Difference between revisions of "IPhone Hacking"
(201 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
The iPhone was released in the USA 29th June 2007, and after 2 months it was finally possible to hack the iPhone to allow it run true native third-party applications, aka homebrew applications. | The iPhone was released in the USA 29th June 2007, and after 2 months it was finally possible to hack the iPhone to allow it run true native third-party applications, aka homebrew applications. | ||
== Downgrade == | == Firmware v1.0.2 == | ||
If the phone came with [[ | === Downgrade === | ||
If the phone came with [[IPhone Firmware Versions|v1.1.1]], it's (as of writing) necessary to downgrade to v1.0.2. | |||
# Download the [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw iPhone v1.0.2 firmware] from Apple. | # Download the [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw iPhone v1.0.2 firmware] from Apple. | ||
Line 12: | Line 13: | ||
# The restore should complete with a 1013 error. A yellow triangle on the iPhone indicates that v1.0.2 has been installed. | # The restore should complete with a 1013 error. A yellow triangle on the iPhone indicates that v1.0.2 has been installed. | ||
== Jailbreak == | === Jailbreak === | ||
Jailbreaking means to escape the 'Media'-partition of the iPhone where only some settings and all the media files is stored. Technically the jailbreak is essentially 'chroot /var/root/Media'. | Jailbreaking means to escape the 'Media'-partition of the iPhone where only some settings and all the media files is stored. Technically the jailbreak is essentially a 'chroot /var/root/Media'. | ||
# There are two ways to jailbreak on Windows, [http://iphone.nullriver.com/beta/ Apptapp installer] or [http://cre.ations.net/creation/ibrickr iBrickr]. Download the recommended Apptapp installer. | # There are two ways to jailbreak on Windows, [http://iphone.nullriver.com/beta/ Apptapp installer] or [http://cre.ations.net/creation/ibrickr iBrickr]. Download the recommended Apptapp installer. | ||
Line 19: | Line 20: | ||
# Once jailbreaked, the iPhone will return to the 'Slide for emergency' and still needs activation to load the normal Springboard. | # Once jailbreaked, the iPhone will return to the 'Slide for emergency' and still needs activation to load the normal Springboard. | ||
== Activate == | === Activate === | ||
A normal iPhone can only work and be activated on the AT&T operator. Faking the activation tricks the iPhone into 'Activated'-state and all the functions except phone is available. | A normal iPhone can only work and be activated on the AT&T operator. Faking the activation tricks the iPhone into 'Activated'-state and all the functions except phone is available. | ||
Line 26: | Line 27: | ||
# Open a command-prompt (Start -> Run -> cmd) and change directory (cd) to the iAsign folder. | # Open a command-prompt (Start -> Run -> cmd) and change directory (cd) to the iAsign folder. | ||
# Run 'iAsign --automatic iPhoneActivation_private.pem' to generate a new activated certificate on the iPhone. | # Run 'iAsign --automatic iPhoneActivation_private.pem' to generate a new activated certificate on the iPhone. | ||
# The 'Slide to emergency'-message should have changed to 'Slide to unlock'. | # A message should show stating the iPhone is activated. The 'Slide to emergency'-message should have changed to 'Slide to unlock'. | ||
# You now see the Springboard and the 'Installer' application. | # You now see the Springboard and the 'Installer' application. | ||
# To make it easy to upload files and execute remote commands on the iPhone, open Installer, install 'BSD Subsystem' and 'OpenSSH'. Use WinSCP to connect with username 'root' and password 'dottie' (first connect takes time). | # To make it easy to upload files and execute remote commands on the iPhone, open Installer, install 'BSD Subsystem' and 'OpenSSH'. Use WinSCP to connect with username 'root' and password 'dottie' (first connect takes time). | ||
== Youtube == | === Youtube === | ||
Youtube requires some certificates to work properly. | Youtube requires some certificates to work properly. | ||
# Download the [http://rapidshare.com/files/63774049/youtube-thethreefiles1.zip.html 3 required Youtube files]. | # Download the [http://rapidshare.com/files/63774049/youtube-thethreefiles1.zip.html 3 required Youtube files]. | ||
# Upload the data_ark.plist, device_private_key.pem and device_public_key.pem files to /var/root/Library/Lockdown/. | # Upload the data_ark.plist, device_private_key.pem and device_public_key.pem files to /var/root/Library/Lockdown/. | ||
# Open the data_ark.plist and copy the certificate block | # Open the data_ark.plist and copy the certificate block ending om '...FLS0tLS0K'. | ||
# In the same directory, go into 'pair_records', edit the file (double click), paste the certificate into the DeviceCertificate <data></data> section. | # In the same directory, go into 'pair_records', edit the file (double click), paste the certificate into the DeviceCertificate <data></data> section. | ||
# Go into the 'activation_records' directory and to the same for all the files. | # Go into the 'activation_records' directory and to the same for all the files. | ||
# Hold the SLEEP button for 5 seconds and reboot the iPhone. | # Hold the SLEEP button for 5 seconds and reboot the iPhone. | ||
== Unlock == | === Unlock === | ||
To be able to use any SIM-card the iPhone's baseband firmware has to be modified. | To be able to use any SIM-card the iPhone's baseband firmware has to be modified. | ||
Line 50: | Line 51: | ||
# If you get a 'SIM Locked'-message after the process is successful, press 'Unlock' and enter the PIN-code for the SIM. You can disable the prompt in Settings -> Phone -> SIM Pin. | # If you get a 'SIM Locked'-message after the process is successful, press 'Unlock' and enter the PIN-code for the SIM. You can disable the prompt in Settings -> Phone -> SIM Pin. | ||
== Localization == | === Localization === | ||
==== Keyboard ==== | |||
The iPhone does not come with any other dictionary or keyboard layouts then the default American package. | |||
'''New recommended method:''' | |||
# In Safari go to http://russianiphone.com/beta/en/ and http://iph0ne.moo.no/ and install the sources when prompted. | |||
# Go into Installer and install Mobile Enhancer (which is a plugin like extension) and Norwegian Keyboard (plugin for Mobile Enhancer). | |||
# Reboot phone. | |||
'''Old method:''' | |||
To add Norwegian locale support, a few files has to be patched. The character '[', ']' and '{' will be replaced with 'æ', 'ø' and 'å' respectively. | |||
# Download the Norwegian dictionary from the [http://code.google.com/p/iphoneshop/downloads/list iPhoneShop download page]. | # Download the Norwegian dictionary from the [http://code.google.com/p/iphoneshop/downloads/list iPhoneShop download page]. | ||
# Download the [http://rapidshare.com/files/63781711/Keyboard-StandardQWERTY.artwork-magnerlu90.zip.html patched keyboard .artwork file] with Norwegian character keyboard images. | # Download the [http://rapidshare.com/files/63781711/Keyboard-StandardQWERTY.artwork-magnerlu90.zip.html patched keyboard .artwork file] with Norwegian character keyboard images. | ||
Line 58: | Line 70: | ||
# Extract all the files and put them into the /System/Library/Frameworks/UIKit.framework/ directory on the iPhone. Backup the originals. Change the permissions for 'UIKit' to 0755. | # Extract all the files and put them into the /System/Library/Frameworks/UIKit.framework/ directory on the iPhone. Backup the originals. Change the permissions for 'UIKit' to 0755. | ||
# Reboot the iPhone and test the new keyboard and dictionary. | # Reboot the iPhone and test the new keyboard and dictionary. | ||
==== Phone Number Format ==== | |||
The default phone number format is the classic American standard with the parentheses and spaces. The format string is dictated by a simple settings file. | |||
Replace US format with NO format: | |||
# On the iPhone, go to /System/Library/Frameworks/AddressBookUI.framework/ and download the ABPPhoneFormats.plist file. | |||
# Browse to [http://140.124.181.188/~khchung/cgi-bin/plutil.cgi this binary-to-xml website] to convert the plist to a XML-file. | |||
# Open the new file in a plain text editor and find the 'US'-key. | |||
# Change the format string in the 'US'-key to the new format. For Norway the string will be '''########''' and '''+47 ########'''. | |||
# Save the file and upload the file to the same directory. No need to convert the plist back to binary. | |||
# Reboot the iPhone and check the Phone application to see the new string. | |||
==== International Caller ID ==== | |||
The iPhone supports 7 digits to handle local and international phone number formats. It cuts of from the end and tries to match the phone number with the contacts. The length differs from country to country. | |||
# Download the patched AppSupport binary that match the length of the phone number, [http://iphone.fiveforty.net/wiki/index.php/AppSupport AppSupport]. | |||
# Upload AppSupport to /System/Library/Frameworks/Appsupport.framework/ | |||
# Reboot the phone. | |||
=== Voicemail Button === | |||
The voicemail button in the Phone application will not be functional on a non-AT&T network. It's possible to re-program the button to dial the correct voicemail phone number. | |||
# Open the Phone application and select the Keypad. | |||
# Enter the code '''*5005*86*...#''' where the three dots ('...') indicates the voicemail phone number for the operator. | |||
# For Telenor in Norway, this sequence is used '''*5005*86*+4791509001#'''. | |||
# Try to hit the voicemail button and it will connect to the voicemail service. | |||
== Firmware v1.1.1 == | |||
There are many interesting fixes and a few new features in the iPhone v1.1.1 firmware update. But applying the update will re-jail and flash the modem baseband. A regular update does not remove settings and all the media files are preserved, third-party applications is wiped. Some applications may need updates to function on v1.1.1. | |||
=== Updating === | |||
# Open iTunes and keep it open during the next steps. This is to trick the re-jailing. | |||
# Remotely SSH into the iPhone (using putty or terminal) and change directory (cd) to /var/root/ | |||
# Rename the 'Media'-directory to 'Media-old' using 'mv Media Media-old' and issue this command to create a symbol link, 'ln -s / Media '. | |||
# Another prerequisite is a copy of 'lockdownd' from v1.0.2, 'cp /usr/libexec/lockdownd /var/root/lockdown.1.0.2' (/var/root/ is not erased). It's used to generate a valid activation certificate on v1.1.1. | |||
# Now, in iTunes click the 'Update'-button to start the update process. When it's finished the phone should show a activation screen and the slider should say 'Slide to emergency'. Everything is OK. | |||
=== Enabling read/write === | |||
# Download the [http://rapidshare.com/files/67438686/JailbreakWindows_v1.1.1.zip.html JailbreakWindows_v1.1.1.zip] package and extract it. | |||
# Open a command-prompt and change directory to the JailbreakWindows directory and execute the iphuc-jailbreak.exe application. | |||
# To make sure the iPhone is jailbroken, issue 'ls' and look for 'Applications'. It it shows up, everything is good. | |||
# To enable read/write (rw), the /etc/fstab file has to be replaced. A special putjailbreak-command overwrites the correct sector in the flash to update the file. In ipuch-jailbreak.exe, issue 'putjailbreak rdisk0s1 /dev/rdisk0s1'. | |||
# Reboot the iPhone to enable read/write filesystem. | |||
=== Install SSH === | |||
This step assumes a working Wifi configuration has been set up before the v1.1.1 upgrade. Else you need a open Wifi network and/or do the [http://modmyiphone.com/forums/showthread.php?t=10969 activation and contacts hack] to enable a Wifi network connection to be able to connect via SSH. | |||
# In the JailbreakWindows folder, delete the com.apple.update.plist.orig, com.apple.update.plist.orig, update and update.org files. Else the renaming of the original files from the iPhone will fail. | |||
# Open a commd-prompt and execut the sshify-windows.bat batch file. Follow the simple instructions. | |||
# When phase 4 is finished, the last 'fileref' should return 0. That means a file failed to be copied. | |||
# Execute iphoneinterface.exe and issue this command to upload the last com.apple.update.plist, 'putfile /System/Library/LaunchDaemons/com.apple.update.plist'. | |||
# Reboot the iPhone once more to enable the dropbear SSH server. | |||
# Connect to the SSH server (putty or terminal) and use the username '''root''' and the new password '''alpine'''. The dropbear server does not support SFTP, only SCP. | |||
=== Install Installer.app === | |||
# Follow the same procedure when installing SSH above. | |||
# Open a command-prompt and execute the installapps.bat batch script. | |||
# Installer.app can be executed via SSH before activation if wanted by doing the [http://modmyiphone.com/forums/showthread.php?t=10969 activation and contacts hack]. | |||
=== Activating === | |||
# Open a command-prompt and change directory to the JailbreakWindows directory. | |||
# Execut iphoneinterface.exe and issue this command to install the public certificate to make the activation work, ' putfile /System/Library/Lockdown/iPhoneActivation.pem' | |||
# SSH remotely and make a copy of lockdownd for v1.1.1, 'cp /usr/libexec/lockdownd /var/root/lockdownd.1.1.1'. | |||
# Install the 'cp' binary, iphoneinterface.exe and 'putfile /bin/cp'. Fix the permissions 'chmod +x /bin/cp'. | |||
# Copy the old lockdownd from v1.0.2 over the current lockdownd, 'cp /var/root/lockdown.1.0.2 /usr/libexec/lockdownd'. | |||
# Restart the lockdownd daemon, 'ps xa', find the PID, 'kill 21'. It should automatically restart. | |||
# If 'ps' is not precent, install the BSD Subsystem pack with the Installer.app and contact hack above. | |||
# Do the same for the afcd daemon, 'ps xa', 'kill 43'. | |||
# Note that iphoneinterface.exe will fail to work if the iPhone is rebooted with lockdownd from v1.0.2, afc requires v1.1.1. Copy over v1.1.1 before rebooting. | |||
# Download the [http://iphone.fiveforty.net/wiki/index.php/IASign iAsign package] for Mac and then the Windows (Win32) update. Put iAsign.exe in the 'bin'-folder. | |||
# Open a command-prompt and change directory to the iAsign folder. | |||
# Run 'iAsign --automatic iPhoneActivation_private.pem' to generate a new activated certificate on the iPhone. A message should show stating the iPhone is activated. | |||
# Restore the lockdownd from v1.1.1, 'cp /var/root/lockdown.1.1.1 /usr/libexec/lockdownd'. | |||
# Kill lockdownd once more and it should, 'ps xa', and 'kill <pid>'. | |||
# The iPhone screen should now have a 'Slide to unlock'-slide and the phone is successfully activated. | |||
=== Patch Springboard === | |||
The new Springboard has to be patched to behave as before. | |||
# Make springpatch executable, 'chmot 755 /usr/bin/springpatch'. | |||
# Execute the patch, '/usr/bin/springpatch'. | |||
=== Fix Installer.app Settings === | |||
If Installer.app was installed before the update, all the preferences files are invalid as the applications are wiped. | |||
# Remove the preferences for Installer.app, 'rm -r /private/var/root/Library/Installer'. | |||
# Make the new Installer.app executable, 'chmod 755 /Applications/Installer.app/Installer'. | |||
# Reboot to load the changes. | |||
=== Restoring Media Partition === | |||
# Remove symbol link, 'rm Media'. | |||
# Move old Media library back, 'mv Media-old Media'. | |||
=== Install BSD Tools === | |||
Installer.app (recommended): | |||
# Install the BSD Subsystem via the Installer.app: | |||
Natetrue: | |||
# Download the Base and Extra tarballs [http://iphone.natetrue.com/ natetrue.com]. | |||
# Transfer the files over to root (/) on the iPhone via SCP, either WinSCP or scp works. | |||
# Remotely SSH into the iPhone and issue the extract command on both tarballs, 'tar zxvf *.tar.gz'. | |||
# Move the files into the system using rsync, 'rsync -av BSD_Base /' and 'rsync -av BSD_Extra /' | |||
# The extraction will overwrite original iPhone files with newer versions. | |||
=== Fix SSH === | |||
The dropbear SSH server does not have SFTP and is incompatible with the Services applications. OpenSSH is recommended. | |||
# SCP into the iPhone | |||
# Remove the following files | |||
/etc/dropbear/dropbear_rsa_host_key | |||
/etc/dropbear/dropbear_dss_host_key | |||
/etc/dropbear (folder) | |||
/etc/hackinit.sh | |||
/etc/init.d/dropbear.sh | |||
/etc/init.d (folder) | |||
/usr/bin/dropbear | |||
# Install Community Sources and OpenSSH client and server. | |||
# Reboot the iPhone to enable the new SSH server. | |||
=== Add Contacts Icon === | |||
Add a contacts icon on the home screen. | |||
# Download /Systems/Library/CoreServices/Springboard.app/M68AP5.plist. | |||
# Add this string before the 'com.apple.MobileStore' and upload the file to the iPhone. | |||
<dict> | |||
<key>displayIdentifier</key> | |||
<string>com.apple.MobileAddressBook</string> | |||
</dict> | |||
=== Fix My Number Display === | |||
In iTunes and on top of the contacts list on the iPhone, your phone number should normally show. But if the SIM card is not programmed to include the acutal phone number it will not be shown. | |||
# SSH remotely into the iPhone | |||
# Stop the commcenter, 'launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist' | |||
# Start the modem configurator, 'minicom -s' | |||
# Use the arrow keys to select 'Serial port setup' | |||
# Press 'A' for Serial Device, delete 'modem' and type 'tty.baseband'. The full string should be '/dev/tty.baseband'. | |||
# Press enter twice to save the settings. Select 'Exit' and the initialize the modem. | |||
# Type 'AT' to a 'OK' confirmation. Type 'AT+CPBS="ON"' to enable the 'My Number' feature. | |||
# Then type 'AT+CPBW=1,"xxxxxxxx",,"N Telenor"' (two commas) to program your phone number and carrier. | |||
# Verify by issuing 'AT+CPBR=1' and 'AT+CNUM'. | |||
# Exit minicom by pressing CTRL+A and then Q. | |||
# Load commcenter again, 'launchctl load /System/Library/LaunchDaemons/com.apple.CommCenter.plist' | |||
# Reboot the iPhone and look for the number in the contacts list and iTunes. | |||
=== Low Space Fix === | |||
The system partition is only 300 MB and is quickly filled when installing third-party applications. The media partition on the other hand holds the rest of the free flash storage memory. | |||
# SSH into the iPhone. Make a complete backup of the iPhone beforehand via SFTP. | |||
# Edit the fstab to allow execution of applications on the media partition, 'pico /etc/fstab' and remove ',noexec'. | |||
# Change directory to root, 'cd /'. | |||
# Copy the Applications directory over to the media partition, 'cp -Rv Applications/ private/var/root/'. | |||
# Delete the entire Applications directory, 'rm -rv /Applications'. | |||
# Create a new symbol-link from the media partition back to the root directory, 'ln -s private/var/root/Applications .' | |||
# List the directory to make sure Applications points to private/var/root/Applications. | |||
# Reboot the iPhone and install bigillion more applcations. | |||
=== iPhuc AFC Fix === | |||
AFC is the protocol iTunes uses to transfer files to the iPhone. To make iPhuc/iPhoneBrowser work, a second AFC services is needed for root filesystem access. | |||
# Backup /System/Library/Lockdown/Services.plist and edit Services.plist | |||
# Add this section after the com.apple.afc entry: | |||
<key>com.apple.afc2</key> | |||
<dict> | |||
<key>Label</key> | |||
<string>com.apple.afc2</string> | |||
<key>ProgramArguments</key> | |||
<array> | |||
<string>/usr/libexec/afcd</string> | |||
<string>--lockdown</string> | |||
<string>-d</string> | |||
<string>/</string> | |||
</array> | |||
</dict> | |||
# Open a command-prompt and enter iPhuc (iphuc.exe/iphuc_jailbreak.exe/iPhuc). | |||
# Enable the afc2 service, 'setafc com.apple.afc2'. | |||
=== Notes === | |||
The new v1.1.1 update fixes a lot of localization problems and seems to gear up for the official european release as it includes german, frence and uk dictionaries stock in the update. | |||
To get special characters, like æøå in Norwegian, press and hold the key to get a pop-up with a array of different variations of that character. | |||
The iPhone was still unlocked after the v1.0.2 to v1.1.1 update, the phone came with baseband v04.01.13_G and was unlocked with AnySIM v1.1. It did not require to be unlocked again after the update, showing that the AnySIM team have resolved the bricking issues. | |||
To fix the localization for countries other than those mentioned, only two files needs to updated. | |||
# Install the appropriate AppSupport from the [http://iphone.fiveforty.net/wiki/index.php/AppSupport Dev Wiki]. This fixes the lenght problem of the phone number matching. | |||
# Download /System/Library/CoreServices/Springboard.app/M68AP.plist and change the International key to true. Convert it first with [http://140.124.181.188/~khchung/cgi-bin/plutil.cgi the binary-to-xml website]. This enables a flew of options in the Settings -> General panel. Including Language, Keyboards and Region format (.GlobalPreferences.plist). I set the Language to English, Keyboard to US and Norwegian, and region formats to Norway. When typing on the keyboard, there is now a new button to switch between US and Norwegian keyboard. | |||
=== Fix Stuck Recovery Mode === | |||
# Open command-prompt and execute iphoneinterface.exe from the JailbreakWindows_v1.1.1 package | |||
# Enter the commands: cmd setenv auto-boot true, cmd saveenv, cmd fsboot | |||
# Typ exit to quit | |||
=== Contacts Hack === | |||
If the phone is not activated and you want to go to jailbreakme.com. Wifi has to be configured first by doing a workaround to get the the system preferences. | |||
# At the callpad, enter *#307# and Call. | |||
# Answer the call and press Hold. | |||
# If Hold is not available, delete the *#307# and enter 0 and press Call. | |||
# Now answer the call and press Hold. | |||
# Decline the next call and the Recent calls screen should appear. | |||
# Add a new contacts with the url 'prefs://1F' and 'http://jailbreakme.com'. | |||
# To the the first URL to configure the Wifi and the second to jailbreak the phone. | |||
=== Easy Jailbreak for v1.1.1 === | |||
A TIFF exploit is used to jailbreak v1.1.1. Recently a easy to use webbased jailbreaking method was released, jailbreakme.com. The website will utilize the TIFF exploit to: | |||
# Jailbreakes the iPhone using TIFF exploit | |||
# Patches Springboard | |||
# Activates the phone | |||
# Installs Installer.app | |||
# Fixes Youtube | |||
# Patches the TIFF vulnerability | |||
# Enables afc2 protocol | |||
== Firmware v1.1.2 == | |||
The new iPhone v1.1.2 firmware patches the TIFF exploit and requires some extra work to update. Uploading files to jailbreak requires a new standalone application. | |||
# If you acctidently updated to v1.1.2, downgrade to v1.1.1 by enabling restore mode, hold the Power and Home button for 5-10 seconds. The screen will be black on v1.1.2. | |||
# If iTunes reports an error 1, try to use iBrickr 0.91 or higher to get into the correct restore mode. | |||
# Connect to computer and when asked by iTunes that it found a iPhone in restore mode click Ok. | |||
# Download [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3823.20070821.vormd/iPhone1,1_1.0.2_1C28_Restore.ipsw 1.0.2] or [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPod/SBML/osx/bundles/061-3932.20070927.p23dD/iPod1,1_1.1.1_3A110a_Restore.ipsw v1.1.1] from Apple and Shift/command-Click the Restore button and select the downloaded firmware. | |||
# After it reboots into yellow triangle, open iPhuc and enter these commands: cmd setenv auto-boot true, cmd saveenv, cmd fsboot, or use iPhuc to boot the iPhone. | |||
# Now while in v1.0.2, jailbreak it by using iBrickr or AppTappInstaller. Activate using iBrick to upload the iPhoneActivation.pem to /Library/System/Lockdown/ and iAsign --automatic iPhoneActivation_private.pem to activate as described above. | |||
# Install Community Sources and OpenSSH (to transfer AnySIM if not installed via AppInstaller). | |||
# Unlock the new baseband version using AnySIM. Download [http://code.google.com/p/iphone-elite/downloads/detail?name=anySIM1.2.1u.zip&can=2&q= AnySIM 1.2.1u] and upload to /Applications/AnySIM.app (important it's anySIM.app). Make it executeable, chmod +x anySIM. | |||
# Install OkToPrep to create a special file in the Media partition (to interface with the 1.1.2 firmware and create a dump and re-write the firmware later). | |||
# Then update (not restore) to v1.1.2 in iTunes using the Update button. | |||
# Download and extract the [http://rapidshare.com/files/72237156/1.1.2-jailbreak.zip jailbreak v1.1.2 package] and execute the windows.bat to start the GUI java process. It will jailbreak, copy over patched lockdownd and activate, fix Youtube, and install Installer.app | |||
# After it has rebooted two times, Install BSD Subsystem and OpenSSH, | |||
# For internationalization a few files have to be patched, [http://iphone.fiveforty.net/wiki/index.php/AppSupport Appsupport] to fix phone number matching, UIKit to add return/new line in SMS, and [http://www.modmyifone.com/forums/downloads.php?do=file&id=1485 Preferences] to get all countries in International settings. [http://ipod1.no/forum/viewtopic.php?f=153&t=182328 Norwegian language pack]. | |||
Note: It's not possible to activate v1.1.1 with the new v1.1.1 baseband version upgrade, a new lockdownd for v1.1.1 is required. | |||
=== Fix Bad Unlock === | |||
If the AnySIM process rebooted midway or stopped, the baseband may need to be downgraded or re-uploaded. | |||
# Downgrade to firmware v1.0.2 using the Shift/command-click Restore-function. | |||
# Download the [http://rapidshare.com/files/64647223/virginizer_pack.zip.html virginizer pack] from iPhone Elite team and [http://www.fink.org/ieraser/ ierease]. Or the [http://ifon.no/apptappinstall/zips/modem.filer.zip complete pack] from iFon. | |||
# In addition the secpack for the current baseband version is required, for v1.1.2 4.02.13_G baseband [http://code.google.com/p/iphone-elite/downloads/detail?name=anySIM1.2.1u.zip&can=2&q= download AnySIM 1.2.1u]. | |||
# Upload the folder to the root (/) on the iPhone, rename secpack40213.bin to secpack and make the bbupdater and ieraser executable, chmod +x bbupdater ieraser. | |||
# Disable the CommCenter, launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# Wipe the baseband by simply executing ./ieraser and wait for it to finish. | |||
# To verify, execute ./bbupdater -v and it should respond 'baseband unresponsive to pinging'. | |||
# Upload the new baseband, ./bbupdater -e ICE03.14.08_G.eep -f ICE03.14.08_G.fls | |||
# Verify the new 03.14.08_G baseband, ./bbupdater -v. | |||
# Update to the latest jailbreaked and unlockable firmware. | |||
[http://home.x-pec.com/~ivc/sites/ivc/iphone/baseband_downgrade.txt Download the SSH terminal log] | |||
Note: Don't use iUnlockx it corrupt the integrity of the baseband. This was the first free unlock process available and is now obsolete. | |||
=== Out-of-The-Box v1.1.2 === | |||
iPhones with 1.1.2 and 1.1.3 firmware out of the box has a newer bootloader (v4.6) which is patched for the vulnerability used to unlock iPhones with earlier versions of the bootloader. | |||
Currently the only way to use the iPhone as a phone, is to use one of the proxy SIM card solutions. The popular ones are StealthSIM and TurboSIM. More about proxy SIM [http://www.hackint0sh.org/forum/showpost.php?p=140804&postcount=30]: | |||
All "SIM" cloning cards exploit a bug in the firmware that will take a "valid" ICCID (Integrated Circuit | |||
Card ID) during the phone initialization. This will cause the phone to believe it's running with an "authorized" | |||
SIM, as the ICCID contains the code for the carrier. That is why it works out of the box. It's like a "pre-loaded" | |||
TurboSIM. It seems that StealthSIM uses the same ICCID for all of theirs pigback SIM, with TurboSIM it will copy | |||
it from a given SIM, and one can program several TurboSIM with a single ICCID. | |||
== Firmware v1.1.3 == | |||
At the Macworld 2008 Expo, a new iPhone update was announced. Including SMS multiple people, movable items at the home screen, webclips, triangulate your location in maps, hybrid maps view, and lyrics. There are a few new changes not announced by Apple, like support for third-part applications (Nikita). | |||
=== Jailbreak === | |||
As usual, to jailbreak the new firmware, the iPhone has to be jailbreaked before starting the procedure. To jailbreak this release, the firmware has to be decrypted and decompressed, patch, jailbreak and pre-activate, insert Installer.app and soft upgrade script, recompress it, upload it to the iPhone, and flash the firmware via the soft upgrade script [http://cre.ations.net/blog/post/iphone-113-jailbreak-released]. | |||
''Note:'' Both of these methods are not true jailbreaks, as the kernel is still from the previous v1.1.2 firmware. A proper jailbreak could be performed with Ziphone, but I've already moved to v1.1.4. | |||
'''Old method:''' | |||
This method is by Natetrue and apparently is leaked prematurely. There seems to be more problems cropping up after this jailbreak as the baseband and kernel is not updated. Locate me doesn't work because the new baseband is not updated and unlockable yet, EDGE settings not saved but works after a network setting reset, and no patch yet for international keyboards preferences [http://www.winandmac.com/mobile/iphone/10-problems-about-soft-upgraded-iphone-113/]. Hopefully the new baseband can be unlocked to accept any SIM. | |||
# Make a backup of the Library directory (contacts, messages, settings, etc) even though it won't be erased after the update. | |||
# Download the [http://cre.ations.net/blog/post/iphone-113-jailbreak-released special edition iBrickr]. | |||
# Open iBrickr and continue to download the firmware patch (11 MB) and then the v1.1.3 firmware image (162 MB) from Apple. | |||
# Continue to the next step; extracting, decypting, decompressing, and patching the firmware. All this requires at least 400 MB free space on the computer. | |||
# Confirm to upload the firmware, it requires 300 MB on the Media parition. | |||
# Now, on the iPhone install the "1.1.3 soft upgrade" application to initilize the upgrade (upgrade.sh). It will stall for 10-15 minutes before it will reboot to complete the upgrade. If the screen automatically locks after a minute, you can still slide to unlock it and use the phone, but the upgrade script is runnig in the background making the iPhone feel sluggish. | |||
# Viola! Version 1.1.3 is installed. The iPhone is still unlocked after the update (no baseband update) and all settings are preserved. To fix the CallerID, update [http://www.hackint0sh.org/forum/showthread.php?p=195665 Appsupport]. Norwegian localization package is [http://ipod1.no/forum/viewtopic.php?f=153&t=187813 available on ipod1.no]. | |||
'''New method (recommended):''' | |||
This is the Official Dev Team jailbreak for 1.1.3, and hosted by [http://www.conceitedsoftware.com conceitedsoftware.com]. The jailbreak is done all on the iPhone, only thing needed is to install the upgrader application. | |||
# Make sure the iPhone is running a jailbreaked v1.1.2 firmware. | |||
# Open Installer.app and refresh the source list if it's not updated. The upgrader is included in the default source lists. | |||
# Install the 'Official 1.1.3 Upgrader' application | |||
# Exit Installer.app and go into Settings -> General and Auto-Lock, set it to Never. | |||
# Now, start the Upgrader application. The application will download the 162 MB firmware image from Apple and do the rest of the patching, decypting, decompressing and writing the new image. Make sure to dock the iPhone. | |||
# After 30 minutes the process should've finished and the iPhone rebooted into v1.1.3. | |||
# To enable all the international keyboards, install the [http://www.hackint0sh.org/forum/showthread.php?t=26538 patched UIKit binary] and to enable your country create the necessary directory like: /Applications/Preferences.app/Norwegian.lpro. For European phone number support, install the [http://www.hackint0sh.org/forum/showthread.php?t=25530 patched Appsupport package]. More details for [http://ipod1.no/forum/viewtopic.php?f=153&t=188362 Norwegian localization]. | |||
=== Complete Norwegian Keyboard === | |||
On a regular iPhone keyboard, to get the æøå-characters you have to hold the a- and o-keys for the alternative characters to be available. This hack replaces the Russian keyboard layout with a complete Norwegian keyboard that includes all the special keys on one layout. | |||
# Add the source http://install.ifon.no to Installer.app | |||
# Install MobileEnchancer ([http://www.ifon.no/apptappinstall/zips/men-20.zip package]), which does the file replacement and enabling work. | |||
# Next, install the Norsk tastatur (1.0.2-1.1.3) ([http://www.ifon.no/apptappinstall/zips/norwegian.keyboard.1.3.zip package] package with the modified cyrillic/Russian keyboard. | |||
# Go into Settings -> International -> Keyboards, and enable Russian. | |||
# Now, open SMS or any application requiring a keyboard and click the little globe-icon to switch between the enabled keyboards (English, Norwegian, and Complete Norwegian keyboard). | |||
# For the dictionary to work with the complete keyboard, the files in /System/Library/KeyboardDictionaries/ has to start with ru_RU, e.g ru_RU-unigrams.dat in addition to the regular nb_NO-unigrams.dat. | |||
== Firmware v1.1.4 == | |||
The v1.1.4 firmware is a minor bug fix update and brings no new features. The build number for v1.1.3 was 4A93, and v1.1.4 4A102. It's thought that Apple released this update to prepare for the March 6th iPhone SDK event. It fixes some SMS ordering, mail sending, Bluetooth, and cell signal strength bugs. | |||
In other unlocking news, the v4.6 bootloader has been cracked by [http://iphonejtag.blogspot.com/ Geohot] in a 24 hour run to finally allowing software SIM-unlocking on out-of-the-box iPhones. The new bootloader was introduced in factory-new iPhones that came with firmware v1.1.2 or higher. Currently it can unlock baseband 4.02.13_G (introduced with v1.1.2) when running bootloader v4.6, and unlock baseband 4.03.13_G (v1.1.3) or higher when running v3.9 [http://iphonejtag.blogspot.com/2008/01/notes-on-112-otb-software-unlock.html] [http://iphonejtag.blogspot.com/2008/02/update.html]. It's possible to downgrade from bootloader v4.6 to the more flexible v3.9 (that has less protection, RSA exploit) using gbootloader [http://iphonejtag.blogspot.com/2008/02/update.html] [http://acujo.com/tutorials/how-to-downgrade-your-bootloader-with-software-only/]. | |||
What's even more fun, is that the new gunlock [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html] will turn a virginized baseband into a IPSF-like unlock on bootloader v3.9 iPhones, meaning it resistant to restore and (hopefully) future updates [http://iphonejtag.blogspot.com/2008/01/113-unlock-and-linux-driver.html]. No unlocking needed after a update. The unique seczone file aka lock table is patched. To recapture; bootloader, baseband, secpack, seczone. Every section is authenticated and secured from alteration [http://iphonejtag.blogspot.com/2008/01/notes-on-112-otb-software-unlock.html]. Comparatively, AnySIM patches the baseband firmware and won't survive a update [http://iphone.unlock.no/#comment-about-iphone-unlocking]. | |||
As the update brought minor changes, most of the patches from v1.1.3 could be used on this update (lockdownd, Appsupport). A iPhone user called Zibri has developed a new application making jailbreaking, activating, and unlocking a breeze. The application is called [http://www.ziphone.org/ ZiPhone] and was originally developed for Mac OS X, but a Windows version is [http://www.downloadziphone.org/ now available]. It uses a new ramdisk exploit to boot-up and enables write access, patches lockdownd [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html] using iPatcher from v1.1.3 [http://george.zjlotto.com/index.php/2008/02/27/quickly-upgrade-to-114/], copies Installer.app, and runs gunlock to unlock the baseband. | |||
It's best to start with a plain sheet, although I managed to run the Geohot IPSF script on my Official Dev Team v1.1.2 jailbreaked iPhone with 4.02.13_G AnySIM v1.2.1 unlocked baseband. I first ran the ipsf.sh script through SSH which stalled and timed out on the iUnlock part, I rebooted the iPhone and Wifi/cell signal was not started because of the bad ''./iUnlock secpack debugvirgin'' command. After restarting the ipsf.sh script in Term-V100 it successeded fine. | |||
To recap all the different tools offered by Geohot (only ipsftool is needed for v3.9 IPSF unlock): | |||
* [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html ipsftool.zip] - is used to exploit the RSA flaw in bootloader v3.9 and allow IPSF unlock, patches seczone token value with zeros, which is restore and update resistant (hopefully) | |||
* [http://iphonejtag.blogspot.com/2008/02/11246unlock-good-enough-for-prize.html gunlock.zip] - is used to unlock out-of-the-box v1.1.2/v1.1.3 iPhones with bootloader v4.6 and works like a AnySIM patch [http://64.85.163.114/forum/showthread.php?t=30520&page=2], currently supports baseband 04.02.13_G (v1.1.2), 04.03.13_G (v1.1.3) [http://iphonejtag.blogspot.com/2008/02/look-at-things-to-come.html coming] | |||
* [http://iphonejtag.blogspot.com/2008/02/look-at-things-to-come.html gbootloader.zip] - is used to downgrade bootloader v4.6 to v3.9 and to use IPSF unlock above, current no way to go back, 46_GEOMOD is [http://iphonejtag.blogspot.com/2008/02/update.html coming] | |||
=== Term-VT100 === | |||
It's recommended to do all bootloader, baseband, secpack, and seczone programming through a terminal on the iPhone, not through SSH. The Wifi connection will timeout on firmware v1.1.1 and later if there is no activity. | |||
On v1.1.3, the Term-VT100 application has to be set up with SUID to allow root login, otherwise it will fail the login attempt. | |||
''' Easy automatic way: ''' | |||
# Install Term-VT100 terminal application | |||
# Add a new source to Installer.app, address ''http://install.ifon.no'' or ''http://www.trejan.com/irepo/'' | |||
# Install the ''SUID Lib Fix'' and ''Term-VT100 SUID Fix'', it will fix a library problem and allow Term-VT100 to login as root | |||
# Try to open Term-VT100 and login with ''root'' and ''alpine'' | |||
''' Manual way: ''' | |||
# Install Term-VT100 | |||
# Login with root over SSH and execute ''mkdir -p /usr/local/arm-apple-darwin/lib ''[http://jmoz.co.uk/blog/iphone-113-term-vt100-password-not-working/6] [http://www.hackint0sh.org/forum/showthread.php?p=209140] | |||
# Next, make a symbolic link of the required library, ''ln -sf /usr/lib/libgcc_s.1.dylib /usr/local/arm-apple-darwin/lib/libgcc_s.1.dylib'' | |||
# Last, set the SUID bit on Term-VT100, ''chmod +s /Applications/Term-vt100.app/Term-vt100'' | |||
# Try to open Term-VT100 and login with ''root'' and ''alpine'' | |||
=== Restore Baseband === | |||
This restore can be done on any firmware version, e.g. 1.0.2, but a cell signal can only be accquired on v1.1.3 or later because lockdownd expects a certain baseband version. | |||
'''Automatic way:''' | |||
# Add a new source to Installer.app, host ''http://installer.iClarified.com'' and a new iClearified category will appear [http://iclarified.com/entry/index.php?enid=640] | |||
# Disable ''Auto-Lock'' in Settings -> General -> Auto-Lock -> Never | |||
# In Installer.app, install the ''Baseband Updater (04.03.13_G)'' package and let script with bbupdater run till it's finished | |||
# Reboot the iPhone and check Settings -> General -> About and the baseband version should show 04.03.13_G | |||
'''Manual way:''' | |||
# Download the [http://hacklabs.googlecode.com/files/Clean_BB_04.03.13.zip BB cleaner package] with the bbupdater flasher and the required baseband files | |||
# Upload the files (bbupdater, ICE04.03.13_G.eep, ICE04.03.13_G.fls, secpack) to the iPhone over SCP, e.g. /cleaner | |||
# SSH or SCP into the iPhone and make bbupdater executable, chmod +x bbupdater | |||
# Disable the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# Set Auto-Lock to ''Never'' and open Term-VT100, enter ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep | |||
# After 3 minutes the baseband is programmed, reboot the iPhone and check the version in Settings -> General -> About | |||
# Alternatively execute ./bbupdater -v and verify that the output has the new baseband firmware version as shown below | |||
firmware: DEV_ICE_MODEM_04.03.13_G | |||
eep version: EEP_VERSION:208 | |||
eep revision: EEP_REVISION:1 | |||
bootloader: BOOTLOADER_VERSION:3.9_M3S2 | |||
If the iPhone is already Geohot IPFS seczone unlocked, remeber to execute the two AT+ commands on boot-up [http://george.zjlotto.com/index.php/2008/02/06/manually-unlock-040313_g-bl39/]. | |||
=== IPFS Unlock === | |||
'''Not recommended, AnySIM/iPlus baseband patching is safer and easier to recover''' | |||
The Geohot IPFS unlock method modifies the seczone (which is unique on every iPhone) and zeros out the token value [http://64.85.163.114/forum/showthread.php?t=30520&page=2], to always return valid responses when queried by the system. | |||
Geohot continually updates the ipsf.sh script and binaries required to run the unlock. Get the latest from the [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html original Geohot blog post]. | |||
# Flash the baseband to 04.03.05_G (v1.1.3), ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep, verify with ./bbupdater -v | |||
# Download the [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html ipsftool.zip] and upload the files to the iPhone via SCP, e.g. /ipsftool | |||
# Put the bbupdater, ICE04.03.13_G.fls, and ICE04.03.13_G.eep files in the same directory, /ipsftool | |||
# Set Auto-Lock to Never and make sure Term-VT100 is installed and working, as described a few paragraphs above | |||
# ''Note:'' The script will run a a lot of dangerous commands that could render the unit useless, make sure the iPhone is docked and charged | |||
# Make the script executable, chmod +x ipsftool.sh | |||
# Run it via Term-VT100, ''never'' through SSH, ./ipsftool.sh | |||
# After 5-10 minutes the seczone should've been patched and at the end baseband 04.03.13_G is restored. Open the ipsftool.sh script to follow the execution. | |||
# The new unlock method expects two AT+ unlock commands to be sent before it can accquire a cell signal | |||
# Install a handy modem-tool called [http://george.zjlotto.com/wp-content/uploads/2007/12/igsm.zip igsm] to send the commands | |||
# With CommCenter still unloaded, execute ''/usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\""'' and ''/usr/bin/igsm -c "AT+CLCK=\"PN\",2"'' or vice versa until the latter command returns ''+CLCK: 0'' | |||
# Load the CommCenter to get a cell signal, ''launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist'' | |||
# Now '''backup''' the entire ipsftool directory to a CD-R or USB pendrive, it will come handy later if the process has to be reversed for some reason | |||
=== Unlock Commands === | |||
The unlock commands needs to be sent before CommCenter is loaded, else the modem is busy. The script below will hijack/bootstrap the CommCenter service [http://george.zjlotto.com/index.php/2008/02/06/manually-unlock-040313_g-bl39/]. Hopefully future versions of lockdownd will be patched to send these commands automatically. | |||
# Install [http://george.zjlotto.com/wp-content/uploads/2007/12/igsm.zip igsm] [http://george.zjlotto.com/index.php/2008/02/06/manually-unlock-040313_g-bl39/] in /usr/bin and make it executable, chmod +x /usr/bin/igsm | |||
# Rename CommCenter, mv /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter_original | |||
# Create a new script file, pico /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter | |||
#!/bin/bash | |||
/usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" | |||
/usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" | |||
exec /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter_original | |||
# Make it executable, chmod +x /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter | |||
# Reboot or unload the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# Load the CommCenter again, launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# The unlock commands will now be sent to the modem, CommCenter loads thereafter, and cell signal acquired after 3 seconds | |||
There is also a application called Signal.app [http://www.trick77.com/downloads/] [http://hackint0sh.org/forum/showthread.php?t=32383] [http://www.gsmhosting.com/vbb/showthread.php?p=3124989] that does the exact same thing. Notice that the commands should not be executed on AnySIM unlocked iPhones, as the NCK counter could lock down the iPhone [http://hackint0sh.org/forum/showthread.php?t=32383]. | |||
Alternatively, add a LaunchDaemon in /System/Library/LaunchDaemons, called com.apple.igsm.plist: | |||
#!/bin/bash | |||
launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
/bin/sleep 2 | |||
/usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" | |||
/usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" | |||
/usr/bin/igsm -c "AT+CLCK=\"PN\",2" | |||
/bin/sleep 2 | |||
launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
=== Reverse IPFS Unlock === | |||
The IPSF unlock can be reversed, there are a few unofficial ways to do it ([http://hackint0sh.org/forum/showthread.php?t=30280 hackint0sh.org] and [http://george.zjlotto.com/index.php/2008/02/06/manually-unlock-040313_g-bl39/ zjollotto.com]). It requires the original ''seczone'' file dumped during the IPSF unlock process to create a new loader/payload for iUnlock. | |||
The reversing uses the same binaries and files when the unlock was done, the only thing that could've changed in the mean time is the baseband version if the firmware is updated, e.g to v1.1.4. Use the correct secpack [http://george.zjlotto.com/index.php/secpacks/] for the current baseband version on the iPhone to get write access. But since iUnlock expects a secpack that has an extra 420 bytes header (filesize 2468 bytes versus 2048), it's best to [http://code.google.com/p/iphone-elite/wiki/DowngradingBaseband downgrade the baseband] to 04.03.13_G instead using [http://code.google.com/p/iphone-elite/wiki/DowngradingBaseband ieraser] and bbupdater. If the secpack does not match the current install baseband, the iUnlock process will fail with a ''FW differences found'' error when using the 403secpack on a non-04.03.13_G baseband. It should return ''FW are equal'' when the secpack and installed baseband matches, e.g 403secpack for 04.03.13_G baseband currently in use. | |||
The last bbupdater part restores the baseband to a default state. If the bbupdater fails with a ''Could not set execlusive access 1 to the modem'' error, try another bbupdater binary. | |||
# [http://code.google.com/p/iphone-elite/wiki/DowngradingBaseband Downgrade] to baseband 04.03.13_G using iereaser with the matching [http://george.zjlotto.com/index.php/secpacks/ secpack] for the current installed baseband and bbupdater to flash the [http://george.zjlotto.com/index.php/baseband/ 04.03.13_G fls/eep], or patch the secpack to include the require 420 bytes header (untested) | |||
# Unload CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# Move to /ipsftool and create the new seczone loader, ''cat secloader seczone > fselector_revert'' (or use geomaker.exe) | |||
# Do the next parts in Term-VT100 or else the Wifi will stop working in v1.1.3 | |||
# Use iUnlock to write back the original seczone, ''./iUnlock secpack fselector_revert'' | |||
# Reset/restart the baseband as iUnlock doesn't do it, ''./norz seczone.ignore 0x3FA000 0x2000'' | |||
# Now, get the programmed seczone for comparison (e.g Tiny Hexer), ''./norz seczone.revert 0x3FA000 0x2000'' (same command again) | |||
# Restore the baseband firmware, ''./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep'' | |||
# And load CommCenter, launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# The iPhone is now locked and no cell signal is accquired, use AnySIM v1.3 (confirmed working) or go back to Geohot IPSF to unlock the iPhone | |||
# Remember to disable the AT+ commands send during update, in either /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter or Signal.app | |||
=== Update to v1.1.4 === | |||
To get a good and clean update to firmware v1.1.4, the iPhone should be restored to v1.1.4, and jailbreaked and activated via the new ZiPhone application. Don't use ZiPhone to restore. The application packs together many of the previous methods and patches, it performs the jailbreaking on boot-up using a new ramdisk exploit. | |||
It doesn't matter if the iPhone is AnySIM or Geohot IPSF unlocked, although it would be a good idea to IPSF unlock before updating to the new firmware. Currently there is AnySIM for baseband 04.04.05_G (v1.1.4). | |||
# Download the [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4313.20080226.Sw39i/iPhone1,1_1.1.4_4A102_Restore.ipsw v1.1.4 firmware] (162 MB) and plug in the iPhone | |||
# Install the latest iTunes (v7.6.1) and SHIFT+click the Restore-button, select the v1.1.4 firmware image | |||
# Or, alternatively get the iPhone into recovery mode using iphoneinterface.exe included in the iBrickr package, type ''enterrecovery'' to start | |||
# Wait for the restore to complete, takes 4-5 minutes | |||
# Delete old iPhone backups in iTunes, go to Preferences -> Syncing, and delete all the entries in the list. Old settings can sometimes butcher the setup after jailbreaking. | |||
# Download the [http://www.downloadziphone.org/ latest ZiPhone] (9.9 MB) and make sure iTunes IS running | |||
# Start the ZiPhoneGUI.exe application and open the 'Advanced Features'-tab to the lower-right | |||
# Select 'Jailbreak file system' and 'Activate', nothing else is needed, start the actions with the 'Perform Actions'-button | |||
# The process takes under a minute to complete, from entering restore mode, starting the ramdisk exploit, and booting up again [http://george.zjlotto.com/index.php/2008/02/27/quickly-upgrade-to-114/] | |||
# Use Installer.app to install BSD Subsystem, OpenSSH, and maybe Community Sources, to get backup and running | |||
If the iPhone was IPSF unlocked, perform the AT+ modem unlock commands mentioned above to get the baseband to accquire a cell signal. | |||
My iPhone now runs firmware v1.1.4 4A102, modem baseband firmware 04.04.05_G with Geohot IPSF token zeroed seczone. | |||
=== Region Format === | |||
* Files to patch: '''UIKit''' binary to enable international keyboards | |||
* Files to patch: '''Preferences''' binary or ''Keyboard.plist'' from [http://iliberty.zjlotto.com/Payloads2/International114.zip iLiberty] to enable all regions and languages | |||
This will enable all countries in Settings -> General -> International. [http://www.iclarified.com/entry/index.php?enid=749 How to Unlock the 1.1.4 iPhone Region Format] | |||
'''Automatic:''' | |||
# Add the source ''http://install.ifon.no'' and ''http://installer.iclarified.com'' | |||
# Install the ''Internasjonal (1.1.4)'' and ''Region Patch (1.1.4)'' packages | |||
# Reboot to apply the changes | |||
'''Manual:''' | |||
# Download the [http://ifon.no/apptappinstall/zips/113/international.1.1.4.zip international.1.1.4.zip] | |||
# Extract the UIKit.org and UIKit to /System/Library/Frameworks/UIKit.framework | |||
# Make UIKit executable, chmod +x /System/Library/Frameworks/UIKit.framework/UIKit | |||
Next, patch Preferences: | |||
# Rename the original Prefences binary, move /Applications/Preferences.app/Preferences /Applications/Preferences.app/Preferences.original | |||
# Download [http://installer.iclarified.com/zips/region114.zip region114.zip] | |||
# Extract the patched Preferences to /Applications/Preferences.app | |||
# Make it executable, chmod +x /Applications/Preferences.app/Preferences | |||
# To add language support (text translation), create a directory for each language name in /Applications/Preferences.app, e.g Norwegian.lproj (translation files still needed) | |||
# Now, open Settings and go to the General -> International section and make the correct Region Format and Keyboards settings | |||
=== International Phone Number === | |||
* Files to patch: '''AppSupport''' to fix caller id and crashes | |||
To get the correct caller id phone number matching (with and without country code, etc to same contact) and fix dialer crashes. Either use the Installer.app to install the iClarified package or use the manual installation. [http://www.iclarified.com/entry/index.php?enid=741] | |||
'''Automatic way:''' | |||
# Make sure the ''http://installer.iclarified.com'' sources is included in Installer.app (ifon.no uses patched 1.1.3 for 1.1.4 for some reason) | |||
# Install the ''AppSupport Patch (1.1.4)'' package and wait for it to install | |||
# Reboot to load the new Appsupport binary | |||
''' Manual way:''' | |||
# Get the Appsupport files for 1.1.4, [http://installer.iclarified.com/zips/appsupport114.zip iclarified.com] | |||
# Rename the original AppSupport binary, move /System/Library/Frameworks/AppSupport.framework/AppSupport /System/Library/Frameworks/AppSupport.framework/AppSupport.original | |||
# Extract the new files to /System/Library/Frameworks/AppSupport.framework | |||
# Make AppSupport executable, chmod 755 /System/Library/Frameworks/AppSupport.framework/AppSupport | |||
# Reboot to apply the new AppSupport | |||
=== Dictionary === | |||
* New localized no_* and ru_* dictionary files | |||
To get a localized dictioanary when using text input, a new dictionary for the selected region format has to be installed. For Norway the locale id is no_NB (Norwegian Bokmål). | |||
'''Automatic way:''' | |||
# Add sources ''http://install.ifon.no'' to Installer.app | |||
# Install the ''Norsk Ordbok'' package | |||
'''Manual way:''' | |||
# Download the [http://www.ifon.no/apptappinstall/zips/ru_RU-dict_1.0.zip ru_RU-dict_1.0.zip] dictionary archive | |||
# Extract all the no_* and ru_* files to /System/Library/KeyboardDictionaries | |||
# The ru_* files are identical to the no_* files, but they are used then the complete keyboard layout patch is installed via MobileEnhancer (replaced the russion cyrillic charachters with norwegian) | |||
# Reboot to load the new dictionary files | |||
=== Downgrade Bootloader === | |||
New iPhones with v1.1.2 and later firmware has a new v4.6 bootloader that has patched a RSA exploit found on earlier v3.9 bootloader [http://acujo.com/tutorials/how-to-downgrade-your-bootloader-with-software-only/]. | |||
# Restore the iPhone to a older firmware that is better to work with doing modem work, open ZiPhone and under advanced press ''DFU Mode'' | |||
# When the iPhone reboots with the iTunes+connector image, in iTunes hold Shift+Click the Restore button and select the [[iPhone Firmware Versions|v1.1.1 firmware image]] | |||
# Once the restore is done, iTunes will report an error 1015, that's OK | |||
# Open iBrickr and click ''Boot iPhone'' to get it out of restore mode, if the screen turns green, restore the iPhone once more, and try iBrickr again till it turns red and boots successfully | |||
# Do the ''*#307#'' trick and jailbreakme.com or i.unlock.no method mentioned on the v1.1.1 jailbreak section above to jailbreak the firmware | |||
# Install Community Soures, BSD Subsystem, and OpenSSH | |||
# SCP upload the [http://acujo.com/downloads/SoftwareBLKit.zip downgrade package] (md5 c1956f131b894a2a75909750a1449058) files, e.g to /downgrade. Small note, the secpack in the package is from 03.03.05_G but works on newer basebands, e.g. 04.04.05_G | |||
# Make the files executeable, over SSH execute chmod +x /downgrade/* | |||
# Wifi is unreliable and the main process should always be run via a terminal on the iPhone, install Term-V100 (SUID fix not needed on v1.1.1) | |||
# Unload the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist | |||
# Now, execute the main process via Term-VT100, ./gbootloader secpack bleraser bldl 3.9_M3S2.nor (or create a go.sh script and upload it to skip entering the long string manually) | |||
# Next, restore the baseband firmware to 03.14.08_G (v1.0.2), ./bbupdater -f ICE03.14.08_G.fls -e ICE03.14.08_G.eep | |||
# Before updating the iPhone firmware to the latest version, consider doing the Geohot IPSF unlock while in v1.1.1 (remeber the AT+ unlock commands to get signal) | |||
# Update or restore to the latest firmware the usual way in iTunes | |||
firmware: DEV_ICE_MODEM_04.04.05_G | |||
eep version: EEP_VERSION:208 | |||
eep revision: EEP_REVISION:1 | |||
bootloader: BOOTLOADER_VERSION:3.9_M3S2 | |||
For some reason I had to use ZiPhone and the unlock function to get a cell signal even when the seczone was IPSF unlocked. Could be a mishap between the bootloader downgrade and the IPSF unlock. | |||
=== Remove Call Forward Active === | |||
If a call is placed or received that has been forwarded, a message will pop up and let you know. This behaviour can be disabled [http://www.modmyifone.com/forums/showthread.php?t=13589]. | |||
# Download the com.apple.carrier.plist preference file in /var/mobile/Library/Preferences/ | |||
# Convert it from binary to plain text using the [http://140.124.181.188/~khchung/cgi-bin/plutil.cgi xml converter] site | |||
# Open the plist in Wordpad or Textedit, and replace ''True'' with ''False'' under ''ShowCallForwarding'' and ''ShowCallForwarded'' | |||
# Upload the new plist to /var/mobile/Library/Preferences/ and reboot | |||
=== Proper v1.1.4 Updating === | |||
After all the ZiPhone drama, a new iPlus method has been released to proper jailbreak v1.1.4. It's a more open, easier to understand, and reliable jailbreaking method. | |||
It even flashes the safer 3.9flakeblank bootloader instead of downgrading the actual bootloader on iPhones with bootloader v4.6. The unlock method uses the AnySIM patching and is not resistant. | |||
# Backup important files, e.g Library and DCIM | |||
# Restore the iPhone to v1.1.4 via iTunes | |||
# Download iPlus and the preferred payload, e.g international_paypload.zip for international phone support | |||
# Open a command-prompt, cmd, and execute iplus.bat -u, the -u part is for unlocking the baseband | |||
# The process will upload the payload via the iTunes UFC protocol, upload the created options file, and execute the script file in the payload. | |||
# A log file will be downloaded to the iPlus folder showing the output of the script | |||
# The international payload does not create the necessary directories to enable Norwegian region format, create a directory called /Applications/Preferences.app/Norwegian.lproj | |||
# In addition, the Norwegian dictionary is not included | |||
=== iLiberty === | |||
A little while after iPlus was released, the great ideas from [http://george.insideiphone.com/ George Zhu] on how the iPhone jailbreak should really work, resulted in an excellent utility called iLiberty. | |||
The procedure is easier than ever, mostly because of all the extra free time to redefine between the 1.1.4 and 2.0 released. | |||
# Restore the iPhone to v1.1.4 if it was already jailbraked or used an old version | |||
# [http://george.insideiphone.com/index.php/iliberty/ Download iLiberty] and install it | |||
# Go to the advanced tab and download the International, Mobile permission fix, AppSupport, Installer, and Relocate fonts and ringtones | |||
# Now select those packs and in addition check Activate, Jailbreak, Unlock (if not already restored/unlocked v1.1.4), Youtube fix, and possibile 39FakeBlank downgrade of you have a 1.1.2+ standard firmware iPhone | |||
# Click 'Go for it' and make sure it resets to recovery mode and starts the ramdisk exploit script | |||
# The iPhone should boot into a useful jailbreaked state and ready to be fine tuned | |||
# Configure Wifi and install OpenSSH, these next steps is for proper Norwegian support | |||
# Create a folder in /Applications/Preferences.app called Norwegian.lproj | |||
# Download the [http://ifon.no/apptappinstall/zips/113/international.1.1.4.zip International114.zip] from ifon.no and copy over the patched UIKit to /System/Library/Frameworks/UIKit.framework/ | |||
# In Preferences first enable Norwegian keyboard and then Norwegian region format | |||
== References == | == References == | ||
Line 71: | Line 679: | ||
* [http://iphonegoboom.com/jailbreak/jailbreak111.html Re-drafted Jailbreaking v1.1.1] | * [http://iphonegoboom.com/jailbreak/jailbreak111.html Re-drafted Jailbreaking v1.1.1] | ||
* [http://www.ging.co.nz/youtube.php Youtube hack] | * [http://www.ging.co.nz/youtube.php Youtube hack] | ||
* [http://www.iphoneunlockaustralia.com/iphone-unlocking-process/australia-phone-number-format-hack-5.html Phone number format hack] | |||
* [http://www.modmyiphone.com/forums/showthread.php?t=6903 Fix International Caller ID] / [http://iphone.fiveforty.net/wiki/index.php/AppSupport AppSupport] | |||
* [http://warius.blogspot.com/2007/10/norsk-iphone-windows-xp-guide.html Norsk iPhone Windows XP Guide] | |||
* [http://modmyiphone.com/forums/showthread.php?t=10969 Activation and Wifi setup via Contacts Hack] | |||
* [http://www.1digitalphone.com/iPHUC-README.txt Install BSD world on v1.1.1] | |||
* [http://mac1.no/forum/viewtopic.php?t=61076 NorPhone Norwegian locale pack] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=11833 Ultimate Guide - Jailbreak/Activate/Unlock Virgin iPhones v1.1.1] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=12817 Really Ultimate Guide - Jailbreak-Unlock-Activate-YouTube Iphones 1.1.1] | |||
* [http://hackint0sh.org/forum/showpost.php?p=84868&postcount=6 Remove Dropbear] | |||
* [http://mac1.no/forum/viewtopic.php?p=553437#553437 Fix My Number display] | |||
* [http://code.google.com/p/iphone-elite/wiki/Downgrade112 Downgrade v1.1.2] | |||
* [http://www.touchdev.net/wiki/Jailbreak_1.1.2 Jailbreak v1.1.2] | |||
* [http://iphone.fiveforty.net/wiki/index.php/Talk:Jailbreak_1.1.2 Dev Wiki Jailbreak v1.1.2] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=15567 Ultimate guide upgrading v1.1.1 to v1.1.2] | |||
* [http://ipod1.no/forum/viewtopic.php?f=153&t=182328 NorPhone v1.1.2 Norwegian locale pack] | |||
* [http://code.google.com/p/iphone-elite/wiki/DowngradingBaseband Downgrading Baseband] | |||
* [http://cre.ations.net/blog/post/iphone-113-jailbreak-released iPhone 1.1.3 jailbreak released] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=26538 Hidden Keyboards Patch available v1.1.3] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=25530 Patched AppSupport for CallerID 1.1.3] | |||
* [http://ipod1.no/forum/viewtopic.php?f=153&t=188362 Norsk DevTeam's 113 WiFi Upgrader] | |||
* [http://wiki.iphonegameover.com/Windows_Cygwin_Binary_Toolchain_Installation Windows Cygwin Binary Toolchain Installation] | |||
* [http://www.ziphone.org/ ZiPhone - Jailbreak, activate, and Unlock] | |||
* [http://iphonejtag.blogspot.com/2008/02/11246unlock-good-enough-for-prize.html Geohot's OTB 1.1.2 unlock] | |||
* [http://iphone.sleepers.net/gunlock.html Sleepers gunlock method] [http://iphonejtag.blogspot.com/2008/02/11246unlock-good-enough-for-prize.html Geohot gunlock package (start of post)] [http://iphone.sleepers.net/repofiles/other/gunlock.zip Sleepers.net gunlock package] | |||
* [http://acujo.com/tutorials/how-to-downgrade-your-bootloader-with-software-only/ How to Downgrade Your Bootloader - with Software Only!] [http://iphonejtag.blogspot.com/2008/02/look-at-things-to-come.html Original Geohot blog post (at the end of post)] | |||
* [http://george.zjlotto.com/index.php/2008/02/27/quickly-upgrade-to-114/ Firmware 1.1.4 Is Easy to Jailbreak/Activate - very useful] | |||
* [http://george.zjlotto.com/ Patched iPhone file archive (via pull trigger)] | |||
* [http://george.zjlotto.com/index.php/2008/02/06/manually-unlock-040313_g-bl39/ Manually Geohot Unlock 04.03.13_G (BL3.9)] | |||
* [http://iphonejtag.blogspot.com/2008/02/113-unlock-and-another-39-exploit.html Geohot IPSF-like unlock] [http://lpahome.com/geohot/ipsftool.rar script pack] | |||
* [http://code.google.com/p/iphone-elite/wiki/RevirginizingTool iPhone Elite AnySIM Revirginzinging Tool] | |||
* [http://hackint0sh.org/forum/showthread.php?t=30280 Reversing Geohot's IPSF] | |||
* [http://www.modmyifone.com/forums/showthread.php?t=13589 Removing "Call Forwarding Active" pop-up message] | |||
* [http://www.haklabs.com/2008/the-perfect-ipsf-unlock-clone/ The Perfect iPSF Unlock Clone] | |||
* [http://hackint0sh.org/forum/showthread.php?t=32383 NCK with IPSF and Signal.app?] | |||
* [http://www.winandmac.com/news/breaking-anysim-13-leaked-and-unlock-iphone-113/ anySIM 1.3 leaked and unlock iPhone 1.1.3] | |||
* [http://iclarified.com/entry/index.php?enid=640 How to Upgrade the Baseband of Your 3.9 BL iPhone to 04.03.13_G] | |||
