That’s also why personally I’m a big supporter of enabling SIP as much as possible: as I’ve said many times, with OCLP’d Monterey on a Metal-capable Mac, you could optionally enable SIP fully and leave only the SSV (signed/sealed system volume) disabled (0x800); but that changed in Ventura and Sonoma (0x803 still mandatory: otherwise, with increased SIP, either the window server will crash or the system won’t boot): so, it would be interesting if the devs researched middle/long-term possibilities to enable SIP further also in the two latest macOSes - as they also said themselves in a release note some time ago (that statement was subsequently removed, so it’s unclear if they still pursue this goal)…
(BTW, AMFIPass was a great achievement, which previously seemed almost impossible to reach.)
I want to add that Apple claims the SSV (signed system volume) is necessary for FileVault security in macOS11+:
source: Apple Platform Security guide, SSV and FileVault section (https://support.apple.com/guide/security/signed-system-volume-security-secd698747c9/web)In macOS 11, equivalent at-rest protection for system content is provided by the SSV, and therefore the system volume no longer needs to be encrypted. [...]
If the user chooses to disable the SSV, the system at rest becomes vulnerable to tampering, and this tampering could enable an attacker to extract encrypted user data when the system next starts up. Therefore the system won’t permit the user to disable the SSV if FileVault is enabled. Protection while at rest must be enabled or disabled for both volumes in a consistent manner.
see also this GitHub issue for OCLP with a very good explanation here:
FileVault on root-patched systems · Issue #457 · dortania/OpenCore-Legacy-Patcher
Machine Model MacBook5,1 Application Version Latest Release Application Variant CLI (Command Line Interface) What versions of macOS are you seeing the problem on? macOS 11, Big Sur Where does this ...
@erikkfi I wholeheartedly agree that OCLP is a valuable project that is extending the life of old, unsupported Macs (and keeping them out of the landfill). I'm a long-time OCLP user, supporter and donator. The challenge I have with OCLP messaging/documentation is that it misleads by stating that your OCLP-patched Mac is just as secure as a Mac that is still fully supported by Apple (the documentation actually says "For many machines, you're just as secure as a supported Mac." when there are no OCLP-patched, unsupported machines that are as secure as a real Mac).
Based on the Developer comments in this thread, it seems that OCLP started as a small hobby (the donation page specifically stated that OCLP is a hobby project until the "hobby" wording was removed in a commit) and the Devs indicated that they did not anticipate the extent of the adoption or the magnitude of the project.
I understand why Devs would not want to highlight the security limitations of an OCLP-patched Mac (it would curtail adoption and donations), but the Devs have a responsibility to be honest in the documentation in the same way that dhinakg was honest in this thread: an OCLP-patched Mac can never be as secure as a fully supported Mac.
At the very least, OCLP should provide a security alert in documentation and during application of post-install patches and "building and installing Open Core" similar to the following:
By using OCLP, you understand that your unsupported Mac will not receive Apple Rapid Security Responses, your APFS seal is broken to permit installation of uncertified root patches and SIP has been partially disabled. These security downgrades may expose you to computer security vulnerabilities that may not be present when using a Mac that is still fully supported by Apple.
I also agree that there should be a warning for users of OCLP who may not know the security risks involved, as I was not aware of the risks and thought this was just as good of a way to keep a secure OS as going the official Apple route, as there were a lot of articles on Ars Technica mentioning OCLP as a viable way to keep older Macs going and I don't ever remember security issues being mentioned (although there is at least one mention of it in an article I recently rechecked).
Only after I decided to search for more info specifically related to OCLP security before installing did I come across this very informative thread.
This is a very simple message to add to the software and on the download page and I support it:
(and to add the FileVault security risk to the message as well)By using OCLP, you understand that your unsupported Mac will not receive Apple Rapid Security Responses, your APFS seal is broken to permit installation of uncertified root patches and SIP has been partially disabled. These security downgrades may expose you to computer security vulnerabilities that may not be present when using a Mac that is still fully supported by Apple.
Last edited: