SSH Backdoor Found In Fortinet Firewalls (arstechnica.com) 71
An anonymous reader writes: The IT community was shaken a few weeks ago when Juniper Networks firewalls were found to contain "unauthorized code" that seemed to enable a backdoor. Now, Fortinet firewalls have been found to contain an apparent SSH backdoor as well. "According to the exploit code, the undisclosed authentication works on versions 4.3 up to 5.0.7. If correct, the surreptitious access method was active in FortiOS versions current in the 2013 and 2014 time frame and possibly earlier, based on this rough release history. The weakness was eventually patched, but so far, researchers have been unable to locate a security advisory that disclosed the alternative authentication method or the hard-coded password." A spokesperson for Fortinet told El Reg, "This was not a 'backdoor' vulnerability issue but rather a management authentication issue."
Re: (Score:1)
At least they came out and said it (Score:1)
Re: (Score:2)
Maybe when sonicwall was sonicwall... maybe....
But now that they are Dell owned? No chance.... Dell has acquired so much so fast that they don't have any idea what they even have....
Re: (Score:1)
Re: (Score:1)
when Juniper Networks firewalls were found to contain
You mean when NETSCREEN firewalls were found. Juniper purchased Netscreen a while back, and those piles of trash are already end of life. Juniper's own firewall product line is the SRX which was completely unaffected, as it runs an entirely different code base.
when we hear from sonicwall. I won't hold my breath.
That's probably a good idea, I've had indirect dealings with that company and I can say that not only does their product suck, their support is horrifically bad as well. Not quite as badly as Barracuda, but damn close.
Re: (Score:1)
Re: (Score:3)
Unfortunately SRXs also suck harder than a whore at Mardis Gras.
Re: (Score:1)
Whores don't work Mardis Gras -- too many sluts giving it for free.
Re: (Score:3)
They haven't admitted they had a backdoor.
They've only admitted they had a 'management authentication issue'.
Just like many companies are coming under 'advanced persistent threat' attacks.
They aren't filled with idiots who click Important Document.doc.exe from random emails. Course not!
The attack has 'advanced' in the title!
Re: (Score:1)
Re: (Score:3, Insightful)
So then the backdoor is required for whom exactly? Probably the police/China.
Good luck proving that. My bet is on this being once again just some developer sloppiness, not an intentional backdoor. Hanlon's razor: "Never attribute to malice that which is adequately explained by stupidity."
Re: (Score:1)
So then the backdoor is required for whom exactly? Probably the police/China.
Good luck proving that.
I'd say the proof has to come the other way given the current state of trust in various entities to do the right thing.
Re: "management" = ??? (Score:5, Interesting)
Re: (Score:3)
So then the backdoor is required for whom exactly? Probably the police/China.
Good luck proving that. My bet is on this being once again just some developer sloppiness, not an intentional backdoor. Hanlon's razor: "Never attribute to malice that which is adequately explained by stupidity."
My Theorem: "Never assume the motive unless you did it yourself." When humans become perfect and never take advantage of other humans I'll agree that Hanlon's razor is always true. That won't happen, so measure the motive based on evidence and probability.
In other words, every Government and Government agency is attempting to legalize back doors in all encryption. Several of those same institutions were found to be installing and using backdoors in hardware and software, and attempting to hack into syste
Re:"management" = ??? (Score:5, Insightful)
"This was not a 'backdoor' vulnerability issue but rather a management authentication issue. The issue was identified by our product security team as part of their regular review and testing efforts. After careful analysis and investigation, we were able to verify this issue was not due to any malicious activity by any party, internal or external."
Their PR firm is earning its money today.
Re: (Score:2)
So, much like the WMF flaw, "working as intended"?
Re: (Score:2)
It's not always wise to over-estimate the ability of programmers, though.
Don't worry (Score:3)
Hey, check out one of the new reality tv shows.
Re: (Score:1)
So... I, uh... I don't actually watch TV and I searched for that show - expecting to find a funny Onion skit. I haven't really watched TV and not much at all since the 80s. I don't know what to say, except, "Son, I am disappoint."
It's not that I have a high minded reason to avoid TV, I just hate commercials. Sometime in the 1980s they went to showing a whole lot more commercials. So, I just kind of stopped. I do watch documentaries online. So, there's that.
Re: (Score:2)
Hey, check out one of the new reality tv shows.
Masterchef Junior. It's a hoot seeing Gordon Ramsey make nine year old girls cry.
Re: (Score:2)
...says the clown who has obviously never watched the show.
I know you haven't. It's clear.
Ramsey isn't an ass with the kids like he is with the nincompoops on Hell's Kitchen.
No, he isn't, but it doesn't take the same level of abuse to make a nine year old cry as it does a 39 year old. It's odd that the other hosts don't seem to have the same effect on the kids that he does. They an manage to get the message "you didn't do this right" across without histrionics, and he cannot.
iptables + fwbuilder (Score:3)
You don't need no fancy schmancy hardware device.
Re:iptables + fwbuilder (Score:5, Insightful)
That depends how much traffic you are shifting and how many ports you need. Using a linux or BSD box as a firewall is common now at the low end of performance - a lot of firewall appliances actually are nothing more than modified rack servers running linux and a web interface for ease of management, like Smoothwall. But if you want to put a firewall between two networks with a 20Gb/s backbone while meeting a strict latency target? You need something specialised. There's still a space for dedicated firewall appliances at the top end. They do a lot more than just iptables-like rule sets too - lots more SPI, detection and automatic blocking of IPs trying to use known vulnerabilities, logging of specified events (ie, any external IP connecting to a server on port 22), detection of port scanners. Fortinet have firewalls with 100Gb/s ports, and the routing/filtering capacity to keep up too. Hardware firewalls are still going strong at the top end - if you've got the need, you've probably got the money.
Re: iptables + fwbuilder (Score:2)
Re: (Score:1)
Those 100Gbps ports are irrelevant if you are doing DPI. The cores can't process the rules fast enough.
100Gbps I haven't seen yet, but 40Gbps exists [bivio.net]. Naturally, they're not cheap, but certainly in-line with everything else at that level.
They also can be useful in lower end apps (Score:2)
If you want something that uses less power. It is as true today as ever that you can do more with less juice in an ASIC than in software. So sure, you throw a big CPU at something it can often do the trick. But maybe you don't want a big CPU and associated support hardware, maybe you have a reason to want something lower power. In that case, dedicated hardware comes in.
Also I think many people who dis hardware firewalls have never seen really difficult networks. It isn't so much the traffic that causes trou
Re: (Score:2)
Also, if you buy a firewall appliance you can have someone administer it for you remotely. No need to hire someone with the expertise, just pay someone else to manage your firewall and get a lowly Windows Server admin in to handle your internal stuff.
These things aren't just a box you buy, they are a service.
Re: (Score:2)
NSA spotted - or throwing out misdirection? (Score:2)
Re: NSA spotted - or throwing out misdirection? (Score:4, Interesting)
So what're we calling this one? (Score:1)
Fortigategate or just plain Fortigate?
Not "shaken", more surprised it took that long (Score:3)
Seriously, any actual security expert has been expecting things like this for a long time. The only explanation that makes sense for so few of these being found is that most vendors do not go looking in the first place...
Re: pfsense? (Score:2)
If only they would release the source code somebody could take a look.
Hrm, has anybody done a pf PFGA compiler yet? My low-end pfSense boxes won't really keep up over two bonded gigabits. All this propreitary gear is e-waste now.
LOL (Score:5, Funny)
A spokesperson for Fortinet told El Reg, "This was not a 'backdoor' vulnerability issue but rather a management authentication issue."
Later they said, "You didn't get 'pwned', you got 'haxored'...it's like, totally different, man."
And just for the record, I'm not "eating a potato", I'm "utilizing a starch resource with a multi-pronged utensil!"
Build your own (Score:2)
Learn to fab, design your own hardware, add the code and test it. Lots of nice domestic work for years and a good secure product is created.
The hardware might not be fast, cool running, an international standard but it will be fully understood from the chips up and be fully supported locally.
Re: (Score:2)
Volkswagen`cf. Juniper/Fortinet (Score:4, Interesting)
The reaction to these types of revelations should be the same as for the VW emissions scandal. A fired CEO, congressional FCC and FTC investigations, class-actions, naming and shaming of the individuals responsible, and the source code.
Re: (Score:2)
What CEO got fired for the VW emissions scandal. I though,t after a thorough investigation by VW, it turned out to be a couple of rogue programmers acting on their own.
Au contraire...it turned out that the actions went way up the management chain, and indeed CEO Martin Winterkorn stepped down in late September 2015. Google is your friend.
ANALogy (Score:2)
A spokesperson for Fortinet told El Reg, "This was not a 'backdoor' vulnerability issue but rather a management authentication issue."
Hm. To me, that reads like this:
A spokesperson for the Zeta Beta Tau chapter told El Reg, "This was not a surprise unwanted group buttsex situation but rather a dating faux pas."
This kind of "management authentication issue" IS a backdoor...it's exactly what the term "backdoor" was created to refer to.