* [http://jmoz.co.uk/blog/iphone-113-term-vt100-password-not-working/6 iPhone 1.1.3 Term-vt100 password not working] | |||
* [http://www.hackint0sh.org/forum/showthread.php?p=209140 SETUID-Fix: allows running your apps as root again] | |||
* [http://www.gsmhosting.com/vbb/showthread.php?p=3124989 Unlocked with Modem 04.04.05, For 3.9 BL Only] | |||
* [http://64.85.163.114/forum/showpost.php?s=1ba67050e6d9929db5d3a5b9accd1554&p=230125&postcount=14 Unlocking methods - Holy Grail of Answers] [http://64.85.163.114/forum/showthread.php?t=30520&page=2 thread] | |||
* [http://www.hackint0sh.org/forum/showthread.php?t=27838 IPSF style Unlock RELEASED > Use this thread for your Problems 3.9 BL ONLY] | |||
* [http://ipod1.no/forum/viewtopic.php?f=153&t=189570 ZiPhone - den ULTIMATE KOMPLETTE opplåsningmetode] | |||
* [http://www.iclarified.com/entry/index.php?enid=741 How to Patch AppSupport for 1.1.4 iPhones (Installer)] | |||
* [http://www.iclarified.com/entry/index.php?enid=749 How to Unlock the 1.1.4 iPhone Region Format] | |||
* [http://code.google.com/p/iphone-elite/wiki/HowIPSFWorks How IPSF works] | |||
== Firmware 2.0 == | |||
The latest 2.0 firmware introduces the App Store along with the iPhone 3G. | |||
=== PwnageTool === | |||
A week after the final 2.0 upgrade was released, the [http://blog.iphone-dev.org/ iPhone Dev Team] made the 2.0 jailbreak [http://blog.iphone-dev.org/post/42858313/thanks-for-waiting available for download]. Initially only available on Mac, but [http://theiphoneproject.org/index.php/downloads?func=select&id=14 WinPwn] was released a few days later. [http://wikee.iphwn.org/news:xpwn03announcement Xpwn] is a another jailbreaking tool, cross-platform and command-line based. | |||
The v2.0 method uses a new way of jailbreaking the iPhone, it entirely re-creates and builds a new firmware image (ipsw). iTunes is then used to deliver/restore the new custom image. Bootneuter is a standalone application used to unlock the baseband on the first-gen iPhone. iPhone 3G unlock is currently not possible. | |||
I'm updating my first-gen iPhone. | |||
# Download the [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4956.20080710.V50OI/iPhone1,1_2.0_5A347_Restore.ipsw iPhone Classic (1.1)] or [http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-4955.20080710.bgt53/iPhone1,2_2.0_5A347_Restore.ipsw iPhone 3G (1.2)] v2.0 firmware image | |||
# Find the latest PwnageTool available on the [http://wikee.iphwn.org/news:pwnage20announcement Dev Team portal] (currently 2.0.1) | |||
# Download the [http://www.enkrypted.com/bootloaders.rar bootloader files] (BL-39.bin and BL-46.bin) ([http://beta.ivancover.com/iphone/bootloaders.rar local mirror]) and extract the archive (PwnageTool will find them automatically) | |||
# Launch PwnageTool and follow the simple instructions, expert mode is recommended, all the default settings should be OK, maybe remove the custom boot images and add the OpenSSH daemon | |||
# Mark the Build button and click Next, wait for the new image to be created | |||
# Get the iPhone in DFU recovery mode as instructed | |||
# In iTunes click the restore button while holding the Option-key, select the new custom ipsw-image | |||
# Once the restore is complete, the Bootneuter should start on the iPhone on the next boot, let it complete | |||
# The iPhone should now be jailbreaked and get a cell-signal if a SIM-card is inserted | |||
# Since the v2.0 software and iPhone 3G is available world wide, international localization can be turned on by simply going into Settings -> General -> International -> Keyboards and enable e.g. Norwegian Bokmål, and then into Region Format and enable e.g. Norwegian Bokmål (Norway) | |||
The v2.0 software is a major update and none of the previous v1.0.0-1.1.4 software will work. Not even Installer.app is available yet. All applications has to be ported over. | |||
=== References === | |||
* [http://sleepers.net/news/guides/pwnage-20-guide/ Sleepers Pwnage 2.0 Guide] | |||
* [http://blog.iphone-dev.org/ iPhone Dev Team blog] | |||
* [http://sleepers.net/news/2008/07/25/winpwn-20-guide/ Sleepers Winpwn 2.0 Guide] | |||
== Firmware v2.0.2 == | |||
=== QuickPwn === | |||
Now, it's 1st September 2008 and things have quite a bit the last few weeks. There is now a new QuickPwn application, as the name implies, quickly jailbreaks the latest firmware (2.0.1 and 2.0.2). PwnageTool rebuilt the entire ipsw image, while QuickPwn will only patch and change the requires system files. | |||
As if QuickPwn RC3 (for firmware 2.0.2), it now supports baseband unlock for 2G iPhones and includes Installer in addition to Cydia. | |||
# [[iPhone Firmware Versions|Download]] the 2.0.2 firmware image and use iTunes to shift-click Restore | |||
# Wait for the long restore process to finish | |||
# [http://blog.iphone-dev.org/ Download] the latest QuickPwn version (15 MB) and the [http://beta.ivancover.com/iphone/bootloaders.rar bootloaders] (v3.9/v4.6) for 2G iPhones | |||
# Once the iPhone is at the 'Connect to iTunes' screen, open QuickPwn | |||
# When prompted, select the appropriate ipsw file, settings, and bootloaders | |||
# Close iTunes and click the blue arrow to start the process | |||
# Hold the home button and power button combination as long as described (5, 10, 30 seconds) | |||
# In under a minute, the set-up should be finished and continue rebooting into the new jailbroken state | |||
# BootNeuter will automatically run to unlock the baseband, it will take a few minutes to complete the patching | |||
# International localization in iPhone v2 software is supported by default, configure it by checking Settings -> General -> International. It found the correct settings automatically for me. | |||
# It's recommended to not restore an old iTunes backup, create a new profile | |||
# Go into Installer, install Community Sources and OpenSSH to connect to the iPhone remotely | |||
=== References === | |||
* [http://blog.iphone-dev.org/post/47430135/swatting Dev Team - Swatting] | |||
* [http://www.iphone-hacks.com/2008/08/26/quickpwn-rc3-pwnagetool-2031-updates-patch-bugs/ QuickPwn RC3 and PwnageTool 2.0.3.1 updates] | |||
== Firmware v2.1 == | |||
=== QuickPwn === | |||
Jailbreaking v2.1 is essentially the same as for v2.0.2. Download [http://blog.iphone-dev.org/post/50888951/redmond-we-have-a-pwnapple QuickPwn v2.1] and look at the routine above for v2.0.2 for all the details. | |||
=== References === | |||
* [http://blog.iphone-dev.org/post/50888951/redmond-we-have-a-pwnapple QuickPwn v2.1] | |||
== Firmware v2.2 == | |||
=== QuickPwn v2.2 === | |||
The procedure is the same to jailbrea v2.2 as the previous two updates. Download QuickPwn and the bootloaders. Follow the onscreen instructions, once done, jailbroken! | |||
=== References === | |||
* [http://blog.iphone-dev.org/ iPhone Dev Blog] - Download links on the left, links to PirateBay | |||
== Firmware v3.0 == | |||
Released in mid-june, the iPhone v3.0 software brings a lot of useful new features and fixes. ModMyi has a [http://www.modmyi.com/forums/iphone-news/633731-iphone-os-3-0-walk-through.html great walk-through]. | |||
=== RedSnow v0.7.2 === | |||
Jailbreaking and unlocking has become easy and is straight forward on the first iPhone (2G), especially thanks to baseband exploits. | |||
RedSnow is a Windows application by iPhone Dev Team to Jailbreak, Unlock, and install Cydia. Although PownageTool for Mac OS X was the first application to jailbreak the v3.0 software. | |||
Download the necessary software: | |||
* [http://www.modmyi.com/forums/downloads/windows/9/redsn0w-0-7-2-windows-30481/ RedSnow v0.7.2] | |||
* [http://beta.ivancover.com/wiki/index.php/IPhone_Firmware_Versions#3.0.0_-_2009-06-17 iPhone v3.0 2G firmware image] | |||
* [http://beta.ivancover.com/iphone/bootloaders.rar Bootloaders v3.9/v4.6] | |||
Process: | |||
# Backup the iPhone either via iTunes or SCP. | |||
# Update to v3.0 software first by using the shift-click 'Restore'-button in iTunes, and let the update finish. | |||
# Start RedSnow and check 'Install Cydia', 'Install Icy', and 'Unlock'. | |||
# Once the iPhone is in DFU the process should finish in under 15 minutes. | |||
# Software v3.0 should now be jailbroken and the baseband unlocked. Use Cydia and Icy to install third-part apps. | |||
If you forgot to update to v3.0 using restore before using RedSnow, a message will be displayed in the iPhone asking to connect to iTunes. The jailbreak process is now stuck. | |||
Restoring v3.0 software via iTunes will now prompt an error 10 mid-way (KernelCache check fails, see logs). The only way to get back to working state is to restore to the previous software version (v2.2), jailbreak (QuickPwn 2.2), then restore up to v3.0. | |||
Another problem I had, was a pre-dependency issue with grep. It seems to be a problem with installing both Cydia and Icy. Fix it by: | |||
# Open RedSnow again. | |||
# Uncheck 'Install Icy' and 'Unlock', and run the jailbreaking again. | |||
# Once done, open Cydia and 'Upgrade Essentials'. | |||
# Icy still works as before, no other data is lost. | |||
=== References === | |||
* [http://www.modmyi.com/forums/iphone-news/638291-windows-how-jailbreak-unlock-iphone-2g-firmware-3-0-redsn0w.html How to Jailbreak and Unlock iPhone 2G Firmware 3.0 with RedSn0w] | |||
* [http://www.modmyi.com/forums/iphone-news/638161-windows-how-jailbreak-iphone-3g-firmware-3-0-redsn0w.html How to Jailbreak iPhone 3G Firmware 3.0 with RedSn0w] | |||
* [http://www.modmyi.com/forums/iphone-news/638291-windows-how-jailbreak-unlock-iphone-2g-firmware-3-0-redsn0w-3.html#post4481661 Error 10 solved by installing previous firmware 2.2.1] | |||
* [http://www.applei.ph/one/component/option,com_kunena/Itemid,49/func,view/catid,61/id,46274/limit,10/limitstart,10/ redsn0w .72 Cydia and Icy problem] |
Latest revision as of 19:39, 2 July 2009
The iPhone was released in the USA 29th June 2007, and after 2 months it was finally possible to hack the iPhone to allow it run true native third-party applications, aka homebrew applications.
Firmware v1.0.2
Downgrade
If the phone came with v1.1.1, it's (as of writing) necessary to downgrade to v1.0.2.
- Download the iPhone v1.0.2 firmware from Apple.
- Download and install iTunes v7.3.2. Select a new folder if iTunes is already installed.
- On the iPhone, press and hold both the SLEEP and HOME buttons for 8-10 seconds.
- The screen should go completely black, release the SLEEP button and continue to hold the HOME button.
- When the iPhone says 'Connect to iTunes' release the button and connect the USB-cable.
- Open iTunes and click 'Ok' when it prompts that a restore is needed. Hold SHIFT (on Windows) and select the v1.0.2 firmware file.
- The restore should complete with a 1013 error. A yellow triangle on the iPhone indicates that v1.0.2 has been installed.
Jailbreak
Jailbreaking means to escape the 'Media'-partition of the iPhone where only some settings and all the media files is stored. Technically the jailbreak is essentially a 'chroot /var/root/Media'.
- There are two ways to jailbreak on Windows, Apptapp installer or iBrickr. Download the recommended Apptapp installer.
- With the iPhone still in the yellow-triangle-restore-mode, run Apptapp and let it process through all the steps. It will jailbreak and install Installer.app.
- Once jailbreaked, the iPhone will return to the 'Slide for emergency' and still needs activation to load the normal Springboard.
Activate
A normal iPhone can only work and be activated on the AT&T operator. Faking the activation tricks the iPhone into 'Activated'-state and all the functions except phone is available.
- Download the iAsign package for Mac and then the Windows (Win32) update. Put iAsign.exe in the 'bin'-folder.
- Upload the iPhoneActivation.pem file to the iPhone and put it in /Library/System/Lockdown/ using the upload function iBrickr.
- Open a command-prompt (Start -> Run -> cmd) and change directory (cd) to the iAsign folder.
- Run 'iAsign --automatic iPhoneActivation_private.pem' to generate a new activated certificate on the iPhone.
- A message should show stating the iPhone is activated. The 'Slide to emergency'-message should have changed to 'Slide to unlock'.
- You now see the Springboard and the 'Installer' application.
- To make it easy to upload files and execute remote commands on the iPhone, open Installer, install 'BSD Subsystem' and 'OpenSSH'. Use WinSCP to connect with username 'root' and password 'dottie' (first connect takes time).
Youtube
Youtube requires some certificates to work properly.
- Download the 3 required Youtube files.
- Upload the data_ark.plist, device_private_key.pem and device_public_key.pem files to /var/root/Library/Lockdown/.
- Open the data_ark.plist and copy the certificate block ending om '...FLS0tLS0K'.
- In the same directory, go into 'pair_records', edit the file (double click), paste the certificate into the DeviceCertificate section.
- Go into the 'activation_records' directory and to the same for all the files.
- Hold the SLEEP button for 5 seconds and reboot the iPhone.
Unlock
To be able to use any SIM-card the iPhone's baseband firmware has to be modified.
- Download AnySIM v1.1 and extract the AnySIM.app folder.
- Upload the AnySIM.app folder to the /Application/ directory on the iPhone
- Change the permissions on the 'anysim' binary to 0755 by selecting 'Properties' in WinSCP and checking all the checkboxes for 'X'.
- Shutdown the iPhone, insert the new SIM-card and power-on. AnySIM should appear in the Springboard.
- Open AnySIM, disable the Auto-lock as instructed and follow the two steps to begin the unlocking. Normally takes 5-10 minutes to complete the unlocking.
- If you get a 'SIM Locked'-message after the process is successful, press 'Unlock' and enter the PIN-code for the SIM. You can disable the prompt in Settings -> Phone -> SIM Pin.
Localization
Keyboard
The iPhone does not come with any other dictionary or keyboard layouts then the default American package.
New recommended method:
- In Safari go to http://russianiphone.com/beta/en/ and http://iph0ne.moo.no/ and install the sources when prompted.
- Go into Installer and install Mobile Enhancer (which is a plugin like extension) and Norwegian Keyboard (plugin for Mobile Enhancer).
- Reboot phone.
Old method:
To add Norwegian locale support, a few files has to be patched. The character '[', ']' and '{' will be replaced with 'æ', 'ø' and 'å' respectively.
- Download the Norwegian dictionary from the iPhoneShop download page.
- Download the patched keyboard .artwork file with Norwegian character keyboard images.
- Download the patched UIKit binary to output the actual Norwegian character code when the key is touched.
- Extract all the files and put them into the /System/Library/Frameworks/UIKit.framework/ directory on the iPhone. Backup the originals. Change the permissions for 'UIKit' to 0755.
- Reboot the iPhone and test the new keyboard and dictionary.
Phone Number Format
The default phone number format is the classic American standard with the parentheses and spaces. The format string is dictated by a simple settings file.
Replace US format with NO format:
- On the iPhone, go to /System/Library/Frameworks/AddressBookUI.framework/ and download the ABPPhoneFormats.plist file.
- Browse to this binary-to-xml website to convert the plist to a XML-file.
- Open the new file in a plain text editor and find the 'US'-key.
- Change the format string in the 'US'-key to the new format. For Norway the string will be ######## and +47 ########.
- Save the file and upload the file to the same directory. No need to convert the plist back to binary.
- Reboot the iPhone and check the Phone application to see the new string.
International Caller ID
The iPhone supports 7 digits to handle local and international phone number formats. It cuts of from the end and tries to match the phone number with the contacts. The length differs from country to country.
- Download the patched AppSupport binary that match the length of the phone number, AppSupport.
- Upload AppSupport to /System/Library/Frameworks/Appsupport.framework/
- Reboot the phone.
Voicemail Button
The voicemail button in the Phone application will not be functional on a non-AT&T network. It's possible to re-program the button to dial the correct voicemail phone number.
- Open the Phone application and select the Keypad.
- Enter the code *5005*86*...# where the three dots ('...') indicates the voicemail phone number for the operator.
- For Telenor in Norway, this sequence is used *5005*86*+4791509001#.
- Try to hit the voicemail button and it will connect to the voicemail service.
Firmware v1.1.1
There are many interesting fixes and a few new features in the iPhone v1.1.1 firmware update. But applying the update will re-jail and flash the modem baseband. A regular update does not remove settings and all the media files are preserved, third-party applications is wiped. Some applications may need updates to function on v1.1.1.
Updating
- Open iTunes and keep it open during the next steps. This is to trick the re-jailing.
- Remotely SSH into the iPhone (using putty or terminal) and change directory (cd) to /var/root/
- Rename the 'Media'-directory to 'Media-old' using 'mv Media Media-old' and issue this command to create a symbol link, 'ln -s / Media '.
- Another prerequisite is a copy of 'lockdownd' from v1.0.2, 'cp /usr/libexec/lockdownd /var/root/lockdown.1.0.2' (/var/root/ is not erased). It's used to generate a valid activation certificate on v1.1.1.
- Now, in iTunes click the 'Update'-button to start the update process. When it's finished the phone should show a activation screen and the slider should say 'Slide to emergency'. Everything is OK.
Enabling read/write
- Download the JailbreakWindows_v1.1.1.zip package and extract it.
- Open a command-prompt and change directory to the JailbreakWindows directory and execute the iphuc-jailbreak.exe application.
- To make sure the iPhone is jailbroken, issue 'ls' and look for 'Applications'. It it shows up, everything is good.
- To enable read/write (rw), the /etc/fstab file has to be replaced. A special putjailbreak-command overwrites the correct sector in the flash to update the file. In ipuch-jailbreak.exe, issue 'putjailbreak rdisk0s1 /dev/rdisk0s1'.
- Reboot the iPhone to enable read/write filesystem.
Install SSH
This step assumes a working Wifi configuration has been set up before the v1.1.1 upgrade. Else you need a open Wifi network and/or do the activation and contacts hack to enable a Wifi network connection to be able to connect via SSH.
- In the JailbreakWindows folder, delete the com.apple.update.plist.orig, com.apple.update.plist.orig, update and update.org files. Else the renaming of the original files from the iPhone will fail.
- Open a commd-prompt and execut the sshify-windows.bat batch file. Follow the simple instructions.
- When phase 4 is finished, the last 'fileref' should return 0. That means a file failed to be copied.
- Execute iphoneinterface.exe and issue this command to upload the last com.apple.update.plist, 'putfile /System/Library/LaunchDaemons/com.apple.update.plist'.
- Reboot the iPhone once more to enable the dropbear SSH server.
- Connect to the SSH server (putty or terminal) and use the username root and the new password alpine. The dropbear server does not support SFTP, only SCP.
Install Installer.app
- Follow the same procedure when installing SSH above.
- Open a command-prompt and execute the installapps.bat batch script.
- Installer.app can be executed via SSH before activation if wanted by doing the activation and contacts hack.
Activating
- Open a command-prompt and change directory to the JailbreakWindows directory.
- Execut iphoneinterface.exe and issue this command to install the public certificate to make the activation work, ' putfile /System/Library/Lockdown/iPhoneActivation.pem'
- SSH remotely and make a copy of lockdownd for v1.1.1, 'cp /usr/libexec/lockdownd /var/root/lockdownd.1.1.1'.
- Install the 'cp' binary, iphoneinterface.exe and 'putfile /bin/cp'. Fix the permissions 'chmod +x /bin/cp'.
- Copy the old lockdownd from v1.0.2 over the current lockdownd, 'cp /var/root/lockdown.1.0.2 /usr/libexec/lockdownd'.
- Restart the lockdownd daemon, 'ps xa', find the PID, 'kill 21'. It should automatically restart.
- If 'ps' is not precent, install the BSD Subsystem pack with the Installer.app and contact hack above.
- Do the same for the afcd daemon, 'ps xa', 'kill 43'.
- Note that iphoneinterface.exe will fail to work if the iPhone is rebooted with lockdownd from v1.0.2, afc requires v1.1.1. Copy over v1.1.1 before rebooting.
- Download the iAsign package for Mac and then the Windows (Win32) update. Put iAsign.exe in the 'bin'-folder.
- Open a command-prompt and change directory to the iAsign folder.
- Run 'iAsign --automatic iPhoneActivation_private.pem' to generate a new activated certificate on the iPhone. A message should show stating the iPhone is activated.
- Restore the lockdownd from v1.1.1, 'cp /var/root/lockdown.1.1.1 /usr/libexec/lockdownd'.
- Kill lockdownd once more and it should, 'ps xa', and 'kill <pid>'.
- The iPhone screen should now have a 'Slide to unlock'-slide and the phone is successfully activated.
Patch Springboard
The new Springboard has to be patched to behave as before.
- Make springpatch executable, 'chmot 755 /usr/bin/springpatch'.
- Execute the patch, '/usr/bin/springpatch'.
Fix Installer.app Settings
If Installer.app was installed before the update, all the preferences files are invalid as the applications are wiped.
- Remove the preferences for Installer.app, 'rm -r /private/var/root/Library/Installer'.
- Make the new Installer.app executable, 'chmod 755 /Applications/Installer.app/Installer'.
- Reboot to load the changes.
Restoring Media Partition
- Remove symbol link, 'rm Media'.
- Move old Media library back, 'mv Media-old Media'.
Install BSD Tools
Installer.app (recommended):
- Install the BSD Subsystem via the Installer.app:
Natetrue:
- Download the Base and Extra tarballs natetrue.com.
- Transfer the files over to root (/) on the iPhone via SCP, either WinSCP or scp works.
- Remotely SSH into the iPhone and issue the extract command on both tarballs, 'tar zxvf *.tar.gz'.
- Move the files into the system using rsync, 'rsync -av BSD_Base /' and 'rsync -av BSD_Extra /'
- The extraction will overwrite original iPhone files with newer versions.
Fix SSH
The dropbear SSH server does not have SFTP and is incompatible with the Services applications. OpenSSH is recommended.
- SCP into the iPhone
- Remove the following files
/etc/dropbear/dropbear_rsa_host_key /etc/dropbear/dropbear_dss_host_key /etc/dropbear (folder) /etc/hackinit.sh /etc/init.d/dropbear.sh /etc/init.d (folder) /usr/bin/dropbear
- Install Community Sources and OpenSSH client and server.
- Reboot the iPhone to enable the new SSH server.
Add Contacts Icon
Add a contacts icon on the home screen.
- Download /Systems/Library/CoreServices/Springboard.app/M68AP5.plist.
- Add this string before the 'com.apple.MobileStore' and upload the file to the iPhone.
<dict> <key>displayIdentifier</key> <string>com.apple.MobileAddressBook</string> </dict>
Fix My Number Display
In iTunes and on top of the contacts list on the iPhone, your phone number should normally show. But if the SIM card is not programmed to include the acutal phone number it will not be shown.
- SSH remotely into the iPhone
- Stop the commcenter, 'launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist'
- Start the modem configurator, 'minicom -s'
- Use the arrow keys to select 'Serial port setup'
- Press 'A' for Serial Device, delete 'modem' and type 'tty.baseband'. The full string should be '/dev/tty.baseband'.
- Press enter twice to save the settings. Select 'Exit' and the initialize the modem.
- Type 'AT' to a 'OK' confirmation. Type 'AT+CPBS="ON"' to enable the 'My Number' feature.
- Then type 'AT+CPBW=1,"xxxxxxxx",,"N Telenor"' (two commas) to program your phone number and carrier.
- Verify by issuing 'AT+CPBR=1' and 'AT+CNUM'.
- Exit minicom by pressing CTRL+A and then Q.
- Load commcenter again, 'launchctl load /System/Library/LaunchDaemons/com.apple.CommCenter.plist'
- Reboot the iPhone and look for the number in the contacts list and iTunes.
Low Space Fix
The system partition is only 300 MB and is quickly filled when installing third-party applications. The media partition on the other hand holds the rest of the free flash storage memory.
- SSH into the iPhone. Make a complete backup of the iPhone beforehand via SFTP.
- Edit the fstab to allow execution of applications on the media partition, 'pico /etc/fstab' and remove ',noexec'.
- Change directory to root, 'cd /'.
- Copy the Applications directory over to the media partition, 'cp -Rv Applications/ private/var/root/'.
- Delete the entire Applications directory, 'rm -rv /Applications'.
- Create a new symbol-link from the media partition back to the root directory, 'ln -s private/var/root/Applications .'
- List the directory to make sure Applications points to private/var/root/Applications.
- Reboot the iPhone and install bigillion more applcations.
iPhuc AFC Fix
AFC is the protocol iTunes uses to transfer files to the iPhone. To make iPhuc/iPhoneBrowser work, a second AFC services is needed for root filesystem access.
- Backup /System/Library/Lockdown/Services.plist and edit Services.plist
- Add this section after the com.apple.afc entry:
<key>com.apple.afc2</key> <dict> <key>Label</key> <string>com.apple.afc2</string> <key>ProgramArguments</key> <array> <string>/usr/libexec/afcd</string> <string>--lockdown</string> <string>-d</string> <string>/</string> </array> </dict>
- Open a command-prompt and enter iPhuc (iphuc.exe/iphuc_jailbreak.exe/iPhuc).
- Enable the afc2 service, 'setafc com.apple.afc2'.
Notes
The new v1.1.1 update fixes a lot of localization problems and seems to gear up for the official european release as it includes german, frence and uk dictionaries stock in the update.
To get special characters, like æøå in Norwegian, press and hold the key to get a pop-up with a array of different variations of that character.
The iPhone was still unlocked after the v1.0.2 to v1.1.1 update, the phone came with baseband v04.01.13_G and was unlocked with AnySIM v1.1. It did not require to be unlocked again after the update, showing that the AnySIM team have resolved the bricking issues.
To fix the localization for countries other than those mentioned, only two files needs to updated.
- Install the appropriate AppSupport from the Dev Wiki. This fixes the lenght problem of the phone number matching.
- Download /System/Library/CoreServices/Springboard.app/M68AP.plist and change the International key to true. Convert it first with the binary-to-xml website. This enables a flew of options in the Settings -> General panel. Including Language, Keyboards and Region format (.GlobalPreferences.plist). I set the Language to English, Keyboard to US and Norwegian, and region formats to Norway. When typing on the keyboard, there is now a new button to switch between US and Norwegian keyboard.
Fix Stuck Recovery Mode
- Open command-prompt and execute iphoneinterface.exe from the JailbreakWindows_v1.1.1 package
- Enter the commands: cmd setenv auto-boot true, cmd saveenv, cmd fsboot
- Typ exit to quit
Contacts Hack
If the phone is not activated and you want to go to jailbreakme.com. Wifi has to be configured first by doing a workaround to get the the system preferences.
- At the callpad, enter *#307# and Call.
- Answer the call and press Hold.
- If Hold is not available, delete the *#307# and enter 0 and press Call.
- Now answer the call and press Hold.
- Decline the next call and the Recent calls screen should appear.
- Add a new contacts with the url 'prefs://1F' and 'http://jailbreakme.com'.
- To the the first URL to configure the Wifi and the second to jailbreak the phone.
Easy Jailbreak for v1.1.1
A TIFF exploit is used to jailbreak v1.1.1. Recently a easy to use webbased jailbreaking method was released, jailbreakme.com. The website will utilize the TIFF exploit to:
- Jailbreakes the iPhone using TIFF exploit
- Patches Springboard
- Activates the phone
- Installs Installer.app
- Fixes Youtube
- Patches the TIFF vulnerability
- Enables afc2 protocol
Firmware v1.1.2
The new iPhone v1.1.2 firmware patches the TIFF exploit and requires some extra work to update. Uploading files to jailbreak requires a new standalone application.
- If you acctidently updated to v1.1.2, downgrade to v1.1.1 by enabling restore mode, hold the Power and Home button for 5-10 seconds. The screen will be black on v1.1.2.
- If iTunes reports an error 1, try to use iBrickr 0.91 or higher to get into the correct restore mode.
- Connect to computer and when asked by iTunes that it found a iPhone in restore mode click Ok.
- Download 1.0.2 or v1.1.1 from Apple and Shift/command-Click the Restore button and select the downloaded firmware.
- After it reboots into yellow triangle, open iPhuc and enter these commands: cmd setenv auto-boot true, cmd saveenv, cmd fsboot, or use iPhuc to boot the iPhone.
- Now while in v1.0.2, jailbreak it by using iBrickr or AppTappInstaller. Activate using iBrick to upload the iPhoneActivation.pem to /Library/System/Lockdown/ and iAsign --automatic iPhoneActivation_private.pem to activate as described above.
- Install Community Sources and OpenSSH (to transfer AnySIM if not installed via AppInstaller).
- Unlock the new baseband version using AnySIM. Download AnySIM 1.2.1u and upload to /Applications/AnySIM.app (important it's anySIM.app). Make it executeable, chmod +x anySIM.
- Install OkToPrep to create a special file in the Media partition (to interface with the 1.1.2 firmware and create a dump and re-write the firmware later).
- Then update (not restore) to v1.1.2 in iTunes using the Update button.
- Download and extract the jailbreak v1.1.2 package and execute the windows.bat to start the GUI java process. It will jailbreak, copy over patched lockdownd and activate, fix Youtube, and install Installer.app
- After it has rebooted two times, Install BSD Subsystem and OpenSSH,
- For internationalization a few files have to be patched, Appsupport to fix phone number matching, UIKit to add return/new line in SMS, and Preferences to get all countries in International settings. Norwegian language pack.
Note: It's not possible to activate v1.1.1 with the new v1.1.1 baseband version upgrade, a new lockdownd for v1.1.1 is required.
Fix Bad Unlock
If the AnySIM process rebooted midway or stopped, the baseband may need to be downgraded or re-uploaded.
- Downgrade to firmware v1.0.2 using the Shift/command-click Restore-function.
- Download the virginizer pack from iPhone Elite team and ierease. Or the complete pack from iFon.
- In addition the secpack for the current baseband version is required, for v1.1.2 4.02.13_G baseband download AnySIM 1.2.1u.
- Upload the folder to the root (/) on the iPhone, rename secpack40213.bin to secpack and make the bbupdater and ieraser executable, chmod +x bbupdater ieraser.
- Disable the CommCenter, launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Wipe the baseband by simply executing ./ieraser and wait for it to finish.
- To verify, execute ./bbupdater -v and it should respond 'baseband unresponsive to pinging'.
- Upload the new baseband, ./bbupdater -e ICE03.14.08_G.eep -f ICE03.14.08_G.fls
- Verify the new 03.14.08_G baseband, ./bbupdater -v.
- Update to the latest jailbreaked and unlockable firmware.
Note: Don't use iUnlockx it corrupt the integrity of the baseband. This was the first free unlock process available and is now obsolete.
Out-of-The-Box v1.1.2
iPhones with 1.1.2 and 1.1.3 firmware out of the box has a newer bootloader (v4.6) which is patched for the vulnerability used to unlock iPhones with earlier versions of the bootloader.
Currently the only way to use the iPhone as a phone, is to use one of the proxy SIM card solutions. The popular ones are StealthSIM and TurboSIM. More about proxy SIM [1]:
All "SIM" cloning cards exploit a bug in the firmware that will take a "valid" ICCID (Integrated Circuit Card ID) during the phone initialization. This will cause the phone to believe it's running with an "authorized" SIM, as the ICCID contains the code for the carrier. That is why it works out of the box. It's like a "pre-loaded" TurboSIM. It seems that StealthSIM uses the same ICCID for all of theirs pigback SIM, with TurboSIM it will copy it from a given SIM, and one can program several TurboSIM with a single ICCID.
Firmware v1.1.3
At the Macworld 2008 Expo, a new iPhone update was announced. Including SMS multiple people, movable items at the home screen, webclips, triangulate your location in maps, hybrid maps view, and lyrics. There are a few new changes not announced by Apple, like support for third-part applications (Nikita).
Jailbreak
As usual, to jailbreak the new firmware, the iPhone has to be jailbreaked before starting the procedure. To jailbreak this release, the firmware has to be decrypted and decompressed, patch, jailbreak and pre-activate, insert Installer.app and soft upgrade script, recompress it, upload it to the iPhone, and flash the firmware via the soft upgrade script [2].
Note: Both of these methods are not true jailbreaks, as the kernel is still from the previous v1.1.2 firmware. A proper jailbreak could be performed with Ziphone, but I've already moved to v1.1.4.
Old method:
This method is by Natetrue and apparently is leaked prematurely. There seems to be more problems cropping up after this jailbreak as the baseband and kernel is not updated. Locate me doesn't work because the new baseband is not updated and unlockable yet, EDGE settings not saved but works after a network setting reset, and no patch yet for international keyboards preferences [3]. Hopefully the new baseband can be unlocked to accept any SIM.
- Make a backup of the Library directory (contacts, messages, settings, etc) even though it won't be erased after the update.
- Download the special edition iBrickr.
- Open iBrickr and continue to download the firmware patch (11 MB) and then the v1.1.3 firmware image (162 MB) from Apple.
- Continue to the next step; extracting, decypting, decompressing, and patching the firmware. All this requires at least 400 MB free space on the computer.
- Confirm to upload the firmware, it requires 300 MB on the Media parition.
- Now, on the iPhone install the "1.1.3 soft upgrade" application to initilize the upgrade (upgrade.sh). It will stall for 10-15 minutes before it will reboot to complete the upgrade. If the screen automatically locks after a minute, you can still slide to unlock it and use the phone, but the upgrade script is runnig in the background making the iPhone feel sluggish.
- Viola! Version 1.1.3 is installed. The iPhone is still unlocked after the update (no baseband update) and all settings are preserved. To fix the CallerID, update Appsupport. Norwegian localization package is available on ipod1.no.
New method (recommended):
This is the Official Dev Team jailbreak for 1.1.3, and hosted by conceitedsoftware.com. The jailbreak is done all on the iPhone, only thing needed is to install the upgrader application.
- Make sure the iPhone is running a jailbreaked v1.1.2 firmware.
- Open Installer.app and refresh the source list if it's not updated. The upgrader is included in the default source lists.
- Install the 'Official 1.1.3 Upgrader' application
- Exit Installer.app and go into Settings -> General and Auto-Lock, set it to Never.
- Now, start the Upgrader application. The application will download the 162 MB firmware image from Apple and do the rest of the patching, decypting, decompressing and writing the new image. Make sure to dock the iPhone.
- After 30 minutes the process should've finished and the iPhone rebooted into v1.1.3.
- To enable all the international keyboards, install the patched UIKit binary and to enable your country create the necessary directory like: /Applications/Preferences.app/Norwegian.lpro. For European phone number support, install the patched Appsupport package. More details for Norwegian localization.
Complete Norwegian Keyboard
On a regular iPhone keyboard, to get the æøå-characters you have to hold the a- and o-keys for the alternative characters to be available. This hack replaces the Russian keyboard layout with a complete Norwegian keyboard that includes all the special keys on one layout.
- Add the source http://install.ifon.no to Installer.app
- Install MobileEnchancer (package), which does the file replacement and enabling work.
- Next, install the Norsk tastatur (1.0.2-1.1.3) (package package with the modified cyrillic/Russian keyboard.
- Go into Settings -> International -> Keyboards, and enable Russian.
- Now, open SMS or any application requiring a keyboard and click the little globe-icon to switch between the enabled keyboards (English, Norwegian, and Complete Norwegian keyboard).
- For the dictionary to work with the complete keyboard, the files in /System/Library/KeyboardDictionaries/ has to start with ru_RU, e.g ru_RU-unigrams.dat in addition to the regular nb_NO-unigrams.dat.
Firmware v1.1.4
The v1.1.4 firmware is a minor bug fix update and brings no new features. The build number for v1.1.3 was 4A93, and v1.1.4 4A102. It's thought that Apple released this update to prepare for the March 6th iPhone SDK event. It fixes some SMS ordering, mail sending, Bluetooth, and cell signal strength bugs.
In other unlocking news, the v4.6 bootloader has been cracked by Geohot in a 24 hour run to finally allowing software SIM-unlocking on out-of-the-box iPhones. The new bootloader was introduced in factory-new iPhones that came with firmware v1.1.2 or higher. Currently it can unlock baseband 4.02.13_G (introduced with v1.1.2) when running bootloader v4.6, and unlock baseband 4.03.13_G (v1.1.3) or higher when running v3.9 [4] [5]. It's possible to downgrade from bootloader v4.6 to the more flexible v3.9 (that has less protection, RSA exploit) using gbootloader [6] [7].
What's even more fun, is that the new gunlock [8] will turn a virginized baseband into a IPSF-like unlock on bootloader v3.9 iPhones, meaning it resistant to restore and (hopefully) future updates [9]. No unlocking needed after a update. The unique seczone file aka lock table is patched. To recapture; bootloader, baseband, secpack, seczone. Every section is authenticated and secured from alteration [10]. Comparatively, AnySIM patches the baseband firmware and won't survive a update [11].
As the update brought minor changes, most of the patches from v1.1.3 could be used on this update (lockdownd, Appsupport). A iPhone user called Zibri has developed a new application making jailbreaking, activating, and unlocking a breeze. The application is called ZiPhone and was originally developed for Mac OS X, but a Windows version is now available. It uses a new ramdisk exploit to boot-up and enables write access, patches lockdownd [12] using iPatcher from v1.1.3 [13], copies Installer.app, and runs gunlock to unlock the baseband.
It's best to start with a plain sheet, although I managed to run the Geohot IPSF script on my Official Dev Team v1.1.2 jailbreaked iPhone with 4.02.13_G AnySIM v1.2.1 unlocked baseband. I first ran the ipsf.sh script through SSH which stalled and timed out on the iUnlock part, I rebooted the iPhone and Wifi/cell signal was not started because of the bad ./iUnlock secpack debugvirgin command. After restarting the ipsf.sh script in Term-V100 it successeded fine.
To recap all the different tools offered by Geohot (only ipsftool is needed for v3.9 IPSF unlock):
- ipsftool.zip - is used to exploit the RSA flaw in bootloader v3.9 and allow IPSF unlock, patches seczone token value with zeros, which is restore and update resistant (hopefully)
- gunlock.zip - is used to unlock out-of-the-box v1.1.2/v1.1.3 iPhones with bootloader v4.6 and works like a AnySIM patch [14], currently supports baseband 04.02.13_G (v1.1.2), 04.03.13_G (v1.1.3) coming
- gbootloader.zip - is used to downgrade bootloader v4.6 to v3.9 and to use IPSF unlock above, current no way to go back, 46_GEOMOD is coming
Term-VT100
It's recommended to do all bootloader, baseband, secpack, and seczone programming through a terminal on the iPhone, not through SSH. The Wifi connection will timeout on firmware v1.1.1 and later if there is no activity.
On v1.1.3, the Term-VT100 application has to be set up with SUID to allow root login, otherwise it will fail the login attempt.
Easy automatic way:
- Install Term-VT100 terminal application
- Add a new source to Installer.app, address http://install.ifon.no or http://www.trejan.com/irepo/
- Install the SUID Lib Fix and Term-VT100 SUID Fix, it will fix a library problem and allow Term-VT100 to login as root
- Try to open Term-VT100 and login with root and alpine
Manual way:
- Install Term-VT100
- Login with root over SSH and execute mkdir -p /usr/local/arm-apple-darwin/lib [15] [16]
- Next, make a symbolic link of the required library, ln -sf /usr/lib/libgcc_s.1.dylib /usr/local/arm-apple-darwin/lib/libgcc_s.1.dylib
- Last, set the SUID bit on Term-VT100, chmod +s /Applications/Term-vt100.app/Term-vt100
- Try to open Term-VT100 and login with root and alpine
Restore Baseband
This restore can be done on any firmware version, e.g. 1.0.2, but a cell signal can only be accquired on v1.1.3 or later because lockdownd expects a certain baseband version.
Automatic way:
- Add a new source to Installer.app, host http://installer.iClarified.com and a new iClearified category will appear [17]
- Disable Auto-Lock in Settings -> General -> Auto-Lock -> Never
- In Installer.app, install the Baseband Updater (04.03.13_G) package and let script with bbupdater run till it's finished
- Reboot the iPhone and check Settings -> General -> About and the baseband version should show 04.03.13_G
Manual way:
- Download the BB cleaner package with the bbupdater flasher and the required baseband files
- Upload the files (bbupdater, ICE04.03.13_G.eep, ICE04.03.13_G.fls, secpack) to the iPhone over SCP, e.g. /cleaner
- SSH or SCP into the iPhone and make bbupdater executable, chmod +x bbupdater
- Disable the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Set Auto-Lock to Never and open Term-VT100, enter ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep
- After 3 minutes the baseband is programmed, reboot the iPhone and check the version in Settings -> General -> About
- Alternatively execute ./bbupdater -v and verify that the output has the new baseband firmware version as shown below
firmware: DEV_ICE_MODEM_04.03.13_G eep version: EEP_VERSION:208 eep revision: EEP_REVISION:1 bootloader: BOOTLOADER_VERSION:3.9_M3S2
If the iPhone is already Geohot IPFS seczone unlocked, remeber to execute the two AT+ commands on boot-up [18].
IPFS Unlock
Not recommended, AnySIM/iPlus baseband patching is safer and easier to recover
The Geohot IPFS unlock method modifies the seczone (which is unique on every iPhone) and zeros out the token value [19], to always return valid responses when queried by the system.
Geohot continually updates the ipsf.sh script and binaries required to run the unlock. Get the latest from the original Geohot blog post.
- Flash the baseband to 04.03.05_G (v1.1.3), ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep, verify with ./bbupdater -v
- Download the ipsftool.zip and upload the files to the iPhone via SCP, e.g. /ipsftool
- Put the bbupdater, ICE04.03.13_G.fls, and ICE04.03.13_G.eep files in the same directory, /ipsftool
- Set Auto-Lock to Never and make sure Term-VT100 is installed and working, as described a few paragraphs above
- Note: The script will run a a lot of dangerous commands that could render the unit useless, make sure the iPhone is docked and charged
- Make the script executable, chmod +x ipsftool.sh
- Run it via Term-VT100, never through SSH, ./ipsftool.sh
- After 5-10 minutes the seczone should've been patched and at the end baseband 04.03.13_G is restored. Open the ipsftool.sh script to follow the execution.
- The new unlock method expects two AT+ unlock commands to be sent before it can accquire a cell signal
- Install a handy modem-tool called igsm to send the commands
- With CommCenter still unloaded, execute /usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" and /usr/bin/igsm -c "AT+CLCK=\"PN\",2" or vice versa until the latter command returns +CLCK: 0
- Load the CommCenter to get a cell signal, launchctl unload -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Now backup the entire ipsftool directory to a CD-R or USB pendrive, it will come handy later if the process has to be reversed for some reason
Unlock Commands
The unlock commands needs to be sent before CommCenter is loaded, else the modem is busy. The script below will hijack/bootstrap the CommCenter service [20]. Hopefully future versions of lockdownd will be patched to send these commands automatically.
- Install igsm [21] in /usr/bin and make it executable, chmod +x /usr/bin/igsm
- Rename CommCenter, mv /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter_original
- Create a new script file, pico /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter
#!/bin/bash /usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" /usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" exec /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter_original
- Make it executable, chmod +x /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter
- Reboot or unload the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Load the CommCenter again, launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- The unlock commands will now be sent to the modem, CommCenter loads thereafter, and cell signal acquired after 3 seconds
There is also a application called Signal.app [22] [23] [24] that does the exact same thing. Notice that the commands should not be executed on AnySIM unlocked iPhones, as the NCK counter could lock down the iPhone [25].
Alternatively, add a LaunchDaemon in /System/Library/LaunchDaemons, called com.apple.igsm.plist:
#!/bin/bash launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist /bin/sleep 2 /usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" /usr/bin/igsm -c "AT+CLCK=\"PN\",0,\"00000000\"" /usr/bin/igsm -c "AT+CLCK=\"PN\",2" /bin/sleep 2 launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
Reverse IPFS Unlock
The IPSF unlock can be reversed, there are a few unofficial ways to do it (hackint0sh.org and zjollotto.com). It requires the original seczone file dumped during the IPSF unlock process to create a new loader/payload for iUnlock.
The reversing uses the same binaries and files when the unlock was done, the only thing that could've changed in the mean time is the baseband version if the firmware is updated, e.g to v1.1.4. Use the correct secpack [26] for the current baseband version on the iPhone to get write access. But since iUnlock expects a secpack that has an extra 420 bytes header (filesize 2468 bytes versus 2048), it's best to downgrade the baseband to 04.03.13_G instead using ieraser and bbupdater. If the secpack does not match the current install baseband, the iUnlock process will fail with a FW differences found error when using the 403secpack on a non-04.03.13_G baseband. It should return FW are equal when the secpack and installed baseband matches, e.g 403secpack for 04.03.13_G baseband currently in use.
The last bbupdater part restores the baseband to a default state. If the bbupdater fails with a Could not set execlusive access 1 to the modem error, try another bbupdater binary.
- Downgrade to baseband 04.03.13_G using iereaser with the matching secpack for the current installed baseband and bbupdater to flash the 04.03.13_G fls/eep, or patch the secpack to include the require 420 bytes header (untested)
- Unload CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Move to /ipsftool and create the new seczone loader, cat secloader seczone > fselector_revert (or use geomaker.exe)
- Do the next parts in Term-VT100 or else the Wifi will stop working in v1.1.3
- Use iUnlock to write back the original seczone, ./iUnlock secpack fselector_revert
- Reset/restart the baseband as iUnlock doesn't do it, ./norz seczone.ignore 0x3FA000 0x2000
- Now, get the programmed seczone for comparison (e.g Tiny Hexer), ./norz seczone.revert 0x3FA000 0x2000 (same command again)
- Restore the baseband firmware, ./bbupdater -f ICE04.03.13_G.fls -e ICE04.03.13_G.eep
- And load CommCenter, launchctl load -w /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- The iPhone is now locked and no cell signal is accquired, use AnySIM v1.3 (confirmed working) or go back to Geohot IPSF to unlock the iPhone
- Remember to disable the AT+ commands send during update, in either /System/Library/Frameworks/CoreTelephony.framework/Support/CommCenter or Signal.app
Update to v1.1.4
To get a good and clean update to firmware v1.1.4, the iPhone should be restored to v1.1.4, and jailbreaked and activated via the new ZiPhone application. Don't use ZiPhone to restore. The application packs together many of the previous methods and patches, it performs the jailbreaking on boot-up using a new ramdisk exploit.
It doesn't matter if the iPhone is AnySIM or Geohot IPSF unlocked, although it would be a good idea to IPSF unlock before updating to the new firmware. Currently there is AnySIM for baseband 04.04.05_G (v1.1.4).
- Download the v1.1.4 firmware (162 MB) and plug in the iPhone
- Install the latest iTunes (v7.6.1) and SHIFT+click the Restore-button, select the v1.1.4 firmware image
- Or, alternatively get the iPhone into recovery mode using iphoneinterface.exe included in the iBrickr package, type enterrecovery to start
- Wait for the restore to complete, takes 4-5 minutes
- Delete old iPhone backups in iTunes, go to Preferences -> Syncing, and delete all the entries in the list. Old settings can sometimes butcher the setup after jailbreaking.
- Download the latest ZiPhone (9.9 MB) and make sure iTunes IS running
- Start the ZiPhoneGUI.exe application and open the 'Advanced Features'-tab to the lower-right
- Select 'Jailbreak file system' and 'Activate', nothing else is needed, start the actions with the 'Perform Actions'-button
- The process takes under a minute to complete, from entering restore mode, starting the ramdisk exploit, and booting up again [27]
- Use Installer.app to install BSD Subsystem, OpenSSH, and maybe Community Sources, to get backup and running
If the iPhone was IPSF unlocked, perform the AT+ modem unlock commands mentioned above to get the baseband to accquire a cell signal.
My iPhone now runs firmware v1.1.4 4A102, modem baseband firmware 04.04.05_G with Geohot IPSF token zeroed seczone.
Region Format
- Files to patch: UIKit binary to enable international keyboards
- Files to patch: Preferences binary or Keyboard.plist from iLiberty to enable all regions and languages
This will enable all countries in Settings -> General -> International. How to Unlock the 1.1.4 iPhone Region Format
Automatic:
- Add the source http://install.ifon.no and http://installer.iclarified.com
- Install the Internasjonal (1.1.4) and Region Patch (1.1.4) packages
- Reboot to apply the changes
Manual:
- Download the international.1.1.4.zip
- Extract the UIKit.org and UIKit to /System/Library/Frameworks/UIKit.framework
- Make UIKit executable, chmod +x /System/Library/Frameworks/UIKit.framework/UIKit
Next, patch Preferences:
- Rename the original Prefences binary, move /Applications/Preferences.app/Preferences /Applications/Preferences.app/Preferences.original
- Download region114.zip
- Extract the patched Preferences to /Applications/Preferences.app
- Make it executable, chmod +x /Applications/Preferences.app/Preferences
- To add language support (text translation), create a directory for each language name in /Applications/Preferences.app, e.g Norwegian.lproj (translation files still needed)
- Now, open Settings and go to the General -> International section and make the correct Region Format and Keyboards settings
International Phone Number
- Files to patch: AppSupport to fix caller id and crashes
To get the correct caller id phone number matching (with and without country code, etc to same contact) and fix dialer crashes. Either use the Installer.app to install the iClarified package or use the manual installation. [28]
Automatic way:
- Make sure the http://installer.iclarified.com sources is included in Installer.app (ifon.no uses patched 1.1.3 for 1.1.4 for some reason)
- Install the AppSupport Patch (1.1.4) package and wait for it to install
- Reboot to load the new Appsupport binary
Manual way:
- Get the Appsupport files for 1.1.4, iclarified.com
- Rename the original AppSupport binary, move /System/Library/Frameworks/AppSupport.framework/AppSupport /System/Library/Frameworks/AppSupport.framework/AppSupport.original
- Extract the new files to /System/Library/Frameworks/AppSupport.framework
- Make AppSupport executable, chmod 755 /System/Library/Frameworks/AppSupport.framework/AppSupport
- Reboot to apply the new AppSupport
Dictionary
- New localized no_* and ru_* dictionary files
To get a localized dictioanary when using text input, a new dictionary for the selected region format has to be installed. For Norway the locale id is no_NB (Norwegian Bokmål).
Automatic way:
- Add sources http://install.ifon.no to Installer.app
- Install the Norsk Ordbok package
Manual way:
- Download the ru_RU-dict_1.0.zip dictionary archive
- Extract all the no_* and ru_* files to /System/Library/KeyboardDictionaries
- The ru_* files are identical to the no_* files, but they are used then the complete keyboard layout patch is installed via MobileEnhancer (replaced the russion cyrillic charachters with norwegian)
- Reboot to load the new dictionary files
Downgrade Bootloader
New iPhones with v1.1.2 and later firmware has a new v4.6 bootloader that has patched a RSA exploit found on earlier v3.9 bootloader [29].
- Restore the iPhone to a older firmware that is better to work with doing modem work, open ZiPhone and under advanced press DFU Mode
- When the iPhone reboots with the iTunes+connector image, in iTunes hold Shift+Click the Restore button and select the v1.1.1 firmware image
- Once the restore is done, iTunes will report an error 1015, that's OK
- Open iBrickr and click Boot iPhone to get it out of restore mode, if the screen turns green, restore the iPhone once more, and try iBrickr again till it turns red and boots successfully
- Do the *#307# trick and jailbreakme.com or i.unlock.no method mentioned on the v1.1.1 jailbreak section above to jailbreak the firmware
- Install Community Soures, BSD Subsystem, and OpenSSH
- SCP upload the downgrade package (md5 c1956f131b894a2a75909750a1449058) files, e.g to /downgrade. Small note, the secpack in the package is from 03.03.05_G but works on newer basebands, e.g. 04.04.05_G
- Make the files executeable, over SSH execute chmod +x /downgrade/*
- Wifi is unreliable and the main process should always be run via a terminal on the iPhone, install Term-V100 (SUID fix not needed on v1.1.1)
- Unload the CommCenter, launchctl unload /System/Library/LaunchDaemons/com.apple.CommCenter.plist
- Now, execute the main process via Term-VT100, ./gbootloader secpack bleraser bldl 3.9_M3S2.nor (or create a go.sh script and upload it to skip entering the long string manually)
- Next, restore the baseband firmware to 03.14.08_G (v1.0.2), ./bbupdater -f ICE03.14.08_G.fls -e ICE03.14.08_G.eep
- Before updating the iPhone firmware to the latest version, consider doing the Geohot IPSF unlock while in v1.1.1 (remeber the AT+ unlock commands to get signal)
- Update or restore to the latest firmware the usual way in iTunes
firmware: DEV_ICE_MODEM_04.04.05_G eep version: EEP_VERSION:208 eep revision: EEP_REVISION:1 bootloader: BOOTLOADER_VERSION:3.9_M3S2
For some reason I had to use ZiPhone and the unlock function to get a cell signal even when the seczone was IPSF unlocked. Could be a mishap between the bootloader downgrade and the IPSF unlock.
Remove Call Forward Active
If a call is placed or received that has been forwarded, a message will pop up and let you know. This behaviour can be disabled [30].
- Download the com.apple.carrier.plist preference file in /var/mobile/Library/Preferences/
- Convert it from binary to plain text using the xml converter site
- Open the plist in Wordpad or Textedit, and replace True with False under ShowCallForwarding and ShowCallForwarded
- Upload the new plist to /var/mobile/Library/Preferences/ and reboot
Proper v1.1.4 Updating
After all the ZiPhone drama, a new iPlus method has been released to proper jailbreak v1.1.4. It's a more open, easier to understand, and reliable jailbreaking method.
It even flashes the safer 3.9flakeblank bootloader instead of downgrading the actual bootloader on iPhones with bootloader v4.6. The unlock method uses the AnySIM patching and is not resistant.
- Backup important files, e.g Library and DCIM
- Restore the iPhone to v1.1.4 via iTunes
- Download iPlus and the preferred payload, e.g international_paypload.zip for international phone support
- Open a command-prompt, cmd, and execute iplus.bat -u, the -u part is for unlocking the baseband
- The process will upload the payload via the iTunes UFC protocol, upload the created options file, and execute the script file in the payload.
- A log file will be downloaded to the iPlus folder showing the output of the script
- The international payload does not create the necessary directories to enable Norwegian region format, create a directory called /Applications/Preferences.app/Norwegian.lproj
- In addition, the Norwegian dictionary is not included
iLiberty
A little while after iPlus was released, the great ideas from George Zhu on how the iPhone jailbreak should really work, resulted in an excellent utility called iLiberty.
The procedure is easier than ever, mostly because of all the extra free time to redefine between the 1.1.4 and 2.0 released.
- Restore the iPhone to v1.1.4 if it was already jailbraked or used an old version
- Download iLiberty and install it
- Go to the advanced tab and download the International, Mobile permission fix, AppSupport, Installer, and Relocate fonts and ringtones
- Now select those packs and in addition check Activate, Jailbreak, Unlock (if not already restored/unlocked v1.1.4), Youtube fix, and possibile 39FakeBlank downgrade of you have a 1.1.2+ standard firmware iPhone
- Click 'Go for it' and make sure it resets to recovery mode and starts the ramdisk exploit script
- The iPhone should boot into a useful jailbreaked state and ready to be fine tuned
- Configure Wifi and install OpenSSH, these next steps is for proper Norwegian support
- Create a folder in /Applications/Preferences.app called Norwegian.lproj
- Download the International114.zip from ifon.no and copy over the patched UIKit to /System/Library/Frameworks/UIKit.framework/
- In Preferences first enable Norwegian keyboard and then Norwegian region format
References
- iPhone v1.1.1 Jailbreak & AppTapp Installation Guide / Jailbreak archive with readme
- iPod Touch Jailbreak
- iPhone v1.1.1 Baseband downgrading
- Unlocking The iPhone / secpack extraction
- Unlock the iPhone Simple Tutorial
- iPhone Dev Wiki Jailbreak v1.1.1
- Downgrade from v1.1.1 to v1.0.2
- Activate v1.1.1
- Re-drafted downgrading guide
- Re-drafted Jailbreaking v1.1.1
- Youtube hack
- Phone number format hack
- Fix International Caller ID / AppSupport
- Norsk iPhone Windows XP Guide
- Activation and Wifi setup via Contacts Hack
- Install BSD world on v1.1.1
- NorPhone Norwegian locale pack
- Ultimate Guide - Jailbreak/Activate/Unlock Virgin iPhones v1.1.1
- Really Ultimate Guide - Jailbreak-Unlock-Activate-YouTube Iphones 1.1.1
- Remove Dropbear
- Fix My Number display
- Downgrade v1.1.2
- Jailbreak v1.1.2
- Dev Wiki Jailbreak v1.1.2
- Ultimate guide upgrading v1.1.1 to v1.1.2
- NorPhone v1.1.2 Norwegian locale pack
- Downgrading Baseband
- iPhone 1.1.3 jailbreak released
- Hidden Keyboards Patch available v1.1.3
- Patched AppSupport for CallerID 1.1.3
- Norsk DevTeam's 113 WiFi Upgrader
- Windows Cygwin Binary Toolchain Installation
- ZiPhone - Jailbreak, activate, and Unlock
- Geohot's OTB 1.1.2 unlock
- Sleepers gunlock method Geohot gunlock package (start of post) Sleepers.net gunlock package
- How to Downgrade Your Bootloader - with Software Only! Original Geohot blog post (at the end of post)
- Firmware 1.1.4 Is Easy to Jailbreak/Activate - very useful
- Patched iPhone file archive (via pull trigger)
- Manually Geohot Unlock 04.03.13_G (BL3.9)
- Geohot IPSF-like unlock script pack
- iPhone Elite AnySIM Revirginzinging Tool
- Reversing Geohot's IPSF
- Removing "Call Forwarding Active" pop-up message
- The Perfect iPSF Unlock Clone
- NCK with IPSF and Signal.app?
- anySIM 1.3 leaked and unlock iPhone 1.1.3
- How to Upgrade the Baseband of Your 3.9 BL iPhone to 04.03.13_G
- iPhone 1.1.3 Term-vt100 password not working
- SETUID-Fix: allows running your apps as root again
- Unlocked with Modem 04.04.05, For 3.9 BL Only
- Unlocking methods - Holy Grail of Answers thread
- IPSF style Unlock RELEASED > Use this thread for your Problems 3.9 BL ONLY
- ZiPhone - den ULTIMATE KOMPLETTE opplåsningmetode
- How to Patch AppSupport for 1.1.4 iPhones (Installer)
- How to Unlock the 1.1.4 iPhone Region Format
- How IPSF works
Firmware 2.0
The latest 2.0 firmware introduces the App Store along with the iPhone 3G.
PwnageTool
A week after the final 2.0 upgrade was released, the iPhone Dev Team made the 2.0 jailbreak available for download. Initially only available on Mac, but WinPwn was released a few days later. Xpwn is a another jailbreaking tool, cross-platform and command-line based.
The v2.0 method uses a new way of jailbreaking the iPhone, it entirely re-creates and builds a new firmware image (ipsw). iTunes is then used to deliver/restore the new custom image. Bootneuter is a standalone application used to unlock the baseband on the first-gen iPhone. iPhone 3G unlock is currently not possible.
I'm updating my first-gen iPhone.
- Download the iPhone Classic (1.1) or iPhone 3G (1.2) v2.0 firmware image
- Find the latest PwnageTool available on the Dev Team portal (currently 2.0.1)
- Download the bootloader files (BL-39.bin and BL-46.bin) (local mirror) and extract the archive (PwnageTool will find them automatically)
- Launch PwnageTool and follow the simple instructions, expert mode is recommended, all the default settings should be OK, maybe remove the custom boot images and add the OpenSSH daemon
- Mark the Build button and click Next, wait for the new image to be created
- Get the iPhone in DFU recovery mode as instructed
- In iTunes click the restore button while holding the Option-key, select the new custom ipsw-image
- Once the restore is complete, the Bootneuter should start on the iPhone on the next boot, let it complete
- The iPhone should now be jailbreaked and get a cell-signal if a SIM-card is inserted
- Since the v2.0 software and iPhone 3G is available world wide, international localization can be turned on by simply going into Settings -> General -> International -> Keyboards and enable e.g. Norwegian Bokmål, and then into Region Format and enable e.g. Norwegian Bokmål (Norway)
The v2.0 software is a major update and none of the previous v1.0.0-1.1.4 software will work. Not even Installer.app is available yet. All applications has to be ported over.
References
Firmware v2.0.2
QuickPwn
Now, it's 1st September 2008 and things have quite a bit the last few weeks. There is now a new QuickPwn application, as the name implies, quickly jailbreaks the latest firmware (2.0.1 and 2.0.2). PwnageTool rebuilt the entire ipsw image, while QuickPwn will only patch and change the requires system files.
As if QuickPwn RC3 (for firmware 2.0.2), it now supports baseband unlock for 2G iPhones and includes Installer in addition to Cydia.
- Download the 2.0.2 firmware image and use iTunes to shift-click Restore
- Wait for the long restore process to finish
- Download the latest QuickPwn version (15 MB) and the bootloaders (v3.9/v4.6) for 2G iPhones
- Once the iPhone is at the 'Connect to iTunes' screen, open QuickPwn
- When prompted, select the appropriate ipsw file, settings, and bootloaders
- Close iTunes and click the blue arrow to start the process
- Hold the home button and power button combination as long as described (5, 10, 30 seconds)
- In under a minute, the set-up should be finished and continue rebooting into the new jailbroken state
- BootNeuter will automatically run to unlock the baseband, it will take a few minutes to complete the patching
- International localization in iPhone v2 software is supported by default, configure it by checking Settings -> General -> International. It found the correct settings automatically for me.
- It's recommended to not restore an old iTunes backup, create a new profile
- Go into Installer, install Community Sources and OpenSSH to connect to the iPhone remotely
References
Firmware v2.1
QuickPwn
Jailbreaking v2.1 is essentially the same as for v2.0.2. Download QuickPwn v2.1 and look at the routine above for v2.0.2 for all the details.
References
Firmware v2.2
QuickPwn v2.2
The procedure is the same to jailbrea v2.2 as the previous two updates. Download QuickPwn and the bootloaders. Follow the onscreen instructions, once done, jailbroken!
References
- iPhone Dev Blog - Download links on the left, links to PirateBay
Firmware v3.0
Released in mid-june, the iPhone v3.0 software brings a lot of useful new features and fixes. ModMyi has a great walk-through.
RedSnow v0.7.2
Jailbreaking and unlocking has become easy and is straight forward on the first iPhone (2G), especially thanks to baseband exploits.
RedSnow is a Windows application by iPhone Dev Team to Jailbreak, Unlock, and install Cydia. Although PownageTool for Mac OS X was the first application to jailbreak the v3.0 software.
Download the necessary software:
Process:
- Backup the iPhone either via iTunes or SCP.
- Update to v3.0 software first by using the shift-click 'Restore'-button in iTunes, and let the update finish.
- Start RedSnow and check 'Install Cydia', 'Install Icy', and 'Unlock'.
- Once the iPhone is in DFU the process should finish in under 15 minutes.
- Software v3.0 should now be jailbroken and the baseband unlocked. Use Cydia and Icy to install third-part apps.
If you forgot to update to v3.0 using restore before using RedSnow, a message will be displayed in the iPhone asking to connect to iTunes. The jailbreak process is now stuck.
Restoring v3.0 software via iTunes will now prompt an error 10 mid-way (KernelCache check fails, see logs). The only way to get back to working state is to restore to the previous software version (v2.2), jailbreak (QuickPwn 2.2), then restore up to v3.0.
Another problem I had, was a pre-dependency issue with grep. It seems to be a problem with installing both Cydia and Icy. Fix it by:
- Open RedSnow again.
- Uncheck 'Install Icy' and 'Unlock', and run the jailbreaking again.
- Once done, open Cydia and 'Upgrade Essentials'.
- Icy still works as before, no other data is lost.