t;>
>>
>>
>> *From:*AusNOG [mailto:ausnog-boun...@lists.ausnog.net] *On Behalf Of
>> *Mike Everest
>> *Sent:* Thursday, 4 April 2019 2:13 PM
>> *To:* 'aus...@ausnog.net'
>> *Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Re
3.14 (bugfix) as soon as possible.
>
>
>
> Cheers, Mike.
>
> From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Mike
> Everest
>
> Sent: Thursday, 4 April 2019 2:13 PM
>
> To: 'aus...@ausnog.net'
>
> Subject: Re: [AusNOG]
possible.
Cheers, Mike.
From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Mike Everest
Sent: Thursday, 4 April 2019 2:13 PM
To: 'aus...@ausnog.net'
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
Public IPv6 Facing Mikrotik
For those no
For those not watching this issue closely…
Further information and updates here:
https://shop.duxtel.com.au/article_info.php?articles_id=89
Cheers, Mike.
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinf
New beta released appears to address the memory issue that caused the
watchdog reboot. A MikroTik trainer has tested locally and it appears to
mitigate a reboot during an attack. If this is indeed the fix hopefully it
moves to stable and bugfix only branches soon.
*What's new in 6.45beta23 (2019-A
New beta released today appears to address the memory issue that caused the
watchdog reboot. A MikroTik trainer has tested locally and it appears to
mitigate a reboot during an attack. If this is indeed the fix hopefully it
moves to stable and bugfix only branches soon.
*What's new in 6.45beta23 (
Goldman
Sent: Monday, 1 April 2019 3:12 PM
To: ausnog@lists.ausnog.net
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
Public IPv6 Facing Mikrotik
Biggest issue is i still want to use their hardware, RouterBoards have some
good products. hAP's for home CPE's,
ier networking.
If looking for CPE/lower level again, pfSense or Edgerouter?
-Michael
*From:*AusNOG *On Behalf Of *Alex Samad
*Sent:* Sunday, 31 March 2019 5:51 PM
*To:* ausnog@lists.ausnog.net
*Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you
have Public IPv6 Facing Mikrotik
On Mon, 2019-04-01 at 01:11 +, Michael J. Carmody wrote:
> If you want to stay in the Mikrotik like space, VyOS is probably
> where you need to be for BGP/Carrier networking.
This is really sad, because the MikroTiks are almost unbeatable bang
for buck.
Regards, K.
--
~~
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
Public IPv6 Facing Mikrotik
Sigh, how long have they promised V7 ...
Think it was coming soon 7years ago
Multithreaded BGP !
"
* There's a comment 'The fix is in v7' - theres a long running joke that v7
w
For those with popcorn, here's the running update (and, after typing
all this, I realise it may not be of interest to everyone on the list
- but it's a REALLY GOOD EXAMPLE of what not to do, so if you're
involved in security at YOUR org, please take notes. Specifically -
ALWAYS HAVE A 'security@'
neker | Network Engineer** | TasmaNet*
>
>
>
> *From:* AusNOG *On Behalf Of *Shane Clay
> *Sent:* Friday, 29 March 2019 10:08 PM
> *To:* ausnog@lists.ausnog.net
> *Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you
> have Public IPv6 Facing Mikrotik
>
>
From: AusNOG On Behalf Of Shane Clay
Sent: Friday, 29 March 2019 10:08 PM
To: ausnog@lists.ausnog.net
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
Public IPv6 Facing Mikrotik
Looks like a fix is on the way:
What's new in 6.45beta22 (2019-Mar-29 08:37):
Change
k.com/download/changelogs/testing-release-tree
Shane Clay
Caznet
From: AusNOG On Behalf Of Noel Butler
Sent: Friday, 29 March 2019 12:02 PM
To: ausnog@lists.ausnog.net
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
Public IPv6 Facing Mikrotik
On 29/03/2019 11:17,
On 29/03/2019 11:17, Mike Everest wrote:
> On the point of "the fix is in v7"
v7 has for a great many years, been code for "too hard basket"
--
Kind Regards,
Noel Butler
This Email, including any attachments, may contain legally
privileged
information, therefore remains c
r informed
> than everyone else when it comes to this sort of thing :-}
>
> Cheers!
>
> Mike.
>
>
>
> *From:* AusNOG [mailto:ausnog-boun...@lists.ausnog.net] *On Behalf Of *Rob
> Thomas
> *Sent:* Friday, 29 March 2019 10:50 AM
> *To:* Cameron Murray
> *Cc:*
&
informed than
everyone else when it comes to this sort of thing :-}
Cheers!
Mike.
From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Rob Thomas
Sent: Friday, 29 March 2019 10:50 AM
To: Cameron Murray
Cc:
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have
On Fri, 29 Mar 2019 at 10:51, Rob Thomas wrote:
>
> Quick summary of the problem:
>
> * From the description it appears to be a kernel-level issue - when a
> MikroTik device receives a magic IPv6 packet, it will panic.
> * MikroTik have known about it for almost a year, and have not fixed it.
> *
Quick summary of the problem:
* From the description it appears to be a kernel-level issue - when a
MikroTik device receives a magic IPv6 packet, it will panic.
* MikroTik have known about it for almost a year, and have not fixed it.
* It is not fixed in the latest 6.44.1 image
* The discoverer ha
Guys,
This has just popped up on the Mikrotik forums that I am sure many on the
list need to be aware of.
If you run Mikrotik in your network and have IPv6 on a Public facing
interface please check the following link:
https://forum.mikrotik.com/viewtopic.php?t=147076
Cheers
Cameron
20 matches
Mail list logo