OpenWrt 22.03.0-rc6 sixth release candidate

22.03.0-rc2 and -rc3 were skipped, because of some build issues. So -rc6 is actually the forth release candidate.

4 Likes

installed and not working on BT Home hub 5. Dynamic DNS has the correct numbers but my website does not appear. IP numbers on rc6 & on my server match. Other websites are OK. Had to drop back to rc5 (the only version that fully works).

1 Like

Hi all,
I installed last RC6 on my WAX202 yesterday and this morning I was locked out of LuCI while SSH was successful.
Even after a POST with the right credentials, the subsequent GET always returned 403.
I tried resetting password with passwd but LuCI remained locked.

Browser private session worked, so I had to delete the cookies for the router site.

1 Like

Sounds like an known problem that also appears when switching from vendor firmware to OpenWRT on a Linksys WRT. WRT is based an older forked OpenWRT version, reusing the LuCi session cookie name with a non-compatible value.
If you login into WRT vendor admin GUI then flash OpenWRT, the vendor firmware logout will be skipped (which would remove the cookie). If you then try to login into LuCi afterwards, the old cookie is still present, but does not match LuCis value format expectation. That login fails as well, until you manually delete the old cookie.

4 Likes

I worked with the AP a lot yesterday, with login and logout and reboot and all the stuff.
Anyway I'll keep an eye if it happens again.

I see in your other thread that your WRT3200 had that issue as well when moving from RC5 to RC6?

My WRT3200 is still at 21.02.
It's my first time with a RC, just because it's the only available for WAX202...

MikroTik RouterBOARD 951Ui-2nD (hAP)

Looking good. I did the jump last month from 19.07.10 to the 22.03.0 rc5

Bless the Developer's aim: I only today noticed this in the LuCi Interface setup of WireGuard: An Import conf drag/drop..



Pic in BoottrapLight

Really, doing this from scratch is very easy now. Plop in your supplied file


Add your DNS



Firewall Zone



Edit the Peer that was dropped



Check route allowed IP




opkg list-installed
/$ opkg list-installed
base-files - 1487-r19590-042d558536
busybox - 1.35.0-3
ca-bundle - 20211016-1
cgi-io - 2021-09-08-98cef9dd-20
curl - 7.83.1-3
diffutils - 3.8-1
dnsmasq-full - 2.86-13
dropbear - 2022.82-2
firewall4 - 2022-06-17-15c38317-1
fstools - 2022-06-02-93369be0-1
fwtool - 2019-11-12-8f7fe925-1
getrandom - 2021-08-03-205defb5-2
hostapd-common - 2022-01-16-cff80b4f-9
iw - 5.16-1
iwinfo - 2022-04-26-dc6847eb-1
jansson4 - 2.13.1-2
jq - 1.6-2
jshn - 2022-05-15-d2223ef9-1
jsonfilter - 2018-02-04-c7e938d6-1
kernel - 5.10.134-1-d32e3f3c2551fb8c98ff50bb6902118f
kmod-ath - 5.10.134+5.15.58-1-1
kmod-ath9k - 5.10.134+5.15.58-1-1
kmod-ath9k-common - 5.10.134+5.15.58-1-1
kmod-cfg80211 - 5.10.134+5.15.58-1-1
kmod-crypto-aead - 5.10.134-1
kmod-crypto-ccm - 5.10.134-1
kmod-crypto-cmac - 5.10.134-1
kmod-crypto-crc32c - 5.10.134-1
kmod-crypto-ctr - 5.10.134-1
kmod-crypto-gcm - 5.10.134-1
kmod-crypto-gf128 - 5.10.134-1
kmod-crypto-ghash - 5.10.134-1
kmod-crypto-hash - 5.10.134-1
kmod-crypto-hmac - 5.10.134-1
kmod-crypto-kpp - 5.10.134-1
kmod-crypto-lib-chacha20 - 5.10.134-1
kmod-crypto-lib-chacha20poly1305 - 5.10.134-1
kmod-crypto-lib-curve25519 - 5.10.134-1
kmod-crypto-lib-poly1305 - 5.10.134-1
kmod-crypto-manager - 5.10.134-1
kmod-crypto-null - 5.10.134-1
kmod-crypto-rng - 5.10.134-1
kmod-crypto-seqiv - 5.10.134-1
kmod-crypto-sha256 - 5.10.134-1
kmod-gpio-button-hotplug - 5.10.134-3
kmod-ipt-core - 5.10.134-1
kmod-ipt-ipset - 5.10.134-1
kmod-lib-crc-ccitt - 5.10.134-1
kmod-lib-crc32c - 5.10.134-1
kmod-mac80211 - 5.10.134+5.15.58-1-1
kmod-nf-conntrack - 5.10.134-1
kmod-nf-conntrack-netlink - 5.10.134-1
kmod-nf-conntrack6 - 5.10.134-1
kmod-nf-flow - 5.10.134-1
kmod-nf-ipt - 5.10.134-1
kmod-nf-log - 5.10.134-1
kmod-nf-log6 - 5.10.134-1
kmod-nf-nat - 5.10.134-1
kmod-nf-nat6 - 5.10.134-1
kmod-nf-reject - 5.10.134-1
kmod-nf-reject6 - 5.10.134-1
kmod-nfnetlink - 5.10.134-1
kmod-nft-core - 5.10.134-1
kmod-nft-fib - 5.10.134-1
kmod-nft-nat - 5.10.134-1
kmod-nft-nat6 - 5.10.134-1
kmod-nft-offload - 5.10.134-1
kmod-ppp - 5.10.134-1
kmod-pppoe - 5.10.134-1
kmod-pppox - 5.10.134-1
kmod-slhc - 5.10.134-1
kmod-udptunnel4 - 5.10.134-1
kmod-udptunnel6 - 5.10.134-1
kmod-wireguard - 5.10.134-1
libblobmsg-json20220515 - 2022-05-15-d2223ef9-1
libc - 1.2.3-4
libcap - 2.63-1
libcurl4 - 7.83.1-3
libgcc1 - 11.2.0-4
libgmp10 - 6.2.1-1
libiwinfo-data - 2022-04-26-dc6847eb-1
libiwinfo-lua - 2022-04-26-dc6847eb-1
libiwinfo20210430 - 2022-04-26-dc6847eb-1
libjson-c5 - 0.15-2
libjson-script20220515 - 2022-05-15-d2223ef9-1
liblua5.1.5 - 5.1.5-10
liblucihttp-lua - 2022-07-08-6e68a106-1
liblucihttp0 - 2022-07-08-6e68a106-1
libmbedtls12 - 2.28.0-1
libmnl0 - 1.0.5-1
libnetfilter-conntrack3 - 1.0.9-2
libnettle8 - 3.7.3-2
libnfnetlink0 - 1.0.2-1
libnftnl11 - 1.2.1-1
libnghttp2-14 - 1.44.0-1
libnl-tiny1 - 2021-11-21-8e0555fb-1
libopenssl1.1 - 1.1.1q-1
libpthread - 1.2.3-4
libubox20220515 - 2022-05-15-d2223ef9-1
libubus-lua - 2022-06-01-2bebf93c-1
libubus20220601 - 2022-06-01-2bebf93c-1
libuci-lua - 2021-10-22-f84f49f0-6
libuci20130104 - 2021-10-22-f84f49f0-6
libuclient20201210 - 2021-05-14-6a6011df-1
libucode20220322 - 2022-06-01-b211ca0e-1
libustream-wolfssl20201210 - 2022-01-16-868fd881-1
libwolfssl5.4.0.ee39414e - 5.4.0-stable-5
logd - 2021-08-03-205defb5-2
lua - 5.1.5-10
luci - git-20.074.84698-ead5e81
luci-app-firewall - git-22.089.67563-7e3c1b4
luci-app-opkg - git-22.154.41881-28e92e3
luci-app-wireguard - git-21.322.66896-8ae208d
luci-base - git-22.204.42822-9a18337
luci-lib-base - git-20.232.39649-1f6dc29
luci-lib-ip - git-20.250.76529-62505bd
luci-lib-jsonc - git-22.097.61921-7513345
luci-lib-nixio - git-20.234.06894-c4a4e43
luci-mod-admin-full - git-19.253.48496-3f93650
luci-mod-network - git-22.193.51183-f19d41c
luci-mod-status - git-22.189.48501-6731190
luci-mod-system - git-22.140.66206-02913be
luci-proto-ipv6 - git-21.148.48881-79947af
luci-proto-ppp - git-21.158.38888-88b9d84
luci-proto-wireguard - git-22.213.40001-18e6040
luci-ssl - git-20.244.36115-e10f954
luci-theme-bootstrap - git-22.141.59265-d8ecf48
mtd - 26
netifd - 2022-06-01-39ef9fe1-1
nftables-json - 1.0.2-2
ntpdate - 4.2.8p15-4
odhcp6c - 2022-07-13-9212bfcb-18
odhcpd-ipv6only - 2021-08-11-01b4e604-1
openwrt-keyring - 2022-03-25-62471e69-3
opkg - 2022-02-24-d038e5b6-1
ppp - 2.4.9.git-2021-01-04-3
ppp-mod-pppoe - 2.4.9.git-2021-01-04-3
procd - 2022-06-01-7a009685-1
procd-seccomp - 2022-06-01-7a009685-1
procd-ujail - 2022-06-01-7a009685-1
px5g-wolfssl - 4
rpcd - 2022-02-07-909f2a04-1
rpcd-mod-file - 2022-02-07-909f2a04-1
rpcd-mod-iwinfo - 2022-02-07-909f2a04-1
rpcd-mod-luci - 20210614
rpcd-mod-rrdns - 20170710
swconfig - 12
ubi-utils - 2.1.4-1
uboot-envtools - 2022.01-27
ubox - 2021-08-03-205defb5-2
ubus - 2022-06-01-2bebf93c-1
ubusd - 2022-06-01-2bebf93c-1
uci - 2021-10-22-f84f49f0-6
uclient-fetch - 2021-05-14-6a6011df-1
ucode - 2022-06-01-b211ca0e-1
ucode-mod-fs - 2022-06-01-b211ca0e-1
ucode-mod-ubus - 2022-06-01-b211ca0e-1
ucode-mod-uci - 2022-06-01-b211ca0e-1
uhttpd - 2022-02-07-2f8b1360-1
uhttpd-mod-ubus - 2022-02-07-2f8b1360-1
urandom-seed - 3
urngd - 2020-01-21-c7f7b6b6-1
usign - 2020-05-23-f1f65026-1
wireguard-tools - 1.0.20210424-3
wireless-regdb - 2022.06.06-1
wpad-basic-wolfssl - 2022-01-16-cff80b4f-9

