10.13 Secure Kernel Extension Loading Implementation is Detrimental to Security and Deployment

Number:rdar://33628971 Date Originated:07/31/2017
Status:Duplicate/33628591 Resolved:
Product:macOS + SDK Product Version:10.13b4
Classification: Reproducible:Always
Secure Kernel Extension Loading negatively affects usability for end users and as a result makes the experience less secure overall. It is also not manageable for organizations with any business need to ensure the functionality of kernel extensions in its current implementation.

Steps to Reproduce:

Install file sync, audio driver, printer, virtualization, hardware accessory, or security product. All of which are properly signed with certs approved by Apple.

Expected Results:
Signed kernel extensions are loaded and functional.

Observed Results:

The kext is not loaded. At time of install, a confusingly-worded prompt mentions a name (the Subject Common Name field) which would almost always not be the same as the product users would have seen as the window title during the install. Users are not allowed one-click opening of the appropriate System Preferences -> Security pane. Only during a 30-minute window and when the kext is attempted to be loaded again the end user may enable the kext. If multiple directories contain kexts by the developer, or the developer used different TeamIDs for the products in their suite, multiple checkboxes are observed.


10.13 Beta 4

The strategy to address this change proposed in Technical Note TN2459 falls short of reasonably addressing any business concerns. Getting every new computer into an environment where spctl can run to perform whitelisting is contrary to Apple guidance to not maintain imaging infrastructure. Unlike GUI whitelisting, exceptions or disabling of this new behavior via spctl can be reset with NVRAM. This makes enterprise IT less confident that loading signed kexts can't (inadvertently or otherwise) be directly circumvented - in departments where use of these kexts are compliance-mandated this will remove the option of purchasing or using Macs



By rderewianko at Feb. 13, 2018, 4:38 p.m. (reply...)

Response from Apple.

This is a follow up to Bug ID# 33628971. This bug has been closed as a Duplicate. The issue is being tracked under the original Bug ID# 33163283 which is also listed in the Related Problem section of your bug report. To check the status of the original bug report, please visit the Related Problem section of the Problem Detail view of your closed duplicate bug.

For further information on the status of the original bug report, please update your report directly http://bugreport.apple.com and we will provide you with any available information.

Thank you for submitting this report.

By rderewianko at Aug. 11, 2017, 4:23 p.m. (reply...)

Please note: Reports posted here will not necessarily be seen by Apple. All problems should be submitted at bugreport.apple.com before they are posted here. Please only post information for Radars that you have filed yourself, and please do not include Apple confidential information in your posts. Thank you!