Difference between revisions of "Jailbreak (S5L8920+)"

From The iPhone Wiki
Jump to: navigation, search
(iPad)
m
 
(33 intermediate revisions by 7 users not shown)
Line 1: Line 1:
When the [[N88ap|iPhone 3GS]] was initially released, Apple did not have enough time to fix the [[0x24000 Segment Overflow]] in the [[S5L8920 (Bootrom)|S5L8920]]. However, in order to flash an exploited [[LLB]] and jailbreak the iPhone 3GS, '''one''' of the following needed to be done:
+
When the [[N88AP|iPhone 3GS]] was initially released, Apple did not have enough time to fix the [[0x24000 Segment Overflow]] in the [[S5L8920]]. However, in order to flash an exploited [[LLB]] and jailbreak the iPhone 3GS, '''one''' of the following needed to be done:
 
* Find a new [[iBoot]] exploit every time a new firmware is out.
 
* Find a new [[iBoot]] exploit every time a new firmware is out.
 
* Find a way to bypass the [[ECID]] checks.
 
* Find a way to bypass the [[ECID]] checks.
 
* Use a bootrom exploit that allows unsigned code execution via USB.
 
* Use a bootrom exploit that allows unsigned code execution via USB.
   
Newer devices (iPhone 3GS with [[iBoot-359.3.2|new bootrom]], [[N18ap|iPod touch 3G]], and subsequent devices) are no longer vulnerable to the [[0x24000 Segment Overflow]] exploit. Many of them are susceptible to geohot's bootrom exploit (originally found in [[limera1n]]), which allows unsigned code execution over USB. Even newer devices, starting with the [[iPad 2]], have no bootrom exploits to run unsigned code ''at all''.
+
Newer devices (iPhone 3GS with [[Bootrom 359.3.2|new bootrom]], [[N18AP|iPod touch (3rd generation)]], and subsequent devices) are no longer vulnerable to the [[0x24000 Segment Overflow]] exploit. Many of them are susceptible to geohot's bootrom exploit (originally found in [[limera1n]]), which allows unsigned code execution over USB. Even newer devices, starting with the [[iPad 2]], have no bootrom exploits to run unsigned code ''at all''.
   
 
==ECID==
 
==ECID==
Apple added a new tag to the [[IMG3 File Format]] called ECID. The ECID is ''unique'' to each phone, and its signature is being checked. With this method, Apple attempts to block downgrades once newer firmware becomes available, unless you have a dump of your old firmware's unique IMG3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered jailbreaks, because such exploits will be closed in new firmwares. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].
+
Apple added a new tag to the [[IMG3 File Format]] called ECID. The ECID is ''unique'' to each phone, and its signature is being checked. With this method, Apple attempts to block downgrades once newer firmware becomes available, unless you have a dump of your old firmware's unique IMG3 or signed certificate. Therefore, [[iBoot (Bootloader)|iBoot]] exploits won't be so useful for [[tethered jailbreak]]s, because such exploits will be closed in new firmwares. [http://iphonejtag.blogspot.com/2009/06/ecid-field-downgrades-no-dice.html].
   
The issue with this is that, even with the [[0x24000 Segment Overflow]] still in bootrom, an [[iBoot]] exploit was still needed to actually flash the exploited [[LLB]]. Apple uses this ECID stuff to block downgrading iBoot to a vulnerable version. It was resolved when Geohot released his [[limera1n]] tool, which used a bootrom exploit to upload an unsigned iBoot. Still the problem remains with newer devices with [[0x24000 Segment Overflow|0x24000]] fixed - tampering with firmware makes such jailbreak tethered unless some other exploit is used.
+
The issue with this is that, even with the [[0x24000 Segment Overflow]] still in [[bootrom]], an iBoot exploit was still needed to actually flash the exploited [[LLB]]. Apple uses this ECID stuff to block downgrading iBoot to a vulnerable version. It was resolved when Geohot released his [[limera1n]] tool, which used a bootrom exploit to upload an unsigned iBoot. Still the problem remains with newer devices with the [[0x24000 Segment Overflow]] fixed - tampering with firmware makes such jailbreak tethered unless some other exploit is used.
   
 
There are methods to help keep your downgrading ability, though.
 
There are methods to help keep your downgrading ability, though.
   
  +
* If it receives your ECID, saurik's servers will actively cache the necessary files. [http://www.saurik.com/id/12#howto Instructions] to use the servers are available.
* If it was cached prior to 3.1's release, 3GS owners were able save a file which contains the signature of the 3.0 [[iBSS]] containing their [[ECID]], using the [http://purplera1n.com/ purplera1n website]. A tool has not been created to incorporate this file into a fully signed iBSS, however.
 
* Saurik's servers are actively caching the necessary files. [http://www.saurik.com/id/12#howto Instructions] to use the servers are included.
 
 
* The [[SHSH]] associated with an ECID can be also saved by running [[TinyUmbrella]]. [[TinyUmbrella]] allows the user to restore to whatever version is associated with that [[SHSH]] file permanently. This is based on the aforementioned service [[Saurik]] provides remotely from [[Cydia Server|his server(s)]].
 
* The [[SHSH]] associated with an ECID can be also saved by running [[TinyUmbrella]]. [[TinyUmbrella]] allows the user to restore to whatever version is associated with that [[SHSH]] file permanently. This is based on the aforementioned service [[Saurik]] provides remotely from [[Cydia Server|his server(s)]].
   
==Jailbreak tools ==
+
== Jailbreak Tools ==
  +
{{main|Jailbreak#Jailbreak Tools}}
===[[K66ap |Apple TV 2G]]===
 
'''NOTE:''' The version in parentheses is what the Apple TV reports on TV.
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="5"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 4.1 (4.0)
 
|style="width:100px;"| 4.2 (4.1)
 
|style="width:100px;"| 4.2.1 (4.1.1)
 
|style="width:100px;"| 4.3 Build 8F191m (4.2)
 
|style="width:100px;"| 4.3 Build 8F202 (4.2.1)
 
|-
 
| [[limera1n]]
 
| {{partial|no package management GUI}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[sn0wbreeze]]
 
| {{partial|no package management GUI}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|2.5}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{partial|no package management GUI}}
 
| {{no}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[PwnageTool]]
 
| {{partial|no package management GUI}}
 
| {{partial|Restore from a custom firmware with unofficial bundle<sup>1</sup>}}
 
| {{yes|4.2}}
 
| {{no}}
 
| {{yes|4.3}}
 
|-
 
| [[Seas0nPass]]
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{no}}
 
| {{yes|0.7.4 (Mac)<br />
 
0.3.7 (Windows)}}
 
|-
 
|}
 
<sup>1</sup> [[Tethered jailbreak]].
 
   
  +
[[Category:Jailbreaking]]
===[[K48ap|iPad]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="7"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 3.2
 
|style="width:100px;"| 3.2.1
 
|style="width:100px;"| 3.2.2
 
|style="width:150px;"| 4.2.1
 
|style="width:100px;"| 4.3
 
|style="width:100px;"| 4.3.1
 
|style="width:100px;"| 4.3.2
 
|-
 
| [[Spirit]]
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Star]]
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[limera1n]]
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{no}}
 
| {{no}}
 
| {{yes|RC4}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[redsn0w]]
 
| {{no}}
 
| {{no}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14 or 0.9.7b6<sup>1 2</sup>}}
 
| {{yes|0.9.6rc14<sup>1</sup>}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
|-
 
| [[PwnageTool]]
 
| {{no}}
 
| {{no}}
 
| {{yes|4.1.3}}
 
| {{yes|4.2}}
 
| {{no}}
 
| {{yes|4.3}}
 
| {{yes|4.3.2}}
 
|-
 
| [[sn0wbreeze]]
 
| {{no}}
 
| {{no}}
 
| {{yes|2.1}}
 
| {{yes|2.2}}
 
| {{yes|2.3b4<sup>1</sup>}}
 
| {{yes|2.5}}
 
| {{yes|2.6}}
 
|}
 
<sup>1</sup> [[Tethered jailbreak]].
 
