The Silicon Valley maker of networking gear said it would ship new
versions of security software in the first half of this year to
replace those that rely on numbers generated by Dual Elliptic Curve
technology.
The statement on a blog post came a day after the presentation at a
Stanford University conference of research by a team of
cryptographers who found that Juniper's code had been changed in
multiple ways during 2008 to enable eavesdropping on virtual private
network sessions by customers.
Last month, Sunnyvale-based Juniper said it had found and replaced
two unauthorized pieces of code that allowed "back door" access,
which the researchers said had appeared in 2012 and 2014.
The 2014 back door was straightforward, said researcher Hovav
Shacham of the University of California, San Diego, allowing anyone
with the right password to see everything.
The 2012 code changed a mathematical constant in Juniper's Netscreen
products that should have allowed its author to eavesdrop, according
to Shacham and his fellow investigators.
Juniper's initial patch had gotten rid of that constant in Dual
Elliptic Curve and replaced it with the version it had been using
since 2008.
But the academics who studied the code said that while Juniper had
not disavowed the 2008 code, it had not explained how that constant
was picked or why it was using the widely faulted Dual Elliptic
Curve at all.
Still another curve constant, quietly provided by the NSA and
required for some federal certification, was exposed in documents
leaked by former NSA contractor Edward Snowden as a key to the back
door.
Until now, the most influential adopter of Dual Elliptic Curve was
believed to be RSA, part of storage company EMC, which Reuters
reported received a $10-million federal contract to distribute it in
a software kit for others.
[to top of second column] |
Though the academic team looking at Juniper has not named a suspect
in the 2008, 2012 or 2014 changes, 2008 was one year after veteran
cryptographers raised questions about Dual Elliptic Curve.
A very advanced adversary could have seen how to manipulate Dual EC
and in theory managed to insert code through a cooperative or
unsuspecting Juniper employee, but the company had not advertised
the fact that it was using the formula at all.
A more logical suspect, said expert Nicholas Weaver of the
International Computer Science Institute, was the NSA, which might
have been displaced later by other countries' agencies or top-level
hackers in 2012 and 2014.
The NSA did not immediately respond to an emailed request for
comment.
Juniper said it was continuing to investigate.
http://forums.juniper.net/t5/Security-Incident-Response/Advancing-the-Security-of-Juniper-Products/ba-p/286383
It declined to answer questions from Reuters about the revisions.
(Reporting by Joseph Menn; Editing by Clarence Fernandez)
[© 2016 Thomson Reuters. All rights
reserved.]
Copyright 2016 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
|