v1.5.3 Bug Reports and Comments

DOWNLOAD THE LATEST FIRMWARE HERE
User avatar
Stephen
Employee
Employee
 
Posts: 1033
Joined: Sun Dec 24, 2017 8:56 pm
Has thanked: 85 times
Been thanked: 181 times

v1.5.3 Bug Reports and Comments

Sat Jul 27, 2019 9:44 pm

v1.5.3 wrote:FIXED/CHANGED
- fixed issue with watchdog poe bounce that was not completely shutting off power depending on the delay time and offset's used
- This version had to be pushed as a new production run has a new temp sensor as old was discontinued
- fixed memory leak in NET-SNMP

ENHANCEMENTS

- Modified Port Bounce option to read 'Port Bounce POE' and added 'Port Bounce Link' manual option for status and ports tab
- Option in discovery configuration now exists to disable the switch from broadcasting on discovery protocols while the discovery tab is enabled
- link bounce option exists for the watchdog as well as the POE bounce option.

KNOWN ISSUES

- WEB UI issues when not at 100% Zoom on browser especially on VLAN TAB
- Some language templates need help - please private message Eric Stern to help

Released 7/27/2019

Ludvik
Experienced Member
 
Posts: 105
Joined: Tue Nov 08, 2016 1:50 pm
Has thanked: 15 times
Been thanked: 15 times

Re: v1.5.3 Bug Reports and Comments

Sun Jul 28, 2019 5:59 am

SNMP bug solved too? Like in 1.5.3rc2-201907151558?

User avatar
Stephen
Employee
Employee
 
Posts: 1033
Joined: Sun Dec 24, 2017 8:56 pm
Has thanked: 85 times
Been thanked: 181 times

Re: v1.5.3 Bug Reports and Comments

Mon Jul 29, 2019 12:59 pm

Thank you for the reminder Ludvick, yes that fix is in there. The temp sensor issue was an emergency and so we had to immediately wrap up everything and get this version out. However, the fix for what we found with snmp is in there (and I have updated the notes to reflect that).

mducharme
Member
 
Posts: 32
Joined: Sun Jul 10, 2016 3:34 am
Has thanked: 2 times
Been thanked: 3 times

Re: v1.5.3 Bug Reports and Comments

Thu Aug 01, 2019 1:48 pm

Hello,

We are having problems with special characters in passwords (we just upgraded to v1.5.2 last week). The upgrade to 1.5.2 from a much older version has fixed the issues with the # character in passwords, but we have a user with the characters " } ! | [ in their password and they cannot log in via RADIUS to a netonix. Our other users are fine, so the problem seems to be with one of those characters.

User avatar
Stephen
Employee
Employee
 
Posts: 1033
Joined: Sun Dec 24, 2017 8:56 pm
Has thanked: 85 times
Been thanked: 181 times

Re: v1.5.3 Bug Reports and Comments

Thu Aug 01, 2019 2:14 pm

The latest firmware is now at 1.5.3 but if this is an issue in our code I don't think the fix is there yet.
I will add this to the list and try to get it ready for the rc release.

Ludvik
Experienced Member
 
Posts: 105
Joined: Tue Nov 08, 2016 1:50 pm
Has thanked: 15 times
Been thanked: 15 times

Re: v1.5.3 Bug Reports and Comments

Thu Aug 01, 2019 6:35 pm

Length of password is only 16 characters for RADIUS. I think that is bug.
We use Mikrotik's implementation (userman) and there is no length limit (or is very longer).

User avatar
sirhc
Employee
Employee
 
Posts: 7416
Joined: Tue Apr 08, 2014 3:48 pm
Location: Lancaster, PA
Has thanked: 1608 times
Been thanked: 1325 times

Re: v1.5.3 Bug Reports and Comments

Fri Aug 02, 2019 10:27 am

Ludvik wrote:Length of password is only 16 characters for RADIUS. I think that is bug.
We use Mikrotik's implementation (userman) and there is no length limit (or is very longer).


Not a bug, this was intentional.

More than 16 characters, really?
Support is handled on the Forums not in Emails and PMs.
Before you ask a question use the Search function to see it has been answered before.
To do an Advanced Search click the magnifying glass in the Search Box.
To upload pictures click the Upload attachment link below the BLUE SUBMIT BUTTON.

Ludvik
Experienced Member
 
Posts: 105
Joined: Tue Nov 08, 2016 1:50 pm
Has thanked: 15 times
Been thanked: 15 times

Re: v1.5.3 Bug Reports and Comments

Fri Aug 02, 2019 1:39 pm

In secure environment ... bigger password is necessary. If you use phrase, you don't have problem with. If you use password manager, you don't have problem ...

16 is small. Very small limit. I could understand 40, but 16 couldn't.

If you have a hash, you don't care much about the length of the hashed text.

User avatar
jpaine619
Member
 
Posts: 82
Joined: Fri Jul 07, 2017 11:13 pm
Location: San Diego, CA
Has thanked: 26 times
Been thanked: 18 times

Re: v1.5.3 Bug Reports and Comments

Fri Aug 02, 2019 2:51 pm

sirhc wrote:More than 16 characters, really?


Well, mathematically 16 bits of random text is roughly equal to an 80-bit encryption key. I.e if you want to crack a 128 bit cipher, you don't attack the cipher itself if the password is less than about 24 characters..(assuming all ASCII without mixed case or special characters).

Seriously though, you should support passwords of at least 24 characters (128 bits). Some people are serious about security. Why deploy a 128 bit WPA2 cipher if your password for it is gonna be less than 128 bits (effective)? That's like putting a shitty lock on a strong chain..

https://www.kryptel.com/articles/encryption_passwords.php

User avatar
sirhc
Employee
Employee
 
Posts: 7416
Joined: Tue Apr 08, 2014 3:48 pm
Location: Lancaster, PA
Has thanked: 1608 times
Been thanked: 1325 times

Re: v1.5.3 Bug Reports and Comments

Fri Aug 02, 2019 3:00 pm

Even with a 16 character limit on the password that is over 332,329,305,696,010,000,000,000,000,000 possible passwords.

Who is hacking you, the NSA?

I understand your thinking of using a phrase but come on.
Support is handled on the Forums not in Emails and PMs.
Before you ask a question use the Search function to see it has been answered before.
To do an Advanced Search click the magnifying glass in the Search Box.
To upload pictures click the Upload attachment link below the BLUE SUBMIT BUTTON.

Next
Return to Hardware and software issues

Who is online

Users browsing this forum: No registered users and 48 guests