Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

friendly_iconoclast

(15,333 posts)
Tue Dec 22, 2015, 04:17 AM Dec 2015

Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA

Source: Wired

Security researchers believe they have finally solved the mystery around how a sophisticated backdoor embedded in Juniper firewalls works. Juniper Networks, a tech giant that produces networking equipment used by an array of corporate and government systems, announced on Thursday that it had discovered two unauthorized backdoors in its firewalls, including one that allows the attackers to decrypt protected traffic passing through Juniper’s devices.

The researchers’ findings suggest that the NSA may be responsible for that backdoor, at least indirectly. Even if the NSA did not plant the backdoor in the company’s source code, the spy agency may in fact be indirectly responsible for it by having created weaknesses the attackers exploited.

Evidence uncovered by Ralf-Philipp Weinmann, founder and CEO of Comsecuris, a security consultancy in Germany, suggests that the Juniper culprits repurposed an encryption backdoor previously believed to have been engineered by the NSA, and tweaked it to use for their own spying purposes. Weinmann reported his findings in an extensive post published late Monday.

They did this by exploiting weaknesses the NSA allegedly placed in a government-approved encryption algorithm known as Dual_EC, a pseudo-random number generator that Juniper uses to encrypt traffic passing through the VPN in its NetScreen firewalls. But in addition to these inherent weaknesses, the attackers also relied on a mistake Juniper apparently made in configuring the VPN encryption scheme in its NetScreen devices, according to Weinmann and other cryptographers who examined the issue. This made it possible for the culprits to pull off their attack.


Read more: http://www.wired.com/2015/12/researchers-solve-the-juniper-mystery-and-they-say-its-partially-the-nsas-fault/



Weinmann's post:

http://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/


The NSA backdoor is known as FEEDTROUGH:

34 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA (Original Post) friendly_iconoclast Dec 2015 OP
US should be able to bypass encryption—but only for terrorists, candidate says. Ichingcarpenter Dec 2015 #1
I thought only GOOD GUYS could get the backdoors open. Pholus Dec 2015 #2
Only if they give you a reach around jberryhill Dec 2015 #8
K&R to keep this visible. Nihil Dec 2015 #3
Corporate Spying, too... IthinkThereforeIAM Dec 2015 #4
If Juniper's VPNs are compromised, for compatibility Downwinder Dec 2015 #5
In my experience , no... PosterChild Dec 2015 #9
I was thinking of compatibility with other router brands. Downwinder Dec 2015 #10
But how will our government keep us safe if they can't read our mail or listen in on our phones??? hunter Dec 2015 #6
For all we know, Snowden could have told the Russians about the backdoor Blue_Tires Dec 2015 #19
Spy vs. Spy games are disgusting. hunter Dec 2015 #20
Search and seizure is a legitimate and necessary . ... PosterChild Dec 2015 #28
Message auto-removed Name removed Dec 2015 #7
The only evidence offered that.., PosterChild Dec 2015 #11
And your opinion is based on what? Ichingcarpenter Dec 2015 #12
I don't think I offered an opinion... PosterChild Dec 2015 #13
Ralf-Philipp Weinmann scholarly articles Ichingcarpenter Dec 2015 #15
Those are great sources.... PosterChild Dec 2015 #17
HEARTBLEED proves that the NSA simply isn't doing its job. joshcryer Dec 2015 #14
Snowden showed how bad the NSA is Ichingcarpenter Dec 2015 #16
The NSAs responsiibity is signals intelligence, not... PosterChild Dec 2015 #18
Ummm....and "Information Assurance." Pholus Dec 2015 #21
Thanks. I'll look through the links you provided. However.... PosterChild Dec 2015 #23
I looked at the security week link.... PosterChild Dec 2015 #24
I checked out the NSA mission statement concerning... PosterChild Dec 2015 #25
wget sure did.... Pholus Dec 2015 #29
Im not sure what you are referring to. You'll have to... PosterChild Dec 2015 #31
Looked at the slash dot eeport on the secure Linux open source project.... PosterChild Dec 2015 #27
The solution for openSSL is switching to libreSSL.... JonLeibowitz Dec 2015 #26
if they attack .... PosterChild Dec 2015 #30
I know company who switched from Cisco to juniper,, benld74 Dec 2015 #22
For a better, no-bullshit analysis, READ: Blue_Tires Dec 2015 #32
From your link: friendly_iconoclast Dec 2015 #34
Anyone remember INSLAW/Promis? Octafish Dec 2015 #33

