OpenWrt 22.03.0-rc6 sixth release candidate

Hi,

The OpenWrt community is proud to announce the sixth release candidate of the upcoming OpenWrt 22.03 stable version series. It incorporates over 3500 commits since branching the previous OpenWrt 21.02 release and has been under development for about one year.

This is just a release candidate and not the final release yet.

Changes between OpenWrt 22.03.0-rc5 and 22.03.0-rc6

Software updates

  • Linux kernel updated to version 5.10.134 (from 5.10.127 in v22.03.0-rc5)
  • mac80211 updated to version 5.15.58-1 (from 5.15.33-1 in v22.03.0-rc5)
  • wolfssl updated to version 5.4.0 (from 5.3.0 in v22.03.0-rc5)
  • openssl update to version 1.1.1q (from 1.1.1p in v22.03.0-rc5)
  • intel-microcode update to version 20220510 (from 20220207 in v22.03.0-rc5)

Misc changes

  • wolfssl: Deactivate CPU acceleration by default
  • wolfssl: Make package shared again

Device support

  • New devices
    • ramips: Netgear WAX202
  • bcm53xx: NAT performance increase

Many other changes in all parts of OpenWrt, see Changelog for details.
https://openwrt.ifw.cn/releases/22.03/changelog-22.03.0-rc6


Full release notes and upgrade instructions are available at
https://openwrt.ifw.cn/releases/22.03/notes-22.03.0-rc6

In particular, make sure to read the regressions and known issues before upgrading:
https://openwrt.ifw.cn/releases/22.03/notes-22.03.0-rc6#known_issues

For a detailed list of all changes since 22.03-rc5, refer to
https://openwrt.ifw.cn/releases/22.03/changelog-22.03.0-rc6

To download the 22.03.0-rc6 images, navigate to:
https://downloads.openwrt.ifw.cn/releases/22.03.0-rc6/
Use OpenWrt Firmware Selector to download:
https://firmware-selector.openwrt.ifw.cn/?version=22.03.0-rc6

As always, a big thank you goes to all our active package maintainers, testers, documenters, and supporters.

Have fun!

The OpenWrt Community


To stay informed of new OpenWrt releases and security advisories, there
are new channels available:

11 Likes

Not that I mind. But rc6. Have there been as many release candidates for an Openwrt release before?

1 Like

Installed and working fine on a Wavlink Quantum Dax

Installed and working fine on a TP-Link Archer C60 v3.

22.03.0-rc2 and -rc3 were skipped, because of some build issues. So -rc6 is actually the forth release candidate.

4 Likes

installed and not working on BT Home hub 5. Dynamic DNS has the correct numbers but my website does not appear. IP numbers on rc6 & on my server match. Other websites are OK. Had to drop back to rc5 (the only version that fully works).

1 Like

Hi all,
I installed last RC6 on my WAX202 yesterday and this morning I was locked out of LuCI while SSH was successful.
Even after a POST with the right credentials, the subsequent GET always returned 403.
I tried resetting password with passwd but LuCI remained locked.

Browser private session worked, so I had to delete the cookies for the router site.

1 Like

Sounds like an known problem that also appears when switching from vendor firmware to OpenWRT on a Linksys WRT. WRT is based an older forked OpenWRT version, reusing the LuCi session cookie name with a non-compatible value.
If you login into WRT vendor admin GUI then flash OpenWRT, the vendor firmware logout will be skipped (which would remove the cookie). If you then try to login into LuCi afterwards, the old cookie is still present, but does not match LuCis value format expectation. That login fails as well, until you manually delete the old cookie.

4 Likes

I worked with the AP a lot yesterday, with login and logout and reboot and all the stuff.
Anyway I'll keep an eye if it happens again.

I see in your other thread that your WRT3200 had that issue as well when moving from RC5 to RC6?

My WRT3200 is still at 21.02.
It's my first time with a RC, just because it's the only available for WAX202...

MikroTik RouterBOARD 951Ui-2nD (hAP)

Looking good. I did the jump last month from 19.07.10 to the 22.03.0 rc5

Bless the Developer's aim: I only today noticed this in the LuCi Interface setup of WireGuard: An Import conf drag/drop..



