Mikrotik Router OS 6.46.2 is out

Notables from the changelog of Mikrotik RouterOS 6.46.2

*) console – prevent “flash” directory from being removed (introduced in v6.46);
*) crs305 – disable optical SFP/SFP+ module Tx power after disabling SFP+ interface;
*) defconf – fixed default configuration loading on RBwAPG-60adkit (introduced in v6.46);
*) lora – fixed packet sending when using “antenna-gain” higher than 5dB;
*) lte – fixed “cell-monitor” on R11e-LTE in 3G mode;
*) lte – fixed “earfcn” reporting on R11e-LTE6 in UMTS and GSM modes;
*) lte – report only valid info parameters on R11e-LTE6;
*) qsfp – do not report bogus monitoring readouts on modules without DDMI support;
*) qsfp – improved module monitoring readouts for DAC and break-out cables;
*) security – fixed vulnerability for routers with default password (limited to Wireless Wire), admin could login on startup with empty password before default configuration script was fully loaded;
*) system – fixed “*.auto.rsc” file execution (introduced in v6.46);
*) traffic-generator – improved memory handling on CHR;
*) winbox – fixed “Default Route Distance” default value when creating new LTE APN;

Full changelog at
https://mikrotik.com/download

RouterOS 7.0Beta4 released on Dec 6 2019

!) included all features and fixes from 6.46 version;
!) implemented completely new User Manager package;
*) dhcpv4-server – added “option-set” parameter for each “vendor-class-id”;
*) dhcpv4-server – added “radius-password’ parameter under “config” menu;
*) dhcpv6-client – allow reading passed options in script;
*) dhcpv6-relay – include client’s Link-Layer address in option 79;
*) interface – improved support for Intel, Mellanox and other generic network cards;
*) ipsec – fixed action=none policies;
*) ipv6 – added “disable-ipv6” parameter;
*) lte – added support for Quectel EC25-E;
*) lte – added support for Sierra Wireless MC7304;
*) lte – improved system stability when resetting modem;
*) package – fixed USB and CD-ROM installs;
*) ssh – improved key exchange algorithm support;
*) system – fixed port duplication on each system reboot;

Mikrotik RouterOS 6.46 is out

What’s new in 6.46 (2019-Dec-02 11:16):

Lots of fixes in this.  Many LTE, WInbox, SNMP fixes.  CRS fixes as well.
Notable Changes (not all but ones I think are worth pulling out). Full changelog can be foudn at https://www.mikrotik.com/download

*) backup – fixed automatic backup file generation when configuration reset by button;
*) backup – store automatically created backup file in “flash” directory;
*) bonding – correctly remove HW offloaded bonding with ARP monitoring;
*) bonding – properly handle MAC addresses when bonding WLAN interfaces;
*) bridge – disable/enable bridge port when setting bpdu-guard;
*) bridge – do not add bridge as untagged VLAN member when frame-types=admit-only-vlan-tagged;
*) bridge – do not add dynamically VLAN entry when changing “pvid” property for non-vlan aware bridge;
*) bridge – include whole VLAN-id in DHCP Option 82 message;
*) ccr – improved general system stability;
*) crs1xx/2xx – allow to set trunk port as mirroring target;
*) crs3xx – correctly handle L2MTU change;
*) crs3xx – do not send pause frames when ethernet “tx-flow-control” is disabled on CRS326/CRS328/CRS305 devices;
*) crs3xx – improved interface initialization;
*) crs3xx – improved switch-chip resource allocation on CRS317-1G-16S+, CRS309-1G-8S+, CRS312-4C+8XG, CRS326-24S+2Q+ devices;
*) crs3xx – improved system stability on CRS309-1G-8S+, CRS312-4C+8XG, CRS326-24S+2Q+ devices;
*) defconf – require “policy” permission to print default configuration;
*) dhcpv6-client – fixed timeout when doing rebind;
*) dhcpv6-client – properly update bind time when unused prefix received from the server;
*) dhcpv6-client – properly update IPv6 address on rebind;
*) dhcpv6-server – fixed logged error message when using “address-pool=static-only”;
*) dhcpv6-server – ignore prefix-hint from client’s DHCPDISCOVER if static prefix received from RADIUS;
*) dhcpv6-server – include “User-Name” parameter in accounting requests;
*) dhcpv6-server – made “calling-station-id” contain MAC address if DUID contains it;
*) dot1x – added “reject-vlan-id” server parameter (CLI only);
*) dot1x – added support for dynamic switch rules from RADIUS;
*) dot1x – added support for “mac-auth” authentication type (CLI only);
*) ethernet – automatically detect interface when using IP address for power-cycle-ping;
*) ethernet – do not enable interface after reboot that is already disabled;
*) ipsec – fixed DNS resolving when domain has only AAAA entries;
*) ipsec – fixed policy “sa-src-address” detection from “local-address” (introduced in v6.45);
*) ipv6 – changed “advertise-dns” default value to “yes”;
*) route – fixed area range summary route installation in VRF;
*) sniffer – allow filtering by packet size;
*) usb – general USB modem stability improvements;

Network wide Mikrotik RouterOS updates with Unimus

https://unimus.net/blog/network-wide-mikrotik-routeros-upgrade.html

This article will focus on MikroTik – we will show you how you can do a network wide mass upgrade of RouterOS using Unimus, and the RouterOS Package Source feature. What’s even better, doing the entire upgrade process (including setup of Unimus and RouterOS Package Source) can be done in under an hour.

