Dear colleagues,

Today, at 15:35 UTC+1 on 25 November 2019, we made our final /22 IPv4 allocation from the last remaining addresses in our available pool. We have now run out of IPv4 addresses.

uzdevums:  izveidot uz x rūteriem jaunas mapes, pārkopēt failus

csshx. trāpīju ar pirmo no gūgles, bet varbūt vēlāk var paprovēt kaut ko, kas never vaļā x logus.

uzdevums: uzkopēt imidžus uz x rūteriem.

 # pscp -h ips.txt -l irb2 /etc/hosts /tmp/hosts
   Success on 128.112.152.122:22
   Success on 18.31.0.190:22
   Success on 128.232.103.201:22

 

https://forum.mikrotik.com/viewtopic.php?f=21&t=119308&p=587512#p587512

 

Quote from Wikileaks document https://wikileaks.org/ciav7p1/cms/page_20250630.html:

“ROS 6.28 has a Firewall Filter Rule to drop access to WAN side ethernet port. This was disabled in order to throw ChimayRed”

Also, it seems that this exploit may not be functional in RouterOS version above v6.30.1 (released 2015-07-15).

Quote from Wikileaks document https://wikileaks.org/ciav7p1/cms/page_20251203.html:

“Downgraded to ROS 6.30.1. ChimayRed does not support 6.30.2”