10:51 am

Now back to the topic. You published a new version to fix something in the default config. How do you think that publishing this new version is going to affect ANYTHING?
Should there, at minimum, not be some simple directions in the announcement article that explain what you need to change when you already have a configured router?
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26387
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 12:32 pm

You are absolutely right about the secont part.

Firewall rule before the fix:
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp

Firewall rule now:
add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udp
 
whatever
Member
Member
Posts: 353
Joined: Thu Jun 21, 2018 9:29 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 12:44 pm

So devices with the old default firewall rule can potentially be used for DNS amplification attacks if the attacker uses these as source ports?
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 1:11 pm

Yes. Mitigating factor is that first you have to know the address of the router. In IPv6 that is often not trivial.
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 6:19 pm

You are absolutely right about the secont part.

Firewall rule before the fix:
add action=accept chain=input comment="defconf: accept UDP traceroute" port=33434-33534 protocol=udp

Firewall rule now:
add action=accept chain=input comment="defconf: accept UDP traceroute" dst-port=33434-33534 protocol=udp
Why not provide a migration script?
script removed - see better version below by mkx
Last edited by infabo on Wed Feb 07, 2024 7:05 pm, edited 1 time in total.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 11646
Joined: Thu Mar 03, 2016 10:23 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 6:44 pm

Why not provide a migration script?

Your script is inefficient ;-) . Here's one that does the same but using single command, fixed for use in v6:
/ipv6 firewall filter set dst-port=33434-33534 !port  [find comment="defconf: accept UDP traceroute" port=33434-33534]
 
infabo
Long time Member
Long time Member
Posts: 695
Joined: Thu Nov 12, 2020 12:07 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 7:06 pm

I did not know that prefixing a value-name with "!" can unset it.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 7:15 pm

RouterOS itself should perform actions like that, as mentioned before (to change defaults when they are incorrect)....
 
mszru
Frequent Visitor
Frequent Visitor
Posts: 79
Joined: Wed Aug 10, 2016 10:42 am

Re: v6.49.13 [stable] is released!

Wed Feb 07, 2024 7:43 pm

Why not provide a migration script?

Your script is inefficient ;-) . Here's one that does the same but using single command, fixed for use in v6:
/ipv6 firewall filter set dst-port=33434-33534 !port  [find comment="defconf: accept UDP traceroute" port=33434-33534]
It doesn't work in v7. The range of ports must be enclosed in quotes:
port="33434-33534"
 
holvoetn
Forum Guru
Forum Guru
Posts: 5500
Joined: Tue Apr 13, 2021 2:14 am
Location: Belgium

Re: v6.49.13 [stable] is released!

Tue Mar 19, 2024 6:24 pm

It doesn't work in v7. The range of ports must be enclosed in quotes:
port="33434-33534"
And your comment about ROS7 scripting is valid in a ROS6 thread because ... ???

Apples and oranges.
 
pe1chl
Forum Guru
Forum Guru
Posts: 10248
Joined: Mon Jun 08, 2015 12:09 pm

Re: v6.49.13 [stable] is released!

Tue Mar 19, 2024 7:27 pm

And your comment about ROS7 scripting is valid in a ROS6 thread because ... ???
Well, maybe because when you have a router that originally had a v6 release before 6.49.13 with IPv6 enabled, and you upgraded it to v7, that wrong rule will still be there and has to be corrected.
 
mszru
Frequent Visitor
Frequent Visitor
Posts: 79
Joined: Wed Aug 10, 2016 10:42 am

Re: v6.49.13 [stable] is released!

Fri Mar 22, 2024 11:10 am

Yes, that is exactly my case. I've upgraded the router from v6 to v7 before 6.49.13 came out.
 
EdPa
MikroTik Support
MikroTik Support
Topic Author
Posts: 291
Joined: Fri Sep 15, 2017 10:05 am
Location: Riga
Contact:

Re: v6.49.13 [stable] is released!

Thu Apr 04, 2024 11:57 am

New version v6.49.14 has been released:
viewtopic.php?t=206444

Who is online

Users browsing this forum: eworm and 5 guests