Skip to content

a powerful tool to check tss signing status of various devices and firmwares

License

Notifications You must be signed in to change notification settings

Torki1980/tsschecker

 
 

Repository files navigation

tsschecker

CI Building

tsschecker is a powerful tool to check TSS signing status on combinations of various apple devices and firmware versions.

Features

  • Supports: Apple TV, Apple Watch, HomePod, iPad, iPhone, iPod touch, M1 Macs and the T2 Coprocessor.
  • Allows you to get lists of supported apple devices as well as Firmwares and OTA versions for any specified apple device.
  • Can check signing status for any firmware version by specifying either a firmware version or a BuildManifest.
  • Works without specifying any device relevant values to check signing status, but can be used to save blobs when given an ECID and the option --print-tss-response (although there are better tools to do this).

tsschecker is not only meant to be used to check firmware signing status, but also to explore Apple's TSS servers.
By using all of its customization possibilities, you might discover a combination of devices and firmware versions that is getting signed but wasn't getting signed before.

About Nonces:

A Nonce ("Number-used-ONCE") is a randomly generated value that is used to randomize apple's signed hash blobs.

it is created by the device with a nonce seed (generator) and then hashes that seed to create the nonce.
On arm64e devices, nonce generation works a bit differently, see "Nonce Entangling" for more details.

Recommended nonce-seeds (Generators) for saving tickets:

  • 0xbd34a880be0b53f3 // default on the Electra, Chimera and Odyssey jailbreak apps.
  • 0x1111111111111111 // default on the unc0ver jailbreak app.

Nonce Entangling (arm64e devices)

arm64e devices such as the iPhone XR, Apple Watch Series 4 and all newer devices have nonce-entangling.

Nonce Entangling further randomizes the boot nonce by encrypting a constant value with the UID key (using AES-256-CBC)
It is then used to encrypt the "generator" value (using AES-128-CBC) before hashing it to become the boot nonce.

In short, nonce entangling makes the boot nonce unique to that device only.

To save reusable tickets for any arm64e device, you must get the boot nonce that the device creates from your generator,
the simpliest way to get a nonce/generator pair is to use airsquared's blobsaver tool and read them from the device.

For more information, visit The iPhone Wiki:
The iPhone Wiki (AES Keys, Nonce)

Nonce Collisions:

the Nonce Collision method only works on a few firmwares and devices, and is not reliable and not recommended.
it's a lot better to save a ticket with a generator and use the checkm8 bootrom exploit or a nonce setter.

Recovery Nonce Collisions only occur on a few iOS versions, like iOS 9.3.3 and iOS 10.1-10.2 on the iPhone 5s
and is not reliable as once you update, your device will almost-certainly not collide nonces anymore.

DFU Nonce Collisions on the other hand, very commonly occur on any device using A7 and A8 chipsets regardless of iOS version,
and is MUCH more reliable than using recovery collisions.

Build

Install or Compile dependencies

To compile, run:

./autogen.sh
make
sudo make install

Help

Usage: tsschecker [OPTIONS]

Example: tsschecker -d iPhone10,1 -B D20AP -e 5482657301265 -i 14.7.1 --generator 0x1111111111111111 -s

option
(short)
option
(long)
description
-h --help prints usage information
-d --device MODEL specify device by its model (eg. iPhone10,3)
-i --ios VERSION specify firmware version (eg. 14.7.1)
-Z --buildid BUILD specific buildid instead of firmware version (eg. 18G82)
-B --boardconfig BOARD specific boardconfig instead of device model (eg. d22ap)
-o --ota check OTA signing status, instead of normal restore
-b --no-baseband don't check baseband signing status. Request tickets without baseband
-m --build-manifest manually specify a BuildManifest (can be used with -d)
-s --save save fetched shsh blobs (mostly makes sense with -e)
-u --update-install only request tickets for InstallType=Update
-E --erase-install only request tickets for InstallType=Erase
-l --latest use the latest public firmware version instead of manually specifying one
especially useful with -s and -e for saving signing tickets
-e --ecid ECID manually specify ECID to be used for fetching blobs, instead of using random ones.
ECID must be either DEC or HEX eg. 5482657301265 or ab46efcbf71
-g --generator GEN manually specify generator in format 0x%%16llx
-8 --apnonce NONCE manually specify ApNonce instead of using random ones
(required when saving blobs for arm64e devices with a matching generator)
-9 --sepnonce NONCE manually specify SepNonce instead of using random ones (not required for saving signing tickets)
-c --bbsnum SNUM manually specify BbSNUM in HEX to save valid BBTickets (not required for saving blobs)
-3 --save-path PATH specify path for saving shsh blobs
-6 --beta request ticket for a beta instead of normal release (use with -o)
-1 --list-devices list all known devices
-2 --list-ios list all known firmware versions
-7 --nocache ignore caches and re-download required files
-4 --print-tss-request print the TSS request that will be sent to Apple
-5 --print-tss-response print the TSS response that comes from Apple
-r --raw send raw file to Apple's TSS server (useful for debugging)
-0 --debug print extra tss info(useful for debugging)

About

a powerful tool to check tss signing status of various devices and firmwares

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 94.0%
  • CMake 2.8%
  • M4 1.5%
  • Shell 1.2%
  • Makefile 0.5%