Cyberoam: "Not a mass surveillance device"

Powered by SC Magazine
 

Company refutes TorProject claims private keys can be extracted.

Cyberoam has denied allegations by the Tor Project that its Deep Packet Inspection (DPI) boxes were “mass surveillance devices” capable of intercepting a wide range of traffic.

The security vendor was embroiled in controversy last week after Tor security researcher Runa Sandvik and OpenDNS’ Ben Laurie concluded its DPI units had intercepted traffic from a user from Jordan.

They discovered that the Unified Threat Management (UTM) units used shared certificates which users must accept to have their encrypted traffic scanned, ostensibly for security threats.

Users accepting the certificates could be scanned by any Cyberoam DPI unit, researchers said. Moreover, they claimed the private key could be extracted from the devices.

But Cyberoam fired back, stating its keys could not be extracted.

“.. theoretically it is possible to decrypt SSL data using a conned private key. Cyberoam UTM does not allow import or export of the foresaid private key used for the SSL-Bridging technology,” the company said on its blog.

“Cyberoam UTM either accepts or rejects, but does not store HTTPS Deep Scan Inspection data, as processing is done in real-time. The possibility of data interception between any two Cyberoam appliances is hence nullified.

“Having vindicated Cyberoam technology, we appreciate Tor for the awareness campaign.”

Copyright © SC Magazine, Australia


Cyberoam: "Not a mass surveillance device"
 
 
 
Top Stories
Photos: iTnews Benchmark Awards countdown begins
Just a few days left until entries close for 2014.
 
Australian Govt to rethink cyber security strategy
Six-year old policy to be refreshed.
 
The failure of the antivirus industry
[Blog post] Insights from AVAR 2014.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  15%
 
A State Government agency (Health dept, etc)
  5%
TOTAL VOTES: 1069

Vote