The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Talk:Baker 8B117 (iPhone2,1)"
Tavianator (talk | contribs) |
(indent police!) |
||
Line 1: | Line 1: | ||
== FS key is wrong == |
== FS key is wrong == |
||
− | |||
genpass gives the key in the article when run with the update ramdisk, and "59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e" when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC) |
genpass gives the key in the article when run with the update ramdisk, and "59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e" when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --[[User:Tavianator|Tavianator]] 05:38, 6 January 2011 (UTC) |
||
+ | :Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid. |
||
− | |||
− | Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid. |
||
--[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC) |
--[[User:Ih8sn0w|iH8sn0w]] 17:58, 6 January 2011 (UTC) |
||
+ | ::Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! [[User:Tavianator|Tavianator]] 22:25, 6 January 2011 (UTC) |
||
− | |||
− | Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! [[User:Tavianator|Tavianator]] 22:25, 6 January 2011 (UTC) |
Revision as of 01:48, 7 January 2011
FS key is wrong
genpass gives the key in the article when run with the update ramdisk, and "59ebcd47de964e5479ce2e2dc583284c863b85fefc0a58d68871a941a76c125367bffd2e" when run with the restore ramdisk. Neither one produces a valid image when using vfdecrypt to decrypt the filesystem DMG. I haven't figured out how to get the correct one; there's talk that genpass fails on ramdisk images that use compression, could that be it? I'm doing all of this on x86-64 Linux. --Tavianator 05:38, 6 January 2011 (UTC)
- Did you decrypt the ramdisk first? The hash is calculated by hashing a decrypted ramdisk dmg. The key on here is valid.
--iH8sn0w 17:58, 6 January 2011 (UTC)
- Oops, figured it out. Linux doesn't handle compressed DMG images, and the FS image is compressed. dmg2img can be used to decompress it. Sorry for the noise! Tavianator 22:25, 6 January 2011 (UTC)