From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0114.outbound.protection.outlook.com [207.46.100.114]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "MSIT Machine Auth CA 2" (verified OK)) by huchra.bufferbloat.net (Postfix) with ESMTPS id D064E21F31B for ; Tue, 9 Dec 2014 12:34:43 -0800 (PST) Received: from mail-oi0-f46.google.com (209.85.218.46) by BY2PR06MB028.namprd06.prod.outlook.com (10.242.45.25) with Microsoft SMTP Server (TLS) id 15.1.31.17; Tue, 9 Dec 2014 20:34:41 +0000 Received: by mail-oi0-f46.google.com with SMTP id h136so994391oig.19 for ; Tue, 09 Dec 2014 12:34:36 -0800 (PST) X-Received: by 10.182.120.10 with SMTP id ky10mr245067obb.68.1418157275997; Tue, 09 Dec 2014 12:34:35 -0800 (PST) MIME-Version: 1.0 Received: by 10.182.160.68 with HTTP; Tue, 9 Dec 2014 12:34:14 -0800 (PST) In-Reply-To: References: From: Eric Schultz Date: Tue, 9 Dec 2014 14:34:14 -0600 Message-ID: To: David Lang Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [209.85.218.46] X-ClientProxiedBy: BN1PR08CA0029.namprd08.prod.outlook.com (10.242.217.157) To BY2PR06MB028.namprd06.prod.outlook.com (10.242.45.25) X-Microsoft-Antispam: UriScan:; X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:BY2PR06MB028; X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(602002); SRVR:BY2PR06MB028; X-Forefront-PRVS: 0420213CCD X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6009001)(51914003)(24454002)(199003)(51704005)(51414003)(377454003)(46584002)(243025005)(189002)(55446002)(101416001)(97736003)(61266001)(64706001)(122386002)(21056001)(120916001)(99396003)(61726006)(40100003)(450100001)(77156002)(62966003)(15975445007)(66066001)(68736005)(59536001)(93886004)(122856001)(16601075003)(50986999)(46102003)(20776003)(4396001)(110136001)(54356999)(107046002)(106356001)(105586002)(81156004)(69596002)(23676002)(50466002)(19580405001)(63696999)(47776003)(86362001)(92566001)(76176999)(93516999)(42186005)(19580395003)(87976001)(31966008)(55456009); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR06MB028; H:mail-oi0-f46.google.com; FPR:; SPF:None; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:;SRVR:BY2PR06MB028; X-OriginatorOrg: prplfoundation.org Cc: "cerowrt-devel@lists.bufferbloat.net" Subject: Re: [Cerowrt-devel] New FCC requirements and CeroWrt X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Dec 2014 20:35:12 -0000 David, Thanks for the response. We're getting advice from the EFF right now, and hopefully other groups, on what the requirement is. It's admittedly vague and hard to separate what the FCC means versus what developers might think. You bring up a lot of good points that I need to add to the page to clarify. I'm not sure in this case you can separate the radio frequency parameters from the kernel in the case of OpenWrt. I'm not a kernel engineer but I've tried to general understanding of how the frequency authorization works in OpenWrt and Linux. As I understand it, the system for deciding which frequencies to use is included as part of the kernel in OpenWrt. The kernel uses the frequency database to decide on what commands to send to the wifi driver (which include changing frequency, using DFS, etc). The driver is clearly part of the device at this point. But how should the driver verify that the commands coming in comply with requirements? It's not entirely clear. And how does the manufacturer guarantee that only authorized updates are made to the device? I want to make clear, the wiki page does not include recommendations. These were ideas that one of our members were throwing around internally with their development and legal team. They've asked me to try to come up with better solutions since they don't really like any of the ones they've come up with internally. I'm contacting folks to try to come up with recommendations for companies so they don't go for the more extreme routes that unnecessarily lock down devices and hurt the community. Eric On Tue, Dec 9, 2014 at 2:14 PM, David Lang wrote: > We really need to find out what the new FCC requirements are. > > People have been claiming that the FCC requires all sorts of lockdowns th= at > they don't actually require for decades (when I first got into Ham Radio,= we > were hearing that any radio able to operate on the business bands had to = be > locked down to prevent the owner from changing it's frequency. It wasn't > true) > > If they are saying that the RF portion can't be modified in a Software > Defined Radio, that would be somewhat reasonable, saying that the softwar= e > implementing the 802.11(whatever) protocol on that RF portion must be loc= ked > down is less so, and saying that the main OS on the router must be locked > down is completely unreasonable. > > I would be surprised if they required that the OS can't be changed. > > As for the implementation of the 802.11(whatever) protocol, I would be > surprised if they required this to be locked down, but not dumbfounded > > > now that I've finished the rant, reading the statement quoted on that wik= i > page: > >> Applications for certification of U-NII devices in the 5.15-5.35 GHz and >> the 5.47-5.85 GHz bands must include a high level operational descriptio= n of >> the security procedures that control the radio frequency operating >> parameters and ensure that unauthorized modifications cannot be made. > > > All that it is talking about is the radio frequency parameters. > > The followup/clarification is again talking about the RF parameters. > > > Remember, when the FCC is talking about a 'device', they are talking