 
<sup>2</sup> If [[SHSH]]s were saved for iOS 4.2b3 and if you have a developer access to its IPSW, [[Jailbreak Monte]] can be used.
 
 
=== [[iPad 2]] ===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
! rowspan="2"| [[Jailbreak]] Tool
 
!colspan="3"| Works with [[firmware]]...
 
|-
 
|style="width:90px;"| 4.3
 
|style="width:90px;"| 4.3.1
 
|style="width:90px;"| 4.3.2
 
|-
 
|}
 
 
===[[N88ap|iPhone 3GS]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="13"| Works with [[firmware]]...
 
|-
 
|style="width:90px;"| 3.0
 
|style="width:90px;"| 3.0.1
 
|style="width:90px;"| 3.1
 
|style="width:90px;"| 3.1.2
 
|style="width:90px;"| 3.1.3
 
|style="width:90px;"| 4.0
 
|style="width:90px;"| 4.0.1
 
|style="width:90px;"| 4.0.2
 
|style="width:90px;"| 4.1
 
|style="width:90px;"| 4.2.1
 
|style="width:90px;"| 4.3
 
|style="width:90px;"| 4.3.1
 
|style="width:90px;"| 4.3.2
 
|-
 
| [[purplera1n]]
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[redsn0w]]
 
| {{yes|0.8}}
 
| {{yes|0.8}}
 
| {{yes|0.9.2<sup>1</sup> or 0.9.3<sup>1</sup>}}
 
| {{yes|0.9.2<sup>1</sup> or 0.9.3<sup>1</sup>}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14<sup>1</sup>}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
|-
 
| [[blackra1n]]
 
| {{no}}
 
| {{no}}
 
| {{yes|Yes<sup>1</sup>}}
 
| {{yes|Yes<sup>1</sup>}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Spirit]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Star]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[PwnageTool]]
 
| {{no}}
 
| {{no}}
 
| {{partial|Restore from a custom firmware<sup>2</sup>}}
 
| {{yes|3.1.4<sup>2</sup>}}
 
|colspan="2" {{partial|Restore from a custom firmware<sup>2</sup>}}
 
|colspan="2" {{partial|Restore from a custom firmware with unofficial firmware bundle<sup>2</sup>}}
 
| {{yes|4.1.3}}
 
| {{yes|4.2}}
 
| {{yes|4.2<sup>1</sup><sup>3</sup>}}
 
| {{yes|4.3}}
 
| {{no}}
 
|-
 
| [[sn0wbreeze]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|2.0.2<sup>1 2</sup>}}
 
| {{yes|2.0.2<sup>1 2</sup>}}
 
| {{yes|2.0.2<sup>1 2</sup>}}
 
|colspan="2" {{yes|2.0.2<sup>1 2</sup>}}
 
| {{yes|2.1}}
 
| {{yes|2.2}}
 
| {{yes|2.3b4<sup>1</sup>}}
 
| {{yes|2.5}}
 
| {{yes|2.6}}
 
|-
 
| [[limera1n]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|RC4}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|}
 
<sup>1</sup> [[Tethered jailbreak]] on devices with the [[iBoot-359.3.2|new bootrom]].
 
 
<sup>2</sup> Only applicable for devices with the [[iBoot-359.3|old bootrom]]. Requires the device to have signature checks disabled (pwned).
 
 
<sup>3</sup> Requires an unofficial firmware bundle.
 
 
===[[N90ap|iPhone 4 (GSM model)]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="8"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 4.0
 
|style="width:100px;"| 4.0.1
 
|style="width:100px;"| 4.0.2
 
|style="width:100px;"| 4.1
 
|style="width:100px;"| 4.2.1
 
|style="width:100px;"| 4.3
 
|style="width:100px;"| 4.3.1
 
|style="width:100px;"| 4.3.2
 
|-
 
| [[Star]]
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[limera1n]]
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|RC4}}
 
| {{yes|RC5.1}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[redsn0w]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14 or 0.9.7b6<sup>1 2</sup>}}
 
| {{yes|0.9.6rc14<sup>1</sup>}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
|-
 
| [[PwnageTool]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|4.1.3}}
 
| {{yes|4.2}}
 
| {{yes|4.2<sup>1 3</sup>}}
 
| {{yes|4.3}}
 
| {{yes|4.3<sup>1 3</sup>}}
 
|-
 
| [[sn0wbreeze]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|2.1}}
 
| {{yes|2.2}}
 
| {{yes|2.3b4<sup>1</sup>}}
 
| {{yes|2.5}}
 
| {{yes|2.6}}
 
|}
 
<sup>1</sup> [[Tethered jailbreak]].
 
 
<sup>2</sup> If [[SHSH]]s were saved for iOS 4.2b3 and if you have a developer access to its IPSW, [[Jailbreak Monte]] can be used.
 
 
<sup>3</sup> Requires an unofficial firmware bundle
 
 
===[[N92ap|iPhone 4 (CDMA model)]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="3"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 4.2.5
 
|style="width:100px;"| 4.2.6
 
|style="width:100px;"| 4.2.7
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{no}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
|-
 
| [[PwnageTool]]
 
| {{no}}
 
| {{yes|4.2}}
 
| {{no}}
 
|-
 
| [[redsn0w]]
 
| {{no}}
 
| {{yes|0.9.6rc13}}
 
| {{no}}
 
|-
 
| [[sn0wbreeze]]
 
| {{no}}
 
| {{yes|2.2}}
 
| {{no}}
 
|}
 
 
===[[N18ap|iPod touch 3G]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="10"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 3.1.1
 
|style="width:100px;"| 3.1.2
 
|style="width:100px;"| 3.1.3
 
|style="width:100px;"| 4.0
 
|style="width:100px;"| 4.0.2
 
|style="width:100px;"| 4.1
 
|style="width:100px;"| 4.2.1
 
|style="width:100px;"| 4.3
 
|style="width:100px;"| 4.3.1
 
|style="width:100px;"| 4.3.2
 
|-
 
| [[blackra1n]]
 
| {{yes|Yes<sup>1</sup>}}
 
| {{yes|Yes<sup>1</sup>}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[redsn0w]]
 
| {{yes|0.9.3<sup>1</sup>}}
 
| {{yes|0.9.3<sup>1</sup>}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14<sup>1</sup>}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
|-
 
| [[Spirit]]
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Star]]
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[sn0wbreeze]]
 
| {{no}}
 
| {{yes|2.0.2<sup>1</sup>}}
 
| {{yes|2.0.2<sup>1</sup>}}
 
| {{yes|2.0.2<sup>1</sup>}}
 
| {{yes|2.0.2<sup>1</sup>}}
 
| {{yes|2.1}}
 
| {{yes|2.2}}
 
| {{yes|2.3b4<sup>1</sup>}}
 
| {{yes|2.5}}
 
| {{yes|2.6}}
 
|-
 
| [[limera1n]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes}}
 
| {{yes}}
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|RC4}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[PwnageTool]]
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{yes|4.1.3}}
 
| {{yes|4.2}}
 
| {{no}}
 
| {{yes|4.3}}
 
| {{no}}
 
|}
 
<sup>1</sup> [[Tethered jailbreak]].
 
