To upgrade, click "Check for updates" at /system package in your RouterOS configuration interface, or head to our download page: *) www - improved client-initiated renegotiation within the SSL and TLS protocols (CVE-2011-1473) *) wireless - updated "china" regulatory domain information *) wireless - improved installation mode selection for wireless outdoor equipment *) wireless - improved DFS radar detection when using non-ETSI regulated country *) winbox - do not allow setting "dns-lookup-interval" to "0" *) supout - changed IPv6 pool section to output detailed print *) supout - added "pwr-line" section to supout file *) supout - added IPv6 ND section to supout file *) ssh - fixed non-interactive multiple command execution *) snmp - improved reliability on SNMP service packet validation *) rb921 - improved system stability ("/system routerboard upgrade" required) *) rb3011 - improved system stability when receiving bogus packets *) ovpn - added "verify-server-certificate" parameter for OVPN client (CVE-2018-10066) *) ipv6 - improved system stability when receiving bogus packets *) hotspot - moved "title" HTML tag after "meta" tags *) gps - strip unnecessary trailing characters from "longtitude" and "latitude" values *) firewall - process packets by firewall when accepted by RAW with disabled connection tracking *) firewall - fixed fragmented packet processing when only RAW firewall is configured *) e-mail - properly release e-mail sending session if the server's domain name can not be resolved *) discovery - fixed CDP packets not including address on slave ports (introduced in v6.44) *) dhcpv6-server - override prefix pool and/or DNS server settings by values received from RADIUS *) dhcpv6-server - fixed dynamic IPv6 binding without proper reference to the server *) dhcpv6-client - fixed status update when leaving "bound" state *) defconf - automatically set "installation" parameter for outdoor devices *) conntrack - fixed GRE protocol packet connection-state matching (CVE-2014-8160) *) cloud - properly stop "time-zone-autodetect" after disable *) certificate - removed "set-ca-passphrase" parameter *) capsman - fixed interface-list usage in access list *) capsman - fixed CAP system upgrading process for MMIPS *) bridge - correctly handle bridge host table !) security - fixed vulnerability CVE-2019-13074 It's recommended to set up administrators password on both devices.RouterOS version 6.44.5 has been released in public "long-term" channel!ġ) Remember to make backup/export files before an upgrade and save them on another storage device Ģ) Make sure the device will not lose power during upgrade process ģ) Device has enough free storage space for all RouterOS packages to be downloaded. Link should be established after all previously explained steps are done.
0 Comments
Leave a Reply. |