So, looks like the ps3 is completely hacked.

Page 6 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Maleficus

Diamond Member
May 2, 2001
7,685
0
0
It would be awesome for Geohot to work for a company and try to make a system that couldn't be cracked like the PS3 (except actual security, if in fact the smug guys in the conference were right). Very surprised Apple didn't hire him actually.

It doesn't matter how good you are, there will always be flaws people can exploit.

I'll go ahead and borrow from Tyson here: Everyone has a plan until they get punched in the face
 

Sniper82

Lifer
Feb 6, 2000
16,517
0
76
It doesn't matter how good you are, there will always be flaws people can exploit.

I'll go ahead and borrow from Tyson here: Everyone has a plan until they get punched in the face

true

yeah hiring him would be pointless because someone else would come along and hack his $h!t so why bother?
 

digiram

Diamond Member
Apr 17, 2004
3,991
172
106
true

yeah hiring him would be pointless because someone else would come along and hack his $h!t so why bother?

What they really need to do is hire Mike Tyson. Send him over to the hacker's house, and have Iron Mike punch him in the face... lol
 

magomago

Lifer
Sep 28, 2002
10,973
14
76
i don't see how the PSP ones matter....the console has been wide open forever. I haven't played any cracked games, but at the very least I play some SNES emulators on my PSP haha.

Makes me wonder if they remembered to keep K randomized....would they have cracked the ps3 that fast?
 

Ross Ridge

Senior member
Dec 21, 2009
830
0
0
Makes me wonder if they remembered to keep K randomized....would they have cracked the ps3 that fast?

Without that or a similar vulnerability, they'd never have gotten the private signing key unless someone inside Sony leaked them. The USB dongle and the hypervisor vulnerabilties were seperate bugs though, and it's possible that these same exploits that pulled back veils hiding the ECDSA vulnerability would've also revealed other bugs that would've allowed for homebrew or piracy. That's what hackers were looking for, they would've never expected to get the private keys so easily.
 

sourceninja

Diamond Member
Mar 8, 2005
8,805
65
91
Just think, had they kept linux and allowed it access to the video, or had some really nice homebrew functionality built-in, people would have probably never looked for these exploits.
 

Cstefan

Golden Member
Oct 6, 2005
1,510
0
71
Just think, had they kept linux and allowed it access to the video, or had some really nice homebrew functionality built-in, people would have probably never looked for these exploits.


SONY?? Shooting themselves in the foot?? Say it aint so!!!
 

JTsyo

Lifer
Nov 18, 2007
11,774
919
126
Just think, had they kept linux and allowed it access to the video, or had some really nice homebrew functionality built-in, people would have probably never looked for these exploits.

No, people would do it just for the challenge and bragging rights.
 

Kev

Lifer
Dec 17, 2001
16,367
4
81
What's kind of sad is that anyone knowledgable about crytology and the ECDSA algorithim used by Sony should've noticed immediately that their implementation wasn't working right. The parameters, R, n, K, and Da, geohot gives in the link above are what you need to your own signing. The "n" parameter is a constant based on the ecliptic curve used and doesn't need to be a secret. The "K" parameter is the now infamous random number that should've changed everytime something was signed. "Da" is the private key that's supposed to be kept secret but was easily discovered because "K" never changed.

"R" however, is part of the signature. It's not supposed to be a secret, it's used to verify the executable (or whatever) was actually signed by Sony, not any one else, and not modified in anyway. It's also not supposed to be a constant, each signature should have its own unique "R" value, but becase "K" never changes, neither does "R". Just by looking at the signatures their implentation generated, and seeing how half the signature is always the same, they could've seen that something was wrong. Ironically if they hadn't gone to the additional and unnecessary step of encrypting the signature in the executable it would've been blindingly obvious even to third-party developers who knew little about cryptology. This could've been caught and fixed before the PlayStation 3 was ever released to the public, if Sony had just been dumb and not also stupidly paranoid.

The prahase "Epic Fail" gets way over used, but this time...