 
===[[N81ap |iPod touch 4G]]===
 
{| class="wikitable" style="font-size: smaller; text-align: center; table-layout: fixed; border-collapse: collapse;" border="1"
 
|-
 
!rowspan="2"| [[Jailbreak]] Tool
 
!colspan="5"| Works with [[firmware]]...
 
|-
 
|style="width:100px;"| 4.1 (both builds)
 
|style="width:100px;"| 4.2.1
 
|style="width:100px;"| 4.3
 
|style="width:100px;"| 4.3.1
 
|style="width:100px;"| 4.3.2
 
|-
 
| [[limera1n]]
 
| {{yes}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[Greenpois0n (jailbreak)|greenpois0n]]
 
| {{yes|RC4}}
 
| {{yes|RC6.1}}
 
| {{no}}
 
| {{no}}
 
| {{no}}
 
|-
 
| [[PwnageTool]]
 
| {{yes|4.1.3}}
 
| {{yes|4.2}}
 
| {{no}}
 
| {{yes|4.3}}
 
| {{no}}
 
|-
 
| [[sn0wbreeze]]
 
| {{yes|2.1}}
 
| {{yes|2.2}}
 
| {{yes|2.3b4<sup>1</sup>}}
 
| {{yes|2.5}}
 
| {{yes|2.6}}
 
|-
 
| [[redsn0w]]
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14 or 0.9.7b6<sup>1 2</sup>}}
 
| {{yes|0.9.6rc14<sup>1</sup>}}
 
| {{yes|0.9.6rc14}}
 
| {{yes|0.9.6rc14}}
 
|}
 
<sup>1</sup> [[Tethered jailbreak]].
 
 
<sup>2</sup> If [[SHSH]]s were saved for iOS 4.2b3 and if you have a developer access to its IPSW, [[Jailbreak Monte]] can be used.
 

Latest revision as of 09:52, 26 March 2017

When the iPhone 3GS was initially released, Apple did not have enough time to fix the 0x24000 Segment Overflow in the S5L8920. However, in order to flash an exploited LLB and jailbreak the iPhone 3GS, one of the following needed to be done:

  • Find a new iBoot exploit every time a new firmware is out.
  • Find a way to bypass the ECID checks.
  • Use a bootrom exploit that allows unsigned code execution via USB.

Newer devices (iPhone 3GS with new bootrom, iPod touch (3rd generation), and subsequent devices) are no longer vulnerable to the 0x24000 Segment Overflow exploit. Many of them are susceptible to geohot's bootrom exploit (originally found in limera1n), which allows unsigned code execution over USB. Even newer devices, starting with the iPad 2, have no bootrom exploits to run unsigned code at all.

ECID

Apple added a new tag to the IMG3 File Format called ECID. The ECID is unique to each phone, and its signature is being checked. With this method, Apple attempts to block downgrades once newer firmware becomes available, unless you have a dump of your old firmware's unique IMG3 or signed certificate. Therefore, iBoot exploits won't be so useful for tethered jailbreaks, because such exploits will be closed in new firmwares. [1].

The issue with this is that, even with the 0x24000 Segment Overflow still in bootrom, an iBoot exploit was still needed to actually flash the exploited LLB. Apple uses this ECID stuff to block downgrading iBoot to a vulnerable version. It was resolved when Geohot released his limera1n tool, which used a bootrom exploit to upload an unsigned iBoot. Still the problem remains with newer devices with the 0x24000 Segment Overflow fixed - tampering with firmware makes such jailbreak tethered unless some other exploit is used.

There are methods to help keep your downgrading ability, though.

  • If it receives your ECID, saurik's servers will actively cache the necessary files. Instructions to use the servers are available.
  • The SHSH associated with an ECID can be also saved by running TinyUmbrella. TinyUmbrella allows the user to restore to whatever version is associated with that SHSH file permanently. This is based on the aforementioned service Saurik provides remotely from his server(s).

Jailbreak Tools

Main article: Jailbreak#Jailbreak Tools