2
First let me explain that extracting the certificates from Haxorware from the Baseline Privacy tab do NOT work, (either from the .tar or by downloading certificates separately). You will need to extract them from the 32 KB nonvol or 2MB dump. So please make sure you always keep a backup of your modem at all times. Here's why: The length of the keys (in hex) when you extract them from haxorware are as follows: 1. public.key 8B 2. private.key 289 3. root.key 10D 4. cm_cert.key 326 5. ca_cert.key 403 This is actually incorrect. If you use the nonvol explorer and extract the keys from your nonvol, the lengths will be as so: 1. public.key 8D 2. private.key 289 3. root.key 110 4. cm_cert.key 32F 5. ca_cert.key 409 These inconsistencies will give rise to this error when trying to start BPI: [ERROR] [DOCSIS.BPI(pid=267)]: Decrypt Auth Key: Couldn't format PKCS#8 private key into PKCS#1 format! This is a step-by-step tutorial on how to both extract the needed keys from your SB5101 running Haxorware and import them into your SB6120 with shelled firmware. 1) Open Haxorware on your SB5101 and go to backup tab. Select download nonvol (32 KB). This will download a nonvol.bin file. 2) Get the nonvol explorer program (cmnonexp.exe) by qingpu. Version 1.1.1 -> (google search) 1 of 2 Grab and Convert Certs from sb5101 to sb6120

How to Grab Certs From Motorola SB5101 to use on the SB6120 modem

Embed Size (px)

DESCRIPTION

A tutorial showing you how to grab your needed certificates from your Sb5101 modem to insert them into your SB6120 modem for Forceware or SBH Alpha 1.1 firmwares. Easiest way to go from DOCSIS 2.0 to DOCSIS 3.0!!

Citation preview

Page 1: How to Grab Certs From Motorola SB5101 to use on the SB6120 modem

First let me explain that extracting the certificates from Haxorware from the Baseline Privacy tab do NOT work, (either from the .tar or by downloading certificates separately). You will need to extract them from the 32 KB nonvol or 2MB dump. So please make sure you always keep a backup of your modem at all times.

Here's why:

The length of the keys (in hex) when you extract them from haxorware are as follows:

1. public.key 8B2. private.key 2893. root.key 10D4. cm_cert.key 3265. ca_cert.key 403

This is actually incorrect. If you use the nonvol explorer and extract the keys from your nonvol, the lengths will be as so:

1. public.key 8D2. private.key 2893. root.key 1104. cm_cert.key 32F5. ca_cert.key 409

These inconsistencies will give rise to this error when trying to start BPI:[ERROR] [DOCSIS.BPI(pid=267)]: Decrypt Auth Key: Couldn't format PKCS#8 private key into PKCS#1 format!

This is a step-by-step tutorial on how to both extract the needed keys from your SB5101 running Haxorware and import them into your SB6120 with shelled firmware.

1) Open Haxorware on your SB5101 and go to backup tab. Select download nonvol (32 KB). This will download a nonvol.bin file.

2) Get the nonvol explorer program (cmnonexp.exe) by qingpu. Version 1.1.1 -> (google search)

1 of 2

Grab and Convert Certs from sb5101 to sb6120

Page 2: How to Grab Certs From Motorola SB5101 to use on the SB6120 modem

3) Place nonvol.bin and cmnonexp.exe in same folder. Open CMD and navigate to that folder. Run "cmnonexp.exe -e -f nonvol.bin". This will extract 5 files and they will appear in the folder with these names:non01_1_public.keynon01_2_private.keynon01_3_root.keynon01_4_cm_cert.cernon01_5_ca_cert.cer

4) Rename them as follows:non01_1_public.key -> mfg_key_pub.binnon01_2_private.key -> cm_key_prv.binnon01_3_root.key -> root_pub_key.binnon01_5_ca_cert.cer -> mfg_cert.cerNo need to rename cm_cert.cer

5) Setup FTP server. Set the directory to whatever has those files you just renamed.

6) In SB6120 shell, navigate to "cd /nvram/1/security". Use the "ls" command to list the contents and you should see the certs in there already.

7) Remove the links to the files in there by using:rm mfg_key_pub.binrm cm_key_prv.binrm root_pub_key.binrm mfg_cert.cerrm cm_cert.cer

8) Download the new ones (assuming your FTP server has no user/pass and using port 21, adjust accordingly):wget ftp://192.168.100.2/mfg_key_pub.binwget ftp://192.168.100.2/cm_cert.cerwget ftp://192.168.100.2/mfg_cert.cerwget ftp://192.168.100.2/cm_key_prv.binwget ftp://192.168.100.2/root_pub_key.bin

9) CHMOD the new fileschmod 444 mfg_key_pub.binchmod 444 cm_cert.cerchmod 444 mfg_cert.cerchmod 444 cm_key_prv.binchmod 444 root_pub_key.bin

Regardless if you need the root cert or not this method can be used for all 5 and works fine. I have confirmed that BPI+ works using this method with the matching MAC of course. 

www.modempremodz.net

2 of 2