Yup, afraid so. I'm going deep into it now. Some helps might be great!It's currently not working because sony updated the method they use to communicate with the psvita, hopefully there not using a SSL cert, better yet knowing sony it might be plain text.
Updated Info:
It doesn't seem to have any SSL connection in my early findings, but somehow i ended-up at:
* NP0001-NPXS10002_00-VTSTORELIVEAREA0 PKG file, which contains (based on Yifan's file list):
Code: Select all
vs0:app/NPXS10002/eboot.bin
vs0:app/NPXS10002/sce_sys/icon0.png
vs0:app/NPXS10002/sce_sys/livearea/contents/bg0.png
vs0:app/NPXS10002/sce_sys/livearea/contents/bg1.png
vs0:app/NPXS10002/sce_sys/livearea/contents/default_gate.png
vs0:app/NPXS10002/sce_sys/livearea/contents/template.xml
vs0:app/NPXS10002/sce_sys/param.sfo
vs0:app/NPXS10002/sce_sys/pic0.png
vs0:app/NPXS10002/store_browser_plugin.rco* list_launch_vita.dat
* list_launch_emu.dat
I believe the PKG is the PSN store itself, and the encrypted DAT files are used to limit/control the PSV. And these files are upgraded to PSV (when launching PSN sign-in / PSN store bubble) since 10th April 2015. If someone able to hold the older version (v3.36 in this case) of the PKG and 3 DAT files on your PSV with VUB --block-traffic parameter or hosting them with your own local web server and DNS server tricks, I believe the PSN store and System Activation will be still working. Yifanlu did mention the PSN store doesn't use the PSV proxy setting, it uses direct connection with SSL encryption (that's why Transparent Proxy environment is very important). I had also confirmed that it is truth during my analysis on sigining-in PSN store, example of SSL/TLSv1 packets:
Code: Select all
1 10.10.1.58 -> 173.230.217.226 TCP 78 58852 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=1 SACK_PERM=1 TSval=0 TSecr=0
2 173.230.217.226 -> 10.10.1.58 TCP 74 443 58852 [SYN, ACK] Seq=0 Ack=1 Win=4050 Len=0 MSS=1350 TSval=XXXXXXXXXX TSecr=0 SACK_PERM=1
3 10.10.1.58 -> 173.230.217.226 TCP 66 58852 443 [ACK] Seq=1 Ack=1 Win=65535 Len=0 TSval=1 TSecr=XXXXXXXXXX
4 10.10.1.58 -> 173.230.217.226 SSL 122 Client Hello
5 173.230.217.226 -> 10.10.1.58 TLSv1 1404 Server Hello
6 173.230.217.226 -> 10.10.1.58 TLSv1 925 Certificate
7 10.10.1.58 -> 173.230.217.226 TCP 66 58852 443 [ACK] Seq=57 Ack=2198 Win=63589 Len=0 TSval=2 TSecr=XXXXXXXXXX
8 10.10.1.58 -> 173.230.217.226 TLSv1 384 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
9 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [ACK] Seq=2198 Ack=375 Win=4424 Len=0 TSval=XXXXXXXXXX TSecr=2
10 173.230.217.226 -> 10.10.1.58 TLSv1 117 Change Cipher Spec, Encrypted Handshake Message
11 10.10.1.58 -> 173.230.217.226 TLSv1 1231 Application Data
12 10.10.1.58 -> 173.230.217.226 TLSv1 319 Application Data
13 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [ACK] Seq=2249 Ack=1540 Win=5589 Len=0 TSval=XXXXXXXXXX TSecr=3
14 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [ACK] Seq=2249 Ack=1793 Win=5842 Len=0 TSval=XXXXXXXXXX TSecr=3
15 173.230.217.226 -> 10.10.1.58 TLSv1 335 Application Data
16 10.10.1.58 -> 173.230.217.226 TLSv1 95 Encrypted Alert
17 10.10.1.58 -> 173.230.217.226 TCP 66 58852 443 [FIN, ACK] Seq=1822 Ack=2518 Win=65535 Len=0 TSval=3 TSecr=XXXXXXXXXX
18 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [ACK] Seq=2518 Ack=1822 Win=5871 Len=0 TSval=XXXXXXXXXX TSecr=3
19 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [FIN, ACK] Seq=2518 Ack=1822 Win=5871 Len=0 TSval=XXXXXXXXXX TSecr=3
20 173.230.217.226 -> 10.10.1.58 TCP 66 443 58852 [ACK] Seq=2519 Ack=1823 Win=5871 Len=0 TSval=XXXXXXXXXX TSecr=3
21 10.10.1.58 -> 173.230.217.226 TCP 66 58852 443 [ACK] Seq=1823 Ack=2519 Win=65535 Len=0 TSval=4 TSecr=XXXXXXXXXXCode: Select all
vs0:data/external/cert/CA_LIST.cer