Search results for

ACME

78 results found

Post

Replies

Boosts

Views

Activity

Big Sur fails to mount encrypted volume
I have a problem mounting an encrypted volume on Big Sur (11.1). In DiskUtility, when I select the volume, click Mount, enter password and click Unlock, nothing happens. I also tried to use CLI to unlock the volume using command: diskutil apfs unlockVolume /dev/disk1s6 but it gives me error: Passphrase: ACM: LibCall_ACMContextCreate: returning, err = -536870181. Error -536870181 (0xe00002db) creating ACM Context for passphrase I also tried to create a new encrypted volume with simple password '123', but after I unmounted it and tried to mount again I got the same error. Device: MacBook Pro (16-inch, 2019) Is it a bug in Big Sur or am I doing something wrong? Should I just wait for an update with a fix? I don't have an urgent need to decrypt the data because I have a backup. The question is about possibility of using encrypted volumes in macOS.
4
0
3.8k
Jan ’21
Reply to Managed Device Attestation - ACME - Request Authorization
It would be great if the device could attest that it is under management and have an OID for the check-in URL or the APNS topic is registered against. This might eliminate the ACME server's need to authorize a request against the MDM server or help improves the validation of the request etc. The only properties that could potentially appear in attestations are things that the Secure Enclave did. It's the OS's responsibility to enroll the device and keep track of the check-in URL, push topic, and other management-related properties. So to attest it, the OS would have to tell the Secure Enclave these properties. A compromised OS could lie to the Secure Enclave about these management properties. So to trust attestation of those properties, you'd have to trust the OS as well. And if you're trusting the OS, the attestation of that property isn't giving you any additional security over just asking the OS to report the property directly.
Jun ’22
Managed Device Attestation - ACME - Request Authorization
I'm curious about suggested workflows for a 3rd party ACME server handling a request for a managed device. Specifically, when the MDM server does not control the ACME server like it likely would when using the ACME payload for the MDM client identity. i.e., an organization with a CA that can distribute client identities using ACME; how should ACME servers validate the request is authorized? The server, of course, would be able to validate that the attestation is valid from Apple, but how would an ACME server validate that the request is authorized for a device? I would assume that the ACME server would use the ClientIdentifier key similarly to a SCEP challenge. And that identifier should be populated in MDM either as a static challenge or dynamically fetched by MDM from the ACME service? Or possibly that the ACME service would need a connection (i.e., through a restful API) to the MDM server to validate it is a device under manag
2
0
1.9k
Jun ’22
Reply to Managed Device Attestation - ACME - Request Authorization
You're right that the ClientIdentifier can work similarly to the SCEP challenge. ClientIdentifier management systems amount to some kind of coordination between the ACME server and the system that's generating the configuration profile containing an ACME payload (usually the MDM server). There's many ways to arrange it: It could be that the ACME server and MDM server agree on some ClientIdentifier generation scheme based on increasing counters or timestamps, or the MDM server asks the ACME server to issue a ClientIdentifier to embed in the profile, or the MDM server generates them and the ACME server verifies them when a certificate is requested. But this is ultimately weak evidence. If the ClientIdentifier is fumbled at any step of the way, someone else could use it. That's why the only specifically recommended use is as a rate limiting system, so that the ACME server can quickly reject clients that don't have valid ClientIdentifiers. So how does the ACME
Jun ’22
IOKIT Detecting BSD(unix) name for USB Serial Device with PID and VID
I am working with USB serial devices on macOS.How can I detect BSD(unix) name have for my USB Serial device on macOS using IOKit?I want to get device name like : IODialinDevice = /dev/tty.usbmodemMyDeviceNameMy USB device is USB serial COM port.Also I want to detect when device was attached to machine.I can detect when new USB device with my VID and PID was connected.This code allows me to do it CFMutableDictionaryRef keywordDict = IOServiceMatching(kIOSerialBSDServiceValue); kern_return_t result = IOServiceGetMatchingServices(kIOMasterPortDefault, keywordDict, &iterator); while ((port = IOIteratorNext(iterator))) { io_object_t parent = 0; io_object_t current_device = port; while (KERN_SUCCESS == IORegistryEntryGetParentEntry(current_device, kIOServicePlane, &parent)) { CFTypeRef vendor_Id = IORegistryEntryCreateCFProperty(parent, CFSTR(kUSBVendorID), kCFAllocatorDefault, 0); CFTypeRef pr_Id = IORegistryEntryCreateCFProperty(parent, CFSTR(kUSBProductID), kCFAllocatorDefault, 0); if((vendor_id==MY_VEND
3
0
3.8k
Oct ’21
auv3 macOS in process validating
oli-mbp:~ oli$ auval -v aufx IpeH Acme AU Validation Tool Version: 1.6.1a1 Copyright 2003-2013, Apple Inc. All Rights Reserved. Specify -h (-help) for command options -------------------------------------------------- VALIDATING AUDIO UNIT: 'aufx' - 'IpeH' - 'Acme' -------------------------------------------------- Manufacturer String: AcmeInc AudioUnit Name: IPlugEffect Component Version: 1.0.0 (0x10000) * * PASS -------------------------------------------------- TESTING OPEN TIMES: COLD: dyld: warning, LC_RPATH @executable_path/../Frameworks in /Users/oli/Applications/IPlugEffect.app/Contents/Frameworks/IPlugEffectAUv3Framework.framework/IPlugEffectAUv3Framework being ignored in restricted program because of @executable_path 2018-05-10 20:45:25.883 auvaltool[5532:94786] -[IPlugViewController createAudioUnitWithComponentDescription:error:]: unrecognized selector sent to instance 0x7fa5b4031ee0 2018-05-10 20:45:25.883 auvaltool[5532:94786] *** Terminating app due to uncaught exception 'NSInv
2
0
1.9k
Jul ’21
Reply to create Serial Port Drivers use DriverKit
