Difference between revisions of "Talk:Baker 8B117 (iPhone2,1)"

From The iPhone Wiki
Jump to: navigation, search
(indent police!)
m
Line 1: Line 1:
 
== FS key is wrong ==
 
== FS key is wrong ==
genpass gives the key in the article when run with the update ramdisk, and "59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e" when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC)
+
genpass gives the key in the article when run with the update ramdisk, and <tt>59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e</tt> when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC)
 
:Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid.
 
:Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid.
 
--[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC)
 
--[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC)

Revision as of 01:48, 7 January 2011

FS key is wrong

genpass gives the key in the article when run with the update ramdisk, and 59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --Tavianator 05:38, 6 January 2011 (UTC)

Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid.

--iH8sn0w 17:58, 6 January 2011 (UTC)

Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! Tavianator 22:25, 6 January 2011 (UTC)