MatthewL246 / pretendo-docker

An unofficial Docker Compose setup for self-hosting a Pretendo Network server.
https://matthewl246.github.io/pretendo-docker/
GNU Affero General Public License v3.0
54 stars 9 forks source link

Add Pretendo DNS support for hackless client deployment #74

Closed alexander-sil closed 5 months ago

alexander-sil commented 6 months ago

I would like to propose the addition of Pretendo DNS connection method support for homebrewless deployment of the client software complexa, as described here. Feel free to negotiate.

MatthewL246 commented 6 months ago

Thanks for the feature request! Support for SSSL is already on the roadmap, so I've linked that here.

MatthewL246 commented 5 months ago

SSSL support has been added! Check the Wii U connecting guide for the necessary steps to set that up.

alexander-sil commented 5 months ago

image

WDYM? Does this mean I have to dump NAND?

MatthewL246 commented 5 months ago

No, you don't need to dump your entire NAND. The easiest way is to simply copy the file using FTP.

alexander-sil commented 5 months ago

Browser exploit?

MatthewL246 commented 5 months ago

Oh, that's a great point. I didn't think of that. Yes, the person hosting the server does need to run homebrew software using the browser exploit once in order to start a FTP server to dump the certificate.

alexander-sil commented 5 months ago

Is it possible for some sort of non-invasive homebrewing using browser?

MatthewL246 commented 5 months ago

Yes, I would suggest using the old Mocha Online Exploit method, which only loads CFW temporarily and is the least invasive option because it doesn't permanently install anything. Then, you can download the FTPiiU Everywhere app from the Homebrew App Store in the Homebrew Launcher and use that to copy the certificate. Make sure that you're only copying the files from the Wii U to your computer and not modifying anything on the Wii U's hard drive because that is dangerous.

MatthewL246 commented 5 months ago

Now that I've thought about it some more, dumping the certificate isn't necessary. You can just visit https://account.nintendo.net/ (with HTTPS) in your browser and export the certificate as a DER. In Chrome, you can click on the "Not Secure" button in the address bar when you get to the "Privacy error" page, and you can select and export the "Nintendo CA - G3" certificate as CACERT_NINTENDO_CA_G3.der.

image image image

I am going to add this method to the guide.

alexander-sil commented 5 months ago

Any idea on how to make the SpotPass server CFW-free as well? I want to use your project for Wii U application development.

MatthewL246 commented 5 months ago

Unfortunately, I don't think that's possible. Creating new SpotPass content requires an encryption key that, as far as I know, is not available anywhere publicly and is not legal to redistribute.

MatthewL246 commented 5 months ago

The documentation site has been updated with hackless Nintendo CA G3 certificate download method. Thanks for letting me know about the issue!