Search results for

codesign

3,112 results found

Post

Replies

Boosts

Views

Activity

Reply to Codesigning in Europe still doesn't work with IPv6
[quote='848428022, intown, /thread/792209?answerId=848428022#848428022, /profile/intown'] Is there anyway I can get some assistance. [/quote] It’s hard to say without knowing more about the problem you’re experiencing. If this is a technical problem, then I recommend that you open a new thread here on the forums with the details [1]. Please pay careful attention to the topic, subtopic, and tags you choose, because many of us use that info to find relevant questions. For more info on how to use the forums effectively, see Quinn’s Top Ten DevForums Tips. OTOH, if this is a non-technical problem then the Apple Developer Forums might not be the right option. In that case, post a short summary of the issue here and I’ll see if I can offer a path forward. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com [1] Unless the problem happens to be about codesigning timestamps on IPv6 networks in Europe, but that seems unlikely. But, hey, if it doe
Topic: Code Signing SubTopic: General Tags:
Jul ’25
Codesigning in Europe still doesn't work with IPv6
I spent 20 minutes trying to figure out why codesigning was failing -- I had the pf block set up correctly, my keychains were unlocked, and then, eventually, it occurred to me, hey, maybe an IP address changed, so I disabled IPv6 except for link local, and then amazingly, it went back to working. I filed FB13706261 over a year ago. This is ridiculous.
7
0
298
Jul ’25
Reply to Correct formatting of webcredentials app id
I want to be clear about terms here: A bundle ID is how the system uniquely identifies your app. It’s typically in reverse DNS format, for example, com.apple.iWork.Pages. An App ID is composed of an App ID prefix and a bundle ID. For example, 74J34U3R6X.com.apple.iWork.Pages. The App ID prefix is typically your Team ID, but iOS previously used to require unique App ID prefixes, where you allocate a prefix that’s different from your Team ID. The apple-app-site-association file is expecting App IDs. There’s no ambiguity there. For any given App ID, the prefix is either the Team ID or a unique value. There are plenty of ways to determine your App ID but my preferred option is: Using Xcode, build your app for the device. Using Terminal, dump its entitlements: % codesign -d --entitlements - /path/to/your.app Look for the application-identifier entitlement (com.apple.application-identifier for Mac apps). If your app is currently using a unique App ID prefix, there are good reasons to convert it to use your
Topic: App & System Services SubTopic: General Tags:
Jul ’25
Reply to Signing a daemon with the Endpoint Security entitlement
fidelisevents % syspolicy_check distribution ./bin/FidelisEvents.app/Contents/MacOS/fidelisevents App passed all pre-distribution checks and is ready for distribution. fidelisevents % syspolicy_check distribution ./bin/FidelisEvents.app App passed all pre-distribution checks and is ready for distribution. And yes, I did this after removing the negative flags in the entitlement: codesign -d --entitlements :- ./fidelisevents.app Executable=/Users/darrelburns/devel/fidelisevents/bin/FidelisEvents.app/Contents/MacOS/fidelisevents warning: Specifying ':' in the path is deprecated and will not work in a future release Current Status: I’ve followed all documented Apple and forum guidance for deploying a non-system-extension Endpoint Security client as a Developer ID app bundle. I have: Embedded a Developer ID Application provisioning profile with the Endpoint Security entitlement (confirmed by developer.apple.com, profile XML, and all tools). Used codesign, spctl, and syspolicy_check distribution (
Topic: App & System Services SubTopic: Core OS Tags:
Jul ’25
Reply to Signing a daemon with the Endpoint Security entitlement
After learning that Endpoint Security (ES) clients must be packaged in an “app-like” structure to use a provisioning profile, I followed Apple’s technical note and Quinn’s advice: Steps Taken App Bundle Creation Created a bundle named FidelisEvents.app, with standard macOS .app layout. Placed my universal Mach-O (x86_64/arm64) binary at FidelisEvents.app/Contents/MacOS/fidelisevents. Added an Info.plist at FidelisEvents.app/Contents/Info.plist with the correct CFBundleIdentifier and metadata (matching the provisioning profile/App ID). Provisioning Profile Embedded the provisioning profile at FidelisEvents.app/Contents/embedded.provisionprofile. Profile type: Developer ID Application for macOS. App ID and team identifier match the bundle and entitlements. Profile entitlements explicitly include: com.apple.application-identifier com.apple.developer.team-identifier com.apple.developer.endpoint-security.client Confirmed by extracting and inspecting the embedded profile. Entitlements Used an entitlements plist at
