![]() TLSv1.2 (IN), TLS handshake, Certificate (11): TLSv1.2 (IN), TLS handshake, Server hello (2): TLSv1.2 (OUT), TLS handshake, Client hello (1): If the server is "not Albert" it seems to send the request to the root page instead of device activation (I made the key differences in bold).Ĭonnected to localhost (::1) port 80 (#0) > POST / HTTP/1.1 Host: localhost User-Agent: iOS Device Activator (MobileActivation-20 built on at 19:07:28) Accept: / Content-Length: 12907 Expect: 100-continue Content-Type: multipart/form-data boundary=-1d2cf02c7afb7c1aĬonnected to (17.171.27.65) port 443 (#0)Ĭipher selection: set certificate verify locations: There seems to be a check in place to see whether or not the server certificate is valid. The only problem now is Apple seems to have added an extra layer of security to Albert.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |