Hacker News new | past | comments | ask | show | jobs | submit login

Just a reminder: installing this will enable System Integrity Protection (aka rootless, prevents even root from modifying system files), but it can be disabled by rebooting into recovery mode and selecting Utilities -> Security Configuration.

Edit: Actually, some webpage says that the method was changed in a later beta. Let me actually do the update and see how it works now...





And that bash 3.2 is one of the reasons I want to turn off rootless so I can install modern bash 4.3 in /bin/bash, so that scripts that have #/bin/bash continue to work unmodified.

Apple will most likely never update their bash to GPL 3.0 bash 4 or later.


You can set your shell per user in /etc/passwd (or similar, can't remember the name)


It's easy to change your default shell, but if you got a shell script that explicitly specifies #!/bin/sh (and they all do) then /bin/sh will be invoked, regardless what your default shell is. So your options are to modify every script file to invoke your default shell (usually #!/usr/local/bin/sh ) or to install your default shell in /bin.


"csrutil disable" from within a terminal in recovery mode will do it


What's the definition of system files in this context? I run ssh on alternate port by editing /System/Library/LaunchDaemons/ssh.plist . Will that not be editable anymore or is this applicable to executables only?


That won't be editable anymore. But you could disable SIP from recovery mode, make the change, then re-enable it.


Is editing /etc/hosts allowed in rootless mode?


/etc/ and /usr/local/ are still editable.


So then what is considered to be a system file? Any definition or documentation from Apple?


Security Configuration is no longer an option in Utilities in recovery mode




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: