Jump to content

MetalMario

Member
  • Posts

    21
  • Joined

  • Last visited

Posts posted by MetalMario

  1. Seeing that Kaphotics and Hozu have both viewed this thread

    If this is the case, I would like to express my interest in hosting the Pokécheck battle video database on my own server.

    Since I only finished my crawler 3 days before the close, I was only able to save 3564 Gen5 videos before the close. Since I recall you guys having in the tens of thousands of videos saved, it would be a great boon to the community to have some place to host them.

  2. But this exploit is for MITM only.

    Edit: And both client and server need to be vulnerable to allow for reading cleartext.

    Edit2: If we can modify the client then we don't even need an exploit to document the protocol. This is how custom DS wifi servers were made. So breaking TLS is moot if this is possible. (but certainly *not* moot for getting unmodified clients to connect)

  3. You've heard about my GTS?

    http://foundations-gts.cloudapp.net

    I've also got Generation IV battle videos cracked but Generation V ones have some kind of pseudo-SSL which is causing problems.

    I have a crawler for Generation IV battle videos running and I'll be adding them to my custom server once it's made.

    What would really help with my crawling is if anyone has a complete list of GTS country and region codes. I could build a list myself but it would take way longer than I have time for.

  4. They use a different CA for 3DS as opposed to DS and Wii. DS is also unpatchable and a Wii patch seems unlikely at this point. Since their official servers are shutting down, issuing a patch blocking all online activity seems especially troll and unlikely.

    As long as we don't attempt to crack (or at least release publicly) their 3DS CA's private key, it shouldn't prompt them to issue a patch. In absence of any bad key generation, cracking an 1024 bit RSA would take hundreds of years with current technology.

    Forging individual certificates is going to be much easier than breaking a private key.

  5. I'm not sure. I've seen the 3DS accept SHA256-RSA. My best guess is that the DS does accept MD5.

    The only significance is that MD5 computes faster so would be easier to use for a brute force preimage search.

    Again, not sure. I can difinitively say from my own testing though that 3DS titles do care about the subject field and not just being signed by the correct CA.

    Pipian will probably need to answer this. If the DS/Wii don't care very much about the subject then it might be possible to use the same (forged) certificate for both their authentication servers.

    I don't see any mention of Bitcoin in that article, where are you getting that part?

    I meant it as a generic term for lots of spare compute power that can be diverted from relatively useless tasks like bitcoin mining.

    The RSA common factors attack also requires that they did a bad job generating their key. This being Nintendo (in 2005), who knows.

    All this is idle speculation in absence of more facts.

  6. Question: Does the DS accept X.509 certificates using signing algorithms other than SHA1-RSA? Like perhaps MD5? Also, does it care what's contained in the subject or just that it's signed by Nintendo CA?

    Edit: Found this in a Google search for "factoring RSA":

    http://windowsontheory.org/2012/05/15/979/

    Basically, if either Nintendo CA's public key or that of any of the certificates they've signed share a common factor with any random public key we can find on the internet, it can be broken in a reasonable time if enough people have bitcoin mining clusters they're willing to lend.

  7. but if you change the NDS for things like the GTS doesn't that mean that it'll come from that other server?

    http://en.wikipedia.org/wiki/X.509

    In short, the DS can tell whether a server it visits is the official one or an impostor. (Impersonating the server perfectly would require a secret number kept in the basement of Nintendo HQ guarded by Magikoopas or something.)

    The reason we can fake the GTS is because Game Freak opted not to use those protections (SSL) for the GTS. But since they're still used for the login stage of connecting to the GTS, all fake GTSes will become inaccessible once Nintendo Wifi shuts down.

    One option is to get a flashcard and hack the ROM to turn off SSL. Pipian is working on a custom server which can be used in this way.

    The other is to defeat the DS's security on the serverside. This is hard but something I'm interested in.

  8. I'm really interested in figuring out whatever we can do to save online play. For the past two and a half weeks, I've been working on a full replacement for the GTS based on Project Pokémon's documentation and a lot of my own Wiresharking to fill in the blanks. Right now I have it working for Generation IV running off my laptop and have conducted a trade with it.

    https://github.com/mm201/pkmnFoundations/tree/master/gts

    NAS going down will of course stop it from working. :frown:

    I'm really optimistic we can find an SSL exploit. The GameSpy HTTP client they're using is already many years old. I'm just rather dumb stupid when it comes to disassembly. I'd rather stick to developing replacement servers but I'd be glad to lend a hand in any way.

    One of the other things I had been researching is Platinum's "upload a box" function. (It would be very cool to be able to Pokécheck 30 Pokémon at a time!) The data seems to be encoded with a rather crappy RNG with a period of 256 bytes. Cracking it (or hard coding the entire pad) wouldn't be difficult but I stopped when it became apparent that it wasn't sending entire pkm data anyway. It was only sending barely enough to display the teasers they show you.

×
×
  • Create New...