Unsigned (Legacy) Extensions in El Capitan?

Running an iMac 21.5-inch (Mid-2011) with 2.5GHz Intel Core i5, 4GB DDR3 1333MHz, 500GB Internal HD, (2) 3TB Thunderbolt External Drives, (1) 1.5TB FireWire800 External Drive, M-Audio FireWire 410 at the end of the FireWire800 Bus and now not loading drivers.


Extensions (from System Report) states the following:


M-AudioFireWireBeBoB:


Version: 1.10.2

Last Modified: 7/28/11, 2:27 PM

Bundle ID: com.m-audio.driver.firewire

Loaded: No

Obtained from: Not Signed

Kind: Universal

Architectures: i386, ppc, x86_64

64-Bit (Intel): Yes

Location: /System/Library/Extensions/M-AudioFireWireBeBoB.kext

Kext Version: 1.10.2

Loadable: No

Signature Validation Errors: Not Signed

Dependencies: Satisfied

Signed by: Not Signed



Until I installed El Capitan, the M-Audio FireWire 410 worked perfectly. I don't remember having to use the bypass (sudo nvram boot-args="kext-dev-mode=1) for unsigned extensions in Yosemite. I just read the bypass may be completely disabled in El Capitan. Is there an alternative?


I realize this is "legacy" equipment, but most of my digital music equipment is, as it is too expensive to replace. The manufacturer isn't going to spend time on signed drivers for this older equipment. Before I start considering a replacement, which will take a lot of research to factor in the manufacturer's record for providing signed drivers for Mac OS X, is there any way to get El Capitan to permit this one extension to load?

iMac, OS X El Capitan (10.11), 21.5-inch (Mid-2011) 4GB RAM

Posted on Oct 3, 2015 7:12 AM

Reply
22 replies

Oct 19, 2015 3:41 AM in response to R C-R

So previously my Firewire-410 had quit on me after upgrading my system to El Capitan. The blue light kept blinking.


For whatever it is worth, I disabled SIP and got my Firewire-410 working. Solid blue light, recording, playback and everything else seemed just fine. M-Audio control panel, however, was still not working, which I disregarded.


BUT, today I started up my iMac (late 2011) the 410 is just not working, not even a blue light.


Just wanted to share with y'all.


-Y

Oct 19, 2015 8:24 AM in response to Yidoman

Yidoman wrote:

For whatever it is worth, I disabled SIP and got my Firewire-410 working.

As I mentioned, for several reasons I personally think it is not a good idea to disable SIP. If it was me & I really needed to use the Firewire 410, what I would do instead is create a separate boot volume with Yosemite (or whatever other older OS that met my needs) on it, & boot into that whenever I needed to do anything with the 410.


Because the older OS X versions are not as secure as El Capitan, if at all practical I would disable all Internet access on that system.


But that is just me.

Oct 19, 2015 8:58 AM in response to R C-R

Thanks, R C-R. Your abundance of caution is understood and appreciated. I had not considered the alternate boot volume to an older OS, so thank you for reminding me of that option. I think I have a Mavericks bootable volume somewhere on a mobile external drive.


Maybe I'm naive to new threats to system integrity. With 35 years experience of personal computing and software development without ever having a system integrity issue, I wonder why the concern is at a level that Apple would resort to such a sweeping change. Is it because there are a lot of less experienced users out there that take too much for granted and Apple is trying to protect them? I can assure you I came along during a time where nothing in computing was taken for granted and because of that, I have adopted best practices that have probably kept me out of harm's way.

Oct 19, 2015 9:54 AM in response to roncarfl

roncarfl wrote:

... I wonder why the concern is at a level that Apple would resort to such a sweeping change.

I think it is mostly in response to the ever increasing sophistication & seriousness of malware attacks. Once, we mostly just had to worry about hacker hobbyists that tried to break into systems for the challenge of seeing if they could do it, & later mostly about script kiddies who didn't pose much of a threat.


But now, we also have to consider well funded criminal organizations & government-sponsored hackers (including our own) looking for anything they can exploit. Unlike the hobbyists & script kiddies, they focus on "stealthy" attacks we are unlikely to notice, & have the resources to probe the OS itself for weaknesses. There is no denying they exist -- all you have to do is look at the long list of vulnerabilities that Apple has patched at Apple security updates - Apple Support. There is no reason to think that as the OS continues to get ever more complex only the white hats will find everything a remote attack can do before the black hats will -- including at least a few things "best practices" won't protect us from.


Of course, SIP can't protect us from everything -- in fact, by itself it offers very little that will protect user domain files -- but I am a firm believer in the value of the layered defense security strategy. SIP adds a new layer that if nothing else makes the damage privilege escalation attacks can do much less severe. That is reason enough for me to avoid disabling it whenever possible.

As always, YMMV.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Unsigned (Legacy) Extensions in El Capitan?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.