Hi Michael,

On 01/03/2018 09:11 AM, Michael Stapelberg wrote:
Pushing code directly to Debian stretch is too risky. Let’s wait until the change made it to Debian testing, which most naturally would happen with a new upstream release (3.0.16?).

Once that happened, please ping this bug and we can look into preparing an update to stretch.

3.0.16 have been released by upstream http://freeradius.org/releases/ it cointain fix for correct receiving of multiple RADIUS packets through RadSec.

It isn't in testing, yet. Is there any chance how to speedup things?

Best regards
--
-----------------------
Jan Tomasek aka Semik
http://www.tomasek.cz/

Reply via email to