Content deleted Content added
removed Category:Defunct companies based in California; added Category:Defunct computer companies based in California using HotCat Tags: Mobile edit Mobile web edit Advanced mobile edit |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(One intermediate revision by one other user not shown) | |||
Line 23:
}}
'''NetScreen Technologies''' was an American technology company that was acquired by [[Juniper Networks]] for [[US$]]4 billion stock for stock in 2004.<ref>{{cite news |url=http://www.networkworld.com/edge/news/2004/0209juniscreen.html |title=Juniper acquires NetScreen |newspaper=Network World |date=2004-02-09 |publisher=networkworld.com |accessdate=2017-01-05 |last1=Duffy |first1=Jim |archive-date=2009-04-17 |archive-url=https://web.archive.org/web/20090417060818/http://www.networkworld.com/edge/news/2004/0209juniscreen.html |url-status=dead }}</ref><ref name="jnprnetscreen">{{cite web|url=http://www.juniper.net/us/en/company/press-center/press-releases/2004/pr-040416.html|title=Juniper Networks Completes Acquisition of NetScreen Technologies and Appoints Frank J. Marshall to the Juniper Networks Board of Directors|date=April 16, 2004|publisher=Juniper Press Release|accessdate=2009-03-05}}</ref>
NetScreen Technologies developed [[Application-specific integrated circuit|ASIC]]-based Internet security systems and appliances that delivered high performance firewall, [[VPN]] and traffic shaping functionality to Internet [[data center]]s, [[e-business]] sites, [[broadband]] service providers and [[application service provider]]s. NetScreen was the first [[Firewall (computing)|firewall]] manufacturer to develop a [[gigabit]]-speed firewall, the NetScreen-1000.<ref>{{cite news| url=http://findarticles.com/p/articles/mi_pwwi/is_20050229/ai_mark01019684/?tag=content;col1 | work=Market Wire | title=Nupremis Deploys The NetScreen-1000 Best Of Breed Security Solution For Global Data Centers | year=2005}}</ref>
Line 42:
Analysis of the [[firmware]] code in 2015 showed that a backdoor [[Key (cryptography)|key]] could exist using [[Dual_EC_DRBG]]. This would enable whoever held that key to passively decrypt traffic [[encrypted]] by ScreenOS.<ref name="wired-secret-code-in-junipers-firewalls">{{cite magazine | url=https://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors | title=Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors | author=Kim Zetter | magazine=Wired | publisher=wired.com | language=English | date=2015-12-18 | accessdate=2017-01-05}}</ref>
In December 2015, Juniper Systems announced that they had discovered "unauthorized code" in the ScreenOS software that underlies their NetScreen devices, present from 2012 onwards. There were two vulnerabilities: One was a simple [[root password]] [[Backdoor (computing)|backdoor]], and the other one was changing a point in Dual_EC_DRBG so that the attackers presumably had the key to use the pre-existing (intentional or unintentional) [[kleptographic]] backdoor in ScreenOS to passively decrypt traffic.<ref>{{Cite web|url=http://blog.cryptographyengineering.com/2015/12/on-juniper-backdoor.html|title=On the Juniper backdoor|date=22 December 2015}}</ref>
==References==
|