I am not aware of any sample code, which is really a shame. Without sample code, writing USB serial device drivers is a very obscure science. However, if you can influence the code on the USB device you are better off implementing the USB CDC ACM protocol. That way your device appears under /dev/tty* and /dev/cu* without the need to write a device driver. And best of all, it works on Windows and Linux as well - again without device drivers. And on macOS, you probably don't want to use the /dev/tty* device but rather the /dev/cu* device. /dev/tty* is from the old days when you had a modem connected to your serial port and your software would become active if there was an incoming call.
Topic: App & System Services SubTopic: Drivers Tags:
May ’21
Reply to How to link Apple in-app subscription to company account
If you want that one user only have one account in ACME, you can detect that the original_transaction_id is being used by another account, and inform the user that he has another account. If you decide to allow a user have different accounts in ACME, then that shouldn't be a problem because the user is the same with two accounts. If the user is the same, it shouldn't matter what account he used to log in. To share subscription between members of a family, Apple has now Family Sharing: https://developer.apple.com/documentation/appstoreservernotifications/notification_type#3733656
Apr ’21
How to link Apple in-app subscription to company account
My understanding is that we are supposed to use the original transaction ID to link to a user, but that's not a one-to-one mapping. Let's say I work for ACME Inc and we offer an in-app subscription to content. A customer downloads our app. Inside the app, they create an ACME account (A). Then they purchase the subscription within the app. During verification and fulfillment, we save the user's ACME account ID and the original transaction ID from the Apple receipt. Great! At some point, the user cancels the subscription and doesn't use the service for some time. When they decide they want to use it again, they open the ACME app and can't remember their login for ACME account (A). So, instead of recovering the account, they create a new account (B). Then they purchase a subscription. We save the user's ACME account ID and the original transaction ID from the Apple receipt. The original transaction ID will be the same in both cases, but the ACME acco
1
0
1.1k
Apr ’21
Reply to From Reality Composer to app
Hi, I began using Reality Composer on the iPad Pro about a year ago, approaching it from having taught 2D-3D graphics 20 year’s ago. Apple’s AR is the most exciting presentation format since QuickTime. I am in much the same position you are in...I have ‘content’, now how do I sew it together and into an app?. Apple has solid information on making apps in ‘normal product category domains’. AR is still a bit new. The difficulty of making the leap from ‘content’ to ‘app’ depends somewhat on your background with Xcode, along with the the complex’s and goals of your app, You also may or may not need an ‘app’ in the ‘AppStore’ sense; I’ve seen discussion of using QuickLook for viewing.reality files. If all you need to do is share your AR content, exporting a Reality Composer ‘scene’ as a .reality file can be a very useful way of making your ‘content’ available the way it functions within Reality Composer’s building environment. C You may also wish to look at SwiftPlaygrounds in iOS as a way to examine if your conte
Nov ’20
Reply to Quicklook cache taking up almost 80gb of storage?
David:Only assumptions on my part, I'd guess that file is allowed to go big specifically related to the beta, via the ACM, or, at least in your example, it's borked - sqlite.org says this about size, otherwise:Avoiding Excessively Large WAL FilesIn normal cases, new content is appended to the WAL file until the WAL file accumulates about 1000 pages (and is thus about 4MB in size) at which point a checkpoint is automatically run and the WAL file is recycled. The checkpoint does not normally truncate the WAL file (unless the journal_size_limit pragma is set). Instead, it merely causes SQLite to start overwriting the WAL file from the beginning. This is done because it is normally faster to overwrite an existing file than to append. When the last connection to a database closes, that connection does one last checkpoint and then deletes the WAL and its associated shared-memory file, to clean up the disk.So in the vast majority of cases, applications need not worry about the WAL file at all. SQLite will a
Topic: App & System Services SubTopic: Core OS Tags:
Aug ’19
POSIX open() blocks indefinitely for serial port file descriptor
I have a USB CDC ACM device which appears in the /dev filesystem as /dev/tty.usbmodem... and /dev/cu.usbmodem... . Most of the time, I am able to read from and write to this device using serial port libraries, including the POSIX calls open(), read(), write(), etc.However, if the device is plugged in, then my mac goes to sleep for at least a few minutes (3 seems very repeatable), when the PC wakes up and I try to open the file, the call to open() blocks or hangs forever. This also happens if I use the `O_NONBLOCK` option, which should return immediately. I am not loading any special device drivers, but instead relying on the built-in driver loaded for USB CDC ACM devices.This affects not only my software, but also built-in utilities including `screen` and other common libraries including pyserial. I've tried both the /dev/tty.usbmodem... and /dev/cu.usbmodem.. filepaths. This occurs across multiple versions of macOS including Mojave and High Sierra. I've tried using direct USB-C cable connec
2
0
1.3k
Jun ’19
MDM.cer Private Key?
Hello,I have been following some instructions I found online for setting up and running a custom MDM server. In one of the steps it talks about creating and MDM Vendor CSR. Below I have listed out these steps from the website. I have done up to Step 5, but in step 5 it talks about getting the private key from the MDM Vendor CSR after it has been installed into Keychain Access. Once I get here, for me, there is no disclosure triangle to display the private key. Has something changed in this process and the private key is now located somewhere else or needs to be created in some different way?One other thing to make note of is, what gets downloaded in step 5 is a file named mdm.cer. Should this file actually be named mdm.csr? If so, then maybe my Enterprise account is not flagged for MDM Vendor use. I am not the team agent, so if what I previously mentioend is the case, then I would need to get with that person and have the account flagged appropriately. I would think if the account is not flagged for MDM Vendo
3
0
2.8k
Aug ’16