arrow-left

All pages
gitbookPowered by GitBook
1 of 11

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Mac OSX Sonoma and higher

Smart Card Reader Issues Tracker for Sonoma

hashtag
Issue installation after reboot

On MacOS we make use of the launchd service to automatically start the Trust1Connector upon startup of the machine. In some cases where users have installed certain antivirus or anti-malware software it will prevent launched services to startup immediately. The reason here being that the anti-malware or antivirus software should be the first that start up so it can controll the launchd services.

In this case the Trust1Connector will not be started and will receive an error on the launchd.

This can be solved to add a KeepAlive flag in the launchd service.

hashtag
Update the launchd plist file

Go to the LaunchAgents folder and unload the Trust1Connector service

Then open this plist file in a text editor and add the keepalive flag under the RunAtLoad flag.

Then save this and reload the service

after this you should restart your computer.

hashtag
Smart-card issue

hashtag
Quick fix

A short fix for Mac Sonoma, more details below in the section 'Overview'.

Execute the following steps:

  1. Open a Mac Terminal

  2. Execute command: sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool yes

  3. Unplug smart card reader from USB port

The fix has been applied and you should be able to sign a document or authenticate

hashtag
Overview

Starting from OSX Sonoma, smart card readers for Mac can fail for the following use cases:

  • detect card reader

  • execute transaction (digital signature or authentication)

The general end-user experience is that the smart card communication fails (card reader disseappears or the transaction fails).

A very great shout-out to Ludovic Rousseau who initially did a follow-up on impact of smart card readers in Sonoma:

hashtag
Reported Bug to Mac OSX:

hashtag
OSX Forum

hashtag
Solution

The initial solution prior to 11/2023 was very elaborate, but was made easy by applying a single command in a MAC OSX terminal:

hashtag
What does the command execute/change?

The command switches the MAC OSX implementation of the CCID drivers to the legacy version (the version working prior to Sonoma).

As MAC OSX defaults using a custom CCID implementation, which still have some issues, switching to the old version is a temporary stolution.

hashtag
How to roll-back to MAC OSX CCID implementation?

Form a specific moment (not at the time of writing), switching back to the default CCID implementation can be done using the following commands (in a terminal):

Check if the built-in Apple CCID driver is active

If the former command results in:

This means that the built-in Apple driver is active.

The result is 1 so the "external" (non-Apple) CCID driver is enabled.

Returning back to default, execute:

circle-exclamation

After executing a driver switch, we have noticed that a restart is mandatory!

You need to unplug your smart card reader from the USB port, and plug it back in after restarting

hashtag

Restart Mac
  • Plug smart card reader back in USB port

  • cd ~/Library/LaunchAgents
    launchctl unload com.t1t.t1c.api.plist
    ...
     <key>RunAtLoad</key>
     <true/>
     <key>KeepAlive</key>
     <true/>
    ...
    launchctl load com.t1t.t1c.api.plist
    sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool yes
    defaults read /Library/Preferences/com.apple.security.smartcard.plist useIFDCCID
    he domain/default pair of (/Library/Preferences/com.apple.security.smartcard.plist, useIFDCCID) does not exist
    sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool no

    MacOS Rosetta

    hashtag
    Overview

    With the latest systems of Apple they have switched over from Intel to Arm processors. Apple has provided a translation layer between application that are compatible with Intel but not with Arm.

    In the Trust1Connector we have 1 component which relies on this translation layer for some functionality.

    hashtag
    Problem

    During installation on these systems it can show as a "successfull installation" but the installation folder is still missing.

    in the console logs it will show an error that an installation of Rosetta 2 is necessary.

    hashtag
    Solution

    The solution is to enable rosetta 2 and then re-install the Trust1Connector application.

    you can enable Rosetta 2 with the following command (administrative password is required)

    Disable DNS rebind pop-up

    The Trust1Connector by default will check and see if a DNS rebind issue has been detected or not.

    If this is the case it will try to add a line to the hostfile. This file requires administrative rights to update so a pop-up will appear.

