Hacking Nintendo Switch bootrom dumped.

TotalInsanity4

GBAtemp Supreme Overlord
Member
Joined
Dec 1, 2014
Messages
10,800
Trophies
0
Location
Under a rock
XP
9,814
Country
United States
So if I can my Switch's trust can I get mah bakups?
How do I do so, do I take my Switch to dinner or to the movies first?

But in all seriousness though:

Wouldn't we be able to still play online if we have the original cart of the game while still having the emus in the system?
I assume the online blacklist would only apply if Nintendo detects something odd with the backup you are playing with.
To defeat the Trustzone, one must first break out of the Friendzone
 

Selver

13,5,1,14,9,14,7,12,5,19,19
Member
Joined
Dec 22, 2015
Messages
219
Trophies
0
XP
426
Country
The certificate key data is stored encrypted using keydata only available to TrustZone. ... The SSL module retrieves [console-unique cert] on boot, passes it through TrustZone (through SPL), and its decrypted ....

Hi V-Temp,

Your posts have been technically informative, thank you. Can you help me confirm my understanding (based on your descriptions, switchbrew.org, and ARM manuals)?

Are the following stored in memory accessible by trusted world (TZ)?
  1. Each session-specific key used to wrap the KEK?
  2. Each specific, unencrypted KEK?
  3. The underlying AES/RSA keys?
If I had to guess, I would say the first two answers would be yes. I'm less sure of the last answer, thinking it may be locked to hardware, such that no software (not even TZ trusted worlds) can access the actual keys.

What (if any) peripherals can access the trusted world (TZ) memory? As examples (some of which are mutually exclusive):
  1. can the network card just access physical memory addresses directly?
  2. can the network card write to or DMA to memory mapped only in trusted world?
  3. is the network card only able to access memory via a memory controller that has some concept of security controls?
If I had to guess, I would say that the NIC firmware can access physical memory directly, and thus can bypass the normal protections (e.g., via DMA).

Switchbrew.org is a great resource for the software, but overall hardware architecture is a little more difficult to divine, so please welcome any knowledge in this area you have!
 
  • Like
Reactions: supermario18

Jayro

MediCat USB Dev
Developer
Joined
Jul 23, 2012
Messages
12,999
Trophies
4
Location
WA State
Website
ko-fi.com
XP
17,076
Country
United States
A bit too quick, the 3ds took 4-5 years to get the bootrom, or was it actually kept private :unsure: ?
It was kept private, but the dumpers told us exactly how to dump it, and it eventually leaked out from someone. I'm so excited the bootrom of the Tegra 210 was dumped, this is fantastic.
 

V-Temp

Well-Known Member
Member
Joined
Jul 20, 2017
Messages
1,227
Trophies
0
Age
34
XP
1,342
Country
United States
Are the following stored in memory accessible by trusted world (TZ)?

If I had to guess, I would say the first two answers would be yes. I'm less sure of the last answer, thinking it may be locked to hardware, such that no software (not even TZ trusted worlds) can access the actual keys.

The first, if I understood your question, is easy to answer as its actually documented: http://switchbrew.org/index.php?title=SMC :P Control-F: "overall concept" (as this is what SciresM and I were discussing yesterday, to some degree!).

What (if any) peripherals can access the trusted world (TZ) memory?

I don't have an immediate answer for what can outright bypass TZ and not be forced through a handshake at some level with encryptions along the way, it non-obvious to me unless I am drawing a blank on it.
 

SciresM

Developer
Developer
Joined
Mar 21, 2014
Messages
973
Trophies
3
Age
33
XP
8,294
Country
United States
I don't have an immediate answer for what can outright bypass TZ and not be forced through a handshake at some level with encryptions along the way, it non-obvious to me unless I am drawing a blank on it.

I do: the boot processor that goes to sleep when TZ gets loaded and which can't be taken over later, and nothing else.

So...nothing meaningful.
 

mendezagus

Well-Known Member
Member
Joined
Aug 29, 2017
Messages
159
Trophies
0
Age
44
XP
423
Country
Argentina
Funnily enough, in the months we've been with this scene and how fast its been "moving", we're 'catching up' to the PS4's 1.76 and that mess of a firmware and its fiery kernel. I sort of find the whole "wow already" posts really funny in light of how fast these things have usually gone, I guess no one notices.

wait, so this exact "bootrom dump" situation also happend on the PS4??? how come there was never piracy on PS4 then? were there even emulators?
 
Last edited by mendezagus,

V-Temp

Well-Known Member
Member
Joined
Jul 20, 2017
Messages
1,227
Trophies
0
Age
34
XP
1,342
Country
United States
wait, so this exact "bootrom dump" situation also happend on the PS4??? how come there was never piracy on PS4 then? were there even emulators?

For example: PS4 had license duping years ago.

Its not about the exact same thing occurring. Its about having other failpaths in your security like cloning your NAND with all of its license permissions.
 

mendezagus

Well-Known Member
Member
Joined
Aug 29, 2017
Messages
159
Trophies
0
Age
44
XP
423
Country
Argentina
Apparently PS4 Piracy is in the making.

Great, now i can´t update neither of my consoles!!!





Just joking, i only care for a switch hack. I like it better and sacrificing online doesn´t mean that much in comparison to PS4.

--------------------- MERGED ---------------------------

For example: PS4 had license duping years ago.

Its not about the exact same thing occurring. Its about having other failpaths in your security like cloning your NAND with all of its license permissions.

So the bootrom dump happened on PS4 but no significant failpath (vulnerability?) was found, right? I mean, the hackers could never replicate a NAND with all the permissions.
 

Selver

13,5,1,14,9,14,7,12,5,19,19
Member
Joined
Dec 22, 2015
Messages
219
Trophies
0
XP
426
Country
The first, if I understood your question, is easy to answer as its actually documented: http://switchbrew.org/index.php?title=SMC :P Control-F: "overall concept" (as this is what SciresM and I were discussing yesterday, to some degree!).

Hi V-Temp,

I enjoyed following that discussion between yourself and SciresM, and reviewed the SMC call documentation on SwitchBrew.

I'm sure my question isn't clear. Switchbrew says that "userspace stores... AES(Ksession, AES(Kkek, K...))", presumably referring to non-trusted userspace memory, and is very clear that the underlying key material (K...) is never exposed to the non-trusted world.

Switchbrew also says:
"This means: Plaintext kek keys never leave TrustZone. Further, this means: Actual AES/RSA keys never leave TrustZone".

But, it's not clear from this quote if plaintext kek keys are accessible in TrustZone, or if it's just confirmed that they are definitely not accessible when not in TrustZone. (Sorry for the double-negative, seemed needed.)

In other words, are Ksession and Kkek also locked into a hardware keyslot (or calculated using a hardware keyslot), or just stored in "normal" memory locked down to TrustZone world?

If the question is still unclear, I take all blame; just say so and I'll go away a while...
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    The Real Jdbye @ The Real Jdbye: 4th wife