TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Helped British Spies Find Security Holes in Juniper Firewalls

189 pointsby slasausover 9 years ago

9 comments

discardoramaover 9 years ago
I have a feeling that this is how these agencies skirt the law: agency X is not allowed to do "A", so it helps agency B do it, and share the findings with X. And vice versa. So the GCHQ spies on Americans willy-nilly, and the Americans spy on Brits, with full knowledge of each other.
评论 #10785125 未加载
评论 #10785190 未加载
评论 #10785276 未加载
评论 #10785292 未加载
评论 #10785266 未加载
tptacekover 9 years ago
Worth considering: every serious SIGINT agency probably had this capability against Netscreen VPNs. If you do a lot of network infiltration, these boxes are among the most useful targets; unlike routers running JunOS, the VPN concentrators have a large outside-the-packet-filter attack surface, and everyone runs them.<p>It&#x27;d be surprising if NSA and GCHQ didn&#x27;t have similarly powerful capabilities against all the current VPN products.
评论 #10785618 未加载
评论 #10785154 未加载
MichaelGGover 9 years ago
&gt; ...it does make clear that, like the unidentified parties behind those hacks, the agencies found ways to penetrate the “NetScreen” line of security products...<p>It does? Sounds like this is a rather normal, expected, analysis. They&#x27;re just reviewing products; probably they already had similar capabilities on IOS and wanted to make sure they could handle other targets or a shift in the market. This does not sound like getting backdoors placed, at all.<p>I hate to be suspicious or cynical here, but is this just The Intercept being opportunistic? Is there any reason to relate this to the recent &quot;unauthorized code&quot; issues?
评论 #10785211 未加载
评论 #10785517 未加载
评论 #10785123 未加载
评论 #10785468 未加载
评论 #10785115 未加载
tptacekover 9 years ago
Did The Intercept just publish a document about Juniper insecurity that they&#x27;ve had since 2013, or had they already published this?<p>If they hadn&#x27;t already published it, why not? It could have done some good before, but does no good now.
评论 #10785062 未加载
评论 #10785285 未加载
评论 #10785075 未加载
评论 #10785984 未加载
评论 #10787920 未加载
评论 #10785145 未加载
评论 #10785102 未加载
评论 #10785105 未加载
oroupover 9 years ago
Seems like a prime opportunity for a class action lawsuit. Juniper was selling a class of products that categorically did not do what it claimed. What would be interesting is their method of defense. As was pointed out to me in an earlier thread, companies have legal immunity when assuring the intelligence community with their work.[1] But Juniper already claims that they do not assist third parties to compromise their products. So they would either need to change their statements or be ineligible for this defense.
评论 #10785753 未加载
nickpsecurityover 9 years ago
Not sure about whether it&#x27;s subversion or basic hacking. You should assume, though, that they might have hacks in any common product that can be used for a security bypass. Here&#x27;s why: IT markets usually become oligopolies where a few players products are all over the place. Firewalls, routers, VPN&#x27;s, OS&#x27;s on desktop, OS&#x27;s on mobile, net configuration, build systems... handfuls of implementations in each dominate in market share. So, rather than beating everything, you can focus on 0-days in a tiny few to beat almost everyone [that matters to a TLA].<p>Another side of this coin is that they&#x27;ll add to their hitlist whatever they encounter the most. They probably run into Juniper firewalls all the time. So, it&#x27;s higher priority. Using high-quality, but lower-priority-to-them, components reduces you risk of being hit by them. So, one of my recommendations is to build&#x2F;use strong systems, use diverse components of good quality, and obscure the workings of both at the interface. They&#x27;ll trip your alarms trying to figure out what you&#x27;re using before they hack you.
AndyMcConachieover 9 years ago
So how long has Glen Greenwald and others with access to the Snowden cache known about this?<p>There was only one Snowden cache. If the document was provided by Snowden, did we hear about it earlier?<p>Who has access to the Snowden cache now? Do we know?
NN88over 9 years ago
So the US isn&#x27;t supposed to gather intel now? IS that what you&#x27;re saying Glenn?
biotover 9 years ago
Interesting that Juniper merely claims that putting in a backdoor or working with others to do the same is against their policy. They seem to be avoiding saying a very simple, clear statement: &quot;We never have and never will intentionally compromise the security of or put backdoors into our products, whether for ourselves or on behalf of a third party&quot;. That they can&#x27;t come out and say that makes their claims suspect.
评论 #10786425 未加载