[FS#4159] hostapd-common update breaks WiFi completely when using the config file for the previous version
OpenWrt Bugs
openwrt-bugs at lists.openwrt.org
Thu Jan 6 05:35:30 PST 2022
THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#4159 - hostapd-common update breaks WiFi completely when using the config file for the previous version
User who did this - KsmoinO (KsmoinO)
----------
Jo-Philipp Wich comment on 28 November 2021 23:03, solves the issue for me except for radius authentication
I set it up following this guide https://openwrt.org/docs/guide-user/network/wifi/freeradius
When I upgrade hostapd-common 2020-06-08-5a8b3662-35 to 2020-06-08-5a8b3662-38, hostapd seems not be able to contact radius:
daemon.notice hostapd: wlan0: RADIUS No response from Accounting server 127.0.0.1:1813 - failover
daemon.notice hostapd: wlan0: RADIUS No response from Authentication server 127.0.0.1:1812 - failover
Downgrading hostapd-common to 2020-06-08-5a8b3662-35 restore radius authentication
----------
More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4159#comment10441
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.
More information about the openwrt-bugs
mailing list