Topic: App & System Services SubTopic: Core OS Tags:
Jul ’25
Reply to Root issue is missing entitlement in NFC App
My initial post was not very clear, adding some supporting information below: Initial NFC session establishes successfully Failure occurs immediately on first APDU transmission Configuration & Verification: Xcode Capabilities: Near Field Communication Tag Reading is enabled in the target's Signing & Capabilities tab. entitlements File: com.apple.developer.nfc.readersession.formats is correctly set to an array containing only TAG. (Confirmed ISO7816 should NOT be directly in this array based on Apple documentation). com.apple.developer.nfc.readersession.formats TAG Info.plist Configuration: Privacy - NFC Scan Usage Description (NFCReaderUsageDescription) is present. com.apple.developer.nfc.readersession.iso7816.select-identifiers is correctly configured with an array of relevant YubiKey AIDs, including the OATH AID (A000000527210101) and others. codesign Output : After building the app, running codesign -d --entitlements :- /path/to/YourAppName.app explicitly confirms that the com.app
Topic: App & System Services SubTopic: Core OS Tags:
Jul ’25
Signed application crashed at launch
We are building an installer application to install a dext. Building in Xcode, the installer app launches fine locally and installs the dext. We then try to sign it with the company Developer ID application certificate. However after doing so we cannot launch the application anymore as we get the following crash at launch: Exception Codes: 0x0000000000000000, 0x0000000000000000 Termination Reason: CODESIGNING 1 Taskgated Invalid Signature Triggered by Thread: 0 Thread 0 Crashed: 0 dyld_path_missing 0x102e187c0 _dyld_start + 0 Thread 0 crashed with ARM Thread State (64-bit): x0: 0x0000000000000000 x1: 0x0000000000000000 x2: 0x0000000000000000 x3: 0x0000000000000000 x4: 0x0000000000000000 x5: 0x0000000000000000 x6: 0x0000000000000000 x7: 0x0000000000000000 x8: 0x0000000000000000 x9: 0x0000000000000000 x10: 0x0000000000000000 x11: 0x0000000000000000 x12: 0x0000000000000000 x13: 0x0000000000000000 x14: 0x0000000000000000 x15: 0x0000000000000000 x16: 0x0000000000000000 x17: 0x0000000000000000 x18: 0x00000
Topic: Code Signing SubTopic: General
2
0
434
Jul ’25
Reply to Codesigning in Europe still doesn't work with IPv6
This is the line I was adding to /etc/pf.conf on every reboot: block drop from any to 2620:149:981:603::10 ETA: I want to be clear that the ridiculous part is that it's been going on for over a year, that I never got any response even after I mentioned in at least one forum comment that it was still occurring here, and that codesign after decades continues to give no error messages on failure. Oh, also that it doesn't clean up the .cstemp files it leaves behind, which admittedly were the only clue I had what was going on.
Topic: Code Signing SubTopic: General Tags:
Jul ’25
Is "library-validation" implied by hardened runtime?
We recently had an external pentest for one of our company's macOS applications and they brought up the topic of library validation. Our app has hardened runtime enabled and passes notarization. The codesign verification output includes: flags=0x10000(runtime) The pentesters brought up that both validation and runtime should be present, so I discovered that you could also add library validation by augmenting our flags with: OTHER_CODE_SIGN_FLAGS = --timestamp -o library which changes the flags to: flags=0x12000(library-validation,runtime) The pentesters insist that both options are necessary, especially to avoid library injection when SIP is off, but Apple's docs say that hardened runtime already implies library validation (see here ) My question is: does explicitly specifying library validation provide something that hardened runtime does not already? Or is it correct that hardened runtime already imply library validation? For what it's worth, I did a quick scan of some of the apps on my system, int
2
0
204
Jul ’25
Reply to App works fine in development but crashes in hardened runtime
[quote='791565021, thornhill_medical, /thread/791565, /profile/thornhill_medical'] After I package/codesign into a hardened runtime, I start seeing crashes at the moment when I try to execute the system calls to Docker. [/quote] I have some general advice on this front in my Resolving Hardened Runtime Incompatibilities post, part of the Resolving Trusted Execution Problems series. If you post a crash report, I might be able to offer more specific advice. See Posting a Crash Report for advice on how to do that. Share and Enjoy — Quinn “The Eskimo!” @ Developer Technical Support @ Apple let myEmail = eskimo + 1 + @ + apple.com
Jul ’25
xcodebuild/codesign failing over SSH on 15.x Host OS
We're seeing a pretty big problem with 15.x hosts and using SSH to execute builds. Yet this works just fine in the terminal over VNC. We see similar limitations with SSH and Virtualization too. They look related, but don't know. Xcode 16.4 15.4.1 Host OS Mac Mini M1. Let me know what else is needed. + xcodebuild -workspace /Users/veertu/anka-arm/./Anka.xcworkspace . . . build build /Users/veertu/anka-arm/build/Build/Products/Release/libpolicy.dylib: errSecInternalComponent Command CodeSign failed with a nonzero exit code ** BUILD FAILED ** /Users/veertu/anka-arm/build/Build/Products/Release/libpolicy.dylib: errSecInternalComponent Command CodeSign failed with a nonzero exit code ** BUILD FAILED ** Watching the Console logs I see . . . codesign CSSM Exception: -2147415840 CSSMERR_CSP_NO_USER_INTERACTION codesign error while checking integrity, denying access: CSSM CSSMERR_CSP_NO_USER_INTERACTION error 14:53:57.404848-0500 codesign SecKeyCreateSignature failed: Error
1
0
174
Jul ’25
Code signing of dylib for use under iOS
We are in the process of developing our text to speech and speech analysis tools over to mobile platforms = cross platform development. The tools are written in C++ and are compiled using CMake with an ios specific toolchain targetting the correct platform sdk. One of the parts of this toolkit is the dynamic loading of language specific dylibs via dlopen. I have seen that this can only be done if the dylib has been signed with the same certificate as the application. Note that we are still using free developer certificates generated automatically by XCode. When I run the test application, at the point where the dylib should be loaded via dlopen, the load fails and dlerror returns the following : dlopen(<path to dylib>, 0x0001): code signature invalid (errno=1) sliceOffset=0x00000000, codeBlobOffset=0x0205D0F0, codeBlobSize=0x000453B0 for '<path to dylib>' However, when I check the code signature with : codesign -d --verbose=2 --extract-certificates <path> I g
20
0
11k
Mar ’23
Reply to Using Processor Trace on Non-Xcode Built Binary
Thanks so much for the response! clang and rustc (by design on Rust' part, to be clear!) are sufficiently similar that it was pretty easy to translate between C++ and Rust! Your tips/suggestions almost worked for me, except that the binary would be sigkilled'd immediately after launch. I did some rubber-duck debugging using Claude, and it—rather impressively!—pointed out in https://claude.ai/share/5a4ca3ca-9e98-4e2a-b9ae-71b49c6983cf that the entitlement I needed to use was com.apple.security.get-task-allow, not com.apple.security-get-task-allow. Instruments' diagnostic contained a typo! Once I fixed this typo, I was able to use the Processor Trace instrument via xctrace. Of course, since this is beta software, which I hit a few bugs, which I'll cover at the end of this post. Apple silicon code must be signed, so the linker automatically applies an ad-hoc signature. You can see this if you dump the hello tool before re-signing it: [dump redacted] If you’re going to re-sign the binary anyway, you can disable l
Jul ’25
Notarization and Stapling Failing for Signed PKG & DMG with Error 65 Despite Successful Notary Submission
Dear Apple Developer Technical Support, I am encountering an issue with notarizing and stapling both PKG and DMG installers for our Electron-based macOS application COSGrid. Despite receiving successful notarization submission responses via notarytool, the stapling process fails with Error 65. Environment: App Name: COSGrid Bundle Identifier: com.cosgrid.pkg.COSGrid Developer ID Team ID: YB8S2XZ98K macOS Version: macOS [15.1] Xcode Version: [16.0 (16A242d)] Workflow Summary: For PKG: Build via yarn build (Vite + Electron Builder) Package with pkgbuild Sign using productsign Submit for notarization: xcrun notarytool submit COSGridMZA-2.1.10-arm64.pkg --apple-id ... --team-id YB8S2XZ98K --password ... --wait Conducting pre-submission checks for COSGridMZA-2.1.10-arm64.pkg and initiating connection to the Apple notary service... Submission ID received id: a8ff8e09-1ab4-49ed-9f6b-4afb9f09e53a Upload progress: 100.00% (235 MB of 235 MB) Successfully uploaded file id: a8ff8e09-1ab4-49ed-9f6b-4afb9f09e53a path: /Use
1
0
100
Jul ’25