On 14 Sep 2015, at 19:06, Nick <eveningn...@gmail.com> wrote:

> Yes my code is listening to incoming connections, however I do not own that 
> code - I just embedded a web server into my app, thus i am not the one who 
> binds/listens to a socket and accepts connections - so i cannot delegate this 
> to launchd.

In my experience it's relatively simple to cut the head off such code and wire 
it up to a launchd-based listening socket.  The advantage of that approach is 
that you get launch on demand support.

> I would assume that once the app has been allowed with the firewall, the 
> system could calculate the binary's hash/checksum, so the next time the 
> firewall wants to pop up an alert, it would recalculate the checksum and 
> compare the result with what it has in its database already, check whether 
> the checksum (and therefore the binary) has changed since or not, and based 
> on that pop up an alert or just allow/block the connection.

Back in the days things worked that way for the firewall, and I believe things 
still work that way for the keychain.  However, code signing has become 
sufficiently widespread on OS X that I wouldn't be surprised if the legacy 
support has fallen by the wayside.

Share and Enjoy
--
Quinn "The Eskimo!"                    <http://www.apple.com/developer/>
Apple Developer Relations, Developer Technical Support, Core OS/Hardware



 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Macnetworkprog mailing list      (Macnetworkprog@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/macnetworkprog/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to