Willy-G

Q: Adding exception to SIP?

Hi,

 

Is there an effective way to add an exception to System Integrity Protection without having to turn off the whole thing? Apparently, some of our devs install various binaries in the same paths that SIP controls, and that's causing issues on our end.

 

Thanks.

Posted on May 10, 2016 11:18 AM

Close

Q: Adding exception to SIP?

  • All replies
  • Helpful answers

  • by Leopardus,

    Leopardus Leopardus May 11, 2016 12:49 AM in response to Willy-G
    Level 4 (1,087 points)
    Desktops
    May 11, 2016 12:49 AM in response to Willy-G

    Changes outside the parameters protected by SIP are not a problem. Others within those parameters will only be temporary, if allowed at all, and will revert back to the standard system setting with any restart. That is part of the security layer so aptly described in System Integrity Protection – Adding another layer to Apple’s security model.

     

    But, there does seem to be an exception which might be worth your while to explore: https://derflounder.wordpress.com/2015/10/05/configuring-system-integrity-protec tion-without-booting-to-recovery-hd/#mor… It goes without saying that a lot more information is needed to properly do the scripting required in your or any other scenario. Have a look also at the Github page.

     

    HTH

    Leo

  • by John Lockwood,

    John Lockwood John Lockwood May 11, 2016 2:34 AM in response to Willy-G
    Level 6 (9,200 points)
    Servers Enterprise
    May 11, 2016 2:34 AM in response to Willy-G

    Willy-G wrote:

     

    Hi,

     

    Is there an effective way to add an exception to System Integrity Protection without having to turn off the whole thing? Apparently, some of our devs install various binaries in the same paths that SIP controls, and that's causing issues on our end.

     

    Thanks.

    If it was easy to add exceptions to SIP then this would also make it easy for malware authors to add exceptions to SIP for their crud thereby defeating the whole point of SIP.

     

    Your developers need to change their bad habits and follow Apple's rules about what locations they use. Even if internally you might be willing to jump through hoops to do this your customers will not. There is absolutely no need for a properly written program to bypass SIP, the current main reason for bypassing SIP is customers needing to run old software that has not been updated to take in to account the new rules.

     

    Remember even if right now with El Capitan it may be hypothetically possible to add an exception there is no guarantee that the next version of OS X likely due this summer will continue to allow this. Therefore it is far better to fix these bad practises right now rather than leaving it till you have no choice.

     

    Note: If the binaries are not your own software but are rather various open-source tools being used by your developers then in almost all cases it is possible to install them in a location that is permitted under SIP e.g. /usr/local

  • by appreciate,

    appreciate May 11, 2016 4:42 AM in response to Willy-G
    Level 4 (1,276 points)
    Mac OS X
    May 11, 2016 4:42 AM in response to Willy-G

    system integrity protection( sip ) sometimes called root less a new feature that means users & 3 rd part software including malware cannot change core system files

      core system files cannot be re - written even by root users

       injecting code into protected processes is no longer permitted by system

       only signed kernel extensions can run no exceptions

     

    system directories cannot be edited . contents of certain folder cannot be altered by the user or any program the user might choose to run

      which folders ? ./system ,  ./bin  , ./ user  , ./sbin

      try to create a new directors in /system it won't work

     

    this means that you & any programs you might chose to run can't make any changes to OS X - even if you're a root user & even if you type password .

     

    an article : support.apple.com/en-in/ht204899