Pair Locking your iPhone with Configurator 2


Oct 7th, 2019 | 11 minute read

In response to the recentiphone bootrom bug(and also because I was already in the market for a new phone), I recently purchased a new iPhone XR. This gave me a chance to re-run the steps required topair lockthe device, a process which prevents law enforcement from using forensics tools against your phone, and the result of which is this blog post.

It covers:

  • Why pair lock your device?
  • How does it work?
  • Supervising and pair locking your device

Why pair lock your device?

It’s an unfortunate state of affairs but people’s digital privacy is increasingly under attack by law enforcement agencies, especially at protests, airports, and border crossings. Articles like the following have become all too common:

and closer to my home in San Francisco we see tweets likethis one:

By pair locking your device you will prevent iPhone forensics tools from being able to connect to your device, image it, scan through your messages and camera roll, read your contacts and call history, etc – even if you’ve been compelled by law enforcement to unlock your device! They can stillmanuallylook through your unlocked phone contents, but they can’t image the device for offline analysis, they can’t run automated content scanners, and they no longer get access to your various app authentication tokens.

I originally learned about this feature / unintended side effect from Jonathan Zdziarski’s excellentblog postabout it. Jonathan was a well-known iOS security researcher who now works on Apple’s security team. Unfortunately since joining Apple he stopped blogging about iOS security (and deleted his twitter), and the instructions in his original 2014 blog are now slightly dated. The purpose of this post is to provide updated instructions, though it is still heavily based on Jonathan’s post.

How does it work?

Forensics tools pull data from iPhones using a concept calledpairing, which Jonathan explained best:

A pairing is a trusted relationship with another device, where a computer is granted privileged, trusted access on the iPhone. In order to have the level of control to backup the phone, download personal data, install applications, or perform other such tasks on an iOS device, the machine it’s connected to must be paired with the device. This is what iTunes and Xcode do to talk to the phone, but also what forensic imaging tools and a number of free hacking tools do as well.

By pairlockingyour device, you instruct your iPhone to never create a new trusted relationship with any device that connects to it except the device which created the lock, which has the side effect of breaking all forensics tools. In the presence of pair locking, the only way to harvest data off your phone would be with a hardware vulnerability (like the bootrom one mentioned in the opening line of this blog post).

To enable pair locking we need to put the phone into asupervisedstate, which enables a large number of restrictions you can place on the phone’s functionality and behavior. It was built for enterprises to enforce security controls on their employees’ phones but it’ll work just as well for us here.

Before proceeding with the process there are three caveats to keep in mind:

  • Putting your phone into a supervised state will fully wipe it. After wiping it you can log back into iCloud and all settings/apps/etc you have configured to sync will be there again. However you cannot take a device backup, supervise the device, and then restore the backup (as this would also restore the unsupervised state).
  • Anyone who gains access to your laptop can get the pairing record from it and have complete access to everything on your phone (after physically connecting to it).
  • If you lose access to your laptop or pairing record then you will also be locked out of connecting to your phone.

So, how do you actually do it?

Supervising and pair locking your device

  1. Download and install Apple’sConfigurator 2application.

  2. Plug your phone into your computer with a USB cable.

  3. In Configurator, click on your phone and then click on thePreparebutton in the upper navigation.
    Click to expand image

  4. In the dialog that opens:
    • EnsureSupervise devicesis checked
    • CheckAllow devices to pair with other computers
    • ClickNext
    Click to expand image

    Pair locking can be done at 2 different levels: at the supervisor level or at the profile level (a profile is a collection of iPhone settings to enforce). Following Jonathan’s advice we opt for profile enforcement, which is why we checkedAllow devices to pair with other computershere – we’re allowing it at the supervisor level and we’ll block it later at the profile level. The reasoning for this is that profiles can be added/removed without wiping the device, which is helpful if you ever need to switch to a new laptop.

  5. In the next dialog page, selectDo not enroll in MDMand clickNext:
    Click to expand image

  6. You’ll be prompted to create a new organization. ClickNext:
    Click to expand image

  7. When prompted to sign into Device Enrollment Program, clickSkip:
    Click to expand image

  8. Fill out the name for your organization (everything else can be left blank) and clickNext:
    Click to expand image

    You can choose whatever organization name you want but keep in mind it will be displayed at the top of your iPhone settings:Preparing your device

  9. On the following page, selectGenerate a new supervision identityand clickNext:
    Click to expand image

  10. On the next page leave the settings unchanged and clickPrepare:
    Click to expand image

    This will prompt you for your laptop password to update your certificate settings – once you enter your password and clickUpdate Settingsthe process to wipe and supervise your phone will begin. If your device is already supervised you’ll get an error about needing to restore the device first (but this likely doesn’t affect you, since you’re reading this post!).

  11. After the process completes, you can create a new profile which will have your pair locking restriction:
    • ClickFile ->New Profileand give your new profile a name
    • Under theControls when the profile can be removedsection, select eitherNeverorWith Authorization
    Click to expand image

    This setting controls when someone can remove the profile from within the phone itself. If it’s left as the default value of “Always” then anyone with access to your unlocked phone could remove the pair lock (which would defeat the entire purpose). You can either set it toNeverto never allow removing the profile, orWith Authorizationand set a password to allow removing the profile with the given password (this might be useful to remove the pairing restriction if you do lose access to your laptop).

  12. Go to theRestrictionssection in the left navigation and clickConfigurein the right pane:
    Click to expand image

  13. In the restrictions pane you’ll see a large number of settings you can configure to disallow certain apps, set password/touchid/faceid restrictions, etc. Uncheck the boxAllow pairing with non-Configurator hosts:
    Click to expand image

    You can also go ahead and set any other restrictions that seem appealing to you.

  14. Exit the “New Profile” window. You’ll be prompted to save your new profile somewhere.

  15. In the main Configurator window, right click your phone and selectAdd ->Profiles..., and load your newly saved profile:
    Click to expand image

You’ve now successfully pair locked your device! If you attempt to plug your phone into a different laptop you should see the following error:

and forensics tools should similarly fail to connect to your device. If you later want to remove this restriction you canRemove ->Profiles...in Configurator, analogous to step 15.

Conclusion

Pair locking is a useful feature to protect yourself against invasive device searches. If this topic concerns you then you should also check out the EFF’s detailedDigital Privacy at the U.S. Borderguide, which covers both the technological aspects of digital privacy (like minimizing data when crossing borders) as well as the legal frameworks used for device searches (discussing what is and is not allowed).

While I feel safer having this protection on my phone, no amount of technology will solve what is ultimately a policy issue – we need modern privacy laws and regulations for that.

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here