On Thu, Jul 25, 2019 at 3:53 PM Marcio Barbosa <[email protected]> wrote:
> Hello, > > One of my VMs is running macOS 10.13.6 (including this security update) > and could not reproduce this problem. > But I am running the OpenAFS-1.8.2 client with MIT Kerberos. > > Debug questions sent privately, but, for the record I tried to reproduce it like-for-like rather than with some random other version. 10.13.6, Security Update 2019-004 installed, 0.188. [peridot:/tmp] shadow% kinit [email protected] [email protected]'s password: [peridot:/tmp] shadow% aklog andrew.cmu.edu [peridot:/tmp] shadow% ls /afs/andrew.cmu.edu/usr/shadow $CACHEDIR 012_all_kbuild.patch 024606.html 1.4.12-notes.txt 124740 13-cblater-1.diff 14-optmz.diff [...] But yes, it's most likely that the kext has to be approved, again, which would be done from System Preferences > Security and Privacy > General, ideally just after a failed load (and so, just after either a reboot or a sudo launchctl stop com.auristor.yfs-client; sudo launchctl start com.auristor.yfs-client cycle -- Daria Phoebe Brashear AuriStor, Inc dariaphoebe.com
