The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Firmware Keys"
m (→5.x) |
m (→Notes: added commented out a6 and added 6.0 blurb) |
||
Line 36: | Line 36: | ||
|- |
|- |
||
| [[S5L8945]] (A5X) |
| [[S5L8945]] (A5X) |
||
− | | [[iPad 3]] |
+ | | [[iPad 3]]<!-- |
+ | |- |
||
+ | | [[S5L89??]] (A6) |
||
+ | | [[???ap|iPhone 5]], [[???ap|iPod touch 5G]] |
||
|} |
|} |
||
Line 44: | Line 47: | ||
For the VFDecrypt Keys of each firmware please check the builds listed at the appropiate firmware version page. |
For the VFDecrypt Keys of each firmware please check the builds listed at the appropiate firmware version page. |
||
+ | |||
+ | [[iOS]] 6.0b1 and higher no longer work with [[VFDecrypt]]. You need to use [[hfsplus]] to decrypt these. The decryption process is longer as it writes the progress to the terminal unlike [[VFDecrypt]], but if you can stand a minute or two longer, you can decrypt the iOS 6 and higher firmware files. |
||
== Firmware versions == |
== Firmware versions == |
Revision as of 18:22, 15 September 2012
VFDecrypt Keys are the keys which can decrypt the files that come with the firmware. Apple uses a public-private key encryption to ensure the safety of their files. Over time Apple has changed the way to encrypt firmware files, thus the way to decrypt files as well as the way to get the VFDecrypt Keys has also.
IMG2 was the file format used prior to iOS 2.0. For iOS 1.1.x, IMG2 files were encrypted with Key 0x837.
IMG3 encrypted files contain encrypted versions of the VFDecrypt Keys as part of the KBAG (key bag). These can be decrypted with the GID-key. For jailbroken iDevices the VFDecrypt keys can be retrieved with the devices hardware AES engine. The VFDecrypt key for the root filesystem image of an iDevice (~500 MB to 800MB in the case of iOS 5) requires either a decrypted Restore Ramdisk or Update Ramdisk. Once you have a decrypted Restore or Update Ramdisk, GenPass can be used to gather the keys for the root filesystem. For the root filesystem there is one key per device model, with no IV. You can mount this once it has been decrypted using your program of choice. (For example, 7-zip on Windows (after extracting the DMG on Windows, extract the biggest file with 7-Zip)
Notes
The Update Ramdisk and Restore Ramdisks share the same IV and key per type of Application Processor. The current models are: