Can anyone help/teach me USB reverse engineering for one of my little side projects? :) I bought two (old) passport readers for my decentralised identity project.
But asking them nicely can't hurt, can it?
This might be one of those occasions where live has a pleasant surprise for you 😃
What you are doing is in no way illegal, is it?
@silmaril Sure, once I have the devices here, I will ask nicely. But a lot of the software/knowledge for the 233RL is highly proprietary, possibly NDA covered and for full functionality of the RFID part I need a certificate that is only available to state authorities. So not expecting much :)
@silmaril And no, nothing illegal planned. I am mostly interested in using the same technology in use for normal passports/ID cards in my decentralised approach to identity. Kind of a truly open re-implementation, so to say.
Sounds like a worthwhile goal.
If I remember correctly, the certificate thing was part of the promise that this feature can't be abused by non-authorized people.
So we should hope you won't be able to acquire one 😉
@silmaril The only thing I want to read form a passport chip is the picture. And for that you don't need the certificate stuff. That's just BAC with some data from the MRZ as a key :) The certificate is needed to get to the fingerprints, for example. I have zero plans to go there.
@jwildeboer on Linux, start with lsusb using the -v option, you can see how the usb device is structured (configurations, inter|aces, endpoints).
Without drivers, unless they show up as something somewhat standard (say, a serial port over usb, or an hid device) it would be difficult to reverse engineer. Normally I would start by using a sniffer (usblyzer for windows for example) and see what the official driver is sending/receiving
@pulkomandy The RTE6701 is, due ti its simplicity, not a real challenge. I have the integration manual with the jumper settings etc. The 233RL however does a lot of things. The drivers are not publicly available and those readers are EOLed, AFAICS. So that is going to be more fun.
@pulkomandy Technically they are quite a combination. At the lowest level they seem to act like simple document scanners, with some special commands to switch between normal, UV and IR illumination. On top of that the RFID reader that seems to act like a normal PC/SC card device. A lot of the advanced features seem to be software based, not in the device itself.
@pulkomandy I got the devices used, so no full box. When new, they came with a driver/sw CD that even has a SDK for Linux. So hopefully I can find that driver CD someplace.
@jwildeboer Some links in Hack a day https://hackaday.com/2018/05/25/usb-reverse-engineering-a-universal-guide/ Good luck and may the source be with you. 😉
Mastodon instance for people with Wildeboer as their last name