Hi Vasily,

in "what_we_know_so_far.txt", I explicitely marked all bulks that are changing among different runs. As I said: The bulks you considered:

>> Look at log you've send to me,
>> seq no 277, it's definitely non-encrypted data from sensor!
>> 0x49, 0x44, 0x02 - envelope?
>> 0x0d, 0x00, 0x00 - some multibyte command, no payload
>> 0xe0, 0x22, 0x02 - E-data from sensor, 4 bit per pixel. Exact data
>> starts from 0x22 byte, and looks like it's some 31-byte pattern:
>>
>> 2501 4892 a46d 93ec ff37 816c db7e 5b5a 1280 2449 da36 c9fe 7f13 c8b6 edb7 a5
>> Then after 0x222 bytes:
>> 0xde, 0x10, 0x00 - histogram data
>> After 0x10 bytes:
>> 0xdf, 0x06, 0x00 - authentication message
>>

...are not among them. So...

> Played a bit with my AES1660, and looks like this frame is not
> chaning... It does not matter
> if finger is on sensor...

...yes. They are always the same.


I updated the zip:
- eliminated the mistake in sniff description (upload->download of "bulk 583").
- added Petrs documentation (included zip file)

www.andreas-loos.com/aes1660.zip

One remark concerning Petrs tool: I could not really make it run on my machine. It contains also parts I do not agree with, for instance a "switch to raw" sequence which is in fact an exact copy of a part of what I sniffed in the win driver traffic. Hence there are two possibilities: The driver works in raw mode under windows (which is possible according to the last observations) or Petrs "switch to raw" does not what its name implies.

I did not have the time to produce new usb sniffs, for instance with covered scanner, but I will do in the next days.

Best,
andreas



On 15.11.2012 20:00, Vasily Khoruzhick wrote:
On Wed, Nov 14, 2012 at 1:51 PM, Vasily Khoruzhick <anars...@gmail.com> wrote:
On Wed, Nov 14, 2012 at 1:05 PM, Andreas <krawat...@andreas-loos.com> wrote:
Dear friends of AES1660,


here you find my analysis of what is happening in the usb traffic between
win driver and AES1660:

http://www.andreas-loos.com/AES1660.zip

The zip contains virtually anything I know so far. Vasily asked for usb logs
with complete traffic that can be compared. For this, take for instance log
2 (my favorite reference), log 5 and log 8.

The good news is that many commands seem to be not encrypted like in AES2550
(or was it AES2850?). To be CORRECT in detail: There *are* in fact lots of
encrypted commands, as Vasily remarks, but for them encryption is obviously
the same in each run. So I think, these parts can be easily reproduced as
black box.

The bad news is that we still cannot switch the thing into raw mode or know
anything about the encryption. (Thanks for your helpful comments, Vasily!
You are probably right, keys are probably not transferred unencrypted and
the 583 byte thing is surely not a single long key.)

Any ideas how to proceed?

Best,
andreas

Look at log you've send to me,
seq no 277, it's definitely non-encrypted data from sensor!
0x49, 0x44, 0x02 - envelope?
0x0d, 0x00, 0x00 - some multibyte command, no payload
0xe0, 0x22, 0x02 - E-data from sensor, 4 bit per pixel. Exact data
starts from 0x22 byte, and looks like it's some 31-byte pattern:

2501 4892 a46d 93ec ff37 816c db7e 5b5a 1280 2449 da36 c9fe 7f13 c8b6 edb7 a5

Then after 0x222 bytes:
0xde, 0x10, 0x00 - histogram data
After 0x10 bytes:
0xdf, 0x06, 0x00 - authentication message

Regards
Vasily

Played a bit with my AES1660, and looks like this frame is not
chaning... It does not matter
if finger is on sensor...

Andreas, could you send me Petr's version of test app?

Regards
Vasily


--
___________________________________
 Andreas Loos
 Kurt-Exner-Straße 6
 10249 Berlin

 http://www.andreas-loos.com
___________________________________

_______________________________________________
fprint mailing list
fprint@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/fprint

Reply via email to