It’s hard to answer this without a lot more details. In general, macOS and the notary service continue to tighten up their checking of code in order to close security holes. Some of those are big changes, when we tend to announce widely. I have a bunch of links to such things in Trusted Execution Resources and the other Resources posts that it links to. But some of them are relatively minor changes that don’t get widely advertised. And some changes are just implementation changes that happen to cause problems for code that’s not following the rules [1].
DMGs built, signed and notarised successfully are now failing codesign verification.
If you run syspolicy_check
against such an app, what does it report?
Share and Enjoy
—
Quinn “The Eskimo!” @ Developer Technical Support @ Apple
let myEmail = "eskimo" + "1" + "@" + "apple.com"
[1] Historically those rules were very poorly documented. That’s much better these days, but lots of code, and lots of tooling, was created before the documentation improved.
Oh, and some folks are aware of the rules and choose to bend them anyway )-: