[FS#4159] hostapd-common update breaks WiFi completely when using the config file for the previous version

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Thu Jan 6 05:35:30 PST 2022


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#4159 - hostapd-common update breaks WiFi completely when using the config file for the previous version
User who did this - KsmoinO (KsmoinO)

----------
Jo-Philipp Wich comment on 28 November 2021 23:03, solves the issue for me except for radius authentication

I set it up following this guide https://openwrt.org/docs/guide-user/network/wifi/freeradius

When I upgrade hostapd-common 2020-06-08-5a8b3662-35 to 2020-06-08-5a8b3662-38, hostapd seems not be able to contact radius:
daemon.notice hostapd: wlan0: RADIUS No response from Accounting server 127.0.0.1:1813 - failover
daemon.notice hostapd: wlan0: RADIUS No response from Authentication server 127.0.0.1:1812 - failover

Downgrading hostapd-common to 2020-06-08-5a8b3662-35 restore radius authentication
----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=4159#comment10441

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list