It's probably obvious to everyone here, but compared to weak crypto, a
predictable RNG is potentially devastating.  This article is pretty
basic but touches on several issues:

http://www.nextgov.com/defense/2016/01/cunning-way-hackers-break-so-called-unbreakable-encryption/125037/

It's odd that Juniper recently exited the SSL VPN market:

http://www.bsminfo.com/doc/juniper-exits-ssl-vpn-market-customers-vendors-seek-to-fill-void-0001

Anyway, here's one writeup on the backdoor:

http://www.pcworld.com/article/3017803/security/the-juniper-vpn-backdoor-buggy-code-with-a-dose-of-shady-nsa-crypto.html

        According to experts, Juniper was using a known flawed random
        number generator called Dual_EC_DRBG as the foundation for
        cryptographic operations in NetScreen's ScreenOS, but believed
        it was doing so securely because of additional precautions it
        had taken. It turns out those safeguards were ineffective.

        The VPN decryption issue was announced by Juniper Thursday
        along with another vulnerability that could provide attackers
        with administrative access to NetScreen devices through the
        use of a hard-coded master password. Both issues were the
        result of unauthorized code that was added to ScreenOS and
        were discovered during a recent internal code audit, the
        company said at the time.
        [...]
        It didn't take long for someone to notice that Juniper's
        latest patches reverted a parameter back to a value that the
        OS used before version 6.3.0r12, the first in the 6.3.0 branch
        that Juniper claims was affected by the VPN decryption issue.
        [...]
        "Omitting the mathematics, the short version is that Dual EC
        relies on a special 32-byte constant called Q, which -- if
        generated by a malicious attacker -- can allow said attacker
        to predict future outputs of the RNG after seeing a mere 30
        bytes of raw output from your generator," said Matthew Green,
        a cryptographer and assistant professor at Johns Hopkins
        University, in a blog post Tuesday.
        [...]
        Instead of using the P and Q constants recommended by NIST,
        which are supposed to be points on an elliptic curve, ScreenOS
        uses "self-generated basis points." Furthermore, the output of
        Dual_EC is then used as input for another random number
        generator called FIPS/ANSI X.9.31 that's then used in ScreenOS
        cryptographic operations, the company said at the time.
        [...]
        "Willem Pinckaers pointed out that the reseed_system_prng
        function sets the global variable system_prng_bufpos to 32,"
        Weinmann said in an update to his blog post. "This means that
        after the first invocation of this function, the for loop
        right after the reseed call in system_prng_gen_block never
        executes. Hence, the ANSI X9.31 PRNG code is completely
        non-functional."
        [...]
        The error appears to predate the unauthorized changing of the
        Q point by unknown attackers and can be viewed as a backdoor
        itself. Weinmann actually referred to the whole issue as the
        "backdoored backdoor."
        [...]
        "To sum up, some hacker or group of hackers noticed an
        existing backdoor in the Juniper software, which may have been
        intentional or unintentional -- you be the judge!," Green
        said. "They then piggybacked on top of it to build a backdoor
        of their own, something they were able to do because all of
        the hard work had already been done for them. The end result
        was a period in which someone -- maybe a foreign government --
        was able to decrypt Juniper traffic in the U.S. and around the
        world. And all because Juniper had already paved the road."
-- 
http://www.subspacefield.org/~travis/ | if spammer then [email protected]
"Computer crime, the glamor crime of the 1970s, will become in the
1980s one of the greatest sources of preventable business loss."
John M. Carroll, "Computer Security", first edition cover flap, 1977
_______________________________________________
RNG mailing list
[email protected]
https://lists.bitrot.info/cgi-bin/mailman/listinfo/rng

Reply via email to