diff --git a/Docs/Configuration.md5 b/Docs/Configuration.md5 index 6a75109a..317de78b 100644 --- a/Docs/Configuration.md5 +++ b/Docs/Configuration.md5 @@ -1 +1 @@ -099da6a2cb197e5be23a304b2fdb0af5 +b69e893d885e6cd6904e007721e87592 diff --git a/Docs/Configuration.pdf b/Docs/Configuration.pdf index e734d3a0..30ac4bd1 100644 Binary files a/Docs/Configuration.pdf and b/Docs/Configuration.pdf differ diff --git a/Docs/Configuration.tex b/Docs/Configuration.tex index f59ec431..ba4b4eb9 100755 --- a/Docs/Configuration.tex +++ b/Docs/Configuration.tex @@ -7064,11 +7064,14 @@ as the value for the following three GUID keys in \texttt{LegacySchema}: \item 7C436110-AB2A-4BBB-A880-FE41995C9F82 \item 8BE4DF61-93CA-11D2-AA0D-00E098032B8C \end{itemize} -This enables all variables saved by \texttt{Launchd.command}, and additionally all arbitrary user -test variables (e.g. as set by \texttt{sudo nvram foo="bar"}), to be saved to \texttt{nvram.plist}. -However, once set up, only allowing strictly required variables (as shown in OpenCore's sample -\texttt{.plist} files) is considerably more secure, and please note the following warning about the -overall security of loading nvram variables from a non-vaulted file. +This enables all variables saved by \texttt{Launchd.command} to be saved to \texttt{nvram.plist}, +therefore it allows all arbitrary user test variables (e.g. as set by \texttt{sudo nvram foo=bar}) +to be saved. Using this permissive policy is also future-proof against any changes in the variables +which need to be passed from macOS update setup to the \texttt{macOS Installer} stage, in order for +it to succeed. +Nevertheless, once emulated NVRAM is set up, only allowing known strictly required variables +(as shown in OpenCore's sample \texttt{.plist} files) is considerably more secure. See also the +following warning about the overall security of loading NVRAM variables from a non-vaulted file. \textbf{Warning}: The ability to load NVRAM from a file on disk can be dangerous, as it passes unprotected data to firmware variable services. Only use when no hardware NVRAM diff --git a/Docs/Differences/Differences.pdf b/Docs/Differences/Differences.pdf index 9411db5b..c5662768 100644 Binary files a/Docs/Differences/Differences.pdf and b/Docs/Differences/Differences.pdf differ diff --git a/Docs/Differences/Differences.tex b/Docs/Differences/Differences.tex index 40eb6a66..785b2b47 100644 --- a/Docs/Differences/Differences.tex +++ b/Docs/Differences/Differences.tex @@ -1,7 +1,7 @@ \documentclass[]{article} %DIF LATEXDIFF DIFFERENCE FILE %DIF DEL PreviousConfiguration.tex Wed Jul 27 21:20:07 2022 -%DIF ADD ../Configuration.tex Thu Jul 28 23:20:08 2022 +%DIF ADD ../Configuration.tex Sat Jul 30 08:47:48 2022 \usepackage{lmodern} \usepackage{amssymb,amsmath} @@ -7328,11 +7328,14 @@ root }\texttt{\DIFadd{plist\ dictionary}} \DIFadd{type and contain two fields: }\item \DIFadd{7C436110-AB2A-4BBB-A880-FE41995C9F82 }\item \DIFadd{8BE4DF61-93CA-11D2-AA0D-00E098032B8C }\end{itemize} -\DIFadd{This enables all variables saved by }\texttt{\DIFadd{Launchd.command}}\DIFadd{, and additionally all arbitrary user -test variables (e.g. as set by }\texttt{\DIFadd{sudo nvram foo="bar"}}\DIFadd{), to be saved to }\texttt{\DIFadd{nvram.plist}}\DIFadd{. -However, once set up, only allowing strictly required variables (as shown in OpenCore's sample -}\texttt{\DIFadd{.plist}} \DIFadd{files) is considerably more secure, and please note the following warning about the -overall security of loading nvram variables from a non-vaulted file. +\DIFadd{This enables all variables saved by }\texttt{\DIFadd{Launchd.command}} \DIFadd{to be saved to }\texttt{\DIFadd{nvram.plist}}\DIFadd{, +therefore it allows all arbitrary user test variables (e.g. as set by }\texttt{\DIFadd{sudo nvram foo=bar}}\DIFadd{) +to be saved. Using this permissive policy is also future-proof against any changes in the variables +which need to be passed from macOS update setup to the }\texttt{\DIFadd{macOS Installer}} \DIFadd{stage, in order for +it to succeed. +Nevertheless, once emulated NVRAM is set up, only allowing known strictly required variables +(as shown in OpenCore's sample }\texttt{\DIFadd{.plist}} \DIFadd{files) is considerably more secure. See also the +following warning about the overall security of loading NVRAM variables from a non-vaulted file. } \textbf{\DIFadd{Warning}}\DIFadd{: The ability to load NVRAM from a file on disk can be dangerous, as it diff --git a/Docs/Errata/Errata.pdf b/Docs/Errata/Errata.pdf index 9eb38f8d..02ae0bbb 100644 Binary files a/Docs/Errata/Errata.pdf and b/Docs/Errata/Errata.pdf differ diff --git a/Include/Acidanthera/Library/OcBootManagementLib.h b/Include/Acidanthera/Library/OcBootManagementLib.h index 0b09caad..4576098e 100644 --- a/Include/Acidanthera/Library/OcBootManagementLib.h +++ b/Include/Acidanthera/Library/OcBootManagementLib.h @@ -1,6 +1,5 @@ /** @file - Copyright (C) 2019, vit9696. All rights reserved.
- Copyright (C) 2021, Mike Beaton. All rights reserved.
+ Copyright (C) 2019-2022, vit9696, mikebeaton. All rights reserved.
SPDX-License-Identifier: BSD-3-Clause **/ diff --git a/Library/OcVariableLib/Sip.c b/Library/OcVariableLib/Sip.c index fc32beac..ab024e27 100644 --- a/Library/OcVariableLib/Sip.c +++ b/Library/OcVariableLib/Sip.c @@ -1,7 +1,7 @@ /** @file Manage Apple SIP variable csr-active-config. - Copyright (C) 2022, mikebeaton. All rights reserved.
+ Copyright (C) 2021-2022, Mike Beaton. All rights reserved.
SPDX-License-Identifier: BSD-3-Clause **/