Welcome to the GSM-Forum forums. |
You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!
If you have any problems with the registration process or your account login, please contact contact us.
|BlackBerry (RIM) Blackberry phones discussion, firmwares, tutorial, media, repairs.|
| ||LinkBack||Thread Tools||Display Modes|
|07-22-2012, 09:50||#1 (permalink)|
No Life Poster
Join Date: Dec 2002
Thanked 49 Times in 36 Posts
truth about RTAS!
excerpt taken from what seems to be a write up by a RIM staff! in my bid to make some sense of all this nonsense i combed the internet and found this on the *********(serious minded guys over there by the way) and copied it . This should shed some light on the bricked newer BBs no one can obviously revive!
How RTAS works
The RTAS solution works by allowing the device (which only runs trusted code) to
authenticate against a trusted server within RIM before allowing any tools to connect.
This authentication process is based around a challenge-response system that makes use
of RSA asymmetric cryptography. The challenge issued by the device uses an encrypted
session key which can only be decrypted by the private key hidden in RTAS. The RTAS
server is secured, operated and controlled on-site at RIM. Any user wishing to use a
secured tool must login to the RTAS server, authenticate, and receive the decrypted
session key before access will be granted for any tool, on a per-use basis. Thus we take
the control away from the hostile PC environment and remove the security risk.
A connection to RTAS can only be established within RIMNET confines. To allow
carriers and other business partners to run limited commands and even provide RMA
services on devices at store fronts, web-based tools running on a DMZ will be
provisioned. This gives us huge potential to provide powerful tools to
selected business partners without the risks and concerns we had previously.
devices do not normally have RTAS challenges enabled (though they can be
manually enabled through
bugdisp). Collecting logs with bugdump, bugsimple or
does not require access to RTAS. RTAS is only required to decrypt the logs.
After decrypting the log in
wbugdisp, saving the log to disk will by default save a
decrypted version of the log. The RTAS challenge can also be disabled on a per device
basis to allow for offline development and testing.
|07-23-2012, 03:16||#4 (permalink)|
Join Date: Jul 2012
Location: Yogyakarta, ID
Thanked 45 Times in 21 Posts
|thread||Thread Starter||Forum||Replies||Last Post|
|FAQ about unlock n0kia||man0n||Nokia Legacy Phones ( DCT-1 , DCT-2 , DCT-3 , DCT-L )||6||11-29-2010 18:06|
|About 5110 & Winlock||GByte9||Nokia Legacy Phones ( DCT-1 , DCT-2 , DCT-3 , DCT-L )||2||11-08-1999 02:54|
|I am looking for information about GSM-CABLES.NE||DUPOND||Nokia Legacy Phones ( DCT-1 , DCT-2 , DCT-3 , DCT-L )||5||08-03-1999 15:29|
|need reference about spterminator&andreww bennet||king76||The Market Feed Back||3||08-03-1999 15:25|
|Question about 51xx/61xx||Comic||Nokia Legacy Phones ( DCT-1 , DCT-2 , DCT-3 , DCT-L )||1||07-06-1999 23:47|