Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Security Questions Linger As Juniper Removes Suspicious Dual_EC Algorithm [serious technobabble]
Threatpost.com ^ | 1/11/2016 | Michael Mimoso

Posted on 01/11/2016 7:41:57 PM PST by Fhios

Juniper Networks announced late Friday it was removing the suspicious Dual_EC_DRBG random number generator from its ScreenOS operating system.

And while that’s heralded as a positive move considering Dual_EC’s dubious origins, there remain important and unanswered questions about Juniper’s decision to include what is considered to be a backdoored random number generator in its NetScreen VPNs, and why a number of strange coding and engineering decisions were made that could have facilitated the decryption of secure traffic.

(Excerpt) Read more at threatpost.com ...


TOPICS: Computers/Internet; Conspiracy
KEYWORDS: backdoor; intrusion
Loosely translated: The Every Government from A-Z is spying on you.
1 posted on 01/11/2016 7:41:58 PM PST by Fhios
[ Post Reply | Private Reply | View Replies]

To: Fhios
Oh, dear. Translated as best I can: a VPN (Virtual Private Network) is a system wherein the user "tunnels" through using encryption that is based on a random number generator (in this case), which, if not random or otherwise compromised, allows realtime decryption by a third party who is capturing the packets.

Dang, that isn't much better. Sorry.

2 posted on 01/11/2016 7:45:07 PM PST by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: Billthedrill
Simple summary -- somebody put a backdoor into the Juniper code so spies could access the supposedly secure data. From the article:

"It's very bizarre. I've never seen anything like that before where gone from something that was working and written in a standard manner to something as strange as this," he said. It's that bug that enabled another attacker to replace the Dual_EC constant - thought to belong to the NSA - with their own constant."The very presence of Dual_EC enabled a third party to simply change a constant and make it so they were able to decrypt VPN traffic," Checkoway said...

This is an example of why the kind of backdoor access our security agencies want is a bad idea. Other people find the back door and pretty soon everybody and his cousin are busy reading other people's private information.

3 posted on 01/11/2016 7:59:21 PM PST by freeandfreezing
[ Post Reply | Private Reply | To 2 | View Replies]

To: Fhios

I do NOT trust the hardware RNG that many processor types have built in.

Just too tempting for government to bribe or threaten hardware manufacturers into weakening.

I build my own RNG using something like diode noise as a source.


4 posted on 01/11/2016 8:26:40 PM PST by Bobalu (Even if I could take off, I could never get past the tractor beam!)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson