Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-12 Thread Mike O'Connor
t;> >>   >> >> *From:*AusNOG [mailto:ausnog-boun...@lists.ausnog.net] *On Behalf Of >> *Mike Everest >> *Sent:* Thursday, 4 April 2019 2:13 PM >> *To:* 'aus...@ausnog.net' >> *Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Re

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-05 Thread Troy Kelly
3.14 (bugfix) as soon as possible. > >   > > Cheers,  Mike. > > From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Mike > Everest > > Sent: Thursday, 4 April 2019 2:13 PM > > To: 'aus...@ausnog.net' > > Subject: Re: [AusNOG]

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-04 Thread Mike Everest
possible. Cheers, Mike. From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Mike Everest Sent: Thursday, 4 April 2019 2:13 PM To: 'aus...@ausnog.net' Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik For those no

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-03 Thread Mike Everest
For those not watching this issue closely… Further information and updates here: https://shop.duxtel.com.au/article_info.php?articles_id=89 Cheers, Mike. ___ AusNOG mailing list AusNOG@lists.ausnog.net http://lists.ausnog.net/mailman/listinf

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-01 Thread Matt Hare
New beta released appears to address the memory issue that caused the watchdog reboot. A MikroTik trainer has tested locally and it appears to mitigate a reboot during an attack. If this is indeed the fix hopefully it moves to stable and bugfix only branches soon. *What's new in 6.45beta23 (2019-A

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-04-01 Thread Matt Hare
New beta released today appears to address the memory issue that caused the watchdog reboot. A MikroTik trainer has tested locally and it appears to mitigate a reboot during an attack. If this is indeed the fix hopefully it moves to stable and bugfix only branches soon. *What's new in 6.45beta23 (

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-31 Thread Michael J. Carmody
Goldman Sent: Monday, 1 April 2019 3:12 PM To: ausnog@lists.ausnog.net Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik Biggest issue is i still want to use their hardware, RouterBoards have some good products. hAP's for home CPE's,

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-31 Thread Joseph Goldman
ier networking. If looking for CPE/lower level again, pfSense or Edgerouter? -Michael *From:*AusNOG *On Behalf Of *Alex Samad *Sent:* Sunday, 31 March 2019 5:51 PM *To:* ausnog@lists.ausnog.net *Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-31 Thread Karl Auer
On Mon, 2019-04-01 at 01:11 +, Michael J. Carmody wrote: > If you want to stay in the Mikrotik like space, VyOS is probably > where you need to be for BGP/Carrier networking. This is really sad, because the MikroTiks are almost unbeatable bang for buck. Regards, K. -- ~~

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-31 Thread Michael J. Carmody
Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik Sigh, how long have they promised V7 ... Think it was coming soon 7years ago Multithreaded BGP ! " * There's a comment 'The fix is in v7' - theres a long running joke that v7 w

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-31 Thread Rob Thomas
For those with popcorn, here's the running update (and, after typing all this, I realise it may not be of interest to everyone on the list - but it's a REALLY GOOD EXAMPLE of what not to do, so if you're involved in security at YOUR org, please take notes. Specifically - ALWAYS HAVE A 'security@'

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-30 Thread Alex Samad
neker | Network Engineer** | TasmaNet* > > > > *From:* AusNOG *On Behalf Of *Shane Clay > *Sent:* Friday, 29 March 2019 10:08 PM > *To:* ausnog@lists.ausnog.net > *Subject:* Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you > have Public IPv6 Facing Mikrotik > >

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-29 Thread Philip Loenneker
From: AusNOG On Behalf Of Shane Clay Sent: Friday, 29 March 2019 10:08 PM To: ausnog@lists.ausnog.net Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik Looks like a fix is on the way: What's new in 6.45beta22 (2019-Mar-29 08:37): Change

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-29 Thread Shane Clay
k.com/download/changelogs/testing-release-tree Shane Clay Caznet From: AusNOG On Behalf Of Noel Butler Sent: Friday, 29 March 2019 12:02 PM To: ausnog@lists.ausnog.net Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik On 29/03/2019 11:17,

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Noel Butler
On 29/03/2019 11:17, Mike Everest wrote: > On the point of "the fix is in v7" v7 has for a great many years, been code for "too hard basket" -- Kind Regards, Noel Butler This Email, including any attachments, may contain legally privileged information, therefore remains c

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Cameron Murray
r informed > than everyone else when it comes to this sort of thing :-} > > Cheers! > > Mike. > > > > *From:* AusNOG [mailto:ausnog-boun...@lists.ausnog.net] *On Behalf Of *Rob > Thomas > *Sent:* Friday, 29 March 2019 10:50 AM > *To:* Cameron Murray > *Cc:* &

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Mike Everest
informed than everyone else when it comes to this sort of thing :-} Cheers! Mike. From: AusNOG [mailto:ausnog-boun...@lists.ausnog.net] On Behalf Of Rob Thomas Sent: Friday, 29 March 2019 10:50 AM To: Cameron Murray Cc: Subject: Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Mark Smith
On Fri, 29 Mar 2019 at 10:51, Rob Thomas wrote: > > Quick summary of the problem: > > * From the description it appears to be a kernel-level issue - when a > MikroTik device receives a magic IPv6 packet, it will panic. > * MikroTik have known about it for almost a year, and have not fixed it. > *

Re: [AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Rob Thomas
Quick summary of the problem: * From the description it appears to be a kernel-level issue - when a MikroTik device receives a magic IPv6 packet, it will panic. * MikroTik have known about it for almost a year, and have not fixed it. * It is not fixed in the latest 6.44.1 image * The discoverer ha

[AusNOG] Mikrotik IPv6 Vulnerability - Must Read if you have Public IPv6 Facing Mikrotik

2019-03-28 Thread Cameron Murray
Guys, This has just popped up on the Mikrotik forums that I am sure many on the list need to be aware of. If you run Mikrotik in your network and have IPv6 on a Public facing interface please check the following link: https://forum.mikrotik.com/viewtopic.php?t=147076 Cheers Cameron