This is for those who are having the HTTP service of mikrotik activated on the internet.
On March 2017 Wikileaks published some documents that supposed to belong to CIA under the name of Vault 7, describing that CIA has an exploit called “ChimayRed” by which can inject malicious code on RouterOS if the HTTP service is not protected.
You can find info and information on solving this, here.
Due to issues reported, I had to re-write this guide. This time all certificates are generated by mikrotik routerboard. I use openssl just to create the .p12 personal information exchange file for the android client.
Mikrotik routerOS used : 6.41.1
Android version used : 7
First we have to create some SSL certificates. A CA, a server certificate and a client certificate. Let’s start with the CA. Replace XX and xxxxxx with your information :
add name=ca-template common-name=myCa key-usage=key-cert-sign,crl-sign days-valid=3650 key-size=2048 country=XX state=xxxxxx locality=xxxxxx organization=xxxxxx unit="Certificate Authority"
sign ca-template name=myCa
set myCa trusted=yes