abou= t > the radio, not the entire computer that has a radio as part of it. > > According to the background, they are worried about interference with rad= ar, > so this could mean that the firmware needs to have a mechansim to detect = the > radar and not transmit on that frequency, but this is only a few channels= . > You could still have an opensource, non locked down firmware that just > didn't give you the option of using those channels, and a signed firmware > that did. > > This does not require secure boot or any of the other lockdown methods th= at > are being talked about on that page. I hope these are not the "official" > openwrt recommendations (and if they are, why are they not on an openwrt > page?) > > David Lang > > > On Tue, 9 Dec 2014, Eric Schultz wrote: > >> Dave, >> >> Thanks for the quick response and I appreciate your passion. >> >> No one here wants Secure Boot or DRM at all. I personally find the >> idea abhorrent and no one at prpl wants it. The difficulty is figuring >> out how companies can comply with the regulation in a way that doesn't >> require hardware be locked down. I wish I could avoid ever thinking of >> this topic but unfortunately, if companies don't find a solution that >> fulfills the FCC's requirements, they're going to go with DRM. I want >> to see if we can give manufacturers a solution that avoids DRM >> entirely. >> >> I'd be happy to learn more about the make-wifi-fast effort and to see >> how we can facilitate it's success. >> >> Thanks a ton, >> >> Eric >> >> On Tue, Dec 9, 2014 at 11:49 AM, Dave Taht wrote: >>> >>> On Tue, Dec 9, 2014 at 9:11 AM, Eric Schultz >>> wrote: >>>> >>>> All, >>>> >>>> I work for the prpl Foundation, an open source foundation organized by >>>> a number of companies, most related to MIPS. One project we work with >>>> externally is the OpenWrt project. Recently one of our members >>>> mentioned a new FCC requirement (described at >>>> >>>> http://wiki.prplfoundation.org/wiki/Complying_with_FCC_rules_on_5ghz_w= ifi) >>>> which requires wifi hardware devices to restrict modifications in ways >>>> that were not previously required. Some of the suggestions the company >>>> had internally for complying would be to use features like Secure Boot >>>> and other types of DRM-like mechanisms to prevent routers from being >>>> modified. This obviously would be quite bad for the OpenWrt ecosystem >>> >>> >>> It would be bad for everyone. Worse, since the research contingent >>> making progress on keeping wifi working in the first place in the face >>> of enormous growth, is centered around the ath9k chipset, additional >>> rules and regulations centered around DRM are likely to choke off >>> further development of then new ideas and techniques needed to keep it >>> working. >>> >>>> so we agreed as a group >>>> to try to provide hardware companies with a way of complying without >>>> harming the community. >>> >>> >>> My view is mildly more extreme - the 2.4 and 5.8 ghz spectrum currently >>> allocated to wifi is the *public's* spectrum. >>> >>> I am deeply concerned about further intrusions on it by things like >>> this: >>> >>> https://www.qualcomm.com/products/lte/unlicensed >>> >>> and we need more spectrum, not less, in order to keep wifi for >>> everyone, working. >>> >>>> I'm looking to find individuals (and other companies!) interested in >>>> working with myself and the foundation, companies, the OpenWrt >>>> community >>> >>> >>> >>>> and eventually regulators to provide guidance to hardware >>>> companies on how to best comply with these rules. >>> >>> >>> I intend to continue ignoring them to what extent I can. Regrettably >>> this situation is contributing to community members being unable to >>> apply new queue management techniques to new standards like 802.11ac, >>> and seems to be the source of all the proprietary ac firmware. >>> >>> I think a first step would merely to be for a big maker to publicly >>> release their 802.11ac firmware and let the chips fall where they may. >>> >>>> If you're interested >>>> in getting involved or just would like to know more, please get in >>>> touch with me. We want to make sure that routers are hackable >>>> and we could use all the help we can get. >>> >>> >>> +10. I would like to see prpl participating in the make-wifi-fast effor= t, >>> also. >>> >>> >>> http://snapon.lab.bufferbloat.net/~d/ieee802.11-sept-17-2014/11-14-1265= -00-0wng-More-on-Bufferbloat.pdf >>> >>> >>> >>>> Thanks and I look forward to working with you, >>>> >>>> Eric >>>> >>>> -- >>>> Eric Schultz, Community Manager, prpl Foundation >>>> http://www.prplfoundation.org >>>> eschultz@prplfoundation.org >>>> cell: 920-539-0404 >>>> skype: ericschultzwi >>>> @EricPrpl >>>> _______________________________________________ >>>> Cerowrt-devel mailing list >>>> Cerowrt-devel@lists.bufferbloat.net >>>> https://lists.bufferbloat.net/listinfo/cerowrt-devel >>> >>> >>> >>> >>> -- >>> Dave T=C3=A4ht >>> >>> thttp://www.bufferbloat.net/projects/bloat/wiki/Upcoming_Talks >> >> >> >> >> -- >> Eric Schultz, Community Manager, prpl Foundation >> http://www.prplfoundation.org >> eschultz@prplfoundation.org >> cell: 920-539-0404 >> skype: ericschultzwi >> @EricPrpl >> _______________________________________________ >> Cerowrt-devel mailing list >> Cerowrt-devel@lists.bufferbloat.net >> https://lists.bufferbloat.net/listinfo/cerowrt-devel --=20 Eric Schultz, Community Manager, prpl Foundation http://www.prplfoundation.org eschultz@prplfoundation.org cell: 920-539-0404 skype: ericschultzwi @EricPrpl