Ichingcarpenter

(36,988 posts)
1. US should be able to bypass encryption—but only for terrorists, candidate says.
Tue Dec 22, 2015, 05:21 AM
Dec 2015

US should be able to bypass encryption—but only for terrorists, candidate says.






Presidential candidate Hillary Clinton has called for a "Manhattan-like project" to help law enforcement break into encrypted communications. This is in reference to the Manhattan Project, the top-secret concentrated research effort which resulted in the US developing nuclear weapons during World War II.

At Saturday's Democratic debate (transcript here), moderator Martha Raddatz asked Clinton about Apple CEO Tim Cook's statements that any effort to break encryption would harm law-abiding citizens.





"You've talked a lot about bringing tech leaders and government officials together, but Apple CEO Tim Cook said removing encryption tools from our products altogether would only hurt law-abiding citizens who rely on us to protect their data," Raddatz said. "So would you force him to give law enforcement a key to encrypted technology by making it law?"

Clinton said she "would not want to go to that point" of forcing companies like Apple to give encryption keys to law enforcement.

"I would hope that, given the extraordinary capacities that the tech community has and the legitimate needs and questions from law enforcement, that there could be a Manhattan-like project, something that would bring the government and the tech communities together to see they're not adversaries, they've got to be partners,"


Though Clinton said she has "confidence in our tech experts" to solve this problem, she has continued pushing for weakening encryption despite warnings from Apple, Google, Microsoft, and other tech companies that putting encryption back doors into their products would weaken data security for everyone.

Cook discussed encryption further last night on 60 Minutes. The Apple CEO explained encryption back doors would help anyone—not just law enforcement—access people's private information.

"On your smartphone today, on your iPhone, there's likely health information, there's financial information," Cook said. "There are intimate conversations with your family, or your co-workers. There's probably business secrets and you should have the ability to protect it. And the only way we know how to do that, is to encrypt it. Why is that? It's because if there's a way to get in, then somebody will find the way in. There have been people that suggest that we should have a back door. But the reality is if you put a back door in, that back door's for everybody, for good guys and bad guys."


http://arstechnica.com/tech-policy/2015/12/hillary-clinton-wants-manhattan-like-project-to-break-encryption/

Clinton's Big Brotherish proposal at Saturday's Democratic debate was both troubling and vague


You might imagine that Clinton — of all people — would be sensitive to the liberty interests of hiding personal communications from prying eyes. This is the public servant, after all, who as secretary of state maintained a private email server — with the benefit to Clinton of being able to vet and delete her own communications before they became a permanent part of the public record.

In this context, it was troubling Saturday evening to hear Clinton's response to a question about the power of high technology to ensure privacy. Blasting "encrypted communication that no law enforcement agency can break into," Clinton said, "I would hope that, given the extraordinary capacities that the tech community has and the legitimate needs and questions from law enforcement, that there could be a Manhattan-like project — something that would bring the government and the tech communities together to see they're not adversaries, they've got to be partners."

The reaction from America's most famous privacy whistleblower was swift:

Edward Snowden ✔ @Snowden
Aaaaaaaaand Hillary just terrified everyone with an internet connection. #DemDebate
3:07 AM - 20 Dec 2015

Read more: http://www.rollingstone.com/politics/news/edward-snowden-clintons-call-for-a-manhattan-like-project-is-terrifying-20151220#ixzz3uyvrxGFl

IthinkThereforeIAM

(3,077 posts)
4. Corporate Spying, too...
Tue Dec 22, 2015, 05:46 AM
Dec 2015

... Wall Street loves insider info, corporate statements, the proverbial early data on FCOJ (Trading Places), emails, etc...$$$

PosterChild

(1,307 posts)
9. In my experience , no...
Tue Dec 22, 2015, 08:57 AM
Dec 2015

.... a VPN is used to "tunnel" through unsecure networks into a network that is internally secure . It is not generally used to connect one VPN to another in a peer-to-peer arrangement. So compatibility with other VPNs is not generally needed.

Blue_Tires

(55,445 posts)
19. For all we know, Snowden could have told the Russians about the backdoor
Tue Dec 22, 2015, 12:14 PM
Dec 2015

Last edited Tue Dec 22, 2015, 01:15 PM - Edit history (1)

and let their own hackers exploit it...

:large

hunter

(38,328 posts)
20. Spy vs. Spy games are disgusting.
Tue Dec 22, 2015, 12:44 PM
Dec 2015

Wanna see someone with a really creepy porn collection?

That's a spy.

PosterChild

(1,307 posts)
28. Search and seizure is a legitimate and necessary . ...
Tue Dec 22, 2015, 11:23 PM
Dec 2015

..... law enforcement capability. The constitution provides for reasonable search and seizure. There is a large body of law governing what is and isn't reasonable.

What is the problem with that?

Response to friendly_iconoclast (Original post)

PosterChild

(1,307 posts)
11. The only evidence offered that..,
Tue Dec 22, 2015, 09:32 AM
Dec 2015

.... of a compromise is that an encryption parameter was changed and then changed back to its original value. There is no evidence that this was done delibertly, that the altered value was weak, or that the original value is weak. No evidence that anyone did or attempted to exploit the hypothetical weakness .

Seems like a lot of speculation to me.

Ichingcarpenter

(36,988 posts)
12. And your opinion is based on what?
Tue Dec 22, 2015, 10:31 AM
Dec 2015

Your expertise, education, research, heading your own security company?

PosterChild

(1,307 posts)
13. I don't think I offered an opinion...
Tue Dec 22, 2015, 10:59 AM
Dec 2015

... just noted the weakness of the evidence given in the referenced article.

I do work in an organization that seriously investigates these issues - i don't do so but I'm more exposed to infomation concerning them than others might be.

Ichingcarpenter

(36,988 posts)
15. Ralf-Philipp Weinmann scholarly articles
Tue Dec 22, 2015, 11:17 AM
Dec 2015

Ralf-Philipp Weinmann
Director, Comsecuris UG (haftungsbeschränkt)
Binary Analysis, Reverse Engineering, Mobile/Embedded/Wireless Security, Cryptology


Breaking 104 bit WEP in less than 60 seconds
E Tews, RP Weinmann, A Pyshkin
Information Security Applications, 188-202 225 2007
MutantXL

J Ding, J Buchmann, MSE Mohamed, WSAE Mohamed, RP Weinmann
64 2008

Analysis of the SMS4 block cipher
F Liu, W Ji, L Hu, J Ding, S Lv, A Pyshkin, RP Weinmann
Information Security and Privacy, 158-170 60 2007

Trawling for tor hidden services: Detection, measurement, deanonymization
A Biryukov, I Pustogarov, R Weinmann
Security and Privacy (SP), 2013 IEEE Symposium on, 80-94 46 2013

Block ciphers sensitive to Gröbner basis attacks
J Buchmann, A Pyshkin, RP Weinmann
Topics in Cryptology–CT-RSA 2006, 313-331 41 2006

A Framework for Automated Architecture-Independent Gadget Search.
T Dullien, T Kornau, RP Weinmann
WOOT 40 2010

iOS Hacker's Handbook
C Miller, D Blazakis, D DaiZovi, S Esser, V Iozzo, RP Weinmann
John Wiley & Sons 36 2012

