Skip to content

Instantly share code, notes, and snippets.

@networkextension
Created July 23, 2022 07:36
Show Gist options
  • Save networkextension/491c88153fb7328d866a806812129744 to your computer and use it in GitHub Desktop.
Save networkextension/491c88153fb7328d866a806812129744 to your computer and use it in GitHub Desktop.
ramrod.plist
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>com.apple.AppleNVMeEAN.allow</key>
<true/>
<key>com.apple.CommCenter.fine-grained</key>
<array>
<string>spi</string>
<string>identity</string>
</array>
<key>com.apple.afu.userclientaccess</key>
<true/>
<key>com.apple.aop.rose.controller.admin</key>
<true/>
<key>com.apple.apfs.unlock</key>
<true/>
<key>com.apple.camera.iokit-user-access</key>
<true/>
<key>com.apple.cyrus.allow</key>
<true/>
<key>com.apple.driver.AppleAuthCP.user-access</key>
<true/>
<key>com.apple.driver.AppleBasebandPCI.user-access</key>
<true/>
<key>com.apple.driver.AppleBasebandPCIControl.user-access</key>
<true/>
<key>com.apple.driver.AppleConvergedIPCICEBB.user-access</key>
<true/>
<key>com.apple.driver.AppleConvergedIPCICEBBControl.user-access</key>
<true/>
<key>com.apple.gasgauge.user-access-device</key>
<true/>
<key>com.apple.hid.system.user-access-service</key>
<true/>
<key>com.apple.iohideventsystem.server</key>
<true/>
<key>com.apple.keystore.fdr-access</key>
<true/>
<key>com.apple.keystore.filevault</key>
<true/>
<key>com.apple.keystore.sik.access</key>
<true/>
<key>com.apple.nfcd.hwmanager</key>
<true/>
<key>com.apple.nfcd.info</key>
<true/>
<key>com.apple.pearl.iokit-user-access</key>
<true/>
<key>com.apple.private.IOAESAccelerator.fdr-key-handle</key>
<true/>
<key>com.apple.private.PurpleReverseProxy.allowed</key>
<true/>
<key>com.apple.private.apfs.create-sealed-snapshot</key>
<true/>
<key>com.apple.private.apfs.revert-to-snapshot</key>
<true/>
<key>com.apple.private.apfs.set-firmlink</key>
<true/>
<key>com.apple.private.apfs.trim-active-file</key>
<true/>
<key>com.apple.private.apfs.xart</key>
<true/>
<key>com.apple.private.applecredentialmanager.allow</key>
<true/>
<key>com.apple.private.applepearl.allow</key>
<true/>
<key>com.apple.private.applesepmanager.allow</key>
<true/>
<key>com.apple.private.gasgauge-update</key>
<true/>
<key>com.apple.private.hid.client.event-monitor</key>
<true/>
<key>com.apple.private.ioavfamily.user-access-displaymemory</key>
<true/>
<key>com.apple.private.iokit.system-nvram-allow</key>
<true/>
<key>com.apple.private.iowatchdog.user-access</key>
<true/>
<key>com.apple.private.kernel.darkboot</key>
<true/>
<key>com.apple.private.security.bootpolicy</key>
<true/>
<key>com.apple.private.security.disk-device-access</key>
<true/>
<key>com.apple.private.securityd.stash</key>
<true/>
<key>com.apple.private.stockholm.allow</key>
<true/>
<key>com.apple.private.usbdevice.setdescription</key>
<true/>
<key>com.apple.private.vfs.snapshot</key>
<true/>
<key>com.apple.rootless.install.heritable</key>
<true/>
<key>com.apple.security.iokit-user-client-class</key>
<array>
<string>IOWatchdogUserClient</string>
<string>AppleEffaceableStorageUserClient</string>
<string>AppleAPFSUserClient</string>
<string>IOAccessoryManagerUserClient </string>
<string>AppleNVMeEANUC</string>
<string>AppleImage3NORAccessUserClient</string>
<string>AppleEmbeddedSimpleSPINORFlasherDriverUC</string>
<string>ASPUserClient</string>
<string>AppleNVMeUpdateUC</string>
<string>AppleNVMePassThroughUC</string>
<string>IOAESAcceleratorUserClient</string>
<string>AppleNVMeSMARTUserClient</string>
<string>IOMobileFramebufferUserClient</string>
<string>IOSurfaceRootUserClient</string>
<string>DCPAVControllerProxyUserClient</string>
<string>AppleSMCClient</string>
<string>AppleMobileApNonceUserClient</string>
</array>
<key>com.apple.security.network.client</key>
<true/>
<key>com.apple.security.network.server</key>
<true/>
</dict>
</plist>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment