Hi Michael,
On 01/03/2018 09:11 AM, Michael Stapelberg wrote:
Pushing code directly to Debian stretch is too risky. Let’s wait until
the change made it to Debian testing, which most naturally would happen
with a new upstream release (3.0.16?).
Once that happened, please ping this bug and we can look into preparing
an update to stretch.
3.0.16 have been released by upstream http://freeradius.org/releases/ it
cointain fix for correct receiving of multiple RADIUS packets through
RadSec.
It isn't in testing, yet. Is there any chance how to speedup things?
Best regards
--
-----------------------
Jan Tomasek aka Semik
http://www.tomasek.cz/