Seems like MikroTik and Ubiquiti haven't been particularly good on documenting how their routers work, what each process does, and how to debug/verify what they are doing. I've been particularly worried about Ubiquiti, since they seem to be ignoring the MIPS based EdgeRouter line. The various consumer NAS vendors have been a nightmare security wise, and it's far from clear that the prosumer routers from Ubiquiti and MikroTik are any better.<p>Should it really require reverse engineering to figure out how a Linux box passes packets?<p>I gave up on Ubiquiti and bought a tiny $120 router ($140 with a nice metal case) that's a NanoPi R6s. Pretty impressive specifications. 8GB ram, 8 cores (4 fast Ax76 and 4 slow A55s) and no fans. Has 2x2.5GBe and 1x1GBe for networking. I've installed a port of OpenWRT called FriendlyElec and Ubuntu 22.04.1 LTS. I didn't bother cross compiling, it's plenty fast for native compiles.<p>I've been impressed so far. It compiles Rust about half as fast as my Quad core Xeon server from years ago, and is <i>SEVEN</i> times faster than a RPi 4 8GB! I have an Apple M1 mini around that manages the same compile in 13 minutes. A nice bonus is neither network or storage is USB attached, unlike the RPi.<p>Burned it in overnight, running all 8 cores flat out, with no problems. Haven't decided what to use, maybe shorewall or just raw nftables/iptables.<p>Similarly there's 4 and 6 port 2.5 Gbe boxes with various N5000 and N6000 celerons at around $200. ServerTheHome has reviewed many of them, they seem to be evolving nicely, better cases, better heat sinks, better 2.5Gbe Intel chips, etc. Run *WRT, pfsense, or whatever else floats your boat. STH even demod running the firewall under proxmox on one of these cheap 4-6 port 2.5GBe widgets. Would be nice to keep your complete config in git or the config management widget of your choice (often Puppet or Ansible).<p>Guess I'm just getting less trusting in my old age.
I recently discovered a vulnerability and jailbroke RouterOS 7.4 (beta). As far as I know, this is the latest jailbreak for RouterOS (as of today):<p><a href="https://nns.ee/blog/2022/08/05/routeros-container-rce.html" rel="nofollow">https://nns.ee/blog/2022/08/05/routeros-container-rce.html</a>
Slide deck from the con's site: <a href="https://cfp.recon.cx/media/2022/submissions/TZUFS8/resources/Pulling_MikroTik_into_the_Limelight_qHAG1WT.pdf" rel="nofollow">https://cfp.recon.cx/media/2022/submissions/TZUFS8/resources...</a><p>Slide deck from margin.re: <a href="https://margin.re/content/files/2022/11/Pulling_MikroTik_into_the_Limelight-RECon-2022.pdf" rel="nofollow">https://margin.re/content/files/2022/11/Pulling_MikroTik_int...</a><p>Blurb about the presentation at the con's site: <a href="https://cfp.recon.cx/media/2022/submissions/TZUFS8/resources/Pulling_MikroTik_into_the_Limelight_qHAG1WT.pdf" rel="nofollow">https://cfp.recon.cx/media/2022/submissions/TZUFS8/resources...</a><p>Blurb about the presentation at margin.re: <a href="https://margin.re/pulling-mikrotik-into-the-limelight-2/" rel="nofollow">https://margin.re/pulling-mikrotik-into-the-limelight-2/</a>
Here is the archive.org link now that the original link is 404'ing.<p><a href="https://web.archive.org/web/20221208070504/https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/" rel="nofollow">https://web.archive.org/web/20221208070504/https://margin.re...</a>
Slides are here, their link on the paghe to the PDF did not work <a href="https://margin.re/content/files/2022/11/Pulling_MikroTik_into_the_Limelight-RECon-2022.pdf" rel="nofollow">https://margin.re/content/files/2022/11/Pulling_MikroTik_int...</a>
Some guy yesterday was trying to crack this on /g/ board with ChatGPT. Search the threads archive and you might find something related to this code.