13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8 - Reverse Engineering <strong>Xbox</strong> Security 135<br />

alternate ROM image is valuable for running production test programs<br />

using <strong>the</strong> native <strong>Xbox</strong> CPU. The physical structure of <strong>the</strong> <strong>Xbox</strong> LPC<br />

interface implementation allows users, as well as Microsoft’s contract<br />

manufacturer, to install a properly designed FLASH ROM override<br />

device without any soldering.<br />

Clearly, <strong>the</strong> ability to override <strong>the</strong> trust mechanism used in <strong>the</strong> <strong>Xbox</strong> has<br />

sticky legal implications. While my intent was mostly to satisfy my curiosity<br />

and secondly to run my own code on <strong>the</strong> <strong>Xbox</strong> under my fair-use rights,<br />

o<strong>the</strong>r people have a desire to copy games and to modify and redistribute<br />

Microsoft’s copyrighted kernel code. Because a cipher is blind to its application,<br />

<strong>the</strong> extraction of <strong>the</strong> RC-4 key enables all applications equally. As a<br />

result, I contacted <strong>the</strong> Electronic Frontier Foundation (EFF) to help me sort<br />

through <strong>the</strong> legal issues. The legal process is a slow and ponderous one. I<br />

had extracted <strong>the</strong> key in February, 2002, and it took until almost June before<br />

I was allowed to publish <strong>the</strong> results of my study in <strong>the</strong> appropriate<br />

academic forum.<br />

Never had I experienced so much ado over 128 bits. The Digital Millennium<br />

Copyright Act (DMCA) of 1998 has eternally changed <strong>the</strong> landscape<br />

of hardware hacking. Reverse engineering used to be a protected<br />

act, deemed part of what makes a marketplace healthy and competitive.<br />

Now, tinkering with and bypassing a cryptographic security system to<br />

exercise your fair-use rights in <strong>the</strong> privacy of your own home could serve<br />

you thousands of dollars of fines and lawsuits. I strongly recommend that<br />

you read Chapter 12, “Caveat Hacker,” so that you understand your legal<br />

rights and responsibilities.<br />

Security Through Obscurity<br />

The technique used by Microsoft in <strong>the</strong> first version of <strong>the</strong><br />

<strong>Xbox</strong> security is an excellent example of security through<br />

obscurity. A strong cipher, RC-4/128, was used to encrypt<br />

<strong>the</strong> ROM image in order to prevent people from analyzing<br />

<strong>the</strong> ROM contents or from creating <strong>the</strong>ir own ROMs. However,<br />

RC-4/128 is a symmetric cipher, which means that <strong>the</strong><br />

<strong>Xbox</strong> must contain a decryption key also usable as an<br />

encryption key. This decryption/encryption key is <strong>the</strong> important<br />

piece of information buried inside <strong>the</strong> secret boot<br />

ROM. Hiding this key is security through obscurity: once <strong>the</strong><br />

key is found, <strong>the</strong> cipher is moot and all security is lost.<br />

True security would require that <strong>the</strong> user have access to<br />

every single piece of <strong>the</strong> <strong>Xbox</strong> and still be unable to encrypt<br />

<strong>the</strong>ir own valid FLASH ROM image. This implies that<br />

some secret must be kept outside of <strong>the</strong> <strong>Xbox</strong>. Public-key<br />

cryptography was invented for precisely this scenario. If<br />

Microsoft had used a public-key cipher to encrypt or sign<br />

<strong>the</strong> <strong>Xbox</strong> boot code, <strong>the</strong>n knowing <strong>the</strong> entire contents of<br />

<strong>the</strong> secure boot ROM would be useless, since <strong>the</strong> main<br />

secret, Microsoft’s private key, remains safely out of our reach<br />

in a vault somewhere in Redmond, Washington.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!