NathansFortune
Regular
The DNS method is only temporary. Sony close it off about a week or two after new firmware has been released. After that you have to be on the newest official or custom firmware.
The DNS method is only temporary. Sony close it off about a week or two after new firmware has been released. After that you have to be on the newest official or custom firmware.
The DNS only spoofs the PSN update servers. The actual PSN presence servers still allow for users on the previous firmware to connect for a week after a firmware update is released, then they disallow previous firmwares and only allow the newest firmware to connect.I don't get it. The DNS address he is using is from an old article which talks of FW 3.15 and 3.21 !!! He used that address and it worked. You mean that everytime a new FW is released this vulnerability opens up for a few weeks?
To their credit I think Sony are doing the right thing lately, despite some security mistakes, and those methods might actually help them stop piracy in the long run. Hopefully they can work things out and fight something very problematic that has negative implications for both the company, developers and publishers.That is the one solution that would not require either massive effort (and massive user inconvenience) or just going to new hardware: PS4, with no backward compatibility.
It would still be onerous to users... but if their serial licensing system is sufficiently secure... it's the only real option. Still won't solve all problems, but will alleviate the problem of rampant piracy.
I don't get it. The DNS address he is using is from an old article which talks of FW 3.15 and 3.21 !!! He used that address and it worked. You mean that everytime a new FW is released this vulnerability opens up for a few weeks?
Hi, I’m rms, a PS3 software/homebrew developer.
Well, I’ve been on EFnet for a while now, and I’ve seen many people asking about PS3 Custom Firmware 3.56, well, let me put it in a simple manner, it’s not possible thanks to what Sony did with their ECDSA (Elliptic Curve DSA) cryptography, and the new PUP format along with Cell-OS Lv2 having some extra checks on SELF files now.
See, when we used to get private keys for earlier fail ECDSA keyset revisions, a variable, r, in the ECDSA signature was static, thus allowing us to get the keys using the signature itself, now, Sony fixed this by making that variable random, so we can no longer use simple algebra to get the private key like before. Do note that to retrieve the older private keys, one needed to use 2 signatures, and simply compare them to get the private key. Now, for those who do not know about private keys and public keys and ERK/RIV, here’s a simple explanation: Private keys are used to create signatures, public keys are used to verify the signature’s authenticity. ERK/RIV is used to decrypt the encrypted SELF data.
The new PUP format has 2 extra files, one consists of a new tarball with spkg_hdr1 files, ensuring package integrity, so one can no longer create rehashed pups anymore. Until the spkg format is deciphered, and they can be resigned, one’s pretty much stuck with Official Firmware. Core OS also has some new additions, appldr now checks your SELF revision for NPDRM, and Lv2 selfs, they either must be whitelisted or use the new revision 0x0D keyset in 3.56. Lv2 now will also refuse to load older updater or Lv2diag.self files that do not use the 0x0D keyset. Core OS also has two new revoke lists, prog_srvk and pkg_srvk. They have yet to be fully inspected yet.
So, in the end, Sony pretty much fixed most of the fail, some’s still around though, go look for it. =)
Just to be clear, if the world's most powerful computer would take 2000 years, than 10,000 PS3's would clearly take more than a lifetime as 10,000 is not a patch on the world's most pweorful computer. It's also worth noting that something like the 2,000 year figure is just how long it would take to go through all possibilities, but not when the key may be found. It's like a lottery ticket - with a 1 in a million chance of winning, you'd expect to win once out of a million plays, but that once may come with the first ticket or the millionth or anywhere in between. Not that this pedantry on my part has anything to do with Sony sealing off this breach as well as is being reported.No. The new private key is properly protected. I have heard it would take the most powerful supercomputer in the world 2,000 years to brute force the key now. Even a distributed network of 10,000 PS3s would take longer than a lifetime to do it.
I don't understand how backwards compatibility is maintained with breached keys and homebrew signing is limited without a whitelist. If the old key still works in 3.56 for 3.55 and prior software, how can apps created with that key be denied access in 3.56?
Just to be clear, if the world's most powerful computer would take 2000 years, than 10,000 PS3's would clearly take more than a lifetime as 10,000 is not a patch on the world's most pweorful computer. It's also worth noting that something like the 2,000 year figure is just how long it would take to go through all possibilities, but not when the key may be found. It's like a lottery ticket - with a 1 in a million chance of winning, you'd expect to win once out of a million plays, but that once may come with the first ticket or the millionth or anywhere in between. Not that this pedantry on my part has anything to do with Sony sealing off this breach as well as is being reported.
I don't understand how backwards compatibility is maintained with breached keys and homebrew signing is limited without a whitelist. If the old key still works in 3.56 for 3.55 and prior software, how can apps created with that key be denied access in 3.56?
And i can't see a reason to upgrade to a 3.56CFW if this one allowes remote code execution as a security measure.
It means with OFW3.56, Sony can remotely execute arbitrary code on your PS3 without installing anything. For example when connecting to PSN, Sony can send a small piece of code to run locally to check if the various properties of the firmware are intact. And since they can easily change the "checker" code, it is much more difficult for hackers to fake the results.What does this mean and what is the difference from previous FW?
It means with OFW3.56, Sony can remotely execute arbitrary code on your PS3 without installing anything. For example when connecting to PSN, Sony can send a small piece of code to run locally to check if the various properties of the firmware are intact. And since they can easily change the "checker" code, it is much more difficult for hackers to fake the results.
Of course this is another potential security vulnerability by itself.
It means with OFW3.56, Sony can remotely execute arbitrary code on your PS3 without installing anything. For example when connecting to PSN, Sony can send a small piece of code to run locally to check if the various properties of the firmware are intact.
Interesting situation.
The 3.56 just the first step,currently the sony in the sharge of the fw update,but it have to get back the controle above the codes too.
For that they have to re-encrypt everything in the PSN,force everyone to re-download that,and create a new encryption method for the "run from the HDD" option.
So,it is still a lot of work.
From the other side,currently the biggest protection for the PS3 the blue-ray drive