TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SSH Backdoor found in Fortinet firewalls

366 pointsby CariadKeigherover 9 years ago

17 comments

EvanAndersonover 9 years ago
It's a custom SSH authentication method invoked with a special username, "Fortimanager_Access". The protocol is a weak "challenge/response" using hash of the challenge concatenated with a string (used in multiple firmware versions and not at all unique to the device).
评论 #10888916 未加载
godzillabrennusover 9 years ago
This is why <a href="http:&#x2F;&#x2F;Pfsense.com" rel="nofollow">http:&#x2F;&#x2F;Pfsense.com</a> should get even more coverage on here than it does. Chris and his team do an incredible job of creating secure open firewall software.
评论 #10891522 未加载
评论 #10890587 未加载
评论 #10890030 未加载
评论 #10890780 未加载
评论 #10891030 未加载
评论 #10892385 未加载
评论 #10890809 未加载
评论 #10891004 未加载
评论 #10889950 未加载
nickpsecurityover 9 years ago
This is why high-assurance security products were&#x2F;are required to have:<p>1. Clear description of every feature and requirement in system.<p>2. Mathematical spec of those where English ambiguity could effect results.<p>3. High level design with components that map 1-to-1 to those.<p>4. Low-level, simple, modular code mapping to that.<p>5. Source-to-object code verification or ability to generate from source on-site.<p>What people in faux security mocked as mere &quot;paperwork&quot; or &quot;red tape&quot; were actually pre-requisites for defeating subversion my mentally understanding a system from requirements all the way to code. A problem like this would&#x27;ve been impossible in such a system because it would be beyond obvious and <i>probably</i> unjustifiable with requirements tracing.<p>Every story like this further validates the methods that consistently produced systems without all the security problems plaguing modern security products. Situation isnt inevitable or even necessary: merely an inversion of scientific method where security companies and professionals consistently refuse to use what&#x27;s proven to help and reuse tactics proven to fail. It&#x27;s gotta stop.<p>That it wont is why I favor liability legislation tied to a reasonable baseline of practices. We can use an inexpensive subset of what worked in highly assured systems. 80&#x2F;20 rule. Baseline would look more like Secure64 or HYDRA firewall than shit like Fortinet and Juniper. Hackers would <i>work</i> for exploits. I know Im dreaming, though, as DOD and NSA just dropped mandate to EAL1 w&#x2F; 90 day review for some stuff. (Rolls eyes).
评论 #10889468 未加载
评论 #10889719 未加载
评论 #10889730 未加载
eeZiover 9 years ago
See relevant thread in r&#x2F;netsec: <a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;netsec&#x2F;comments&#x2F;40lotk&#x2F;ssh_backdoor_for_fortigate_os_version_4x_up_to&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;netsec&#x2F;comments&#x2F;40lotk&#x2F;ssh_backdoor...</a><p>&gt; It leaves no traces in any logs (wtf?). It keeps working even if you disable &quot;FMG-Access&quot;. It won&#x27;t let you define an admin user with the same name to mitigate it, so make sure that SSH access on your devices is at least restricted to trusted hosts!
评论 #10889932 未加载
matt_wulfeckover 9 years ago
Open hardware and open source. It&#x27;s our only path. In my opinion the best way for this to happen is to make it part of the government procurement process, that will inject cash into the ecosystem.<p>I really believe this has already begun with the FANG[0] tech giants with Open Hardware initiatives. At some point you can begin pooling your resources to create safe, secure, and fast platforms that everyone can use.<p>[0] facebook, amazon, netflix, google
tptacekover 9 years ago
This probably isn&#x27;t as bad as Juniper&#x27;s, because you don&#x27;t generally get external SSH access to a Fortinet box.
评论 #10888652 未加载
评论 #10888813 未加载
评论 #10888843 未加载
评论 #10898738 未加载
评论 #10889317 未加载
评论 #10889777 未加载
评论 #10914536 未加载
arca_voragoover 9 years ago
Another one bites the dust. I&#x27;m ready for more though, because it is vindicating my position on FOSS. While FOSS isn&#x27;t a panacea, at least you can read the code!
评论 #10888759 未加载
评论 #10892400 未加载
评论 #10889921 未加载
sschuellerover 9 years ago
Nice, who&#x27;s next?<p>Maybe it is time we build open hardware and software for important things. Can&#x27;t trust anyone.<p>Doing audits of open hard and software is a whole other problem however.
评论 #10888654 未加载
Davieyover 9 years ago
I almost had a reallllllly.. bad day. Thankfully, it is only version 4.x up to 5.0.7.
评论 #10888957 未加载
perna_mover 9 years ago
official statement from Fortinet <a href="http:&#x2F;&#x2F;ftnt.net&#x2F;1TTc1Bz" rel="nofollow">http:&#x2F;&#x2F;ftnt.net&#x2F;1TTc1Bz</a>
zymhanover 9 years ago
Can someone provide some context? A python script alone is kind of hard to decipher.
评论 #10888526 未加载
评论 #10888507 未加载
exo762over 9 years ago
Hugged to death. Archive link:<p><a href="https:&#x2F;&#x2F;archive.is&#x2F;WU8l3" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;WU8l3</a>
INTPenisover 9 years ago
These backdoors in the news lately - Juniper and now Fortigate - are scary, but thinking back on 10 years in IT I&#x27;ve never operated in a network where SSH on network equipment was accessible to anyone without intranet access through either physical location or VPN.<p>On top of that I am now in an organization where we&#x27;re starting to implement security levels on networks, anything above level 0 requires 2FA to access and you can never connect a lower level to a higher level. So best practices are a good thing.
评论 #10890101 未加载
评论 #10889959 未加载
ausjkeover 9 years ago
that&#x27;s a shame but we&#x27;re used to it these days I guess.<p>if you want to do backdoor probably should do it better, something like port knocking to start with at least.
评论 #10888792 未加载
评论 #10889641 未加载
HNaTTYover 9 years ago
This script worked for me once I enabled SSH on the lan interface on my FortiGate 100D running 5.0. But the only command that seemed to do anything is &quot;exit&quot;. Everything else gave an &quot;Unknown Action 0&quot;.
hoodoofover 9 years ago
But think of the upside - so many terrorists were probably caught because this code existed. We must fight to ensure all firewalls have back doors or face a true terrorism threat.
jorge-fundidoover 9 years ago
Maybe backdoor was a bad way to describe it? Maybe it&#x27;s used as a customer-initiated support channel for when the customer wants the vendor to access the device.
评论 #10889115 未加载
评论 #10889030 未加载
评论 #10889165 未加载
评论 #10889992 未加载