Difference between revisions of "Normal Mode"

From The iPhone Wiki
Jump to: navigation, search
(added missing devices)
(Device IDs)
Line 8: Line 8:
 
* [[N90ap|iPhone 4 GSM]] - 0x1297
 
* [[N90ap|iPhone 4 GSM]] - 0x1297
 
* [[N92ap|iPhone 4 CDMA]] - 0x129c
 
* [[N92ap|iPhone 4 CDMA]] - 0x129c
* [[N94ap|iPhone 4S]] - ?
+
* [[N94ap|iPhone 4S]] - 0x12a0
   
 
* [[N45ap|iPod touch]] - 0x1291
 
* [[N45ap|iPod touch]] - 0x1291
Line 20: Line 20:
 
* [[K95ap|iPad 2 CDMA]] - 0x12a3
 
* [[K95ap|iPad 2 CDMA]] - 0x12a3
 
* [[K93aap|iPad 2 R2]] - ?
 
* [[K93aap|iPad 2 R2]] - ?
* [[J1ap|iPad 3 Wi-Fi]] - ?
+
* [[J1ap|iPad 3 Wi-Fi]] - 0x12a4
* [[J2ap|iPad 3 CDMA]] - ?
+
* [[J2ap|iPad 3 CDMA]] - 0x12a5
* [[J2aap|iPad 3 Global]] - ?
+
* [[J2aap|iPad 3 Global]] - 0x12a6
   
* [[K66ap|Apple TV 2G]] - ?
+
* [[K66ap|Apple TV 2G]] - 0x129d
 
* [[J33ap|Apple TV 3G]] - 0x12a7
 
* [[J33ap|Apple TV 3G]] - 0x12a7
   

Revision as of 20:52, 12 May 2012

This is the protocol iTunes uses to talk to the booted iPhone. It uses usbmux to provide TCP like connectivity over a USB port using SSL. There is a pairing process iTunes uses to establish the secure channel. File transfer is provided by AFC.

Device IDs

It appears that it uses different device IDs:

Patch: Disable SSL

There is a way to disable SSL encyption during iTunes communication on jailbroken devices by patching lockdownd binary:

(#) Disable SSL protection
(#) FW 2.1
(#) binary /usr/libexec/lockdownd
-0x1000

Offset 000112F8: 0C 30 98 E5 > 00 30 A0 E3 ; Conn.UseSSL = false

After applying the patch all packets between iPhone and iTunes become plain and clear. Musthave for R&D ppl.