(As for the rest of the constants, the "pub" parameter is probably Sony's now uninteresting ECDSA public key. "erk" and "riv" are the secret parameters of the AES encryption method used to encrypt executables.)

wat
 

EightySix Four

Diamond Member
Jul 17, 2004
5,121
49
91
Lol exactly...I haven't taken any security classes yet

Da is the important part of the key, it should be incredibly difficult to figure out because K is supposed to be a random number and Da is part of the same function as K. Since Sony somehow failed to make K random, Da was easy to figure out. With this information, you can sign an executable which the PlayStation thinks was approved by Sony, including the firmware itself.

We'll pretend the key is X and the function is simply X = Da * K. X is a given and K should be random, making Da nearly impossible to figure out. Since it's not, solving it algebraically is a cake walk.
 
Last edited:

Dumac

Diamond Member
Dec 31, 2005
9,391
1
0
Da is the important part of the key, it should be incredibly difficult to figure out because K is supposed to be a random number and Da is part of the same function as K. Since Sony somehow failed to make K random, Da was easy to figure out. With this information, you can sign an executable which the PlayStation thinks was approved by Sony, including the firmware itself.

We'll pretend the key is X and the function is simply X = Da * K. X is a given and K should be random, making Da nearly impossible to figure out. Since it's not, solving it algebraically is a cake walk.

Sounds like a dumb mistake on Sony's part, but they make a lot of those so I am not surprised.
 

Ross Ridge

Senior member
Dec 21, 2009
830
0
0
Sounds like a dumb mistake on Sony's part, but they make a lot of those so I am not surprised.

To a certain point it understandable. The ECDSA signing algorithim actually require two random numbers. The first random number is the private key (Da) itself. That random number is only picked once. The second random number (K) needs to picked everytime something is digitally signed. So it's not hard to see some programmer thinking the second random number needs to picked only once, just like the first.

What is much less excusable is that this bug somehow escaped testing. It should've been obvious. The digital signature is a big long number that's supposed to look random. If there's any sort of pattern in how signatures are generated, like they're all even or the seventeenth digit is usually 0, then that means there's probably a vulnerabilty that can be exploited. In this case, Sony's code was generating digital signatures that looked like this:

Code:
806E078FA1529790CE1AAE02BADD6FAAA6AF74178BAEB115B68AE33CCD812CE8E85170BDA4F95417
806E078FA1529790CE1AAE02BADD6FAAA6AF741771CD1F2DD1DB19252804DE93E50E71A69C9D1FFB
806E078FA1529790CE1AAE02BADD6FAAA6AF7417304D6DE39A90746F858A505F0871DFA96FE14D8D
806E078FA1529790CE1AAE02BADD6FAAA6AF7417A3B32962F39E6D08C4EFAB2EC3605C8257A070AA

See a pattern there? Sony should have.
 

fitzm

Senior member
Mar 17, 2000
691
0
0
Last week I was in a MW2 game where the guy had 25 kills almost immediately and the nuke "sound" blasting the entire game without actually detonating. He fired AC130 ammo with hand-held weapons. It was actually pretty cool. I loved glitching out of maps way back when anyone had the same tactical chance to do so. When a game has been out for a while, who cares when a few new variables are added to the game-as long as everyone has the same opportunity to use them.
 

mugs

Lifer
Apr 29, 2003
48,924
45
91
Last week I was in a MW2 game where the guy had 25 kills almost immediately and the nuke "sound" blasting the entire game without actually detonating. He fired AC130 ammo with hand-held weapons. It was actually pretty cool. I loved glitching out of maps way back when anyone had the same tactical chance to do so. When a game has been out for a while, who cares when a few new variables are added to the game-as long as everyone has the same opportunity to use them.

You're one of those douches that we all hate to play against. Your attitude is beyond idiotic. Most of us don't want to play a glitched game, we enjoy playing the game as it was designed.
 

EightySix Four

Diamond Member
Jul 17, 2004
5,121
49
91
So it's not hard to see some programmer thinking the second random number needs to picked only once, just like the first.

Some random programmer? No, it's not hard to see them making a mistake... A (most likely) well paid security professional developing the security for a console Sony wants to last 10 years... It's pretty hard to imagine. I keep getting the feeling that this may have been done by someone on purpose, it is too big of a mistake.

Also, for those who think Sony can fix this, here's a quote from someone on Reddit with a great explanation why it can't be fixed:

When Sony creates a newer hardware revision with a different metldr key, they would have to issue 2 different firmware updates: one of the current hardware, and one for the new hardware. This is because if they update the metldr keys, all of the ldrs down the chain will need to be re-encrypted with the new key, and signed with the new key. (In theory, they could also publish a single unified update which decides which one to install at runtime.)

So assuming we have current hardware, with the currently known and leaked metldr key, and Sony publishes an update, we can:
Decrypt the update, and all levels of the firmware from lv0 downwards (we have the decryption key)
We can update any revocation list they provide, we can update any whitelist they provide, we can remove any signature checks they add.
We can re-encrypt the update (its symmetric, and we have the keys), and we can resign the update (we have the private ECDSA keys)
We can install our newly "hacked" update...

Lets say Sony tries to be smart and adds some self CRC/Hash calculation code to their new firmware:
We can decrypt the firmware
We can update the CRC calculation code to always return the correct expected value
We can encrypt, sign and install our hacked new firmware.
Sony can't tell the difference between a hacked firmware and a real one.

Let's say our user is dumb, has a current hardware PS3 and updated it to Sony's new firmware with a whitelist for old apps and a revokelist for old firmware, and newer firmware updates are signed with new PKI keys:
We can flash the flashrom (using a hardware flasher) with our own firmware since we have the metldr keys.
Alternatively a "modchip" can be installed beside the flashrom to provide the firmware code.
The console has to accept it because metldr will decrypt it and verify the signature.

This is what khrak is referring to when he says that its broken in an unfixable way.

There is absolutely nothing Sony can do short of updating metldr, or having some secret backup metldr with different keys to fix the issue on current hardware. Even with a backup metldr, geohot (who due to egotistic reasons has not revealed how he got the metldr keys) can probably recover the new metldr keys using whatever exploit he used again.
 
Last edited:

Ross Ridge

Senior member
Dec 21, 2009
830
0
0
Some random programmer? No, it's not hard to see them making a mistake... A (most likely) well paid security professional developing the security for a console Sony wants to last 10 years... It's pretty hard to imagine. I keep getting the feeling that this may have been done by someone on purpose, it is too big of a mistake.

Well, I've kinda wondered if this was some sort intential back door, but it's not too hard to see how it could've happened unintentially. That well paid security professional could've produced an impressive document describing PlayStation 3's proposed security system. All the details of ECDSA signing, AES encryption, the metldr and other levels security, and how they would all work together to keep the PlayStation 3 secure for its expected 10 year lifetime. Then that document gets handed over to some random programmer to actually implement.
 

Narmer

Diamond Member
Aug 27, 2006
5,292
0
0
Is Sony behind this fiasco or IBM? Last I heard, IBM was the brains behind the PS3's security system. If so, Sony should lawyer up.
 

EightySix Four

Diamond Member
Jul 17, 2004
5,121
49
91
So...where are the "tools" everyone was supposed to have like 2 weeks ago?

They're already out there if you know where to look, and someone has already written the first custom firmware which will launch unsigned homebrew only.

Is Sony behind this fiasco or IBM? Last I heard, IBM was the brains behind the PS3's security system. If so, Sony should lawyer up.

IBM's hypervisor was not broken.
 

EightySix Four

Diamond Member
Jul 17, 2004
5,121
49
91
Interestingly, I just looked it up, it features no piracy options.

Which is why I said homebrew only. All of the hacking groups are trying really hard right now to slow the onslaught of piracy.

Kakaroto (the creator of the firmware) said on his blog:

Since the kernel is left unmodified, this means that this custom firmware is really meant for future homebrew installation, and it will not allow piracy. I plan on keeping it that way.
 

RavenSEAL

Diamond Member
Jan 4, 2010
8,670
3
0
Which is why I said homebrew only. All of the hacking groups are trying really hard right now to slow the onslaught of piracy.

Kakaroto (the creator of the firmware) said on his blog:

Overflow said the same thing, now let's just see what the other 99.9% of people are going to do.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |