The requirement of SHSH Blobs in order to install to unsigned iOS versions can be bypassed using a
replay attack, by saving blobs while an iOS firmware is still signed and later using them when installing the firmware. Newer iOS versions require more elements, such as a valid nonce, when saving SHSH blobs. Saving blobs for devices using the
A12 SoC or newer also requires getting a matching nonce for a generator from a device to save valid blobs that can be used later in a restore. Even with SHSH blobs saved correctly, it is still sometimes not possible to jump to certain iOS versions due to incompatibility of the SEP (Secure Enclave) between versions. Tools to save SHSH blobs for newer iOS versions include the application blobsaver and the command line tool tsschecker. To use SHSH blobs to install an unsigned iOS version on a device, tools like futurerestore (based on idevicerestore) or its GUIs can be used, which allows specification of iOS firmware files and SHSH blobs to be used in the restore.
Previous bypass methods For iOS 3 and 4, SHSH blobs were made of static keys (such as the device type, iOS version, and ECID), which meant that the SHSH blobs for a specific iOS version and device would be the same upon every restore. To subvert that system using a
man-in-the-middle attack, server responses for the unique SHSH blobs from Apple for the jailbroken device are cached, so that if a user changes the
hosts file on a computer to redirect the SHSH blobs check to cache instead of Apple's servers,
iTunes would be tricked into checking those cached SHSH blobs and allowing the device to be restored to that version.
iOS 5 and later versions of iOS implement an addition to this system, a random number (a
cryptographic nonce) in the "APTicket", making that simple
replay attack no longer effective. First released in 2009, TinyUmbrella is a tool for finding information about SHSH blobs saved on third party servers, saving SHSH blobs locally, and running a local server to replay SHSH blobs to trick iTunes into restoring older devices to iOS 3 and 4. In June 2011, iH8sn0w released iFaith, a tool that can grab partial SHSH blobs from a device for its currently-installed iOS version (limited to
iPhone 4 and older devices). In late 2011, the iPhone Dev Team added features to
redsn0w that include the ability to save SHSH blobs with APTickets and stitch them into custom firmware in order to restore a device to iOS 5 or later. Replaying SHSH blobs for newer devices (
Apple A12 and later) is not always possible, because there are no
boot ROM (hardware level) exploits available for these devices. As of October 2012, redsn0w includes features for restoring newer devices between different versions of iOS 5, but it cannot downgrade newer devices from
iOS 6 to iOS 5. == See also ==