Hi Rich,

On 20.08.19 23:19, Rich Brown wrote:
> Yes, but... Virtually all the other vendor's firmware are "Linux distro's" as 
> well. 
Stone-age linux distros

> And if I understand the CITL scan process, it shows lots of bad build 
> practices in the vendor firmware source code.

So they should do their magic with the Linux kernel's master and maybe they 
(unlikely) find vulnerabilities.

> Can anyone speak to whether OpenWrt builds use any/all of those techniques 
> called out to provide additional security? OpenWrt's modern kernel provides a 
> bunch of security. That may be good enough, even if builds don't use all 
> those techniques. And if we have implemented them, we can further 
> differentiate ourselves from vendor firmware...Thanks.

As Dmitry said OpenWrt is a state-of-the-art Linux distro and CVEs are 
addressed timely.
See https://openwrt.org/docs/guide-developers/security

- Stack Guards

Issues mostly fixed in Kernel 4.12.

- ASLR

On the ToDo, but takes up to 30% more space for executables.

- RELRO

Full RELRO used by default

- Fortify SRC

Conservative mode used by default

- Non-Exec Stack

That's a matter of the Linux kernel and I don't know of any configuration 
options for that.
As far as I know, it's activated by default on all platforms for which there is 
proper support
(x86-64 IA-32 SPARC PowerPC). I think there is no support for ARM and MIPS.
Regards,

Vincent

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to