!lheuhImcToQZYTQTuI:nixos.org

Nix on macOS

1161 Members
“There are still many issues with the Darwin platform but most of it is quite usable.” — http://yves.gnu-darwin.org188 Servers

Load older messages


SenderMessageTime
18 Nov 2025
@weethet:catgirl.cloudWeetHetAnd I think that not having access to it is a bug15:52:30
@k900:0upti.meK900OK that's above my pay grade15:53:27
@weethet:catgirl.cloudWeetHetIt's not even an impurity since FODs still have a hash to verify that the output doesn't change15:53:59
@weethet:catgirl.cloudWeetHetWhy does it matter if they have access to the system Keychain15:54:09
@weethet:catgirl.cloudWeetHet Minimized patch just adds (allow mach-lookup (global-name "com.apple.SecurityServer")) 15:54:43
@weethet:catgirl.cloudWeetHetWhich should be fine TM15:54:52
@reckenrode:matrix.orgRandy EckenrodeSo, e.g., on Debian it would copy from wherever Debian keeps its certs?18:13:15
@k900:0upti.meK900Yes18:13:32
@reckenrode:matrix.orgRandy EckenrodeYes. Things that access Keychain will get different certs than those that don’t.18:13:43
@reckenrode:matrix.orgRandy EckenrodeIf Nix on Linux copies from the system, so should Nix on Darwin.18:14:18
@weethet:catgirl.cloudWeetHetYou can't copy those you need to give access to the security server18:14:54
@reckenrode:matrix.orgRandy EckenrodeBut copy not punch a hole in the sandbox. The reason being that not every application uses or can use the system API.18:15:07
@reckenrode:matrix.orgRandy EckenrodeThe daemon or whatever sets up the build can’t do it?18:15:30
@weethet:catgirl.cloudWeetHetFOD sandbox already allows access to trustd18:16:45
@weethet:catgirl.cloudWeetHetAgain, it's the FOD sandbox we already allow network access18:17:00
@weethet:catgirl.cloudWeetHetHow much more impure do you want it to be18:17:09
@weethet:catgirl.cloudWeetHetIt would be entirely different if we were talking about the non-FOD sandbox18:17:41
@reckenrode:matrix.orgRandy EckenrodeI actually am.18:17:54
@reckenrode:matrix.orgRandy EckenrodeBecause MDM breakage is a recurring issue.18:18:07
@weethet:catgirl.cloudWeetHetYou can't fix stuff using system tls in any other way other than allowing to access the service18:19:05
@weethet:catgirl.cloudWeetHetThe different option is to patch all of it to not use the system keychain at all18:19:21
@weethet:catgirl.cloudWeetHetIF it can be patched at all18:19:33
@weethet:catgirl.cloudWeetHetmacOS comes with an assumption that there is a system keychain with TLS certificates18:19:56
@saiko:knifepoint.netKatalin 🔪can you shim the keychain API?18:20:01
@weethet:catgirl.cloudWeetHetDo you really think Apple would allow you to impersonate a system service?18:20:33
@weethet:catgirl.cloudWeetHetThat would be a giant security hole18:20:43
@saiko:knifepoint.netKatalin 🔪hm, fair18:20:59
@weethet:catgirl.cloudWeetHetWe already allow access to trustd anyways18:21:21
@weethet:catgirl.cloudWeetHet I would like there to be some sandbox for FODs as relaxed just disables it 18:23:24
@weethet:catgirl.cloudWeetHetIf apps would need to be patched/worked around to work with native tls I'm not sure people would accept this as a valid tradeoff18:23:56

Show newer messages


Back to Room ListRoom Version: 6