Hacker News new | past | comments | ask | show | jobs | submit login

From TFA:

> When SIP was enabled—as it is by default—SIP worked as designed and prevented the change. When the protection was disabled, however, the file system was modified in a way that prevented Macs from rebooting.




what is the rationale for disabling SIP?

not only there should be no way to disable this protection, it should be a deliberate design goal to prevent any process or application from accessing protected areas.


Some gpus need SIP on off because the drivers won't run else. I generally also have to disable it because I run some apps and modify some underlying behaviours in macOS that I find undesirable. I don't think it should be any worse than running stuff as sudo on Unix, where you can easily break the whole OS if you, as the user, don't know what you're doing.

Chrome had a bug and even if it wouldn't have broken the system had SIP been enabled, it's still a serious bug on chrome's side.


> what is the reationale for disabling SIP?

Loading unsigned drivers for eGPUs.

> not only there should be no way to disable this protection, it should be a deliberate design goal to prevent any process or application from accessing protected areas.

I think you're looking for iOS.


iOS:

https://www.cvedetails.com/product/15556/Apple-Iphone-Os.htm...

loading dev drivers should be done differently, and limited to dev, not production. the fact that one needs to disable security feature in production indicates a bad design.

i.e. the user may explicitly allow loading of particular objects (using hashes).


I don't understand why you're linking to a CVE list.


Sometimes you want to do things that the OS maker does not want you to do, like run dtrace on system binaries. If you had no recourse to bypass the OS maker, the world would be a much worse place.


Perhaps if Apple would let us self-sign drivers on our computers, we wouldn't need to disable SIP. Security that does not allow the actual use of the computer gets disabled.


Yes, 100% this. SIP is badly designed because it's a global hammer like root. As such, it prevents power users from doing quite legitimate things with their computers and so we have to turn it off. SIP should work like sudo, not like meta-root.


Exactly. Apple still hasn't come to terms with balancing security with functionality.



I'm fairly sure this only applies to KEXTs that are signed but not notarized.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: