US Gov't Agencies Freak Out Over Juniper Backdoor; Perhaps They'll Now Realize Why Backdoors Are A Mistake

from the wishful-thinking dept

Last week, we wrote about how Juniper Networks had uncovered some unauthorized code in its firewall operating system, allowing knowledgeable attackers to get in and decrypt VPN traffic. While the leading suspect still remains the NSA, it’s been interesting to watch various US government agencies totally freak out over their own networks now being exposed:

The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”

The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.

One U.S. official described it as akin to “stealing a master key to get into any government building.”

And, yes, this equipment is used all throughout the US government:

Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”

Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.

And, of course, US officials are insisting that it couldn’t possibly be the NSA, but absolutely must be the Russians or the Chinese:

The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.

Yeah, sure. Anything’s possible, but the NSA still has to be the leading suspect here, and the insistence that it’s the Chinese or the Russians without more proof seems like a pretty clear attempt at keeping attention off the NSA.

And, of course, all of this is happening at the very same time that the very same US government that is now freaking out about this is trying to force every tech company to install just this kind of backdoor. Because, as always, these technically illiterate bureaucrats still seem to think that you can create backdoors that only “good” people can use.

But that’s not how technology works.

Indeed, now that it’s been revealed that there was a backdoor in this Juniper equipment, it took one security firm all of six hours to figure out the details:

Ronald Prins, founder and CTO of Fox-IT, a Dutch security firm, said the patch released by Juniper provides hints about where the master password backdoor is located in the software. By reverse-engineering the firmware on a Juniper firewall, analysts at his company found the password in just six hours.

?Once you know there is a backdoor there, ? the patch [Juniper released] gives away where to look for [the backdoor] ? which you can use to log into every [Juniper] device using the Screen OS software,? he told WIRED. ?We are now capable of logging into all vulnerable firewalls in the same way as the actors [who installed the backdoor].?

Putting backdoors into technology is a bad idea. Security experts and technologists keep saying this over and over and over and over again — and politicians and law enforcement still don’t seem to get it. And, you can pretty much bet that even though they now have a very real world example of it — in a way that’s impacting their own computer systems — they’ll continue to ignore it. Instead, watch as they blame the Chinese and the Russians and still pretend that somehow, when they mandate backdoors, those backdoors won’t get exploited by those very same Chinese and Russian hackers they’re now claiming were crafty enough to slip code directly into Juniper’s source code without anyone noticing.

Filed Under: , , , , ,
Companies: juniper networks

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “US Gov't Agencies Freak Out Over Juniper Backdoor; Perhaps They'll Now Realize Why Backdoors Are A Mistake”

Subscribe: RSS Leave a comment
73 Comments
TruthHurts (profile) says:

One of 3 possibilities here - NSA, CIA, FBI

Of course it’s the NSA, everyone knows this.

Truth be damned, et al.

That’s why the constitutional amendments were so clear and adamant about “Congress may pass no law” when it comes to sidestepping them.

The founding fathers “KNEW” that generations down the line would be tempted to fuck everyone over to line their pockets and seize the reigns of power ever more tightly.

Anonymous Coward says:

Re: One of 3 possibilities here - NSA, CIA, FBI

Well, I wouldn’t say for sure it was the NSA, or the CIA or FBI for that matter. It is still possible this bad idea was the brain child of some programmer at Juniper who put it in for debugging or something, and never took it out.

Though I would say that you can bet your ass that the NSA found it years ago and didn’t tell anyone so that they could exploit it. Not all that much different from putting it in themselves I’d say.

vastrightwing (profile) says:

I'm in shock!

Of course it wasn’t the U.S. they would never do such a thing. Juniper is wrong to point out the backdoor. Now the terrorists have won. In removing the back door, LEOS will never be able to do their jobs ever again.

It makes me wonder about other firmware now. How many others are there? The NSA should insist on inspecting and fixing back doors other “sophisticated” countries have been able to put in. Of course since this was made public, a more sophisticated back door has since been implemented.

If only there was a way to review code before production.

Anonymous Coward says:

I think this article is mixing the two vulnerabilities in ScreenOS found. The first is the VPN vulnerability, it was perhaps not put in by the NSA, but due to the NSA mucking around with NIST created the issue(DUAL_EC_DBRG). Check Bruce Schneier’s explaination: link.
The second is the SSH backdoor also put in by an unknown party and this is unknown how it got into the system code. Fox-IT revealed this password by checking out the patch for it, so anyone with open SSH (never a good thing), and unpatched ScreenOS Juniper is liable to be compromised at the any level since it backdoors into shell mode. A quick Shodan search could probably cripple some companies, so it’s definitely serious.

Anonymous Coward says:

Sophisticated huh? That rules out simple minded Americans!

“because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door.”

Yes, yes, it was such a sophisticated attack there is no way the morons working for U.S. spy agencies could have done this!

Has to be China or Russia, they are so much smarter than us and the only people capable of pulling off such a sophisticated attack!

Anonymous Coward says:

Re: Re:

Another article showing that Snowden already proved this was done by the NSA:
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html

Now we know how this was made possible:
‘Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.”‘

DannyB (profile) says:

Mike, you just don't seem to get it

Juniper’s back door allowed both bad guys as well as good guys, such as* the NSA to get in through the back door.

What the government wants is back doors that ONLY allow in good guys.

* whether the NSA should be included in the group of good guys or bad guys is left as an exercise for the reader.

Poe Slaw says:

Re: Mike, you just don't seem to get it

I don’t think of it as a backdoor, I like to think of it as magic window frosting that can be dropped or lifted when the good intentions of a Government employee is weighed and proven to be lighter than, a school bus.

Thing is, while I am not a government hack, I am an optimist, I know if the US government reflects on events like this, they will realize that weakened security for surveillance reasons is an epically stupid idea, and persist in asking for it anyway.

David says:

Re: Mike, you just don't seem to get it

Just do it like with electronic cat flaps: the good guys get an RFID chip that lets them in, and the rats stay out. As long as the cat does not drag a rat in with it, of course.

Which is the basic government problem: good guys may associate with bad guys, and then both get in. And once they are in, they go everywhere.

DannyB (profile) says:

Re: Re: Re: Mike, you just don't seem to get it

A magical golden key to the back door is a wonderful solution to this problem.

The golden key only works for those with pure intentions.

If someone in the government goes bad, the golden key no longer works for them.

Why can’t anyone understand something so simple? A magical golden key to the back door would solve all our problems. Good guys can get in. Bad guys can not. If silicon valley could bring their pixee dust, and law enforcement could bring their genuine unicorn horn powder, and they get together, surely we could solve this problem.

Nageki (profile) says:

Re: Mike, you just don't seem to get it

I don’t think you get it DannyB, the whole point of the article is that what the NSA wants is what has happened here. So their claims that a “golden key” would work are ludicrous… Yes, they want a backdoor that only the “good guys” can use, but the problem is any backdoor that has a key can be gotten into by anyone with the same key. If you have one, whether you’re a “good guy” or a “bad guy”, you can open the lock. Also, who’s to say that “good guy” is good 100% of the time? We have LoveInt for a reason… (don’t know what it is? look it up!)

Michael (profile) says:

“stealing a master key to get into any government building.”

Isn’t it a good thing that nobody ever created such a key?

The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door

Great way to put that statement. I’m sure the NSA isn’t behind the back door – they came through it when they created it and are already inside.

Tech girl says:

Re: Re: Just ScreenOS?

Exactly, this affects legacy EOL firewalls that went bye bye years ago. It does not affect any newer Juniper JUNOS based products. The ScreenOS products have been out of production and EOL for 3+++ years. Also “some_guy”. Do a fact check on your info. It’s easy, it’s called Google. juniper is a 100% owned US company on the NYSE. Your info is so wrong.

Anonymous Hero says:

Wait, what?

> The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door.

This seems to be an open admission that the USA has the least sophisticated spy agencies in the world.

Anonymous Coward says:

Re: Inventory list

I’d like to see an inventory list of which agencies have Juniper hardware/software. I imagine it might go something like this:
FBI: 124 devices, 723 installs
NSA: 0 devices, 0 installs
CIA: 334 devices, 1,354 installs

I bet they’d still use them but install their own firmware patched to remove the backdoor(s).

Capt ICE Enforcer says:

Liability

If the NSA is responsible for the security of our nation, and the t knew about this exploit/back door. Then can the NSA be held liable for all the damage done to national security. After all, wouldn’t this be grounds to get fired at least, or grounds of treason for allowing the opponent the opportunity to attack us.

Seegras (profile) says:

Re: Liability

Absolutely. The NSA knew.

Because the second “backdoor” (which isn’t really a backdoor to the system, but to its traffic), was a NIST standard EC-PRNG, which was deliberately compromised by the NSA.

Somebody at Juniper even changed the curve, so it was not (that?) vulnerable, but later somebody changed it back to the curve the NSA knew was vulnerable. It’s impossible the NSA did not notice that.

While it might not have been the NSA which changed it back (but it’s likely it was indeed the NSA), at least it knew and put knowingly every other government agency and all people at jeopardy.

Anonymous Coward says:

Re: Re: Liability

While it might not have been the NSA which changed it back (but it’s likely it was indeed the NSA), at least it knew and put knowingly every other government agency and all people at jeopardy.

If you put the fox in charge of guarding the chicken house, don’t be surprised if a few chickens go missing.

SomeGuy says:

Russians or Chinese - PUHleeeze

Juniper is owned by Israelis and the Israelis have been spying on the US for decades. They’ve installed back doors on ALL of the equipment and software they supply to US corporations and government entities – they can easily hack into any of the telecomms and listen to phone conversations directly (just one example). Doesn’t surprise me that their controlled media would try to blame someone else … it’s SOP for Israel….

Anonymous Coward says:

Re: Russians or Chinese - PUHleeeze

Juniper is owned by Israelis and the Israelis have been spying on the US for decades. They’ve installed back doors on ALL of the equipment and software they supply to US corporations and government entities – they can easily hack into any of the telecomms and listen to phone conversations directly (just one example). Doesn’t surprise me that their controlled media would try to blame someone else … it’s SOP for Israel….

Uh… Juniper was founded at Xerox PARC in the United States by an Indian-American. They’re still headquartered in the US and as far as I know, their biggest stakeholders are American investment firms.

Please follow up with information on your claim that they’re owned by Israelis.

Berenerd (profile) says:

I think you are misunderstanding...

The government thinks that if there is a back door, they can use it on us but not on them. Sadly noone realizes if there is a “back door” so they can access our information, then there is a back door that anyone can use to access the government’s information. All those emails? Secure communications? data? military movements? All will be seen by everyone putting not only the soldiers at risk like you seem to want to blame Snowden for, but us Citizens themselves.

Anonymous Coward says:

Remember the fiasco with Cisco routers being stopped in route to put in spyware by the NSA? Duh. We have another company who no one on the globe will want to purchase their products for because of this ‘hack’. Keep this up with the tech companies of Silicon Valley and before very much longer the US will no longer be a tech leader that others want products from.

What a great way to improve the economy!

streetlight (profile) says:

Re: Cisco fiasco...

Wasn’t there a similar problem where purchase of Chinese made routers was highly discouraged because of potential for Chinese capture of traffic? Then again, the NSA could just as easily intercept Chinese made routers and Internet information available to two governments.

IIRC, wasn’t it recommended that purchasers of Cisco routers send a vehicle to the Cisco manufacturing facility for transport? Maybe they’re made outside the US.

Personanongrata says:

Incompetent Noobs

US Gov’t Agencies Freak Out Over Juniper Backdoor; Perhaps They’ll Now Realize Why Backdoors Are A Mistake

This is gross incompetence on behalf of all the US government know-nothing nitwits involved.

How many billions of US dollars were squandered on this boondoggle?

Will these incompetent noobs be held to account?

Unfortunately failing spectacularly while working for the US government means failing upward so these worthless noobs will be promoted. After their promotions the noobs can then testify before congress about how they too believe in unicorns.

Mr Big Content says:

This Is Not About No Backdoors!

Such wonderful, patriotic Americans. They comprimise National Security by Wilfully Betraying NSA secret Technologies like this. Luckily they found and exposed these nefarious Spying Backdoors put in by Unauthorized Foreign Parties. Did they check with teh Government before telling every Tom Dick and Harry about this? We need more people like this Guarding our FREEDOMS. They should be LOCKED UP for threatening our National Security! They help America stay safe! They are destroying the safety of America!

That Anonymous Coward (profile) says:

Our people, who buy 0 day exploits to abuse, would NEVER do something like this.

The problem has to be bad guys did this because they didn’t have our pure intentions anyone could access the backdoor.

Perhaps this might put the tiniest little idea in their heads that the people who inform them of how they are supposed to vote & what to say in the media might not be fully truthful. That maybe they should look to be educated about topics they wish to rule on beyond a talking points memo attached to a “donation”… but then that old line comes to mind… money talks.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...