Yes, sad but true :-(
From our part, I have opted to add the firewall rules since IPv6 on our network is purely 'experimental' and we don't even have any published services running yet (web sites were next on the list ;)
Once the fix/patch makes it to bugfix chain, then we'll update and save reboot for then. Cheers, Mike. ------------------------------------------------------------------------------------ Why Choose DuxTel for all your MikroTik needs? 10 good reasons: http://duxtel.com/why_duxtel ------------------------------------------------------------------------------------ Follow our tweets for news and updates: http://twitter.com/duxtel
-----Original Message----- From: Public [mailto:public-bounces@talk.mikrotik.com.au] On Behalf Of Paul Julian Sent: Thursday, 4 April 2019 2:45 PM To: 'MikroTik Australia Public List' <public@talk.mikrotik.com.au> Subject: Re: [MT-AU Public] UKNOF 43 CVE
Thanks Mike, great summary, much appreciated.
Only problem is to disable IPV6 package means a reboot ☹
Regards Paul
-----Original Message----- From: Public <public-bounces@talk.mikrotik.com.au> On Behalf Of Mike Everest Sent: Thursday, 4 April 2019 2:12 PM To: 'MikroTik Australia Public List' <public@talk.mikrotik.com.au> Subject: Re: [MT-AU Public] UKNOF 43 CVE
Further information and updates here: https://shop.duxtel.com.au/article_info.php?articles_id=89
Cheers,..
_______________________________________________ Public mailing list Public@talk.mikrotik.com.au http://talk.mikrotik.com.au/mailman/listinfo/public_talk.mikrotik.com.au
_______________________________________________ Public mailing list Public@talk.mikrotik.com.au http://talk.mikrotik.com.au/mailman/listinfo/public_talk.mikrotik.com.au