Difference between revisions of "SEPO"

From The iPhone Wiki
Jump to: navigation, search
m (iPad mini: woops.)
(Processors)
 
(12 intermediate revisions by 6 users not shown)
Line 1: Line 1:
The '''SEPO''' ('''Security EPOch''') tag specifies the device that the firmware is supposed to be ran on. It allows Apple to make sure you are not running another device's firmware files on an incompatible device, probably to prevent using old exploits.
+
The '''SEPO''' ('''Security EPOch''') tag specifies the minimum Security Epoch required for the device to run the provided image. This allows Apple to prevent devices from running previously vulnerable loaders. An example of this is when Apple increased the SEPO on iPod touch (2nd generation) MC models in addition to patching [[0x24000 Segment Overflow]] to prevent the use of the [[ARM7_Go]] vulnerability from the 2.1.1 loaders.
   
  +
== [[Application Processor|Processors]] ==
== Device IDs ==
 
  +
{| class="wikitable"
=== [[Apple TV]] ===
 
* [[k66ap|Apple TV 2G]] -
+
! [[CHIP|SoC]]
  +
! Security Epoch
* [[Apple TV 3G]]
 
  +
|-
** [[j33ap|AppleTV3,1]] -
 
  +
| [[S5L8900]]
** [[j33iap|AppleTV3,2]] -
 
  +
| 0x04
 
  +
|-
=== [[iPad]] ===
 
  +
| 0x01 (later 0x02, then 0x04)
* [[iPad 2]]
 
  +
|-
** [[k93ap|iPad2,1]] -
 
** [[k94ap|iPad2,2]] -
+
| [[S5L8922]]
  +
| 0x02
** [[k95ap|iPad2,3]] -
 
  +
|-
** [[k93aap|iPad2,4]] -
 
  +
| 0x02
** [[j1ap|iPad3,1]] -
 
  +
|-
** [[j2ap|iPad3,2]] -
 
** [[j2aap|iPad3,3]] -
+
| [[S5L8940]]
  +
| 0x11
* [[iPad 4]]
 
  +
|-
** [[p101ap|iPad3,4]] -
 
  +
| 0x10
** [[p103ap|iPad3,6]] -
 
  +
|-
* [[iPad Air]]
 
** [[j71ap|iPad4,1]] -
+
| [[S5L8945]]
  +
| 0x10
** [[j72ap|iPad4,2]] -
 
  +
|-
** [[j73ap|iPad4,3]] -
 
  +
| 0x10
** [[j81ap|iPad5,3]] -
 
  +
|-
** [[j82ap|iPad5,4]] -
 
  +
| [[S5L8950]]
 
  +
| 0x10
=== [[iPad mini]] ===
 
  +
|-
* [[iPad mini 1G]]
 
** [[p105ap|iPad2,5]] -
+
| [[S5L8955]]
  +
| 0x10
** [[p106ap|iPad2,6]] -
 
  +
|-
** [[p107ap|iPad2,7]] -
 
  +
| ?
** [[j85ap|iPad4,4]] -
 
  +
|-
** [[j86ap|iPad4,5]] -
 
** [[j87ap|iPad4,6]] -
+
| [[S5L8965]]
  +
| ?
* [[iPad mini 3]]
 
  +
|-
** [[j85map|iPad4,7]] -
 
  +
| ?
** [[j87map|iPad4,9]] -
 
  +
|-
 
=== [[iPhone]] ===
+
| [[T7001]]
  +
| ?
* [[m68ap|iPhone]] - 0x04
 
  +
|-
* [[n82ap|iPhone 3G]] - 0x04
 
  +
| [[S7002]]
* [[n88ap|iPhone 3GS]] -
 
  +
| ?
* [[iPhone 4]]
 
  +
|-
** [[n90ap|iPhone3,1]] -
 
  +
| [[S8000]]
** [[n90bap|iPhone3,2]] -
 
  +
| ?
** [[n92ap|iPhone3,3]] -
 
  +
|-
* [[n94ap|iPhone 4S]] -
 
  +
| ?
** [[n41ap|iPhone5,1]] -
 
  +
|-
** [[n42ap|iPhone5,2]] -
 
* [[iPhone 5c]]
+
| [[S8003]]
  +
| ?
** [[n48ap|iPhone5,3]] -
 
  +
|-
** [[n49ap|iPhone5,4]] -
 
  +
| ?
** [[n51ap|iPhone6,1]] -
 
  +
|-
** [[n53ap|iPhone6,2]] -
 
* [[n61ap|iPhone 6]] -
+
| [[T8004]]
  +
| ?
* [[n56ap|iPhone 6 Plus]] -
 
  +
|-
 
  +
| ?
* [[n45ap|iPod touch]] - 0x04
 
  +
|-
* [[n72ap|iPod touch 2G]] - 0x01 (later 0x02, then 0x04)
 
  +
| [[T8010]]
* [[n18ap|iPod touch 3G]] -
 
  +
| 0x01
* [[n81ap|iPod touch 4G]] -
 
  +
|-
* [[iPod touch 5G]] -
 
* [[k48ap|iPad]] -
+
| [[S5L8920]]
* [[iPad 3]]
+
| [[S5L8930]]
** [[p102ap|iPad3,5]] -
+
| [[S5L8942]]
* [[iPad Air 2]]
+
| [[S5L8947]]
* [[iPad mini 2]]
+
| [[S5L8960]]
** [[j86map|iPad4,8]] -
+
| [[T7000]]
* [[iPhone 5]]
+
| [[S8001]]
* [[iPhone 5s]]
+
| [[T8002]]
=== [[iPod touch]] ===
+
| [[T8006]]
  +
| [[T8011]]
  +
| ?
  +
|-
  +
| [[T8012]]
  +
| ?
  +
|-
  +
| [[T8015]]
  +
| ?
  +
|-
  +
| [[T8020]]
  +
| ?
  +
|-
  +
| [[T8027]]
  +
| ?
  +
|-
  +
| [[T2002]]
  +
| ?
  +
|-
  +
| [[T8030]]
  +
| ?
  +
|-
  +
| [[T8301]]
  +
| ?
  +
|-
  +
| [[T8101]]
  +
| ?
  +
|}
   
 
{{stub|firmware}}
 
{{stub|firmware}}

Latest revision as of 17:56, 16 September 2020

The SEPO (Security EPOch) tag specifies the minimum Security Epoch required for the device to run the provided image. This allows Apple to prevent devices from running previously vulnerable loaders. An example of this is when Apple increased the SEPO on iPod touch (2nd generation) MC models in addition to patching 0x24000 Segment Overflow to prevent the use of the ARM7_Go vulnerability from the 2.1.1 loaders.

Processors

SoC Security Epoch
S5L8900 0x04
S5L8920 0x01 (later 0x02, then 0x04)
S5L8922 0x02
S5L8930 0x02
S5L8940 0x11
S5L8942 0x10
S5L8945 0x10
S5L8947 0x10
S5L8950 0x10
S5L8955 0x10
S5L8960 ?
S5L8965 ?
T7000 ?
T7001 ?
S7002 ?
S8000 ?
S8001 ?
S8003 ?
T8002 ?
T8004 ?
T8006 ?
T8010 0x01
T8011 ?
T8012 ?
T8015 ?
T8020 ?
T8027 ?
T2002 ?
T8030 ?
T8301 ?
T8101 ?
Tango Utilities-terminal.png This firmware article is a "stub", an incomplete page. Please add more content to this article and remove this tag.