PS3 Hackers able to sign code (and more)!

Elaugaufein

Well-Known Member
Member
Joined
Jan 26, 2010
Messages
220
Trophies
0
XP
396
Country
There are some problems with the whitelist approach, if you hash the entire Blueray and include a filesize check , thats going to have to be computed every time one of those games is started. Thats going to suck, essentially the entire disk has to be read and the hash of a 5-50 GB file has to be computed every time. You could also check the disc as each bit was loaded, essentially slowing the game down constantly instead of once at start up. Depending on the BD architecture and how it communicates with the PS3 either of these could potentially be bypassed (eg the swapping the disc after the calculation, if its done at startup, if the PS3 doesn't have a sophisticated detection method for such, which it probably does).

The DSi method doesn't do that but its got its flaw anyway since its possible for flash cards to duplicate the part of the cart that is checked (which is how they bypass it)

You can hash a variety of small parts of a file and check them at random too (but that still leaves you open, just with a non-100% success rate). It also means your whitelist is going to be enormous if you have to calculate the hash for 1000 different 10 MB chunks of every PS3 piece of executable code out there (in order to keep the success rate low).

Essentially sure a whitelist method can work but the more secure it is, the more likely they are going to get themselves crucified for giving every PS3 application a loading time thats more associated with installing a 2+ DVD game on a PC.

(Its also not going to realistic help against anyone who knows about this, they just aren't going to update until such a time as they know its not going to break anything and its going to be really obvious if it does (the next PUP out isn't going to work on older firmwares without an in between update if they change the PUP key, and disabling service mode is equally trivial to spot))

Essentially whether or not its worth it for anything currently out there is debatable (one of the things in a talk is that its going to be possible to redowngrade the loaders using a mod chip essentially for everything out there now , even if they fix the firmware). And once people can install "valid" firmwares from "valid" PUPs they can essentially update every time Sony does just with the revocation lists zeroed out or bypassed.

They could lock it down pretty nicely on new systems (and if they kept the white-list only on new systems people wouldn't have a "Guide to what you need to impersonate to pass" but that requires releasing seperate PUPs for both systems).

Essentially no matter what they do, its going to hurt them. They really don't have a good choice.

They'll probably try something though even on the systems out there now (via a firmware update), they probably have obligations to do so even if its essentially utterly pointless (and you don't even have to make it "hard" just "non-trivial" to discourage a certain subset of people, an $X0 modchip + $X0 installation fee, will slow a bunch of people down).

Probably a whitelist thats based on reading and calculating only some subset of the data (maybe selected "randomly" from a list) combined with a file size check it'd probably work passably well for a while. Of course they'll also have to kill service mode (in some way) to stop people downgrading (and then reinstalling a "valid" PUP, since alternative l2diag files could now be signed, since dongles are getting pretty cheap.

Its going to be interesting watching what the reaction actually is.


Sidenote: A remote system (the PSN) cannot "scan" your PS3, a "scan" by a remote system is essentially the same as requesting your system to send things to it. If your system is compromised it (the remote system) can't trust the results of the scan, because a compromised system can transmit a bald-faced lie (and should be assumed to do so whenever such is advantageous). If you play online maybe it could scan the data you transmit to the server for irregularities (since sending completely fake data to a server in an online game is silly) which gives avenues for catching cheaters but thats about it.
 

cwstjdenobs

Sodomy non sapiens
Member
Joined
Mar 10, 2009
Messages
1,756
Trophies
0
Location
Ankh-Morpork
Website
Visit site
XP
205
Country
doyama said:
Which track was the de-obfuscation talk?

It was using optimising compiler technique's. https://events.ccc.de/congress/2010/Fahrpla...ts/4096.en.html I'm trying to find a video link but everyone seems a bit obsessed with this, stuxnet, and the political stuff right now.

QUOTEI saw RC4 one which was interesting, though I don't think having to crack WEP is a huge thing
tongue.gif
It was more interesting that they used fuzzy logic to actually find the vulnerability, rather than attacking it directly.

Totally agree, that was sort of my point.
 

doyama

Well-Known Member
Member
Joined
Nov 30, 2006
Messages
1,288
Trophies
0
XP
171
Country
United States
But only the BOOT.ELF files are signed in this way, so you don't need to decrypt the entire disc. You just need to read the ECDSA header that contains the signature, and compare that to the whitelist. I don't disagree that the list would be large, but I think the performance hit would be minimal in theory to do the hash and comparison. I suspect the next firmware revision will address this.

Though I'm not 100% sure, I think the actual stack overflow of the revocation list cannot be fixed since it's in one of loaders that they can't update. So even when the firmware update comes out, since all the security features don't actually integrate the way it's supposed to, you can just create a mod chip to supply the necessary 'bad' revocation list.
 

doyama

Well-Known Member
Member
Joined
Nov 30, 2006
Messages
1,288
Trophies
0
XP
171
Country
United States
cwstjdenobs said:
doyama said:
Which track was the de-obfuscation talk?

It was using optimising compiler technique's. https://events.ccc.de/congress/2010/Fahrpla...ts/4096.en.html I'm trying to find a video link but everyone seems a bit obsessed with this, stuxnet, and the political stuff right now.

QUOTEI saw RC4 one which was interesting, though I don't think having to crack WEP is a huge thing
tongue.gif
It was more interesting that they used fuzzy logic to actually find the vulnerability, rather than attacking it directly.

Totally agree, that was sort of my point.

http://mirror.informatik.uni-mannheim.de/p...20optimization/

Actaully scratch that, the feed is like 50% filler and the audio cuts out a lot.... Have to wait for the properly edited version.

The file is big but it's something
smile.gif
Once it downloads I'll take a look. There's a lot of good talks on there I need to look at once I get the time.
 

Slowking

Well-Known Member
Member
Joined
Dec 31, 2006
Messages
1,403
Trophies
0
XP
260
Country
Germany
BortzANATOR said:
Hahaha here comes the pirate ship.
Honestly has the PS3 really fallen to the hackablily level of the Wii?
Deeper. The Wii has bugs that can be exploited. Sony handed the hackers the PS3s privat keys and said "here you go sign your homebrew as if it was software we made!".

SifJar said:
Rydian said:
I understand substitute functions to return values when the correct one isn't functional, but shouldn't generating a random value always be functional unless your system is to the point that you're not going to be coding anything at all?
What? I am quite confused by this question. If you're asking why Sony's "random" number is always the same, I'm pretty sure no one really knows. Its just Sony's stupidity. Someone asked at the end of the talk "Where does the number come from?" and their response was "We're quite sure, but we think the southern hemisphere"
tongue.gif


Uhm no somebody asked where the Jail Break came originally from and they answered with the "southern hemisphere" thing.

QUOTE(--=ZerO=-- @ Dec 30 2010, 02:50 AM) QUOTE(thedicemaster @ Dec 29 2010, 11:58 PM)
they just have to make a whitelist of all currently existing legit ps3 software, and block anything signed with the old(current) key that isn't on this whitelist.

They could blacklist the unwanted homebrew too. Nintendo does this on the Wii. But it's pointless... Sony is f***** up!
tongue.gif
No they don't.
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
QUOTE said:
SifJar said:
Rydian said:
I understand substitute functions to return values when the correct one isn't functional, but shouldn't generating a random value always be functional unless your system is to the point that you're not going to be coding anything at all?
What? I am quite confused by this question. If you're asking why Sony's "random" number is always the same, I'm pretty sure no one really knows. Its just Sony's stupidity. Someone asked at the end of the talk "Where does the number come from?" and their response was "We're quite sure, but we think the southern hemisphere"
tongue.gif
Uhm no somebody asked where the Jail Break came originally from and they answered with the "southern hemisphere" thing.

My bad. The stream was a bit bad at that point, I misunderstood and thought it was a joke.
 

doyama

Well-Known Member
Member
Joined
Nov 30, 2006
Messages
1,288
Trophies
0
XP
171
Country
United States
SifJar said:
QUOTE said:
SifJar said:
Rydian said:
I understand substitute functions to return values when the correct one isn't functional, but shouldn't generating a random value always be functional unless your system is to the point that you're not going to be coding anything at all?
What? I am quite confused by this question. If you're asking why Sony's "random" number is always the same, I'm pretty sure no one really knows. Its just Sony's stupidity. Someone asked at the end of the talk "Where does the number come from?" and their response was "We're quite sure, but we think the southern hemisphere"
tongue.gif
Uhm no somebody asked where the Jail Break came originally from and they answered with the "southern hemisphere" thing.

My bad. The stream was a bit bad at that point, I misunderstood and thought it was a joke.

Most likely segher just said that because the original PS3Jailbreak videos came from an Australian dealer so he assumed the team was from there. They probably don't follow the scene much, and once the payload was made public there was even less incentive to care about who did what originally.
 

qaz00

ORG 0x0
Newcomer
Joined
Dec 31, 2010
Messages
40
Trophies
0
XP
122
Country
thedicemaster said:
sifjar: there is still a way for them to block homebrew, although it's tedious work.
they just have to make a whitelist of all currently existing legit ps3 software, and block anything signed with the old(current) key that isn't on this whitelist.
not that it would help them much for the ps3's that are already at people's homes, because for those some hacker would just make a firmware update without the whitelist.

They cannot block the homebrew nor make a whitelist, because the loader (metldr) we/they know the private key for is not updatable.
nayps3.gif


BTW the key for signing games/apps is not known, the key we/they have is for signing the GameOS/Lv2 stuff.

EDIT: I spose they could add a whitelist in newly manufactured PS3s.
 

Gitaroo

Well-Known Member
Member
Joined
Jun 20, 2007
Messages
161
Trophies
1
XP
427
Country
Canada
would be funny sony secret leak/mix in a bunch of fake homebrews that bricks your systems to scare ppl off and they have to have send their system for repair and they make even more $$$.
 

redact

‮҉
Member
Joined
Dec 2, 2007
Messages
3,161
Trophies
0
Location
-
XP
674
Country
Mauritania
Slowking said:
--=ZerO=-- said:
thedicemaster said:
they just have to make a whitelist of all currently existing legit ps3 software, and block anything signed with the old(current) key that isn't on this whitelist.

They could blacklist the unwanted homebrew too. Nintendo does this on the Wii. But it's pointless... Sony is f***** up!
tongue.gif
No they don't.
they do for homebrew channel
hence 'HAXX' -> 'JODI'

edit:

also for action replay gamecube
 

Elaugaufein

Well-Known Member
Member
Joined
Jan 26, 2010
Messages
220
Trophies
0
XP
396
Country
QUOTE said:
But only the BOOT.ELF files are signed in this way, so you don't need to decrypt the entire disc. You just need to read the ECDSA header that contains the signature, and compare that to the whitelist. I don't disagree that the list would be large, but I think the performance hit would be minimal in theory to do the hash and comparison. I suspect the next firmware revision will address this.

The thing is if you're just whitelisting the signature, you're inviting attacks that use padding or cruft to replicate the signature (you only need to get one "launcher" program to match the tags and then you're good to go). That is one of the fastest solutions but its also not the most secure. But thats the inevitable tradeoff.

zeromac: Thats not the signing key, that website has confused two different events (the service jig masterkey which is the key in the article) and the signing keys that fail0verflow found.
 

doyama

Well-Known Member
Member
Joined
Nov 30, 2006
Messages
1,288
Trophies
0
XP
171
Country
United States
Elaugaufein said:
QUOTE said:
But only the BOOT.ELF files are signed in this way, so you don't need to decrypt the entire disc. You just need to read the ECDSA header that contains the signature, and compare that to the whitelist. I don't disagree that the list would be large, but I think the performance hit would be minimal in theory to do the hash and comparison. I suspect the next firmware revision will address this.

The thing is if you're just whitelisting the signature, you're inviting attacks that use padding or cruft to replicate the signature (you only need to get one "launcher" program to match the tags and then you're good to go). That is one of the fastest solutions but its also not the most secure. But thats the inevitable tradeoff.

zeromac: Thats not the signing key, that website has confused two different events (the service jig masterkey which is the key in the article) and the signing keys that fail0verflow found.

I think the goal at this point for Sony would be to minimize the chance of a pure soft-mod for future PS3s. As long as you need a mod chip, then it creates a significant barrier of entry for most people. Even with a pure soft-mod Wii, the Homebrew channel install population is only 1% of existing Wii's. As long as you can keep the #'s down it can help significantly.

A signature attack might be possible, though I think the ability to duplicate another signature is still be very difficult even for a launcher application. I agree that it's probably just the quickest fix, but I think speed is better in this case. It doesn't need to be rock solid secure, since we know the security is already kinda crap on thePS3. You just need to make the barrier of entry higher and that's probably enough for now.
 

Slowking

Well-Known Member
Member
Joined
Dec 31, 2006
Messages
1,403
Trophies
0
XP
260
Country
Germany
mercluke said:
Slowking said:
--=ZerO=-- said:
thedicemaster said:
they just have to make a whitelist of all currently existing legit ps3 software, and block anything signed with the old(current) key that isn't on this whitelist.

They could blacklist the unwanted homebrew too. Nintendo does this on the Wii. But it's pointless... Sony is f***** up!
tongue.gif
No they don't.
they do for homebrew channel
hence 'HAXX' -> 'JODI'

edit:

also for action replay gamecube
Well if you consider deleting 4 title IDs a blacklist, then k.
 

SifJar

Not a pirate
Member
Joined
Apr 4, 2009
Messages
6,022
Trophies
0
Website
Visit site
XP
1,175
Country
Slowking said:
mercluke said:
Slowking said:
--=ZerO=-- said:
thedicemaster said:
they just have to make a whitelist of all currently existing legit ps3 software, and block anything signed with the old(current) key that isn't on this whitelist.

They could blacklist the unwanted homebrew too. Nintendo does this on the Wii. But it's pointless... Sony is f***** up!
tongue.gif
No they don't.
they do for homebrew channel
hence 'HAXX' -> 'JODI'

edit:

also for action replay gamecube
Well if you consider deleting 4 title IDs a blacklist, then k.

Um, yeah. That's exactly what it is. What else could it possibly be? You think its not a "list" till it has a lot of stuff in it? Anything with two or more items can be a list. In fact, I see no reason why a list can't have one entry.
 

ManFranceGermany

Atheist, Socialist and pro EU!
Member
Joined
Nov 14, 2010
Messages
624
Trophies
0
XP
39
Country
Gambia, The
Elaugaufein said:
Thats going to suck, essentially the entire disk has to be read and the hash of a 5-50 GB file has to be computed every time. You could also check the disc as each bit was loaded, essentially slowing the game down constantly instead of once at start up.

Isn't Nintendo doing exactly the same thing with the Wii? At least as far as I understood in this first presentation he mentioned that the Wii hashes the whole Disc.
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
  • No one is chatting at the moment.
    K3Nv2 @ K3Nv2: Att did offer a $500gc tempting to use it for 6 months and cancel