Pic in BoottrapLight

Really, doing this from scratch is very easy now. Plop in your supplied file


Add your DNS



Firewall Zone



Edit the Peer that was dropped



Check route allowed IP




opkg list-installed
/$ opkg list-installed
base-files - 1487-r19590-042d558536
busybox - 1.35.0-3
ca-bundle - 20211016-1
cgi-io - 2021-09-08-98cef9dd-20
curl - 7.83.1-3
diffutils - 3.8-1
dnsmasq-full - 2.86-13
dropbear - 2022.82-2
firewall4 - 2022-06-17-15c38317-1
fstools - 2022-06-02-93369be0-1
fwtool - 2019-11-12-8f7fe925-1
getrandom - 2021-08-03-205defb5-2
hostapd-common - 2022-01-16-cff80b4f-9
iw - 5.16-1
iwinfo - 2022-04-26-dc6847eb-1
jansson4 - 2.13.1-2
jq - 1.6-2
jshn - 2022-05-15-d2223ef9-1
jsonfilter - 2018-02-04-c7e938d6-1
kernel - 5.10.134-1-d32e3f3c2551fb8c98ff50bb6902118f
kmod-ath - 5.10.134+5.15.58-1-1
kmod-ath9k - 5.10.134+5.15.58-1-1
kmod-ath9k-common - 5.10.134+5.15.58-1-1
kmod-cfg80211 - 5.10.134+5.15.58-1-1
kmod-crypto-aead - 5.10.134-1
kmod-crypto-ccm - 5.10.134-1
kmod-crypto-cmac - 5.10.134-1
kmod-crypto-crc32c - 5.10.134-1
kmod-crypto-ctr - 5.10.134-1
kmod-crypto-gcm - 5.10.134-1
kmod-crypto-gf128 - 5.10.134-1
kmod-crypto-ghash - 5.10.134-1
kmod-crypto-hash - 5.10.134-1
kmod-crypto-hmac - 5.10.134-1
kmod-crypto-kpp - 5.10.134-1
kmod-crypto-lib-chacha20 - 5.10.134-1
kmod-crypto-lib-chacha20poly1305 - 5.10.134-1
kmod-crypto-lib-curve25519 - 5.10.134-1
kmod-crypto-lib-poly1305 - 5.10.134-1
kmod-crypto-manager - 5.10.134-1
kmod-crypto-null - 5.10.134-1
kmod-crypto-rng - 5.10.134-1
kmod-crypto-seqiv - 5.10.134-1
kmod-crypto-sha256 - 5.10.134-1
kmod-gpio-button-hotplug - 5.10.134-3
kmod-ipt-core - 5.10.134-1
kmod-ipt-ipset - 5.10.134-1
kmod-lib-crc-ccitt - 5.10.134-1
kmod-lib-crc32c - 5.10.134-1
kmod-mac80211 - 5.10.134+5.15.58-1-1
kmod-nf-conntrack - 5.10.134-1
kmod-nf-conntrack-netlink - 5.10.134-1
kmod-nf-conntrack6 - 5.10.134-1
kmod-nf-flow - 5.10.134-1
kmod-nf-ipt - 5.10.134-1
kmod-nf-log - 5.10.134-1
kmod-nf-log6 - 5.10.134-1
kmod-nf-nat - 5.10.134-1
kmod-nf-nat6 - 5.10.134-1
kmod-nf-reject - 5.10.134-1
kmod-nf-reject6 - 5.10.134-1
kmod-nfnetlink - 5.10.134-1
kmod-nft-core - 5.10.134-1
kmod-nft-fib - 5.10.134-1
kmod-nft-nat - 5.10.134-1
kmod-nft-nat6 - 5.10.134-1
kmod-nft-offload - 5.10.134-1
kmod-ppp - 5.10.134-1
kmod-pppoe - 5.10.134-1
kmod-pppox - 5.10.134-1
kmod-slhc - 5.10.134-1
kmod-udptunnel4 - 5.10.134-1
kmod-udptunnel6 - 5.10.134-1
kmod-wireguard - 5.10.134-1
libblobmsg-json20220515 - 2022-05-15-d2223ef9-1
libc - 1.2.3-4
libcap - 2.63-1
libcurl4 - 7.83.1-3
libgcc1 - 11.2.0-4
libgmp10 - 6.2.1-1
libiwinfo-data - 2022-04-26-dc6847eb-1
libiwinfo-lua - 2022-04-26-dc6847eb-1
libiwinfo20210430 - 2022-04-26-dc6847eb-1
libjson-c5 - 0.15-2
libjson-script20220515 - 2022-05-15-d2223ef9-1
liblua5.1.5 - 5.1.5-10
liblucihttp-lua - 2022-07-08-6e68a106-1
liblucihttp0 - 2022-07-08-6e68a106-1
libmbedtls12 - 2.28.0-1
libmnl0 - 1.0.5-1
libnetfilter-conntrack3 - 1.0.9-2
libnettle8 - 3.7.3-2
libnfnetlink0 - 1.0.2-1
libnftnl11 - 1.2.1-1
libnghttp2-14 - 1.44.0-1
libnl-tiny1 - 2021-11-21-8e0555fb-1
libopenssl1.1 - 1.1.1q-1
libpthread - 1.2.3-4
libubox20220515 - 2022-05-15-d2223ef9-1
libubus-lua - 2022-06-01-2bebf93c-1
libubus20220601 - 2022-06-01-2bebf93c-1
libuci-lua - 2021-10-22-f84f49f0-6
libuci20130104 - 2021-10-22-f84f49f0-6
libuclient20201210 - 2021-05-14-6a6011df-1
libucode20220322 - 2022-06-01-b211ca0e-1
libustream-wolfssl20201210 - 2022-01-16-868fd881-1
libwolfssl5.4.0.ee39414e - 5.4.0-stable-5
logd - 2021-08-03-205defb5-2
lua - 5.1.5-10
luci - git-20.074.84698-ead5e81
luci-app-firewall - git-22.089.67563-7e3c1b4
luci-app-opkg - git-22.154.41881-28e92e3
luci-app-wireguard - git-21.322.66896-8ae208d
luci-base - git-22.204.42822-9a18337
luci-lib-base - git-20.232.39649-1f6dc29
luci-lib-ip - git-20.250.76529-62505bd
luci-lib-jsonc - git-22.097.61921-7513345
luci-lib-nixio - git-20.234.06894-c4a4e43
luci-mod-admin-full - git-19.253.48496-3f93650
luci-mod-network - git-22.193.51183-f19d41c
luci-mod-status - git-22.189.48501-6731190
luci-mod-system - git-22.140.66206-02913be
luci-proto-ipv6 - git-21.148.48881-79947af
luci-proto-ppp - git-21.158.38888-88b9d84
luci-proto-wireguard - git-22.213.40001-18e6040
luci-ssl - git-20.244.36115-e10f954
luci-theme-bootstrap - git-22.141.59265-d8ecf48
mtd - 26
netifd - 2022-06-01-39ef9fe1-1
nftables-json - 1.0.2-2
ntpdate - 4.2.8p15-4
odhcp6c - 2022-07-13-9212bfcb-18
odhcpd-ipv6only - 2021-08-11-01b4e604-1
openwrt-keyring - 2022-03-25-62471e69-3
opkg - 2022-02-24-d038e5b6-1
ppp - 2.4.9.git-2021-01-04-3
ppp-mod-pppoe - 2.4.9.git-2021-01-04-3
procd - 2022-06-01-7a009685-1
procd-seccomp - 2022-06-01-7a009685-1
procd-ujail - 2022-06-01-7a009685-1
px5g-wolfssl - 4
rpcd - 2022-02-07-909f2a04-1
rpcd-mod-file - 2022-02-07-909f2a04-1
rpcd-mod-iwinfo - 2022-02-07-909f2a04-1
rpcd-mod-luci - 20210614
rpcd-mod-rrdns - 20170710
swconfig - 12
ubi-utils - 2.1.4-1
uboot-envtools - 2022.01-27
ubox - 2021-08-03-205defb5-2
ubus - 2022-06-01-2bebf93c-1
ubusd - 2022-06-01-2bebf93c-1
uci - 2021-10-22-f84f49f0-6
uclient-fetch - 2021-05-14-6a6011df-1
ucode - 2022-06-01-b211ca0e-1
ucode-mod-fs - 2022-06-01-b211ca0e-1
ucode-mod-ubus - 2022-06-01-b211ca0e-1
ucode-mod-uci - 2022-06-01-b211ca0e-1
uhttpd - 2022-02-07-2f8b1360-1
uhttpd-mod-ubus - 2022-02-07-2f8b1360-1
urandom-seed - 3
urngd - 2020-01-21-c7f7b6b6-1
usign - 2020-05-23-f1f65026-1
wireguard-tools - 1.0.20210424-3
wireless-regdb - 2022.06.06-1
wpad-basic-wolfssl - 2022-01-16-cff80b4f-9

@StSaens makes sense for more RCs than expected due to the move to nftables.

After a stable 25 day uptime on rc5, flashed rc6 to the other partition on my WRT32X, running great so far. Thanks devs. :smiley:

There might be a bug in Upnp related to nftables, doesn't seem to be working luci page reports no activity. Starting to look more into it (generally keep it off anyway, but just for testing).

2 Likes

I was able to do an in place upgrade of my A6 v3 router from rc4 to rc6. But when I try to opkg update I get an error downloading Packages.sig. All other files update correctly when this command is run.

root@a6v3:~# opkg update
...
Downloading https://downloads.openwrt.ifw.cn/releases/22.03.0-rc6/packages/mipsel_24kc/luci/Packages.sig
Signature file download failed.
Remove wrong Signature file.
...
Collected errors:
 * opkg_download: Failed to download https://downloads.openwrt.ifw.cn/releases/22.03.0-rc6/packages/mipsel_24kc/luci/Packages.sig, wget returned 4.
 * opkg_download: Check your network settings and connectivity.

@nbd please can you check this?
Now it's is unusable for devices using mt76.

Thanks

1 Like

Why is it "unusable"? FT works, if you don't look at this error, it is quite usable.

How do we know that FT "works" ?
There are no other infos like:
"WPA: FT authentication already completed - do not start 4-way handshake".

1 Like

Updated WRT1900ACS V1 from 21.02.3 to 22.03.0-rc6 keeping the configuration.
The unit didn't come back up from the reboot, it had to be power cycled.
The power, Internet, and wireless LEDs are too dim to be useable. They are dimmer than before, I can barely see them in a dark room.
Otherwise the unit appears to be working fine after the power cycle.
Edit: Ignore power cycle issue, may have been caused by an attached switch.

Thankyou, I will install rc6 coming weekend and report back.
by the way 5th release had no issue at all in a Zbt-we1326, finally wlan 5Ghz has no disconnects, its been working for 5 days with no issue