Difference between revisions of "Limera1n"

From The iPhone Wiki
Jump to: navigation, search
(Deleted "Download" section. (It's not exactly necessary, as limera1n's page has the download link.))
(Process)
Line 24: Line 24:
   
 
=== Process ===
 
=== Process ===
The jailbreak appears to execute something like the following:
+
The jailbreak appears to execute something like the following (in no particular order):
  +
* In recovery1,
1) The tool has you boot into [[DFU Mode]], where the fun starts.
 
  +
"setenv debug-uarts 1
2) Limera1n.exe appears to upload a payload to your device and execute it at this time, to pwn out the signature checks.
 
  +
setenv auto-boot false
3) The device reboots and is now pwned. From here, it uploads an exploit and a ramdisk. The ramdisk installs limera1n.app and possibly the untethered part of the jailbreak.
 
  +
saveenv"
4) The device shuts down and upon reboot with no computer necessary, the device is jailbroken.
 
  +
* In DFU, it uploads a payload.
  +
* In recovery2, it uploads another payload and its ramdisk.
   
 
== Controversy ==
 
== Controversy ==

Revision as of 03:07, 10 October 2010

On the 9th of October 2010 limera1n was released, delaying the release of greenpois0n. limera1n is now in Beta 2. It only supports Windows at the moment and a large number of devices have issues.

Background Information

Limera1n is a jailbreak by geohot. It is untethered on all supported devices, which include the following (but aren't necessarily limited to):

It has been demonstrated multiple times by geohot, using blog posts on his now private blog. Geohot showed off a high-res picture of Cydia on an iPhone 4. Image He displayed an untethered jailbreak that met MuscleNerd's requirements for a good video on the iPod touch 3G: YouTube Video In addition, he demonstrated Cydia, blackra1n, and a verbose boot on an iPad (before Spirit was released): Image

Technical Information

Basics

  • This does not use SHAtter.
  • This uses a bootrom exploit (different than the greenpois0n one) to achieve the tethered jailbreak and unsigned code execution
  • This uses a userland exploit to make the jailbreak untethered, which geohot obtained under questionable circumstances from comex.
  • Chronic Dev knows about this exploit and has confirmed its legitimacy

Exploits

limera1n uses an undisclosed bootrom exploit.

Process

The jailbreak appears to execute something like the following (in no particular order):

  • In recovery1,
"setenv debug-uarts 1
setenv auto-boot false
saveenv"
  • In DFU, it uploads a payload.
  • In recovery2, it uploads another payload and its ramdisk.

Controversy

The release of this jailbreak is specifically designed to pressure the Chronic Dev team into implementing the exploits in limera1n into greenpois0n. Now that geohot has released limera1n, SHAtter can't be released without major negative backlash from other hackers, as this would burn a bootrom exploit.

External Links

http://theiphonewiki.com/limera1n is possibly the real site and geohot used <!--#include FILE="http://www.theiphonewiki.com/limera1n.com"--> If this is true, then switch the actual site and mirror site text...