@StSaens makes sense for more RCs than expected due to the move to nftables.

After a stable 25 day uptime on rc5, flashed rc6 to the other partition on my WRT32X, running great so far. Thanks devs. :smiley:

There might be a bug in Upnp related to nftables, doesn't seem to be working luci page reports no activity. Starting to look more into it (generally keep it off anyway, but just for testing).

2 Likes

I was able to do an in place upgrade of my A6 v3 router from rc4 to rc6. But when I try to opkg update I get an error downloading Packages.sig. All other files update correctly when this command is run.

root@a6v3:~# opkg update
...
Downloading https://downloads.openwrt.org/releases/22.03.0-rc6/packages/mipsel_24kc/luci/Packages.sig
Signature file download failed.
Remove wrong Signature file.
...
Collected errors:
 * opkg_download: Failed to download https://downloads.openwrt.org/releases/22.03.0-rc6/packages/mipsel_24kc/luci/Packages.sig, wget returned 4.
 * opkg_download: Check your network settings and connectivity.

@nbd please can you check this?
Now it's is unusable for devices using mt76.

Thanks

1 Like

Why is it "unusable"? FT works, if you don't look at this error, it is quite usable.

How do we know that FT "works" ?
There are no other infos like:
"WPA: FT authentication already completed - do not start 4-way handshake".

1 Like

Updated WRT1900ACS V1 from 21.02.3 to 22.03.0-rc6 keeping the configuration.
The unit didn't come back up from the reboot, it had to be power cycled.
The power, Internet, and wireless LEDs are too dim to be useable. They are dimmer than before, I can barely see them in a dark room.
Otherwise the unit appears to be working fine after the power cycle.
Edit: Ignore power cycle issue, may have been caused by an attached switch.

Thankyou, I will install rc6 coming weekend and report back.
by the way 5th release had no issue at all in a Zbt-we1326, finally wlan 5Ghz has no disconnects, its been working for 5 days with no issue

Minor issue here.
Creating a backup archive, the proposed filename keeps the last timestamp.

Just clicked the Generate archive button and this is the result:
image

If I hadn't checked, I'd have overwritten my previous backup.

That's not correct, my one creates name "backup-OpenWrt-2022-08-04.tar.gz" for example
both devices x86 and 7621a

That could be browser related. Try logging out of the router in your browser, clearing cookies and site data for your router, closing the tab/window. Open a new tab and log back in and see if the file name is updated. Alternatively try a new browser that doesn't have session data for your router.

Your router might not synchronize it's time correctly.
Furthermore, browsers typically don't overwrite existing files instead a number (1) gets appended to the file name increasing with every file that has the same name.

2 Likes

Hi,
With OpenWRT since version 21. Installed on Archer C50 V1 and V3. Working with Archer C7 V4. No problem at all.

Now the same devices with version 22.03 rc5 and rc6:

  1. Wireless Client Mode working properly.
  2. ADSL connection works fine.
  3. Dual access to the DSL Bridged modem works.
  4. Guest network in both bands tested now and are fine.

The only issue so far:
The client wireless connection (in wireless menu, below the master device) does not show the encryption method. In version 21, it displays for example CCMP AES, but now there is nothing there. It shows Encryption:-

I am sure that the encryption is WPA2 AES.

Thanks to all respective developers who have made this piece of great software. I am very happy with it and its capabilities.

Regards.

1 Like