Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

xcscredd(186) deny file-read-metadata /Users

Hi


I chacked my Systemlog, that was created over nicht. There are a lot of logs which i try to decrypt. The first on eis this one.


Oct 28 04:27:47 server kernel[0]: Sandbox: xcscredd(186) deny file-read-metadata /Users

Oct 28 04:27:47 --- last message repeated 16 times ---

Oct 28 04:27:47 server.mydomain.com sandboxd[71] ([186]): xcscredd(186) deny file-read-metadata /Users

Oct 28 04:27:49 --- last message repeated 7 times ---


It's comming every 13 minutes. I googled a little bit and find out, that xscertd is a certificate signing deamon.


The deamon config is located in /System/Library/LaunchDaemons/. It has a socket config, what means, that the service is started, when it is needed. As far as I know.


In /usr/share/sandbox/com.apple.xscertd.sb is no entry for the /User folder.


Should I enter a value like


(literal "/Users") in the allow file-read-metadata section?


Can someone tell me what the certificate signing deamon wants in the users folder?


And what activates every 13 minutes the certificate signing deamon which needs to read the file metadta in the users folder?

Mac mini, OS X Mavericks (10.9), Server Profile Manager Payloads

Posted on Oct 28, 2013 2:38 AM

Reply
40 replies

Feb 14, 2017 11:45 AM in response to adrianmartini

This is an old thread, but I have come across this problem with more concern than just my log filling up. This is actually affecting/preventing operation.
For me, I was looking into why the "Autoimporter" was no longer able to transfer my iPhone pictures into the requested folder and discovered these messages appearing when I connect my phone. So it appears this security feature is preventing an important operation for me. Blocking them from the log seems to be a naive solution - head in the sand. Those who did this might have tough time figuring out the problem when they later find the operation that isn't succeeding and was generating the errors.

So, I second the suggestion to determine the root cause.

Oct 28, 2013 1:55 PM in response to - Krzysztof -

xcscredd is part of the Xcode Server service, it holds the credentials for logging into repositories, it has a very restrictive sandbox.

That message is likely a result of the security apis dealing with keychain notifications. It is benign and should have been dealt with in the sandbox file with a no-log directive.


It really is nothing to worry about.

HTH

Leland

Oct 28, 2013 2:44 PM in response to - Krzysztof -

It is my understanding that the portion of the security framework that implements the keychain APIs gets notifications from securityd every time a keychain operation happens on the system. That code (in the clients adddress space) has to verify the keychain path to see if it is a path that the client is interested in. The default application sandbox allows this. Since xcscredd is a deamon process, with no need to look into user folders, it does not use the default application sandbox, and thus is seeing (and denying) the verification attempts.


It's worth filing a bug against Server to have them fix the log issue.


HTH

- Leland

Oct 28, 2013 2:54 PM in response to Leland Wallace

Thanks for the anwsers. I will try it with the sandbox entry and write here tomorrow about it.

And I will make a bug report.


An other question. You seem to know s little bit about the processes.

I have an other log problem here. It spams everytime I open the Keychain.

https://discussions.apple.com/thread/5490121


Can you tell me what secd is?

Oct 29, 2013 12:26 AM in response to ebolaseph

It's the


/usr/share/sandbox/ com.apple.xscertd.sb


file.


Now I checked the log. Over night i rebooted and didn't log in.

So there haven't been any logs from xscertd.


But now I logged in an see, that they are commin again.


kernel[0]: Sandbox: xcscredd(186) deny file-read-metadata /Users


But I it's only the metadata. I think that it is needed to change


(deny file-read*

(subpath "/Users")

(with no-log)

)


to


(deny file-read-metadata

(subpath "/Users")

(with no-log)

)


or just add the last one additionally.


Will try this out and tell you the result here.

xcscredd(186) deny file-read-metadata /Users

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.