The way I understand signing and notarization - which is, admittedly, from outside of Apple’s hierarchy and decision-making process - is that when you sign munki at the time of build, your version submitted for notarization is unique to the signing process. That would mean my version, signed with a Technolutionary Developer Application ID certificate, would be different and independent from a version signed by another Developer ID Application certificate.
Apple has not made public what the notary service is scanning for, so we can’t know how it would interpret the submission of similar binaries from multiple different organizations. I can certainly envision a world in which that would trigger a security inspection, but that’s not a guarantee either.
I would imagine, though, that the notarization result of my submission would match the results of the other submissions with different IDs, as scans like this should be idempotent.
For those of you with AppleCare Enterprise Alliance subscriptions, would you be willing to submit this as a ticket for exploration? I’m afraid I left my $50,000 in my other trousers.
With regards to my original request, I’m hoping to catch a couple of circumstances:
1) Downloaded item is signed but fails a stapler verify action - in which case I’d like to see AutoPkg attempt to staple the ticket, or note that the stapler staple action fails. Goal: identify which developer we need to encourage to not just submit for notarization, but staple the ticket to the distribution method.
2) Downloaded item is unsigned, and thus a notice is logged that the item is unsigned and future default OS behavior may not permit this to run. Goal: identify software that is currently not signed, to encourage future workflow developments whereby the result is signed code.
I see case 2 as more serious than case 1 for long term health, and case 1 more serious for short term health.
Regards,
Tom
--