Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cant restore iPhone14,2 IOS 18.2 #704

Open
E3lleyyaa opened this issue Dec 19, 2024 · 1 comment
Open

Cant restore iPhone14,2 IOS 18.2 #704

E3lleyyaa opened this issue Dec 19, 2024 · 1 comment

Comments

@E3lleyyaa
Copy link


idevicerestore.exe -l -y -P --debug
idevicerestore 1.0.0-223-g61a76ce (libirecovery 1.2.1-5-g7a5e619, libtatsu 1.0.4-4-g7661cad)
progress: 0 0.000000
idevice_event_cb: device 0004799e2e69801e (udid: 00008110-0004799E2E69801E) connected in normal mode
progress: 0 0.100000
Found device in Normal mode
ECID: 1259620197302302
progress: 0 0.200000
Identified device as d63ap, iPhone14,2
Device Product Version: 18.1.1
Device Product Build: 22B91
* Host api.ipsw.me:443 was resolved.
* IPv6: (none)
* IPv4: 104.26.9.156, 104.26.8.156, 172.67.71.187
*   Trying 104.26.9.156:443...
* Connected to api.ipsw.me (104.26.9.156) port 443
* ALPN: curl offers http/1.1
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / id-ecPublicKey
* ALPN: server accepted http/1.1
* Server certificate:
*  subject: CN=ipsw.me
*  start date: Oct 26 00:50:32 2024 GMT
*  expire date: Jan 24 00:50:31 2025 GMT
*  subjectAltName: host "api.ipsw.me" matched cert's "*.ipsw.me"
*  issuer: C=US; O=Google Trust Services; CN=WE1
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
*   Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA256
*   Certificate level 1: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384
*   Certificate level 2: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption
* using HTTP/1.x
> GET /v4/device/iPhone14,2 HTTP/1.1
Host: api.ipsw.me
User-Agent: InetURL/1.0 idevicerestore/1.0.0-223-g61a76ce
Accept: */*

* Request completely sent off
< HTTP/1.1 200 OK
< Date: Thu, 19 Dec 2024 09:09:48 GMT
< Content-Type: application/json
< Transfer-Encoding: chunked
< Connection: keep-alive
< Vary: Accept-Encoding
< Vary: Origin
< Access-Control-Allow-Methods: GET, OPTIONS
< Access-Control-Allow-Origin: *
< Content-Security-Policy: default-src https: 'unsafe-eval' 'unsafe-inline'; object-src 'none'
< X-Content-Type-Options: nosniff
< X-Data-Location: database
< X-Frame-Options: DENY
< X-Frame-Options: DENY
< X-Xss-Protection: 1; mode=block
< Strict-Transport-Security: max-age=15552000; preload
< Last-Modified: Thu, 19 Dec 2024 07:56:37 GMT
< Cache-Control: max-age=14400
< CF-Cache-Status: HIT
< Age: 2384
< Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rcZBq%2FUufwYwkbRT8e1c50pDh%2F9os8qK%2F%2FpYltaIT5wvZyZ8vYrXZxV%2BDcc%2FdJUFGC3V62J%2Bcfz1nb8XsnsLqhdXS0kwW4ZIQj8s86Y6ISnZPLrke%2Fc2R0mneMkq"}],"group":"cf-nel","max_age":604800}
< NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
< Server: cloudflare
< CF-RAY: 8f464184cb175b88-VIE
< alt-svc: h3=":443"; ma=86400
< server-timing: cfL4;desc="?proto=TCP&rtt=28231&min_rtt=28062&rtt_var=10644&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2827&recv_bytes=748&delivery_rate=104055&cwnd=251&unsent_bytes=0&cid=4d0e1227c1f476c3&ts=57&x=0"
<
* Connection #0 to host api.ipsw.me left intact
NOTE: Running non-interactively, automatically selecting latest available version
Selected firmware 18.2 (build 22C152)
Downloading firmware (https://updates.cdn-apple.com/2024FallFCS/fullrestores/072-43504/D0406442-E480-48DB-B130-3EDA1BE95E3D/iPhone14,2_18.2_22C152_Restore.ipsw)
* Host updates.cdn-apple.com:443 was resolved.
* IPv6: (none)
* IPv4: 185.158.208.16
*   Trying 185.158.208.16:443...
* Connected to updates.cdn-apple.com (185.158.208.16) port 443
* ALPN: curl offers http/1.1
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted http/1.1
* Server certificate:
*  subject: C=US; ST=California; O=Apple Inc.; CN=updates.cdn-apple.com
*  start date: Nov 11 13:54:18 2024 GMT
*  expire date: Mar 13 18:49:33 2025 GMT
*  subjectAltName: host "updates.cdn-apple.com" matched cert's "updates.cdn-apple.com"
*  issuer: C=US; O=Apple Inc.; CN=Apple Public Server RSA CA 1 - G1
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
*   Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* using HTTP/1.x
> GET /2024FallFCS/fullrestores/072-43504/D0406442-E480-48DB-B130-3EDA1BE95E3D/iPhone14,2_18.2_22C152_Restore.ipsw HTTP/1.1
Host: updates.cdn-apple.com
User-Agent: InetURL/1.0
Accept: */*

* Request completely sent off
< HTTP/1.1 200 OK
< Content-Type: binary/octet-stream
< Content-Length: 8951909550
< Date: Wed, 18 Dec 2024 18:23:25 GMT
< Last-Modified: Sat, 07 Dec 2024 19:05:08 GMT
< x-amz-server-side-encryption: AES256
< x-amz-meta-digest-sh1: 0a21df745fa04e0d6f3744c64ae8ea09821d3919
< x-amz-meta-digest-sha256: 8388a340f2f0592cf24de69cd31cdf528b4a95473d6c55fa6ef00490151c08b9
< x-amz-version-id: wJ9yS9UPrt0xE6QQiwZ0NvZ6vUBigyP4
< Accept-Ranges: bytes
< Server: AmazonS3
< X-Cache: hit-fresh, miss, none, hit-fresh, none
< Via: http/1.1 deber5-edge-lx-003.ts.apple.com (acdn/14454.1), https/1.1 deber5-edge-bx-013.ts.apple.com (acdn/14454.1), http/1.1 deber5-edge-bx-013.ts.apple.com (acdn/14454.1), http/1.1 giganet-uaiev1a-fe-003.ec.edge.apple (acdn/262.14454), http/1.1 giganet-uaiev1a-fe-003.ec.edge.apple (acdn/262.14454)
< X-Amz-Cf-Pop: CPH50-P1
< X-Amz-Cf-Id: JgpugsJCEZNUXJ9D7m0WUtfTHN5I80LYTe84B2SGqP3wnXpx_PKyXw==
< Cache-Control: max-age=604800, public
< CDNUUID: 30e00e70-05ad-4388-874b-ecf672103e20-3572691085
< Etag: "46ea1721e6e7f57fc3044b3f15b6b9b1-1068"
< Age: 53184
< Connection: keep-alive
<
downloading: 1%
downloading: 2%
downloading: 3%
downloading: 4%
downloading: 5%
downloading: 6%
downloading: 7%
downloading: 8%
downloading: 9%
downloading: 10%
downloading: 11%
downloading: 12%
downloading: 13%
downloading: 14%
downloading: 15%
downloading: 16%
downloading: 17%
downloading: 18%
downloading: 19%
downloading: 20%
downloading: 21%
downloading: 22%
downloading: 23%
downloading: 24%
downloading: 25%
downloading: 26%
downloading: 27%
downloading: 28%
downloading: 29%
downloading: 30%
downloading: 31%
downloading: 32%
downloading: 33%
downloading: 34%
downloading: 35%
downloading: 36%
downloading: 37%
downloading: 38%
downloading: 39%
downloading: 40%
downloading: 41%
downloading: 42%
downloading: 43%
downloading: 44%
downloading: 45%
downloading: 46%
downloading: 47%
downloading: 48%
downloading: 49%
downloading: 50%
downloading: 51%
downloading: 52%
downloading: 53%
downloading: 54%
downloading: 55%
downloading: 56%
downloading: 57%
downloading: 58%
downloading: 59%
downloading: 60%
downloading: 61%
downloading: 62%
downloading: 63%
downloading: 64%
downloading: 65%
downloading: 66%
downloading: 67%
downloading: 68%
downloading: 69%
downloading: 70%
downloading: 71%
downloading: 72%
downloading: 73%
downloading: 74%
downloading: 75%
downloading: 76%
downloading: 77%
downloading: 78%
downloading: 79%
downloading: 80%
downloading: 81%
downloading: 82%
downloading: 83%
downloading: 84%
downloading: 85%
downloading: 86%
downloading: 87%
downloading: 88%
downloading: 89%
downloading: 90%
downloading: 91%
downloading: 92%
downloading: 93%
downloading: 94%
downloading: 95%
downloading: 96%
downloading: 97%
downloading: 98%
downloading: 99%
* Connection #0 to host updates.cdn-apple.com left intact

Verifying 'iPhone14,2_18.2_22C152_Restore.ipsw'...
Checksum matches.
progress: 0 0.600000
Extracting BuildManifest from IPSW
progress: 0 0.800000
IPSW Product Version: 18.2
IPSW Product Build: 22C152 Major: 22
Device supports Image4: true
Variant: Customer Upgrade Install (IPSW)
This restore will update the device without erasing user data.
progress: 1 0.000000
Checking IPSW for required components...
All required components found in IPSW
progress: 1 0.200000
Checking if device requires stashbag...
DEBUG: found component anef (ANE)
DEBUG: found component ansf (ANS)
DEBUG: found component aopf (AOP)
DEBUG: found component avef (AVE)
DEBUG: found component rspt (Ap,RestoreSecurePageTableMonitor)
DEBUG: found component rtrx (Ap,RestoreTrustedExecutionMonitor)
DEBUG: img4_create_local_manifest: Unhandled component 'Ap,SecurePageTableMonitor'
DEBUG: found component msys (Ap,SystemVolumeCanonicalMetadata)
DEBUG: img4_create_local_manifest: Unhandled component 'Ap,TrustedExecutionMonitor'
DEBUG: found component logo (AppleLogo)
DEBUG: found component chg0 (BatteryCharging0)
DEBUG: found component chg1 (BatteryCharging1)
DEBUG: found component batF (BatteryFull)
DEBUG: found component bat0 (BatteryLow0)
DEBUG: found component bat1 (BatteryLow1)
DEBUG: found component glyP (BatteryPlugin)
DEBUG: found component dcpf (DCP)
DEBUG: found component dtre (DeviceTree)
DEBUG: found component gfxf (GFX)
DEBUG: found component ispf (ISP)
DEBUG: found component illb (LLB)
DEBUG: found component liqd (Liquid)
DEBUG: found component lpw0 (LowPowerWallet0)
DEBUG: found component lpw1 (LowPowerWallet1)
DEBUG: found component mtpf (MtpFirmware)
DEBUG: found component pmpf (PMP)
DEBUG: found component recm (RecoveryMode)
DEBUG: found component rans (RestoreANS)
DEBUG: found component rdcp (RestoreDCP)
DEBUG: found component rsep (RestoreSEP)
DEBUG: found component rtsc (RestoreTrustCache)
DEBUG: found component sepi (SEP)
DEBUG: found component siof (SIO)
DEBUG: found component trst (StaticTrustCache)
DEBUG: found component isys (SystemVolume)
DEBUG: found component wchf (WCHFirmwareUpdater)
DEBUG: found component ibot (iBoot)
DEBUG: found component ibdt (iBootData)
DEBUG: creating stashbag...
Device requires stashbag.
******************************************************************************
* Please enter your passcode on the device.  The device will store a token   *
* that will be used after restore to access the user data partition.  This   *
* prevents an 'Attempting data recovery' process occurring after reboot that *
* may take a long time to complete and will _also_ require the passcode.     *
******************************************************************************
Stashbag created.
Getting ApNonce in normal mode... a1 7f 45 06 61 08 0d cc ff 25 af ac f3 7a 36 7f 47 2f 77 5f 17 c9 a4 00 76 55 ea bd e6 1b 60 dd
Getting SepNonce in normal mode...
Trying to fetch new SHSH blob
Getting SepNonce in normal mode... 00 b6 ab 0b c0 d1 74 a8 d2 ac fd 82 34 a4 14 c8 f4 c3 9c a7
TSS server returned: STATUS=168&MESSAGE=An internal error occurred.
ERROR: tss_send_request: Unhandled status code 168
ERROR: TSS request failed (status=168, message=An internal error occurred.)
ERROR: Unable to send TSS request
ERROR: Unable to get SHSH blobs for this device
@E3lleyyaa
Copy link
Author

@nikias Could you please tell me what might be the issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant