While prpl is prototyping a system for remotely accessible testing hardware (which I’ll cover in another post soon), this is a limited workaround for testing a small number of routers.Given all of the difficulties, Open Wrt does a superb job at creating a stable secure distribution.After all, all major Linux distributions have an autoupdate functionality. In the case of a primarily desktop platform like Ubuntu, there’s only a few platforms to support (x86, x64).A quick count reveals there are thirty-eight targets in a recent Open Wrt version.In order to make the lives of users easier, most modern operating system distributions, both proprietary and open source, provide a mechanism for automatically updating the operating system.Every so often, a piece of software on the device will check a trusted server to see if updates are available and, if they are, will download and install the update with minimal input from the user.As part of this effort, we need help understanding the needs (and wants) of manufacturers, service providers, community firmware creators, users, really anyone with an interest in the topic of automatically updating Open Wrt devices.
Instead, most targets have unique profiles and subtargets.
Each combination of profile and subtarget potentially corresponds to a unique output image and package set (some of the packages may be reusable across subtargets and profiles).
Total number of combinations at this point is in the hundreds.
Along with a corresponding wiki entry, it highlighted some important security topics related to Open Wrt.
I don’t know if I’ve ever seen such a succinct and clear organization of security topics for Open Wrt development.