A zero-dimensional Gröbner basis for AES-128
J Buchmann, A Pyshkin, RP Weinmann
Fast Software Encryption, 78-88 35 2006

Analysis of the DVB common scrambling algorithm
RP Weinmann, K Wirt
Communications and Multimedia Security, 195-207 34 2005

Attacks on the DECT authentication mechanisms
S Lucks, A Schuler, E Tews, RP Weinmann, M Wenzel
Topics in Cryptology–CT-RSA 2009, 48-65 23 2009

Meet-in-the-middle attacks on SHA-3 candidates
D Khovratovich, I Nikolić, RP Weinmann
Fast Software Encryption, 228-245 21 2009

Practical cryptanalysis of ISO/IEC 9796-2 and EMV signatures
JS Coron, D Naccache, M Tibouchi, RP Weinmann
Advances in Cryptology-CRYPTO 2009, 428-444 20 2009

Post-Quantum Signatures.
J Buchmann, LCC García, M Döring, D Engelbert, C Ludwig, R Overbeck, ...
IACR Cryptology ePrint Archive 2004, 297 20 2004

Cryptanalysis of the DECT standard cipher
K Nohl, E Tews, RP Weinmann
Fast Software Encryption, 1-18 19 2010

Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks.
RP Weinmann
WOOT, 12-21 18 2012

All Your Baseband Are Belong To Us
RP Weinmann
hack. lu 13 2010

Evaluating algebraic attacks on the AES
RP Weinmann
Diplom thesis, Technische Universität Darmstadt 13 2003


Block ciphers: algebraic cryptanalysis and Groebner bases
C Cid, RP Weinmann
Groebner bases, coding, and cryptography, 307-327 12 2009

TorScan: Tracing long-lived connections and differential scanning attacks
A Biryukov, I Pustogarov, RP Weinmann
Computer Security–ESORICS 2012, 469-486 8 2012

An efficient FPGA implementation for an DECT brute-force attacking scenario
HG Molter, K Ogata, E Tews, RP Weinmann
Wireless and Mobile Communications, 2009. ICWMC'09. Fifth International ... 8 2009

That was page one .... there are more pages


https://scholar.google.dk/citations?user=1JxJ1AIAAAAJ&hl=da&cstart=20&pagesize=20

I think I'll listen to this guy vs......... I know someone who knows someone

PosterChild

(1,307 posts)
17. Those are great sources....
Tue Dec 22, 2015, 12:00 PM
Dec 2015

Last edited Wed Dec 23, 2015, 12:04 AM - Edit history (1)

... and there is no doubt that ecliptic curve random number generation is compromised if you don't select the right parameters, and that the default parameters that come with the standard library are weak, and that NSA lobbied NIST to adopt the library as standard.

It's also true that if you do select the proper parameters it's secure.

The article states that the original parameter was delibertly selected by juniper to be secure. It states that the parameter was changed to a value which is not known to be either secure or compromised. And that when the change was discovered in a code review it was changed back to the uncompromised value.

At this time no evidence has been given to show that the change was deliberate, let alone done by an attacker, let alone a state sponsored attacker, let alone the NSA. Nor did anyone say that the changed value was ever compromised .

Since the FBI is investigating, we might get some answers.

joshcryer

(62,276 posts)
14. HEARTBLEED proves that the NSA simply isn't doing its job.
Tue Dec 22, 2015, 11:06 AM
Dec 2015

It's just one of those agencies that exists to exist but does nothing useful.

Ichingcarpenter

(36,988 posts)
16. Snowden showed how bad the NSA is
Tue Dec 22, 2015, 11:19 AM
Dec 2015

BTW........ what does it really mean.''that the NSA simply isn't doing its job.''?

PosterChild

(1,307 posts)
18. The NSAs responsiibity is signals intelligence, not...
Tue Dec 22, 2015, 12:04 PM
Dec 2015

... not providing patches for openSSL.

