gala is a jailbreak for iOS 4.
gala implements limera1n to gain code execution in SecureROM, then gradually boots and compromises the system from there. gala is also a tethered downgrade utility, as it abuses components of the 'Restore iPhone' procedure to flash and boot the device.
gala comes with an extensive write-up on developing an iOS jailbreak.
gala provides features both in the boot environment and in iOS itself.
- Fully controlled bootchain
- Fully controlled IPSW restore process
- Boot with custom boot logos
- Restore to customized firmwares and iOS filesystems
- Enable
/dev/kmem
device file - Kernel task can be controlled (
task_for_pid(0)
) - Neutered sandbox
- Neutered code signing
- Any task can be root (
suser() == 0
) - Disable FreeBSD MAC enforcement
- Allow RWX pages
- Preinstalled GlobalSign R3 root SSL certificate
- Python application
- limera1n implementation for exploiting the SecureROM
- API for specifying patches in binaries, blob files,
.dmgs
, and.debs
- Automated pipeline for decrypting, patching, and re-encrypting binaries in an iOS image
- Automated toolchain setup (iOS 4 SDK, patching and building dependencies, downloading IPSWs, etc.)
- Rust/armv7 SecureROM exploit payload
- Cocoa GUI for running the jailbreak
- Cocoa Touch wall-bounce animation and visual progress updates on the iPhone 4 while the device restores
- Communicates with gala on the host machine to coordinate the restore to a new filesystem
- C utilities that run in the boot environment
gala implements a generic patching framework that emphasises maintainable and understandable patch sets.
InstructionPatch(
function_name="platform_early_init",
reason="""
The original logic loads a memory word to find the value to pass to debug_enable_uarts().
We always want the debug logs to be emitted, so override the value here.
""",
address=VirtualMemoryPointer(0x84010b96),
orig_instructions=[Instr.thumb("ldrb r0, [r4]")],
patched_instructions=[Instr.thumb("movs r0, #3")],
)
As a glance, the reader of this patch can clearly see exactly what's being replaced, and why.
InstructionPatch
performs extensive validations to ensure the patch does exactly what's described in the metadata. For example, InstructionPatch
will validate:
- That the replaced instructions exactly match what's expected in the patch.
- That disassembling the assembled patch instructions exactly matches what's written in the patch (in other words, that Capstone confirms that the in-house assembler produces the correct opcodes).
- That the exact correct number of bytes are patched based on the input and output instructions
Disassembly is performed via Capstone. New instructions are assembled with an in-house/ad-hoc assembler.
Example: Injecting a shellcode program
shellcode_addr = VirtualMemoryPointer(0x840000fc)
BlobPatch(
address=shellcode_addr,
new_content=(RESOURCES / "shellcode").read_bytes(),
)
gala uses strongarm for Mach-O parsing during patching. gala relies on strongarm to find the appropriate file offset for the provided virtual address.
gala also provides Patch
types that are especially convenient for producing custom iOS distributions. For example, it's straightforward to patch files that only exist within a mounted .dmg
:
DmgPatchSet([
DmgReplaceFileContentsPatch(
file_path=Path("/private/etc/fstab"),
new_content="""
/dev/disk0s1 / hfs rw 0 1
/dev/disk0s2s1 /private/var hfs rw,suid,dev 0 2
""".encode()
),
DmgApplyTarPatch(
tar_path=_RESOURCES / "ssh_additions.tar"
),
])
Set up a Python 3.11 virtual environment.
$ virtualenv -p python3.11 ./venv
# Or your preferred virtual environment manager
Install gala's Python dependencies.
$ pip install -r requirements.txt -r requirements-dev.txt
Set up gala's toolchain and the working tree. This will perform steps such as:
- Ensuring pre-dependencies (such as
git
andrustup
) are installed. - Installing the obsolete Rust nightly version that gala depends on.
- Building gala's forks of iOS interaction projects such as
idevicerestore
. - Downloading and unzipping an iOS 4 IPSW from Apple.
- Extracting and setting up the iOS 4 SDK from an old Xcode distribution.
$ invoke setup-toolchain
gala's host-side logic is primarily written in Python, but comes with a Cocoa wrapper application for end-user convenience. The Cocoa GUI can be built and launched using the following commannd:
$ invoke launch-gui
Alternatively, you can use the Python application directly:
# To flash a jailbroken iOS 4 image to an iPhone 4
$ python3 gala-cli.py --jailbreak
# To perform a tethered boot of an iPhone 4
$ python3 gala-cli.py --boot
gala comes with a writeup detailing the process of writing an iOS jailbreak. Here's what happens on the device at a high-level:
- The user places the device into DFU mode.
- The device's SecureROM waits for an iBSS image to be uploaded over USB.
- gala sends a series of malformed USB control packets to upload and jump to shellcode.
- The shellcode takes over the process of waiting for an iBSS image, and embeds a runloop that will accept and load any unsigned image.
- gala uploads a patched iBSS that has its code signature checks patched out.
- The SecureROM loads and jumps to the patched iBSS.
- gala uploads a patched iBEC that has its code signature checks patched out.
- The iBSS loads and jumps to the patched iBEC.
- gala uploads a patched Restore ramdisk, a patched kernelcache, and a device tree.
- gala specifies boot arguments that indicate that the device should boot from the uploaded Restore ramdisk.
- The iBEC loads and jumps to the kernelcache.
- The patched Restore ramdisk starts up a gala-owned service that communicates with gala on the host machine.
- gala sends a patched filesystem image over USB, and flashes it to the device.
- gala intentionally doesn't flash a new LLB to NOR.
- The device reboots (and fails to boot, since the LLB sees that the boot-chain has an invalid code signature).
At this point, the device is jailbroken. The user then clicks the Tethered boot
button, and the process is similar:
- The user places the device into DFU mode.
- The device's SecureROM waits for an iBSS image to be uploaded over USB.
- gala sends a series of malformed USB control packets to upload and jump to shellcode.
- The shellcode takes over the process of waiting for an iBSS image, and embeds a runloop that will accept and load any unsigned image.
- gala uploads a patched iBSS that has its code signature checks patched out.
- The SecureROM loads and jumps to the patched iBSS.
- gala uploads a patched iBEC that has its code signature checks patched out.
- The iBSS loads and jumps to the patched iBEC.
- gala uploads a patched Restore ramdisk, a patched kernelcache, and a device tree.
- gala specifies boot arguments that indicate that the device should boot from the filesystem on NAND.
- The iBEC loads and jumps to the kernelcache.
- The device boots to iOS.
The user connects a DFU-mode iPhone 4 and launches the GUI.
The iBSS executes.
The iBEC executes.
gala sends and flashes a new filesystem.
After a tethered boot, the device is now jailbroken.
gala is released under the MIT license.