How to Get the MAC Os X Firewall to Permanently Allow My iOS App

How do I get the Mac OS X Firewall to permanently allow my iOS app?

After dabbling with this for some time, I found that manually adding the executable itself to the Firewall "Allow" list gives the desired result. You don't add the .app, but rather the "Unix" executable inside the .app's Contents folder. I believed I had tried this file before without success, but currently it's working.

How to allow Python.app to firewall on Mac OS X?

Apparently El Capitan has something call System Integrity Protection that prevents any user (even root) to modify certain OS resources. Such as the /usr/bin directory in this case, where you have the python executable. To self sign the python binary you can disable SIP by rebooting your mac in recovery mode (reboot while holding CMD+R) and then typing this in the terminal:

csrutil disable

then boot back into regular OSX, and follow the steps to self sign python and execute:

codesign -s "My Signing Identity" -f $(which python)

and finally reboot back into Recovery Mode, and re-enable SIP:

csrutil enable

How do I make the app allow incoming network connections with SwiftNIO?

I looked at the tutorial and I think you need to bind to 0.0.0.0 instead of localhost. Doesn't have to do with capabilities nor ATS.

How to code sign macOS binary to stop firewall permissions requests?

Manually adding the application to the firewall exclusions list via the macOS System Preferences UI worked. The .app was fine, it wasn't necessary to find the executable. I didn't isolate these changes, so it may also be necessary to codesign the app with the failing methods and/or to manually set firewall exclusions via the terminal, as another answer on the following thread suggests.

https://stackoverflow.com/a/10011819/365478

If someone shows how to codesign it properly I'll remark that best answer.



Related Topics



Leave a reply



Submit