Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- It looks like there might be specific terms or patterns in your log that are triggering the Pastebin filters. Let's try removing some specific details and replacing them with placeholders.
- Here is a redacted version of your log:
- ```plaintext
- root@felipe-ubt:/home/felipe/Downloads/idevicerestore# idevicerestore --latest -d -e
- idevicerestore 1.0.0-202-g26613f9
- ERROR: Unable to discover device mode. Please make sure a device is attached.
- root@felipe-ubt:/home/felipe/Downloads/idevicerestore# idevicerestore --latest -d -e
- idevicerestore 1.0.0-202-g26613f9
- irecv_event_cb: device [DEVICE_ID] (udid: N/A) connected in Recovery mode
- Found device in Recovery mode
- ECID: [ECID_NUMBER]
- Identified device as [DEVICE_MODEL], Mac14,9
- Device Product Version: N/A
- Device Product Build: N/A
- * Host api.ipsw.me:443 was resolved.
- * IPv6: [IPV6_ADDRESS], [IPV6_ADDRESS], [IPV6_ADDRESS]
- * IPv4: [IPV4_ADDRESS], [IPV4_ADDRESS], [IPV4_ADDRESS]
- * Trying [IPV6_ADDRESS]:443...
- * Connected to api.ipsw.me ([IPV6_ADDRESS]) port 443
- * ALPN: curl offers h2,http/1.1
- * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / id-ecPublicKey
- * ALPN: server accepted h2
- * Server certificate:
- * subject: CN=ipsw.me
- * start date: [START_DATE]
- * expire date: [EXPIRE_DATE]
- * subjectAltName: host "api.ipsw.me" matched cert's "*.ipsw.me"
- * issuer: C=US; O=Google Trust Services; CN=WE1
- * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
- * Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA256
- * Certificate level 1: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using ecdsa-with-SHA384
- * Certificate level 2: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using sha256WithRSAEncryption
- * using HTTP/2
- * [HTTP/2] [1] OPENED stream for https://api.ipsw.me/v4/device/Mac14,9
- * [HTTP/2] [1] [:method: GET]
- * [HTTP/2] [1] [:scheme: https]
- * [HTTP/2] [1] [:authority: api.ipsw.me]
- * [HTTP/2] [1] [:path: /v4/device/Mac14,9]
- * [HTTP/2] [1] [user-agent: InetURL/1.0 idevicerestore/1.0.0-202-g26613f9]
- * [HTTP/2] [1] [accept: */*]
- > GET /v4/device/Mac14,9 HTTP/2
- Host: api.ipsw.me
- User-Agent: InetURL/1.0 idevicerestore/1.0.0-202-g26613f9
- Accept: */*
- * old SSL session ID is stale, removing
- < HTTP/2 200
- < date: [DATE]
- < content-type: application/json
- < vary: Accept-Encoding
- < vary: Origin
- < access-control-allow-methods: GET, OPTIONS
- < access-control-allow-origin: *
- < cache-control: public, max-age=14400
- < content-security-policy: default-src https: 'unsafe-eval' 'unsafe-inline'; object-src 'none'
- < expires: [DATE]
- < last-modified: [DATE]
- < x-content-type-options: nosniff
- < x-data-location: database
- < x-frame-options: DENY
- < x-frame-options: DENY
- < x-xss-protection: 1; mode=block
- < strict-transport-security: max-age=15552000; preload
- < cf-cache-status: EXPIRED
- < report-to: {"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=[REMOVED]"}],"group":"cf-nel","max_age":604800}
- < nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
- < server: cloudflare
- < cf-ray: [CF-RAY]
- < alt-svc: h3=":443"; ma=86400
- * Connection #0 to host api.ipsw.me left intact
- The following firmwares are currently being signed for Mac14,9:
- [1] 14.5 (build 23F79)
- [2] 14.4.1 (build 23E224)
- [3] 14.4 (build 23E214)
- [4] 14.3.1 (build 23D60)
- [5] 14.3 (build 23D56)
- [6] 14.2.1 (build 23C71)
- [7] 14.2 (build 23C64)
- [8] 14.1.2 (build 23B92)
- [9] 14.1.1 (build 23B81)
- [10] 14.1 (build 23B74)
- [11] 14.0 (build 23A344)
- [12] 13.6 (build 22G120)
- [13] 13.5.2 (build 22G91)
- [14] 13.5.1 (build 22G90)
- [15] 13.5 (build 22G74)
- [16] 13.4.1 (build 22F82)
- [17] 13.4 (build 22F66)
- [18] 13.3.1 (build 22E261)
- [19] 13.3 (build 22E252)
- [20] 13.2.1 (build 22D68)
- [21] 13.2 (build 22D49)
- Select the firmware you want to restore: 1
- Selected firmware 14.5 (build 23F79)
- Downloading firmware (https://updates.cdn-apple.com/2024SpringFCS/fullrestores/062-01897/[FIRMWARE_PATH])
- * Host updates.cdn-apple.com:443 was resolved.
- * IPv6: [IPV6_ADDRESS], [IPV6_ADDRESS]
- * IPv4: [IPV4_ADDRESS], [IPV4_ADDRESS]
- * Trying [IPV6_ADDRESS]:443...
- * Connected to updates.cdn-apple.com ([IPV6_ADDRESS]) port 443
- * ALPN: curl offers h2,http/1.1
- * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519 / RSASSA-PSS
- * ALPN: server accepted http/1.1
- * Server certificate:
- * subject: C=US; ST=California; O=Apple Inc.; CN=updates.cdn-apple.com
- * start date: [START_DATE]
- * expire date: [EXPIRE_DATE]
- * subjectAltName: host "updates.cdn-apple.com" matched cert's "updates.cdn-apple.com"
- * issuer: C=US; O=Apple Inc.; CN=Apple Public Server RSA CA 1 - G1
- * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
- * Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
- * Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
- * using HTTP/1.x
- > GET /2024SpringFCS/fullrestores/062-01897/[FIRMWARE_PATH] HTTP/1.1
- Host: updates.cdn-apple.com
- User-Agent: InetURL/1.0
- Accept: */*
- * old SSL session ID is stale, removing
- < HTTP/1.1 200 OK
- < Content-Type: binary/octet-stream
- < Content-Length: [CONTENT_LENGTH]
- < Date: [DATE]
- < x-amz-replication-status: COMPLETED
- < Last-Modified: [DATE]
- < x-amz-server-side-encryption: AES256
- < x-amz-meta-digest-sh1: [DIGEST_SHA1]
- < x-amz-meta-digest-sha256: [DIGEST_SHA256]
- < x-amz-version-id: [VERSION_ID]
- < Accept-Ranges: bytes
- < Server: AmazonS3
- < X-Cache: hit-fresh, hit-fresh, none
- < Via: http/1.1 [VIA]
- < X-Amz-Cf-Pop: [POP]
- < X-Amz-Cf-Id: [ID]
- < Cache-Control: max-age=604800, public
- < CDNUUID: [UUID]
- < Vary: Accept-Encoding
- < Etag: "[ETAG]"
- < Age: [AGE]
- < Connection: keep-alive
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement