!lheuhImcToQZYTQTuI:nixos.org

Nix on macOS

1162 Members
“There are still many issues with the Darwin platform but most of it is quite usable.” — http://yves.gnu-darwin.org188 Servers

Load older messages


SenderMessageTime
18 Nov 2025
@reckenrode:matrix.orgRandy EckenrodeBut copy not punch a hole in the sandbox. The reason being that not every application uses or can use the system API.18:15:07
@reckenrode:matrix.orgRandy EckenrodeThe daemon or whatever sets up the build can’t do it?18:15:30
@weethet:catgirl.cloudWeetHetFOD sandbox already allows access to trustd18:16:45
@weethet:catgirl.cloudWeetHetAgain, it's the FOD sandbox we already allow network access18:17:00
@weethet:catgirl.cloudWeetHetHow much more impure do you want it to be18:17:09
@weethet:catgirl.cloudWeetHetIt would be entirely different if we were talking about the non-FOD sandbox18:17:41
@reckenrode:matrix.orgRandy EckenrodeI actually am.18:17:54
@reckenrode:matrix.orgRandy EckenrodeBecause MDM breakage is a recurring issue.18:18:07
@weethet:catgirl.cloudWeetHetYou can't fix stuff using system tls in any other way other than allowing to access the service18:19:05
@weethet:catgirl.cloudWeetHetThe different option is to patch all of it to not use the system keychain at all18:19:21
@weethet:catgirl.cloudWeetHetIF it can be patched at all18:19:33
@weethet:catgirl.cloudWeetHetmacOS comes with an assumption that there is a system keychain with TLS certificates18:19:56
@saiko:knifepoint.netKatalin 🔪can you shim the keychain API?18:20:01
@weethet:catgirl.cloudWeetHetDo you really think Apple would allow you to impersonate a system service?18:20:33
@weethet:catgirl.cloudWeetHetThat would be a giant security hole18:20:43
@saiko:knifepoint.netKatalin 🔪hm, fair18:20:59
@weethet:catgirl.cloudWeetHetWe already allow access to trustd anyways18:21:21
@weethet:catgirl.cloudWeetHet I would like there to be some sandbox for FODs as relaxed just disables it 18:23:24
@weethet:catgirl.cloudWeetHetIf apps would need to be patched/worked around to work with native tls I'm not sure people would accept this as a valid tradeoff18:23:56
@reckenrode:matrix.orgRandy EckenrodeIt also assumes we are using Xcode. Should we give up on the whole endeavor?18:30:17
@weethet:catgirl.cloudWeetHetI don't understand why not providing access to security server is such a big deal. I can curl a random non-reproducible url from a FOD to get non-fixed certs file but using the system to verify certificates is somehow worse?18:33:24
@weethet:catgirl.cloudWeetHet FODs exist to turn assumed reproducibility into verified one and have hash checks for a reason 18:35:26
@weethet:catgirl.cloudWeetHetPlus we already have trustd allowed in the sandbox, so allowing the second part of the security framework seems only logical to me18:36:16
@weethet:catgirl.cloudWeetHetAgain the only other option seems to be disallowing native tls in FODs completely which is just insane18:36:51
@reckenrode:matrix.orgRandy EckenrodeI’m thinking beyond FODs.18:37:04
@weethet:catgirl.cloudWeetHet I'm only talking adding (allow mach-lookup (global-name "com.apple.SecurityServer")) to the FOD sandbox profile 18:37:40
@weethet:catgirl.cloudWeetHetNothing else18:37:49
@weethet:catgirl.cloudWeetHetNon-FOD sandbox is beyond me18:38:23
@weethet:catgirl.cloudWeetHetI need my FODs to build first18:38:33
@reckenrode:matrix.orgRandy EckenrodeThat’s fine. I wasn’t thinking about FODs specifically, which resulted in a lot of noisy discussion. Det Nix does something like what I want. I wish we had that in an open spurce Nix.18:45:05

Show newer messages


Back to Room ListRoom Version: 6