We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
idevicerestore.exe -l -y -P --debug idevicerestore 1.0.0-223-g61a76ce (libirecovery 1.2.1-5-g7a5e619, libtatsu 1.0.4-4-g7661cad) progress: 0 0.000000 idevice_event_cb: device 0004799e2e69801e (udid: 00008110-0004799E2E69801E) connected in normal mode progress: 0 0.100000 Found device in Normal mode ECID: 1259620197302302 progress: 0 0.200000 Identified device as d63ap, iPhone14,2 Device Product Version: 18.1.1 Device Product Build: 22B91 * Host api.ipsw.me:443 was resolved. * IPv6: (none) * IPv4: 104.26.9.156, 104.26.8.156, 172.67.71.187 * Trying 104.26.9.156:443... * Connected to api.ipsw.me (104.26.9.156) port 443 * ALPN: curl offers http/1.1 * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / id-ecPublicKey * ALPN: server accepted http/1.1 * Server certificate: * subject: CN=ipsw.me * start date: Oct 26 00:50:32 2024 GMT * expire date: Jan 24 00:50:31 2025 GMT * subjectAltName: host "api.ipsw.me" matched cert's "*.ipsw.me" * issuer: C=US; O=Google Trust Services; CN=WE1 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA256 * Certificate level 1: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384 * Certificate level 2: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/1.x > GET /v4/device/iPhone14,2 HTTP/1.1 Host: api.ipsw.me User-Agent: InetURL/1.0 idevicerestore/1.0.0-223-g61a76ce Accept: */* * Request completely sent off < HTTP/1.1 200 OK < Date: Thu, 19 Dec 2024 09:09:48 GMT < Content-Type: application/json < Transfer-Encoding: chunked < Connection: keep-alive < Vary: Accept-Encoding < Vary: Origin < Access-Control-Allow-Methods: GET, OPTIONS < Access-Control-Allow-Origin: * < Content-Security-Policy: default-src https: 'unsafe-eval' 'unsafe-inline'; object-src 'none' < X-Content-Type-Options: nosniff < X-Data-Location: database < X-Frame-Options: DENY < X-Frame-Options: DENY < X-Xss-Protection: 1; mode=block < Strict-Transport-Security: max-age=15552000; preload < Last-Modified: Thu, 19 Dec 2024 07:56:37 GMT < Cache-Control: max-age=14400 < CF-Cache-Status: HIT < Age: 2384 < Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rcZBq%2FUufwYwkbRT8e1c50pDh%2F9os8qK%2F%2FpYltaIT5wvZyZ8vYrXZxV%2BDcc%2FdJUFGC3V62J%2Bcfz1nb8XsnsLqhdXS0kwW4ZIQj8s86Y6ISnZPLrke%2Fc2R0mneMkq"}],"group":"cf-nel","max_age":604800} < NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800} < Server: cloudflare < CF-RAY: 8f464184cb175b88-VIE < alt-svc: h3=":443"; ma=86400 < server-timing: cfL4;desc="?proto=TCP&rtt=28231&min_rtt=28062&rtt_var=10644&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2827&recv_bytes=748&delivery_rate=104055&cwnd=251&unsent_bytes=0&cid=4d0e1227c1f476c3&ts=57&x=0" < * Connection #0 to host api.ipsw.me left intact NOTE: Running non-interactively, automatically selecting latest available version Selected firmware 18.2 (build 22C152) Downloading firmware (https://updates.cdn-apple.com/2024FallFCS/fullrestores/072-43504/D0406442-E480-48DB-B130-3EDA1BE95E3D/iPhone14,2_18.2_22C152_Restore.ipsw) * Host updates.cdn-apple.com:443 was resolved. * IPv6: (none) * IPv4: 185.158.208.16 * Trying 185.158.208.16:443... * Connected to updates.cdn-apple.com (185.158.208.16) port 443 * ALPN: curl offers http/1.1 * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS * ALPN: server accepted http/1.1 * Server certificate: * subject: C=US; ST=California; O=Apple Inc.; CN=updates.cdn-apple.com * start date: Nov 11 13:54:18 2024 GMT * expire date: Mar 13 18:49:33 2025 GMT * subjectAltName: host "updates.cdn-apple.com" matched cert's "updates.cdn-apple.com" * issuer: C=US; O=Apple Inc.; CN=Apple Public Server RSA CA 1 - G1 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption * using HTTP/1.x > GET /2024FallFCS/fullrestores/072-43504/D0406442-E480-48DB-B130-3EDA1BE95E3D/iPhone14,2_18.2_22C152_Restore.ipsw HTTP/1.1 Host: updates.cdn-apple.com User-Agent: InetURL/1.0 Accept: */* * Request completely sent off < HTTP/1.1 200 OK < Content-Type: binary/octet-stream < Content-Length: 8951909550 < Date: Wed, 18 Dec 2024 18:23:25 GMT < Last-Modified: Sat, 07 Dec 2024 19:05:08 GMT < x-amz-server-side-encryption: AES256 < x-amz-meta-digest-sh1: 0a21df745fa04e0d6f3744c64ae8ea09821d3919 < x-amz-meta-digest-sha256: 8388a340f2f0592cf24de69cd31cdf528b4a95473d6c55fa6ef00490151c08b9 < x-amz-version-id: wJ9yS9UPrt0xE6QQiwZ0NvZ6vUBigyP4 < Accept-Ranges: bytes < Server: AmazonS3 < X-Cache: hit-fresh, miss, none, hit-fresh, none < Via: http/1.1 deber5-edge-lx-003.ts.apple.com (acdn/14454.1), https/1.1 deber5-edge-bx-013.ts.apple.com (acdn/14454.1), http/1.1 deber5-edge-bx-013.ts.apple.com (acdn/14454.1), http/1.1 giganet-uaiev1a-fe-003.ec.edge.apple (acdn/262.14454), http/1.1 giganet-uaiev1a-fe-003.ec.edge.apple (acdn/262.14454) < X-Amz-Cf-Pop: CPH50-P1 < X-Amz-Cf-Id: JgpugsJCEZNUXJ9D7m0WUtfTHN5I80LYTe84B2SGqP3wnXpx_PKyXw== < Cache-Control: max-age=604800, public < CDNUUID: 30e00e70-05ad-4388-874b-ecf672103e20-3572691085 < Etag: "46ea1721e6e7f57fc3044b3f15b6b9b1-1068" < Age: 53184 < Connection: keep-alive < downloading: 1% downloading: 2% downloading: 3% downloading: 4% downloading: 5% downloading: 6% downloading: 7% downloading: 8% downloading: 9% downloading: 10% downloading: 11% downloading: 12% downloading: 13% downloading: 14% downloading: 15% downloading: 16% downloading: 17% downloading: 18% downloading: 19% downloading: 20% downloading: 21% downloading: 22% downloading: 23% downloading: 24% downloading: 25% downloading: 26% downloading: 27% downloading: 28% downloading: 29% downloading: 30% downloading: 31% downloading: 32% downloading: 33% downloading: 34% downloading: 35% downloading: 36% downloading: 37% downloading: 38% downloading: 39% downloading: 40% downloading: 41% downloading: 42% downloading: 43% downloading: 44% downloading: 45% downloading: 46% downloading: 47% downloading: 48% downloading: 49% downloading: 50% downloading: 51% downloading: 52% downloading: 53% downloading: 54% downloading: 55% downloading: 56% downloading: 57% downloading: 58% downloading: 59% downloading: 60% downloading: 61% downloading: 62% downloading: 63% downloading: 64% downloading: 65% downloading: 66% downloading: 67% downloading: 68% downloading: 69% downloading: 70% downloading: 71% downloading: 72% downloading: 73% downloading: 74% downloading: 75% downloading: 76% downloading: 77% downloading: 78% downloading: 79% downloading: 80% downloading: 81% downloading: 82% downloading: 83% downloading: 84% downloading: 85% downloading: 86% downloading: 87% downloading: 88% downloading: 89% downloading: 90% downloading: 91% downloading: 92% downloading: 93% downloading: 94% downloading: 95% downloading: 96% downloading: 97% downloading: 98% downloading: 99% * Connection #0 to host updates.cdn-apple.com left intact Verifying 'iPhone14,2_18.2_22C152_Restore.ipsw'... Checksum matches. progress: 0 0.600000 Extracting BuildManifest from IPSW progress: 0 0.800000 IPSW Product Version: 18.2 IPSW Product Build: 22C152 Major: 22 Device supports Image4: true Variant: Customer Upgrade Install (IPSW) This restore will update the device without erasing user data. progress: 1 0.000000 Checking IPSW for required components... All required components found in IPSW progress: 1 0.200000 Checking if device requires stashbag... DEBUG: found component anef (ANE) DEBUG: found component ansf (ANS) DEBUG: found component aopf (AOP) DEBUG: found component avef (AVE) DEBUG: found component rspt (Ap,RestoreSecurePageTableMonitor) DEBUG: found component rtrx (Ap,RestoreTrustedExecutionMonitor) DEBUG: img4_create_local_manifest: Unhandled component 'Ap,SecurePageTableMonitor' DEBUG: found component msys (Ap,SystemVolumeCanonicalMetadata) DEBUG: img4_create_local_manifest: Unhandled component 'Ap,TrustedExecutionMonitor' DEBUG: found component logo (AppleLogo) DEBUG: found component chg0 (BatteryCharging0) DEBUG: found component chg1 (BatteryCharging1) DEBUG: found component batF (BatteryFull) DEBUG: found component bat0 (BatteryLow0) DEBUG: found component bat1 (BatteryLow1) DEBUG: found component glyP (BatteryPlugin) DEBUG: found component dcpf (DCP) DEBUG: found component dtre (DeviceTree) DEBUG: found component gfxf (GFX) DEBUG: found component ispf (ISP) DEBUG: found component illb (LLB) DEBUG: found component liqd (Liquid) DEBUG: found component lpw0 (LowPowerWallet0) DEBUG: found component lpw1 (LowPowerWallet1) DEBUG: found component mtpf (MtpFirmware) DEBUG: found component pmpf (PMP) DEBUG: found component recm (RecoveryMode) DEBUG: found component rans (RestoreANS) DEBUG: found component rdcp (RestoreDCP) DEBUG: found component rsep (RestoreSEP) DEBUG: found component rtsc (RestoreTrustCache) DEBUG: found component sepi (SEP) DEBUG: found component siof (SIO) DEBUG: found component trst (StaticTrustCache) DEBUG: found component isys (SystemVolume) DEBUG: found component wchf (WCHFirmwareUpdater) DEBUG: found component ibot (iBoot) DEBUG: found component ibdt (iBootData) DEBUG: creating stashbag... Device requires stashbag. ****************************************************************************** * Please enter your passcode on the device. The device will store a token * * that will be used after restore to access the user data partition. This * * prevents an 'Attempting data recovery' process occurring after reboot that * * may take a long time to complete and will _also_ require the passcode. * ****************************************************************************** Stashbag created. Getting ApNonce in normal mode... a1 7f 45 06 61 08 0d cc ff 25 af ac f3 7a 36 7f 47 2f 77 5f 17 c9 a4 00 76 55 ea bd e6 1b 60 dd Getting SepNonce in normal mode... Trying to fetch new SHSH blob Getting SepNonce in normal mode... 00 b6 ab 0b c0 d1 74 a8 d2 ac fd 82 34 a4 14 c8 f4 c3 9c a7 TSS server returned: STATUS=168&MESSAGE=An internal error occurred. ERROR: tss_send_request: Unhandled status code 168 ERROR: TSS request failed (status=168, message=An internal error occurred.) ERROR: Unable to send TSS request ERROR: Unable to get SHSH blobs for this device
The text was updated successfully, but these errors were encountered:
@nikias Could you please tell me what might be the issue?
Sorry, something went wrong.
No branches or pull requests
The text was updated successfully, but these errors were encountered: