<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Fajrian</title>
    <description>The latest articles on Forem by Fajrian (@ajinfajrian).</description>
    <link>https://forem.com/ajinfajrian</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F885346%2Fce39abdb-adf6-42c0-b9a8-eef8ec9a5de3.png</url>
      <title>Forem: Fajrian</title>
      <link>https://forem.com/ajinfajrian</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ajinfajrian"/>
    <language>en</language>
    <item>
      <title>Error MikroTik DNS over HTTPS After Upgrading to 7.19</title>
      <dc:creator>Fajrian</dc:creator>
      <pubDate>Thu, 22 May 2025 20:22:26 +0000</pubDate>
      <link>https://forem.com/ajinfajrian/error-mikrotik-dns-over-https-after-upgrading-to-719-4nal</link>
      <guid>https://forem.com/ajinfajrian/error-mikrotik-dns-over-https-after-upgrading-to-719-4nal</guid>
      <description>&lt;p&gt;Hey fellow network admins! 👋&lt;/p&gt;

&lt;p&gt;So I've got this habit of keeping my MikroTik router updated to the latest firmware version. Usually, it's smooth sailing - upgrade, reboot, everything works perfectly. But recently, I hit a weird snag that had me scratching my head for a while.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem Strikes
&lt;/h2&gt;

&lt;p&gt;I just upgraded my MikroTik from version 7.18.2 to 7.19, expecting the usual seamless experience. Instead, my users suddenly couldn't browse the internet. Not exactly what you want to hear on a Monday morning! 😅&lt;/p&gt;

&lt;p&gt;Time to fire up WinBox and see what's going on.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Hunt Begins
&lt;/h2&gt;

&lt;p&gt;After connecting to my router, I started digging through the logs and found this lovely error message repeating over and over:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fszni95q8klwzsbhmh9gt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fszni95q8klwzsbhmh9gt.png" alt="Mikrotik Log" width="771" height="985"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;DoH server connection error: SSL: ssl: no trusted CA certificate found &lt;span class="o"&gt;(&lt;/span&gt;6&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Well, that's not good. DNS over HTTPS was basically throwing a tantrum about SSL certificates.&lt;/p&gt;

&lt;p&gt;To make things even more interesting, when I tried to ping from the MikroTik terminal, I got this confusing output:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F38e1mhfelc0g6c70qygd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F38e1mhfelc0g6c70qygd.png" alt="Ping error" width="569" height="77"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ping youtube.com
invalid value &lt;span class="k"&gt;for &lt;/span&gt;argument address:
    invalid value of mac-address, mac address required
    invalid value &lt;span class="k"&gt;for &lt;/span&gt;argument ipv6-address
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Yeah, that's definitely not normal ping behavior.&lt;/p&gt;

&lt;h2&gt;
  
  
  Quick Fixes (That I Didn't Want to Use)
&lt;/h2&gt;

&lt;p&gt;I found two quick workarounds:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Switch to local DNS&lt;/strong&gt;: Disabled DoH and used my ISP's DNS servers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Disable certificate verification&lt;/strong&gt;: Turn off DoH certificate verification&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Both worked perfectly - no more errors, internet browsing was back to normal. But here's the thing: I wasn't comfortable with either solution. Using ISP DNS feels like giving up privacy, and disabling certificate verification? That's just asking for security troubles down the road.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F078rx6z0dtw2aonmeof0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F078rx6z0dtw2aonmeof0.png" alt="Disable doh verify" width="692" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Real Solution: Certificate Management
&lt;/h2&gt;

&lt;p&gt;My gut told me this was a certificate issue (thanks to that "no trusted CA certificate found" message). So I decided to tackle the root cause.&lt;/p&gt;

&lt;h3&gt;
  
  
  First Attempt: Import Standard Root CAs
&lt;/h3&gt;

&lt;p&gt;I tried importing the standard certificate bundle from curl:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/tool fetch &lt;span class="nv"&gt;url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;https://curl.se/ca/cacert.pem
/certificate import file-name&lt;span class="o"&gt;=&lt;/span&gt;cacert.pem
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Nope. Still getting the same SSL errors. Time for a more drastic approach.&lt;/p&gt;

&lt;h3&gt;
  
  
  Nuclear Option: Fresh Start with Google's Root CAs
&lt;/h3&gt;

&lt;p&gt;⚠️ &lt;strong&gt;Warning&lt;/strong&gt;: This next command will delete ALL certificates on your MikroTik. Make sure you know what you're doing!&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/certificate remove &lt;span class="o"&gt;[&lt;/span&gt;find]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Yep, I nuked all the certificates. Sometimes you just need a clean slate.&lt;/p&gt;

&lt;p&gt;Then I imported Google's root certificate bundle:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/tool fetch &lt;span class="nv"&gt;url&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"https://pki.goog/roots.pem"&lt;/span&gt; dst-path&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"roots-goog.pem"&lt;/span&gt;
/certificate import file-name&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"roots-goog.pem"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;And just like that... 🎉 &lt;strong&gt;IT WORKED!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqib14kpjvd1lq91tlvtw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqib14kpjvd1lq91tlvtw.png" alt="Everything is work normally" width="800" height="457"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ping was back to normal, DoH was functioning properly, and my users could browse the internet again without any SSL certificate errors.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Actually Happened?
&lt;/h2&gt;

&lt;p&gt;Looking back, it seems like the upgrade to RouterOS 7.19 either corrupted or invalidated the existing certificate store. The built-in certificates that were working fine in 7.18.2 somehow became problematic in the new version.&lt;/p&gt;

&lt;p&gt;By clearing out the old certificates and importing fresh root CAs from Google, I essentially gave the router a clean, trusted certificate foundation to work with.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Certificate issues can be sneaky&lt;/strong&gt; - They might not show up immediately after an upgrade&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Don't settle for insecure workarounds&lt;/strong&gt; - Taking the time to fix the root cause is worth it&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Sometimes a nuclear approach is the fastest solution&lt;/strong&gt; - Starting fresh with certificates can save hours of troubleshooting&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Keep backups&lt;/strong&gt; - Always export your working certificate store before major upgrades (lesson learned!)&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Pro Tips for Next Time
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Export your certificate store before upgrading: &lt;code&gt;/certificate export-certificate&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Test DoH functionality immediately after firmware upgrades&lt;/li&gt;
&lt;li&gt;Keep a trusted root CA bundle handy for situations like this&lt;/li&gt;
&lt;li&gt;Document your certificate sources for easier troubleshooting&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Have you run into similar certificate issues with MikroTik upgrades? Drop a comment below - I'd love to hear about your experiences and solutions!&lt;/p&gt;

</description>
      <category>mikrotik</category>
      <category>networking</category>
      <category>dns</category>
      <category>troubleshooting</category>
    </item>
  </channel>
</rss>
