![]() I checked what files this process has open, and that doesn't help much either. (edit: I corrected my previous mix up of UID and PID - apologies to everyone!!!) ![]() Posts with unsourced content may be edited or deleted. Want to improve this post? Add citations from reputable sources by editing the post. usr/lib/libSystem.B.dylib (compatibility version 1.0.0, current version 1252.0.0) usr/lib/libobjc.A.dylib (compatibility version 1.0.0, current version 228.0.0) System/Library/Frameworks/amework/Versions/C/Foundation (compatibility version 300.0.0, current version 1450.14.0) System/Library/PrivateFrameworks/amework/Versions/A/Rapport (compatibility version 0.0.0, current version 0.0.0) System/Library/PrivateFrameworks/amework/Versions/A/CoreUtils (compatibility version 1.0.0, current version 1.0.0) System/Library/Frameworks/amework/Versions/A/CoreFoundation (compatibility version 150.0.0, current version 1450.14.0) Which will show something like: /usr/libexec/rapportd: ![]() To show what libraries are linked to: otool -L /usr/libexec/rapportd usr/libexec/rapportd: explicit requirement satisfied usr/libexec/rapportd: satisfies its Designated Requirement This should report something like: /usr/libexec/rapportd: valid on disk You can check this on the commandline: codesign -vvvv -R="anchor apple" /usr/libexec/rapportd Unless you turn off SIP, this is simply part of the OS, put there by Apple. In addition to what already has been posted, /usr/libexec/rapportd is code signed by Apple and linked against a PrivateFramework (which Apple doesn't allow for others and therefore doesn't sign for others), and in a SIP-protected location. The internet suggests this is related to some banking protection program but that doesn't seem to fit here, and from a vague text-edit inspection of the binary I can see that it references /System/Library/PrivateFrameworks/amework/Versions/A/Rapport (a framework created on my machine back in July and updated in October) which makes me think this is likely to be a new 1st-party OS daemon. Google Chrome updates whenever it feels like it, so this could be related to a Chrome update (no idea when it last updated). That's a day after I installed the security update 2017-001 (for the second time autoupdate didn't seem to notice that I'd manually updated it), and I haven't installed or updated any other software recently / around that time. Hopefully the term size can be adjusted in the future and I can figure out the commands it uses for the pie graph stats.I've just updated to the latest MacOS 10.13.2 and after restarting, my machine asked me to allow incoming network connections for "rapportd".Īfter blocking it and checking in the firewall config, I can see that this is an executable in /usr/libexec/rapportd which was created on my machine on the 1st of December. It also has keyfile and user/pass login on click and supports custom macro commands.Weird quirk, after starting ssh term I needed to double click to bring up the keyboard and onscreen helpers like arrows and Esc key (I normally use a Bluetooth keyboard with iPad so arrows are built into the hardware but still need that "Esc" key onscreen in term apps and I'll use this with my phone too.)Since it's free and small, I gladly paid $1 to support the author. Some of the commands only saw a 24 line terminal, and it's pretty narrow, but hey it's basically a free ssh term so awesome for that. I tried simple tests, ssh used vi, hit onscreen "Esc" key essential for iOS. ![]() I don't know the commands it's running to get the stats, I'd love to tweak those or fake them myself so Windows and Macs show up with CPU, disk, and RAM stats. I tried this small (20MB good job) app, it showed my Pi stats, I also linked it to my Mac and Window's (Barracuda, not the Linux Subsystem one) servers running ssh. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |