Does it means they had NSA-corrupted engineers, or that they have better processes than others to find this kind of stuff that would happen everywhere?
We know that the NSA hunts SysAdmins [theintercept.com] in order to gain control over the systems and networks they manage [theintercept.com]. With that level of access inside Juniper, the NSA could easily have added these features themselves. In that case, kudos to Juniper for discovering the features and fixing them. Now they need to discover how they were added and what level of access the NSA has inside their systems.
We know that the NSA hunts SysAdmins in order to gain control over the systems and networks they manage. With that level of access inside Juniper, the NSA could easily have added these features themselves.
Hunting sysadmins is perfect to get access to data, but that is less effective to alter stuff. I am certain Juniper uses some version control tool. Modifying something leaves trails.
I am more inclined to think about an NSA agent being hired by Juniper as developer (or a Juniper developer being hired by NSA) in order to add subtle security bug in a legitimate software change.
Jupiner again? (Score:2)
Juniper already had a backdoor in VPN products. [arstechnica.com]
Does it means they had NSA-corrupted engineers, or that they have better processes than others to find this kind of stuff that would happen everywhere?
Re: (Score:1)
That is the question, isn't it?
We know that the NSA hunts SysAdmins [theintercept.com] in order to gain control over the systems and networks they manage [theintercept.com]. With that level of access inside Juniper, the NSA could easily have added these features themselves. In that case, kudos to Juniper for discovering the features and fixing them. Now they need to discover how they were added and what level of access the NSA has inside their systems.
We also know that the NSA receives voluntary cooperation [wikipedia.org] from numerous network providers.
Re:Jupiner again? (Score:2)
We know that the NSA hunts SysAdmins in order to gain control over the systems and networks they manage. With that level of access inside Juniper, the NSA could easily have added these features themselves.
Hunting sysadmins is perfect to get access to data, but that is less effective to alter stuff. I am certain Juniper uses some version control tool. Modifying something leaves trails.
I am more inclined to think about an NSA agent being hired by Juniper as developer (or a Juniper developer being hired by NSA) in order to add subtle security bug in a legitimate software change.