Project

General

Profile

Actions

Emulator Issues #12019

closed

Improper handling of null bytes in encrypted setting.txt data

Added by Leseratte10 over 4 years ago. Updated over 4 years ago.

Status:
Fixed
Priority:
Normal
Assignee:
% Done:

0%

Operating system:
N/A
Issue type:
Bug
Milestone:
Regression:
No
Relates to usability:
No
Relates to performance:
No
Easy:
No
Relates to maintainability:
No
Regression start:
Fixed in:
5.0-11934

Description

Game Name?

Any game that tries to read stuff from the setting.txt

What's the problem? Describe what went wrong.

Take a look at the file Source/Core/Common/SettingsHandler.cpp, at the function SettingsHandler::Decrypt.

str is a pointer to the encrypted data, and the data uses a XOR shuffle with a rotating key.
Right at the beginning of the function is the while condition *str != 0 - which is true at the end of the file, but it's also true when there is a NULL byte in the middle of the encrypted data, which can happen - then, the decryption stops in the middle of the file and the decrypted data is incomplete.

See my comment on pull request 8673 for more information: https://github.com/dolphin-emu/dolphin/pull/8673#issuecomment-601696961

What steps will reproduce the problem?

Find a setting.txt that contains a nullbyte, decrypt using this function, notice that the decryption is wrong.
If necessary, I can provide such a file

Is the issue present in the latest development version? For future reference, please also write down the version number of the latest development version.

Yes, 5.0-11788

Is the issue present in the latest stable version?

Probably, but I can't test that since 5.0-stable doesn't work properly for me.

Actions #1

Updated by Leseratte10 over 4 years ago

This could probably be fixed by just replacing while (*str != 0) with while (1) and relying on the if condition in the function to terminate at the end, but I'm not 100% sure that that wouldn't cause other problems.

Actions #2

Updated by Leseratte10 over 4 years ago

I just tested replacing the condition with an endless loop, and it seems to work properly.
The decrypted data isn't null-terminated, which means, there will be a bunch of crap at the end of the decrypted data (and I don't see a way to detect that). But it does end with a newline.

And because the GetValue function starts from the beginning and returns the first match found, a bunch of additional junk data at the end of the string shouldn't matter.

Actions #3

Updated by Leseratte10 over 4 years ago

I just opened PR #8680 to fix this.

Actions #4

Updated by JosJuice over 4 years ago

  • Subject changed from settings.txt decryption / parsing code breaks for some files to setting.txt decryption breaks when encrypted data contains null byte
  • Status changed from New to Fix pending
Actions #5

Updated by JosJuice over 4 years ago

  • Status changed from Fix pending to Fixed
  • Fixed in set to 5.0-11803
Actions #6

Updated by Leseratte10 over 4 years ago

Unfortunately I have to ask you to open this issue again...

The three NANDs I imported yesterday to test the PR (which decrypts the whole buffer) worked perfectly, but now I found another NAND that results - what I first thought - in the same bug. But it's not actually the same bug:

I added a bunch of debug logging output to Dolphin, and everywhere in Dolphin's code the setting.txt is fine, non-corrupted, as it should be after all the fixes merged in the last few PRs. However the serial number the game sends to Wiimmfi was corrupted yet again, even though I saw nothing in the logs that could explain this.

Then I looked at how Dolphin sends the setting.txt or the data within to the game. Turns out Dolphin just stores the whole encrypted file at 80003800, and the game reads it from there and decrypts it on its own.

So far, so good.

HOWEVER, Nintendo actually made the same mistake that was in the setting.txt parsing code in Dolphin (can it really be labelled a "mistake" then if Nintendo does the same? :P ). The binary data that Dolphin copies to 80003800 is a perfectly valid setting.txt - and when I decode it manually, I get the proper content back. But when the GAME decodes the setting.txt (if anyone wants to look at the code, the related function "__SCF1" is in Mario Kart Wii PAL at address 801b2234), it ALSO assumes that a null byte in the encrypted data means "end of file" - the exact same wrong assumption Dolphin made.

So why did this bug (assuming 00 = eof) not affect real consoles, but only Dolphin?
Simple: Nintendo knew the bug, but it was probably too late to fix it.

What did they do? They made sure that if their generated setting.txt for a console would have included a NULL byte in the generated code, they added an arbitrary additional LF (line feed) character before the line, making sure the encrypted data looks "different" and that there is no NULL byte in the encrypted data. This is the explaination for the arbitrary additional line feeds that required the PR 8670: https://github.com/dolphin-emu/dolphin/pull/8670

What this means for Dolphin:
When Dolphin creates a setting.txt from scratch, it needs to make sure that the encrypted data doesn't contain a NULL byte. If it does, the plaintext data needs to be modified (by adding useless line feeds) and re-encoded until the encrypted data no longer contains a NULL byte.

That took me a while to figure out again ...
I'll see if I can somehow fix this issue in Dolphin easily, right now the encryption seems to be done in a kind of stream (every incoming byte is immediately encrypted), which doesn't allow this kind of modification. That means I would need to rewite that part so that the payload data is first collected in decrypted format, and then afterwards it can be encoded.

What a stupid mistake...

Actions #7

Updated by JosJuice over 4 years ago

  • Status changed from Fixed to Accepted
  • Fixed in deleted (5.0-11803)
Actions #8

Updated by JosJuice over 4 years ago

  • Subject changed from setting.txt decryption breaks when encrypted data contains null byte to Improper handling of null bytes in encrypted setting.txt data
  • Assignee set to JosJuice

I'll work on this if that's fine with you.

Actions #9

Updated by Leseratte10 over 4 years ago

Yeah, of course. Thanks.

Actions #10

Updated by Leseratte10 over 4 years ago

Thinking about that again, when that is fixed, we can probably go back to ending the parsing at the first encrypted null byte and no longer have to decrypt junk at the end of the file.

Actions #11

Updated by JosJuice over 4 years ago

I'm working on a fix right now, but what do we do in case the added LF in itself happens to encrypt to null? I was assuming that any problem could be handled by adding even more LFs at the beginning of the line, but this one can't.

Actions #12

Updated by Leseratte10 over 4 years ago

Good question. Maybe add a full newline? I mean, another CR-LF? Although I don't know if the game would like a full empty line in the middle of the data, we would need to verify that.

Actions #13

Updated by Leseratte10 over 4 years ago

Or add another LF earlier in the file?

Actions #14

Updated by JosJuice over 4 years ago

I ran a simulation, and apparently LF cannot be encoded into null for the first 0x100 bytes (which is the maximum possible size) due to the selected key.

Actions #15

Updated by Leseratte10 over 4 years ago

However what could happen would be that not adding a LF causes a null byte in a certain line, and adding a LF causes a null byte at another point in the same line. So it could still be possible that multiple LFs are needed, until there is no NULL byte in the whole data for the line, couldn't it?

Actions #16

Updated by JosJuice over 4 years ago

  • Status changed from Accepted to Fix pending
Actions #17

Updated by JosJuice over 4 years ago

Yes, my implementation (which I submitted as a PR just now) will add as many LFs as necessary.

Actions #18

Updated by Leseratte10 over 4 years ago

That fix is now pending since almost a month, is there anything I can do to get this merged soon-ish?

Actions #19

Updated by leoetlino over 4 years ago

  • Status changed from Fix pending to Fixed
  • Fixed in set to 5.0-11934
Actions

Also available in: Atom PDF