Mikrotik releases 6.45.7

MAJOR CHANGES IN v6.45.7:
———————-
!) lora – added support for LoRaWAN low-power wide-area network technology for MIPSBE, MMIPS and ARM;
!) package – accept only packages with original filenames (CVE-2019-3976);
!) package – improved package signature verification (CVE-2019-3977);
!) security – fixed improper handling of DNS responses (CVE-2019-3978, CVE-2019-3979);
———————-

RouterOS v7 limited beta

I did an overall video of the New Mikrotik RouterOS v7.

From Mikrotik forum: https://forum.mikrotik.com/viewtopic.php?f=1&t=152003

We have released a very limited test variant of RouterOS v7. Currently only available for ARM systems with a slightly limited feature set.

What is currently unlocked / available:

– Only available for ARM architecture
– Based on Kernel 4.14.131, which is currently the latest and most supported LTS version
– New CLI style, but compatible with the old one for compatibility
– New routing features, but see below
– OpenVPN UDP protocol support
– NTP client and server now in one, rewritten application
– removed individual packages, only bundle and extra packages will remain

Other features not yet public.

What is not available:

– BGP / MPLS disabled
– Extra packages
– Winbox does not show all features, use CLI for most functionality

DO NOT USE IT FOR ANYTHING IMPORTANT, THIS RELEASE IS STRICTLY FOR TESTING AND DOES CONTAIN BUGS

Download link: https://mt.lv/v7

Mikrotik 6.46 beta34 noteable things

This content is for Patreon subscribers of the j2 blog. Please consider becoming a Patreon subscriber for as little as $1 a month. This helps to provide higher quality content, more podcasts, and other goodies on this blog.
To view this content, you must be a member of Justin Wilson's Patreon at $0.01 or more
Already a qualifying Patreon member? Refresh to access this content.

Mikrotik 6.45.2 is out

What’s new in 6.45.2 (2019-Jul-17 10:04):

Important note!!!
Due to removal of compatibility with old version passwords in this version, downgrading to any version prior to v6.43 (v6.42.12 and older) will clear all user passwords and allow password-less authentication. Please secure your router after downgrading.
Old API authentication method will also no longer work, see documentation for new login procedure:
https://wiki.mikrotik.com/wiki/Manual:API#Initial_login

*) bonding – fixed bonding running status after reboot when using other bonds as slave interfaces (introduced in v6.45);
*) cloud – properly stop “time-zone-autodetect” after disable;
*) interface – fixed missing PWR-LINE section on PL7411-2nD and PL6411-2nD (introduced v6.44);
*) ipsec – added “connection-mark” parameter for mode-config initiator;
*) ipsec – allow peer argument only for “encrypt” policies (introduced in v6.45);
*) ipsec – fixed peer configuration migration from versions older than v6.43 (introduced in v6.45);
*) ipsec – improved stability for peer initialization (introduced in v6.45);
*) ipsec – show warning for policies with “unknown” peer;
*) ospf – fixed possible busy loop condition when accessing OSPF LSAs;
*) profile – added “internet-detect” process classificator;
*) radius – fixed “User-Password” encoding (introduced in v6.45);
*) ssh – do not enable “none-crypto” if “strong-crypto” is enabled on upgrade (introduced in v6.45);
*) ssh – fixed executed command output printing (introduced in v6.45);
*) supout – fixed supout file generation outside of internal storage with insufficient space;
*) upgrade – fixed “auto-upgrade” to use new style authentication (introduced in v6.45);
*) vlan – fixed “slave” flag for non-running interfaces (introduced in v6.45);
*) wireless – improved 802.11ac stability for all ARM devices with wireless;
*) wireless – improved range selection when distance set to “dynamic”;

RouterOS 6.45.1 Out – Security Fixes

Mikrotik has released RouterOS 6.45.1 with some security vulnerability fixes.  Some of these have been known and fixed before, while others are new fixes

MAJOR CHANGES IN v6.45.1:
———————-
!) dot1x – added support for IEEE 802.1X Port-Based Network Access Control;
!) ike2 – added support for EAP authentication methods (eap-tls, eap-ttls, eap-peap, eap-mschapv2) as initiator;
!) security – fixed vulnerabilities CVE-2018-1157, CVE-2018-1158;
!) security – fixed vulnerabilities CVE-2019-11477, CVE-2019-11478, CVE-2019-11479;
!) security – fixed vulnerability CVE-2019-13074;
!) user – removed insecure password storage;

Important note!!!
Due to removal of compatibility with old version passwords in this version, downgrading to any version prior to v6.43 (v6.42.12 and older) will clear all user passwords and allow password-less authentication. Please secure your router after downgrading.

Some notes on the security Fixes
CVE-2018-1157
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request.

CVE-2018-1158
Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.

CVE-2019-11477/11478
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-13074
This has been reserved and not been made widely public yet. Although a CVE ID may have been assigned by either CVE or a CAN, it will not be available in the NVD if it has a status of RESERVED by CVE.  This is traditionally done to give the vendor, in this case, Mikrotik and possibly others, a chance to fix this before the exploit is released to the general public.

Rest of the Changelog available at https://www.mikrotik.com/download