FCC路由器禁令对FOSS的影响
What the FCC router ban means for FOSS

原始链接: https://sfconservancy.org/blog/2026/apr/02/fcc-router-ban/

## FCC 路由器禁令:摘要 美国联邦通信委员会(FCC)最近禁止销售非美国制造的新型家用路由器——实际上是所有现有型号。FCC以国家安全问题为由,要求寻求豁免的制造商承诺代价高昂且广泛的美国本土制造计划。 预计此决定将显著提高路由器价格,因为美国制造目前无法与亚洲生产竞争。OpenWrt One路由器已经获得FCC批准且不受影响,但该裁决引发了对未来硬件开发的担忧。 FCC可能还会试图限制现有路由器的软件更新,但用户发起的更新(例如安装OpenWrt)仍然不受限制——这是长期安全的关键方面。作者认为,专注于开源软件和既定的安全标准(如NIST IR 8425A)比地域限制更有效。他们倡导一种全球性的、基于标准的科技安全观,而不是优先考虑原产国。他们已联系FCC寻求澄清,并将提供更新。

最近美国联邦通信委员会(FCC)的路由器禁令,促使OpenWrt社区加强其安全评估,特别是关于符合NIST IR 8425A标准的问题。在Hacker News的讨论中,有人对OpenWrt的安全性提出了担忧,一位评论员指出其缺乏自动更新,且系统可能臃肿,容易受到攻击。 有些人认为OpenWrt由于路由器资源限制而保持精简,但另一些人认为它包含不必要的组件。一个关键的挑战是验证OpenWrt安装的真实性——确保设备没有运行被篡改的版本。 讨论将OpenWrt比作“路由器的Android”,缺乏像谷歌这样公司的强大资源来维护安全性。对一个安全至上、精简且具有可靠更新的替代方案的需求是一个反复出现的主题。
相关文章

原文

by Denver Gingerich on April 2, 2026

Last week, the Federal Communications Commission in the United States (the FCC) banned the sale of all new models of home routers not made in the U.S., which is ... all of them. The stated reason for this is that routers "pose an unacceptable risk to the national security of the U.S. or the safety and security of U.S. persons." A router manufacturer can apply for a "Conditional Approval" exemption to try and convince U.S. government bodies that their router should be allowed into the U.S., but this requires "A detailed, time-bound plan to establish or expand manufacturing in the United States" and "A description of committed and planned capital expenditures, financing, or other investments dedicated to U.S.-based manufacturing and assembly", and "an update on the status of their onshoring plan once a quarter" among other impractical asks. Devices built in the U.S. generally cost at least twice as much as devices built in Asia (see the Librem 5 (USA) for example) because U.S. manufacturing facilities are not ready with the scale and efficiency required to enable competitive pricing. The reason we chose to build the OpenWrt One in Asia is that it makes sure the device is as feasible as possible for people around the world to purchase. We expect it will take decades before the U.S. is ready to produce competitively-priced devices - user freedom can't wait that long.

And, in case you were hoping to buy an OpenWrt One, don't worry: the One has already received FCC approval so there is no change to its availability in the U.S. Naturally, we are concerned about the effect this has on any new hardware that SFC might develop, but this decision by the FCC does not create any near-term problems for us, or for FOSS generally.

We do applaud the FCC for recognizing how important home routers are to people's security. While the rulemaking is misguided, it's absolutely correct that the proprietary router manufacturers be accountable in relation to the hardware and software that individuals bring into their homes and their lives. We believe that manufacturers of routers that are primarily FOSS are in a much better position to evaluate the security of their devices, and so we analyzed the rulemaking taking into specific account its software aspects.

While the FCC decision focuses mainly on hardware, there are also some requirements for software. In particular, the FCC has hinted that it may restrict updates to existing hardware, in particular that existing routers "may continue to receive software and firmware updates that mitigate harm to U.S. consumers at least until March 1, 2027".

Since software updates to already-FCC-approved devices do not require a new FCC approval, it appears the FCC is trying to move beyond its usual authorization procedures to restrict what manufacturers are allowed to push to existing routers. However, the FCC notably does not restrict software changes made by owners of routers in the U.S. In particular, there is no indication that updates people make to their own routers, using software they have sourced themselves, would run afoul of any past or present FCC rule.

As a result, we do not believe that this new FCC decision affects whether and how people can run OpenWrt or other user-selected firmware updates on routers they have already purchased. Not only is this an important right in relation to our ownership and control of our own devices, it also ensures that people can keep their routers secure for far longer than the manufacturer may choose to provide security updates, by allowing them to install up-to-date community software that supports routers for 10, 15, or even more years after their initial release date, as OpenWrt does for many devices.

This leads us back to the stated goal of the FCC in making these changes: to ensure that routers do not "pose an unacceptable risk to ... the safety and security of U.S. persons." We certainly agree that all persons (including U.S. persons) should use technology that is safe and secure. And there are standards that exist to ensure this is the case, such as NIST IR 8425A, which the U.S. government already paid to research and produce and, alongside NIST, is recommended by Consumer Reports and other right-to-repair groups already. We have been assessing our existing processes (for OpenWrt, and especially the OpenWrt One) against NIST IR 8425A, and are now accelerating those efforts to ensure we can show that routers using OpenWrt are indeed safe and secure, as determined by independent bodies. This not only helps U.S. persons, but everyone around the world, as OpenWrt is available to anyone regardless of whether they are in the U.S. or not. We strongly encourage any regulation targeting safety and security to take a holistic view, recognizing that safety and security in our technology does not depend on what country we are in, but rather on common properties of the hardware and software we use, and a shared understanding of what technological safety and security means for all humans.

We have reached out to the FCC for clarity on this topic, and look forward to updating this post with their reply.

Tags: conservancy, GPL, security, licensing, software freedom for everyone, inclusion

联系我们 contact @ memedata.com