They are very good at what they do. Very, very good.

Pholus

(4,062 posts)
21. Ummm....and "Information Assurance."
Tue Dec 22, 2015, 04:42 PM
Dec 2015

As is CLEARLY stated in their mission statement.

https://www.nsa.gov/about/index.shtml

Of course, it gets confusing when early in W's administration they started volunteering stuff like this:

http://linux.slashdot.org/story/00/12/22/0157229/nsa-releases-high-security-version-of-linux

But of course we now know it was always about getting as many U.S. computers and firewalls compromised as possible. Like this:

http://www.securityweek.com/nsa-gchq-linked-efforts-compromise-antivirus-vendors-report

Thanks NSA! For jack and squat. They're just as bad as the Russian cybercriminals when it comes to caring about individual citizens.

PosterChild

(1,307 posts)
23. Thanks. I'll look through the links you provided. However....
Tue Dec 22, 2015, 10:41 PM
Dec 2015

I don't think it is NSA s resposibility to provide patches for openSSL . That just isn't their job.

PosterChild

(1,307 posts)
24. I looked at the security week link....
Tue Dec 22, 2015, 10:51 PM
Dec 2015

... which links to the intercept which states:

The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.


I don't see any thing wrong with this. In order to collect signals intelligence on foreign computing sources they have to defeat, overcome and exploit protections that have been installed on them.

This is what they are supposed to be doing. I'm in support of it.

PosterChild

(1,307 posts)
25. I checked out the NSA mission statement concerning...
Tue Dec 22, 2015, 11:00 PM
Dec 2015

.... their information assurance responsibility...

Our Information Assurance mission confronts the formidable challenge of preventing foreign adversaries from gaining access to sensitive or classified national security information.


Believe me, the openSSL heartbleed defect did not in any way compromise any classified information. Mission accomplished.

PosterChild

(1,307 posts)
27. Looked at the slash dot eeport on the secure Linux open source project....
Tue Dec 22, 2015, 11:09 PM
Dec 2015

.... funded by DARPA. DARPA went to the right folks.

Linux is notoriously skimpy on security , but it's a good environment for a lot of projects. This program seems like a good idea to me.

 

friendly_iconoclast

(15,333 posts)
34. From your link:
Wed Dec 23, 2015, 09:24 PM
Dec 2015
To sum up, some hacker or group of hackers noticed an existing backdoor in the Juniper software, which may have been intentional or unintentional -- you be the judge! They then piggybacked on top of it to build a backdoor of their own, something they were able to do because all of the hard work had already been done for them. The end result was a period in which someone -- maybe a foreign government -- was able to decrypt Juniper traffic in the U.S. and around the world.

And all because Juniper had already paved the road.

So why does this matter?

For the past several months I've been running around with various groups of technologists, doing everything I can to convince important people that the sky is falling. Or rather, that the sky will fall if they act on some of the very bad, terrible ideas that are currently bouncing around Washington -- namely, that our encryption systems should come equipped with "backdoors" intended to allow law enforcement and national security agencies to access our communications.

One of the most serious concerns we raise during these meetings is the possibility that encryption backdoors could be subverted. Specifically, that a backdoor intended for law enforcement could somehow become a backdoor for people who we don't trust to read our messages. Normally when we talk about this, we're concerned about failures in storage of things like escrow keys. What this Juniper vulnerability illustrates is that the danger is much broader and more serious than that.

Octafish

(55,745 posts)
33. Anyone remember INSLAW/Promis?
Wed Dec 23, 2015, 03:56 PM
Dec 2015

PROsecution Management Information System software used to track "individuals" and their cases as they routed through the criminal justice system was modified in the mid-80s, for profit, by friends of Ed Meese II, Ronald Reagan and George H.W. Bush. Small world.

http://www.wired.com/1993/01/inslaw/

Case proves BFEE is above the law.

Latest Discussions»Latest Breaking News»Researchers Solve Juniper...