This commit is contained in:
Jonathan Barrow 2024-02-21 19:27:01 -05:00
commit ec64dff4f2
No known key found for this signature in database
GPG Key ID: E86E9FE9049C741F

View File

@ -1,10 +1,10 @@
# SSSL - Hackless SSL bypass for the Wii U
<center>
<div align="center">
<img src="shutter.png">
<br>
<br>
</center>
</div>
On March 1, 2021 Nintendo released Wii U firmware version [5.5.5](https://wiiubrew.org/wiki/5.5.5). This update updated the Wii U's SSL verification and recompiled all RPLs (though no code changes were made). The exact purpose for this update is unknown, as nothing of significance was changed, and no other changes were made in this update. With the changes to SSL verification, Nintendo introduced a bug which allows for the forging of SSL certificates. These forged certificates will be seen as "Nintendo Signed" and, due to an existing bug with how the Wii U handles CA common names, will be accepted by all domains.
@ -34,4 +34,4 @@ This script takes in a PEM encoded copy of Nintendo CA - G3 and does the above p
## Credits
- Shutterbug for actually finding the new verification bug
- Jemma and Quarky for decompiling the updated SSL functions
- Jemma and Quarky for decompiling the updated SSL functions