Once upon a time, shutterbug2000 discovered nds-constrain't: a bug in Nintendo's NTR SSL library that allowed it's connections to be easily intercepted. This made it possible to connect to alternative online services without ROM patching.
The bug itself is simple: the NDS SSL library does not care whether or not a certificate is authorized to act as a certificate authority. This means that — with any valid certificate — we can sign whatever we want, even a certificate under a false hostname.
A guide to using this bug for fun and profit is now available on the official page, which is much better written than mine. However, you are free to keep reading this one.
Getting the Wii client certificate
As explained in the official page for nds-constrain't, the Wii client certificate is signed by Nintendo and considered valid. Therefore, we can use it's key to sign whatever we want. You could grab it from a Wii, but it is much easier to download it from Larsenv's page. You will want to use the link labelled "Wii NWC Prod 1", by the way.
Converting it to a useable format
The file is a PKCS12, and we can't do anything useful with it until we extract the certificate and the private key. Thankfully, this is pretty simple.
openssl pkcs12 -in WII_NWC_1_CERT.p12 -passin pass:alpine -passout pass:alpine -out keys.txt
That command will export the X.509 certificate and private key from the archive, and store the output in keys.txt. They can then be copied into their appropriate files, which I will name NWC.crt and NWC.key.
Signing your certificate
Instructions for this are listed on the official GitHub page, but I have copied
them for reference. If I remember correctly, the DS can only handle the SHA-1
and MD5 hash formats, so pay attention to the
openssl genrsa -out server.key 1024 openssl req -new -key server.key -out server.csr openssl x509 -req -in server.csr -CA NWC.crt -CAkey NWC.key -CAcreateserial -out server.crt -days 3650 -sha1
Your webserver probably wants the certificate chain as well, so let's generate that as well.
cat server.crt NWC.crt > server-chain.crt
We are ready to rock and roll!
Using your phony certificate
Once the SSL certificate is installed, you may run into issues connecting with your DS. This because your NDS only knows how to use SSLv3, with the SHA-1 or MD5 cipher sets. Enabling SSLv3 and SHA-1 isn't always possible with webservers, so I recommend using NGINX as a reverse-proxy. To enable DS compatibility for NGINX, add the following lines to your NGINX configuration.
ssl_protocols SSLv3; ssl_ciphers ECDHE-RSA-AES128-SHA;
Most services on Nintendo consoles make liberal use of headers. Because of this, some extra options need to be enabled.
underscores_in_headers on; proxy_pass_request_headers on;
Because we have enabled insecure SSL settings on NGINX, you probably don't want to use it for any mission-critical web applications. If you continue having issues with NDS connectivity, please contact me.
The possibilities are infinite. Want to run services through a debugging proxy? Implement WFC protocols? Make a Flipnote Studio server? All of this is possible without ROM patches!
After receiving some e-mails, I have learned that the NDS-supported ciphers have been disabled in OpenSSL versions past 1.0.2g, unless configured with "enable-weak-ssl-ciphers". This means that you may have to re-build NGINX (or mod_ssl for Apache) to get it working.
If you have the means, I suggest taking Wireshark captures to find the cause of any SSL issues. Enabling debug logging in NGINX can also help you pinpoint handshake errors. If all else fails, you can find my e-mail on the about page.
Articles from blogs that I like
Hello again! Another month of FOSS development behind us, and we’re back again to share the results. I took a week off at the end of June, so my progress this month is somewhat less than usual. Regardless, I have some updates for you, mainly in the domain of…
From Drew DeVault's Blog
Published on July 15, 2020
Ah standards, the dictatorship of a few cunts who have no real world experience defining how things should be done. Standards committees blunder forward making a huge mess that can never be fixed and we would have probably have been … Continue reading →
From DeadFish Shitware
Published on May 11, 2020
Foreword # Before I get called out, let me fully disclose that the title is a perfect example of clickbait, and in no way am I actually blaming a widely used technology or Keybase, due to my own lack of responsibility and lack of caution. With that being s…
Published on November 26, 2019
Generated with the spectacular power of openring