On Thu, Jul 25, 2019 at 3:53 PM Marcio Barbosa <[email protected]>
wrote:

> Hello,
>
> One of my VMs is running macOS 10.13.6 (including this security update)
> and could not reproduce this problem.
> But I am running the OpenAFS-1.8.2 client with MIT Kerberos.
>
>
Debug questions sent privately, but, for the record I tried to reproduce it
like-for-like rather than with some random other version.
10.13.6, Security Update 2019-004 installed, 0.188.

[peridot:/tmp] shadow% kinit [email protected]
[email protected]'s password:
[peridot:/tmp] shadow% aklog andrew.cmu.edu
[peridot:/tmp] shadow% ls /afs/andrew.cmu.edu/usr/shadow
$CACHEDIR
012_all_kbuild.patch
024606.html
1.4.12-notes.txt
124740
13-cblater-1.diff
14-optmz.diff
[...]

But yes, it's most likely that the kext has to be approved, again, which
would be done from System Preferences > Security and Privacy > General,
ideally just after a
failed load (and so, just after either a reboot or a
sudo launchctl stop com.auristor.yfs-client; sudo launchctl start
com.auristor.yfs-client
cycle

-- 
Daria Phoebe Brashear
AuriStor, Inc
dariaphoebe.com

Reply via email to