numbles45 wrote:
How does one determine if a process is legit and safe when it's trying to connect to an IP address?
Here's a screenshot of the processes and connection attempts:
Hello numbles45,
You can check the signature of the process. You will have to track down the actual executable file on disk. Then check it with a tool like RB App Checker (https://itunes.apple.com/us/app/rb-app-checker-lite/id519421117?mt=12).
An Apple file will have a section that looks like this:
The signature contains 3 certificates.
Certificate “Apple Root CA”:
Your keychain contains this trusted root certificate.
Will expire on Feb 9, 2035.
Certificate “Apple Code Signing Certification Authority”:
Will expire on Oct 24, 2026.
Certificate “Software Signing”:
Will expire on Apr 12, 2021.
SHA1 fingerprint: “013E2787748A74103D62D2CDBF77A1345517C482”.
Team ID or Organizational Unit: “Apple Software”.
A Mac App Store app will look slightly different:
The signature contains 3 certificates.
Certificate “Apple Root CA”:
Your keychain contains this trusted root certificate.
Will expire on Feb 9, 2035.
Certificate “Apple Worldwide Developer Relations Certification Authority”:
Will expire on Feb 7, 2023.
Certificate “Apple Mac OS Application Signing”:
Will expire on Feb 6, 2023.
SHA1 fingerprint: “B93BDAAAF1A8846B34BA32332635CB2B84853DA8”.
A app with a valid Apple Developer ID app will look like:
The signature contains 3 certificates.
Certificate “Apple Root CA”:
Your keychain contains this trusted root certificate.
Will expire on Feb 9, 2035.
Certificate “Developer ID Certification Authority”:
Will expire on Feb 1, 2027.
Certificate “Developer ID Application: Etresoft, Inc. (U87NE528LC)”:
Will expire on Feb 2, 2021.
SHA1 fingerprint: “4D0E23DE51BDC65119E8D161C0003D792B2A78C9”.
Team ID or Organizational Unit: “U87NE528LC”.
This matches the Team ID contained in the signature.
If you see something else, you should probably be suspicious.
Regarding network connections, it is perfectly normal for any app, including Apple apps, to connect to IP addresses all over the world. Technically speaking, you can use Little Snitch to validate the authenticity of network connections. But those capabilities are turned off by default and require a fair amount of networking knowledge to figure out. The standard dialogs that Little Snitch pops up are meaningless. If you use it to block connections, you are likely only going to cause problems for yourself.