I am unable to move the ethics discussion where it belongs due to lack of privelages. I'll call in someone bigger.
George Hоtz said...
Ok, I figured out how to make iso loader. It will be ready in two hours.
January 26, 2010 9:24 AM
edit -waaait a little, that was posted from the fake "George Hоtz" account. Move along, nothing happened.
Mathieulh said early on that this seemed legit, that geohotz did get what he got. He was among the people questioning geohotz as to how exactly he was going to actually finish the job, to which geohotz would reply that he didn't need to, that all he had to do was control the SPUs.
I'm wondering, though. If he can create new hypervisor calls, can't he execute arbitrary code? Or is he mangling the existing calls somehow?
Somehow the 360´s story tells us something different, and so does the PC gaming. There is a good chance a hacked PS3 will be able to hide itself while the player spoils countless games for other people.You are entitled to how you feel but one discrepancy in your argument is in your first paragraph. How secure is the PC? What some of you choose to do is ignore all other examples and limit the scope of your thinking. A hacked PS3 will most likely be banned from ever going online, from ever affecting these fellow players you care about so much..
Didn´t pirated games more or less destroy the Dreamcast, how about the PSP, if games werent free for so many people how much money would Sony have made on this little device compared to what they do know?Those commenting on the possible losses from piracy need to take a look at the previously and still preferred dev platform which is the 360. Still successful (except for self inflicted problems with RROD) after how many years of being hacked?
A PS3 is sold at a loss, the first money Sony lost was people buying a cheap blu-ray player and Zero softwareYour last line is irrelevant. Leave your money in your pocket? So in the end you rather they don't make any contribution whatsoever to the gaming industry? Pirates buy games, not that they will be the only ones interested in a modded ps3 but your arguments seem to be geared mainly towards them.
Also I don't think sony went through all this to stop pirates, more like preventing the console being used for purposes beyond simple end-user tasks.
A hacked ps3 would definitely interest researchers and the like. Sorry to be off-topic but this thread seems to always go in the direction of ethics.
When geohot mentioned stopped SPUs in linux he meant they were idle, not disabled. When the BBC article mentioned ps2 games on the ps3 those were the words of the author. Notice no quotations.
You really should give him more credit. Most of you are making claims based on theory while he is working directly with the hardware.
I have no idea how typical hardware hacks is performed, but this sounds really clever.The hack seems to exploit specific timing condition that can be altered with Sony's software tweaks.
Not really. If he can insert arbitrary hypervisor methods, what's stopping him from loading arbitrary code? I'm holding him to the same standard as before, I want to see something.
Altough it's nice to capture all these HV calls and stuff from a plain (not encrypted) lv1 binary, but this will never lead to a hacked PS3.
Let's have a look.
The major security architecture on the PS3 is called the "Secure Processing Vault" and is the most important thing regarding "hacking" the PS3.
There is NO WAY for the PPU or even the HV to gain access to the SPU, which is an application running inside of an isolated SPU.
Well you can kick out the isolated SPU, like geohot mentioned, but this gives you nothing, as ALL the encryption and execution of applications (HDD encryption, app encryption, decryption, executing, signature checking, root key extraction) happens inside the isolated SPU.
To run homebrew on the PS3 you would have to reassemble the whole functionality from the SPU inside a binary running on the PPU.
For this you will need the root key. The root key is stored in hardware (not even close to the things on the iPhone). The root key cannot be extracted by any software or hardware means and is essential to ALL encryption/decryption, executing and checking routines.
The only way to get the root key is inside of an isolated SPU, as it is kick-starting the hardware encryption facility. There is no other way to do that !
Let's just assume that geohot or some other guys are able to break into the local store of the isolated SPE. There they will just find some encrypted binaries.
The key for decryption is encrypted by the root key !
You won't get anywhere without the root key.
Let's assume that someone managed to do all those stuff from the isolated SPU on the PPU and creates a CFW.
There is still a secure booting environment. The first module loaded/bootet is integrity checked by the hardware crypto facility utilizing the root key. So you have also to address this booting stuff. Again, no root key, no booting.
So there's always runtime patching you might ask ? Not possible on the PS3 because the hardware crypto facility is able to check the signatures whenever it wants to. And which part is responsible for this ? Exactly, the isolated SPU.
So if you kick out the isolated SPU the system will not boot/run anymore.
The PS3 is neither an PSP nor an iPhone. It's the most secure system architecture of this time !
The girl behind this stuff, Kanna Shimizu, is not somebody. Messing around with this is not like saying Bruce Schneier is a n00b.
Btw.: forget about all those stories, that certain hackers are or will be employed by SONY. That's nothing more than another urban legend.
@geohot It is OBVIOUS that the HV is PPC. The Cell BE is a PPC architecture, you know ;-) Better read those IBM papers in first place !
- iQD
Kanna Shimizu
Cell Broaband Engine Security Architect
PhD Stanford
MSc. Computer Science from Oxford University
Not sure if already posted:
PS3 is hacked - The urban legend continues
So there you have it. As many people figured geohotz is a bit of an amateur.
Here is 'SOMETHING"
Here is 'SOMETHING"
"Now go have some fun with it"
Also, is the root key inherent to the isolated SPU somehow? Or does it load it from a different location? It seems odd to say that nothing either software or hardware will ever extract the key.
Because of the root key's importance in keeping all other keys hidden, it must be robustly protected. The Cell BE processor accomplishes this with its Hardware Root of Secrecy. The root key is embedded in the hardware, and you cannot access it with software means; only a hardware decryption facility has access to it. This makes it much more difficult for software to be somehow manipulated so that the root key is exposed, and of course, the hardware functionality cannot be changed so that the key is exposed.
Furthermore, the activation of the hardware decryption using this root key is tightly integrated with the SPE isolation mode. When an SPE enters isolation mode, the hardware decryption facility is kick-started to fetch the encrypted data into the isolated SPE and decrypt the data using the hardware root key. The decrypted data is placed within the protected Local Store and is available for an isolated SPE application to use. In fact, the decryption based on the root key can only happen within an isolated SPE and not outside of it; no access to the root key is available, by hardware or software means, from a non-isolated SPE or the PPE.
what exactly is geohot claiming? It sounds as if he's saying he doesn't need the hardware key because he can trick the isolated SPU into decrypting code sent by the PPE that is fully under his control?
Nope, when an SPU enters "isolated mode" a part of the LS is locked from all direct access to the outside and the master decryption/authentication code, data and root-key is loaded. Until you compromise the isolated SPU from the inside it stays that way, it should be however possible (but probably still hard) to peek at the remaining LS.the hardware decryption facility is kick-started to fetch the encrypted data into the isolated SPE and decrypt the data using the hardware root key
Seems the root key is not directly exposed to the isolated SPU. Instead it have some form of "smart" dma what can decrypt the data on the fly.