    This will look like the following in windows.

    If you want to prevent this from happening you can update the Registry key to disable this

    The following table indicates which key must be updated with which value

    Installer type
    Key location
    Key name
    Key value

    Default

    Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

    Trust1Connector API

    C:\Users\{YOUR_USERNAME}\AppData\Local\Trust1Connector\t1c-launch.exe --env prod --silent --fix.dns.rebind false

    Standalone

    Computer\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

    Trust1Connector API

    C:\Users\{YOUR_USERNAME}\AppData\Local\Trust1Connector\t1c-launch.exe --env prod --silent --fix.dns.rebind false

    Admin

    Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

    Trust1Connector API

    C:\Program Files\Trust1Connector\t1c-launch.exe --env prod --silent --fix.dns.rebind false

    circle-info

    A reboot is required for this to take into account

    sudo softwareupdate --install-rosetta

    Windows dynamic port range

    The Trust1Connector is using 3 different network ports for communication, For the Trust1Connector by Trust1Team these are ;

    • Registry, fixed 51983 (51883 for the acceptance version)

    • API, dynamically assigned

    • Sandbox, dynamically assigned

    In some rare cases the windows system prevents a range of TCP ports to be used by applications, this is called an exclusion range.

    You can see the dynamic port range by executing the following command in a terminal

    The output will look like the following

    For the exclusion range you can use the following command

    This can look like the following, this can differ from your system

    To remove the listed port ranges from the exclusion range you can use the following command.

    This will make sure that starting of 51980 there are 10 ports allowed to be used by other applications.

    circle-info

    In some cases you will need to stop winnat before having access to the exclusion range

    After updating the exclusion range you need to restart winnat

    If the steps above did not solve your issue you can also update the dynamic port range with the following command. This will move the port range to start from 54000 and have 10511 available ports to be used.

    Mac OSX Sonoma and higher Smart-card reader issue

    Smart Card Reader Issues Tracker for Sonoma

    hashtag
    Smart-card issue

    hashtag
    Quick fix

    A short fix for Mac Sonoma, more details below in the section 'Overview'.

    Execute the following steps:

    1. Open a Mac Terminal

      1. Press Command+Spacebar on your keyboard. Enter Terminal in the search field and press enter.

    2. Execute command: sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool yes

    The fix has been applied and you should be able to sign a document or authenticate

    hashtag
    Overview

    Starting from OSX Sonoma, smart card readers for Mac can fail for the following use cases:

    • detect card reader

    • execute transaction (digital signature or authentication)

    The general end-user experience is that the smart card communication fails (card reader disseappears or the transaction fails).

    A very great shout-out to Ludovic Rousseau who initially did a follow-up on impact of smart card readers in Sonoma:

    hashtag
    Reported Bug to Mac OSX:

    hashtag
    OSX Forum

    hashtag
    Solution

    The initial solution prior to 11/2023 was very elaborate, but was made easy by applying a single command in a MAC OSX terminal:

    hashtag
    What does the command execute/change?

    The command switches the MAC OSX implementation of the CCID drivers to the legacy version (the version working prior to Sonoma).

    As MAC OSX defaults using a custom CCID implementation, which still have some issues, switching to the old version is a temporary stolution.

    hashtag
    How to roll-back to MAC OSX CCID implementation?

    Form a specific moment (not at the time of writing), switching back to the default CCID implementation can be done using the following commands (in a terminal):

    Check if the built-in Apple CCID driver is active

    If the former command results in:

    This means that the built-in Apple driver is active.

    The result is 1 so the "external" (non-Apple) CCID driver is enabled.

    Returning back to default, execute:

    circle-exclamation

    After executing a driver switch, we have noticed that a restart is mandatory!

    You need to unplug your smart card reader from the USB port, and plug it back in after restarting

    hashtag

    Windows

    hashtag
    Skip windows hello business reader

    When your windows machine has Windows hello for business available it will show up as an available card reader. This device shows up as an available card but cannot be interacted with like other card readers.

    You can exclude this from returning on the reader endpoints by using the readersExcludeByName function

    circle-exclamation

    This exclude readers will search for the term in the reader names and exclude those that match with the term

    hashtag
    After installation nothing happens?

    hashtag
    Missing VCRuntime

    circle-check

    Starting from v3.8.8 the VCRuntime is statically linked and will not require additional installation from the user.

    Open Explorer, and go to %localappdata% or (C:\Users\xyz\AppData\Local\Trust1Connector)

    Double click (launch) the .exe file: 't1c-launch'.

    If you see the following:

    Then you need to make sure that VCRuntime is installed for Windows. You can find the latest versions here:

    hashtag
    Check if VCRuntime is installed

    Checking whether the VC runtime is installed can be done via the file explorer or via regedit.

    For the file explorer you need to check if the following file is present

    Via regedit you need to check for the following key

    hashtag
    DNS Rebind issue (depends on the router/modem)

    See the dedicated section on how to sovle DNS Rebing:

    hashtag
    Error while retrieving readers

    hashtag
    Is the smartcard service running?

    The Smartcard service is a Windows service that manages the connection to the eID and card reader. Therefore, this service must be running for you to be able to access the eID. You can check this as follows:

    • Open "Windows Services".

    • Search for "Smartcard service" as shown in the following screenshot:

    Check the following Smartcard service settings (based on the screenshot above):

    • The status column for the Smartcard service shows 'Running'.

    • The 'Log On As' column shows 'Local Service'.

    Are the Smartcard service settings NOT as they should be? Then do whichever of the following two options applies:

    1. The Smartcard service is not running.

    Start the Smartcard service, as follows:

    • Double-click the Smartcard service.

    • Click 'Start' and then 'OK'.

    2. The Smartcard service is not logged on as a 'Local Service'.

    • Double-click the Smartcard service.

    • Select the second tab, 'Log On'.

    • Select 'This account'.

    • Click 'Browse'.

    hashtag
    DNS probe finished nxdomain error

    In some cases there is a possibility that the system is not able to retrieve the domain information, in this case the T1C is not usable. To solve this problem you can follow these steps described here;

    hashtag
    Error during installation MSI error 2502 or 2503

    When installing the T1C the possibility of the errors 2502 or 2503 originate from the fact that permissions in the temp folder (C:\Windows\Temp) are not correct, and since the MSI installer relies on this they need to be correct. You need to have permissions next to the administrator rights.

    You need to have permissions as <My User> next to the administrator rights.

    More information can be found here;

    hashtag
    Antivirus

    The Trust1Connector and some installation files are digitally signed. On some machines however the Trust1Connector is flagged/blocked by an antivirus. Disabling the antivirus temporary can allow the user to install the Trust1Connector for some antivirus tools. Below we provide procedures for some antivirus softwares to be able to install the Trust1Connector.

    hashtag
    ESET

    If the user receives an notification that a script from the Trust1Connector is blocked as shown below:

    The procedure at can be used to solved the issue.

    hashtag
    Kaspersky

    When using the Kaspersky and kaspersky web protection you can add an exclusion rule to the belfiusweb page. After you added this rule, restart the computer to make sure all settings are applied.

    hashtag
    A9. T1C List Type Conent Issue

    If the connector is not starting with the error message: "Can not contact the DS service"

    Go to the user folder in %LocalAppData%

    Go to connector folder and remove the selected files below:

    Restart your pc or mac, and the restart will re-initialise the device keys.

    The problem should be solved after executing this step.

    Connector Connection Issues

    This page summarized 'know' solution for connector connection troubleshooting

    The issues described in this document will specifically tackle the following topics;

    • DNS rebind

    • DNS resolving

    • Use of proxy and or firewall

    hashtag
    DNS Rebind Protection

    DNS rebinding is a method of manipulating resolution of domain names. In the case of the Trust1Connector we use a domain to resolve to localhost or 127.0.0.1. We do this because Self signed certificates are not allowed by browsers and using an insecure protocol from a secured website is not allowed either.

    Some routers prevent DNS rebind, the name for this is DNS rebind protection. They will prevent domains that resolve to private network ip's, such as 127.0.0.1.

    For the Trust1Connector to work this settings must be disabled or the domain t1c.t1t.io must be whitelisted. How to do this should be provided in documentation from your ISP or Router vendor.

    hashtag
    DNS Resolving

    In some cases customers will have their own custom DNS server for various reasons. When this DNS server does not have the domain t1c.t1t.io which should resolve to 127.0.0.1 it can cause the customer to prevent using the software.

    The issue will typically show up as "Could not find the installation".

    To resolve this the domain should be either resolved by the DNS server or the hosts file should be updated.

    hashtag
    Hosts file

    Modifying your hosts file enables you to add a fallback to the domain name system (DNS) for a domain on a specific machine.

    Modifying your hosts file causes your local machine to fall back to the Internet Protocol (IP) address that you specify.

    Modifying the hosts file involves adding an entries to it. The entry contains the IP address to which you want the DNS to resolve and a version of the Internet address.

    When the connector is not reacting, but the installation has succeeded, a DNS Rebind policy can forbid the communication form a web application to the connector's domain name. The default domain name used is: t1c.t1t.io

    Other than DNS rebind, a DNS server not containing the necessary resolutions for localhost or t1c.t1t.io can cause the same issues as a DNS rebind problem.

    circle-exclamation

    Make sure you start your text editor (notepad or other) with ADMIN rights. If not you are more likely to create a second host file which will not solve the issue.

    When using notepad, make sure - when opening a file - you change the file filter in the explorer window to *.*

    The host file does not have a .txt extension.

    There are 2 approaches to fix DNS rebind issues:

    1. update the 'host' file of the device (needs admin rights)

    2. update the local router which enforces the DNS Rebind

    And 2 for when the configured DNS server does not contain the name resolutions;

    1. update the 'host' file of the device (needs admin rights)

    2. Ask the network administrator to update the DNS server to include name resolutions for localhost and t1c.t1t.io to 127.0.0.1

    hashtag
    Update the 'host' file on the device

    hashtag
    [MAC OSX]

    The admin password will be asked in the command line. If you open the file with another editor, a pop-up will ask you for the administrator password.

    The file will be shown (the example can be different from what is configured on your device)

    We need to add an additional line to this file:

    hashtag
    [WINDOWS]

    Open Notepad or an editor of choice and run as administrator the following file:

    The contents will look like this

    We need to add an additional line to this file:

    Select File > Save to save your changes. Restart your browser

    hashtag
    Update DNS Settings

    When updating the local host file is not resolving the connectivity issue, that usually means that the DNS server is blocking the translation of the domain address to a localhost IP.

    We recommend allowing/white listing the domain name for DNS Rebind Protection. If that is not possible, you can opt to update the DNS configuration to the default browser configuration. This can happen when you ISP router is blocking the traffic at home.

    hashtag
    Windows

    Open Windows Powershell as 'administrator'. You can do that by searching for Powershell and mouse-right-click on the startup icon > 'Open as administrator'

    You first need to know on which connection interface you want to 'set/configure' the DNS settings. The first command will list all available internet connection interfaces:

    Each internet connection interface is numbered. Use the dedicated number for your connection as an input parameter of the 'set/configure' DNS command:

    The above command sets some default DNS server addresses (Google and/or Cloudflare), but off course you can update the list with the values you prefer.

    When executing the above command, no restart is needed and the connection issue to the connector will be sovled.

    hashtag
    A proxy is defined

    In some cases there is need for a proxy service by the organization or network. Here this setting can be enforce on a System level and on a browser level. On the system level this can be applied via the settings of the Operating system but can also be applied by policies (GPO) from the infrastructure/network.

    There is a protocol that can do domain resolution based on a Proxy PAC file, which is used by browsers specifically, this is a Javascript file which is hosted on the network infrastructure for browsers to download and execute to determine domain name resolution.

    Another typical case we see is where a firewall is defined which can have certain rules preventing the Trust1Connector to function. For this we ask the administrator to make sure that the following points are tackled;

    • The domain(s) should be reachable (t1c.t1t.io and ds.t1t.eu)

    • The program is running on 3 TCP ports, 51983 and 2 dynamically allocated ones, we ask to have the default port (51983) to be allowed by the firewall

    hashtag
    Antivirus

    An anti-virus has functionalities to protect you from malicious software components. When an anti-virus is present on your device, please allow the connector processes to be trusted and allowed to connect to the web.

    More information on 'known' solution for anti-virus services can be found:

    netsh int ipv4 show dynamicport tcp
    On Windows the host file is typically located on the following path:

    C:\Windows\System32\Drivers\etc\hosts

    Troubleshooting
    Protocol tcp Dynamic Port Range
    ---------------------------------
    Start Port      : 49152
    Number of Ports : 16384
    netsh interface ipv4 show excludedportrange protocol=tcp
    Protocol tcp Port Exclusion Ranges
    
    Start Port    End Port
    ----------    --------
         53180       53189     *
    
    * - Administered port exclusions.
    netsh int ipv4 delete excludedportrange protocol=tcp startport=51980 numberofports=10
    net stop winnat // stop
    net start winnat // start
    netsh int ipv4 set dynamic tcp start=54000 num=10511
    // open the host file (write enabled)
    // use your own editor of choice
    sudo nano /etc/hosts
    ##
    # Host Database
    #
    # localhost is used to configure the loopback interface
    # when the system is booting.  Do not change this entry.
    ##
    127.0.0.1       localhost
    255.255.255.255 broadcasthost
    ::1             localhost
    // add these line
    127.0.0.1       t1c.t1t.io
    127.0.0.1       localhost
    c:\Windows\System32\Drivers\etc\hosts
    # Copyright (c) 1993-2009 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    #      102.54.94.97     rhino.acme.com          # source server
    #       38.25.63.10     x.acme.com              # x client host
    # localhost name resolution is handle within DNS itself.
    #       127.0.0.1       localhost
    #       ::1             localhost
    // add these line
    127.0.0.1       t1c.t1t.io
    127.0.0.1       localhost
    Get-DnsClientServerAddress
    Set-DnsClientServerAddress -InterfaceIndex {your_interface_ref_number} -ServerAddresses ("8.8.8.8","1.1.1.1")

    copy/paste the section in bold in the terminal and press enter

  • Unplug smart card reader from USB port

  • Restart Mac

  • Plug smart card reader back in USB port

  • macOS Sonoma bug: SCardControl() returns SCARD_E_NOT_TRANSACTEDLudovic Rousseau's blogchevron-right
    macOS Sonoma and smart cards statusLudovic Rousseau's blogchevron-right
  • In the white text box, type: loc.

  • Then click 'Check names'.

  • The name 'Local service' now appears in the text box.

  • Then click 'OK'.

  • Leave the password boxes empty.

  • Click 'Apply'.

  • Click 'OK'.

  • Go back to the first tab, 'General', and restart the service.

  • Click 'Start'.

  • Click 'Stop'.

  • Connector Connection Issues
    https://www.hostinger.com/tutorials/fix-dns_probe_finished_nxdomainarrow-up-right
    https://answers.microsoft.com/en-us/windows/forum/windows_8-windows_install/windows-8-install-some-software-using-msi/48881523-1a5d-4c43-abc4-01b1ce3ebf3aarrow-up-right
    https://support.eset.com/kb2908/?locale=en_US&viewlocale=en_USarrow-up-right
    VCRuntime error

    Troubleshooting

    hashtag
    Generating a HAR file for support

    In some cases the Support Desk will ask for a HAR file. This means an export of the functions that a web-page is executing. This is to see that all the functions that call the Trust1Connector are executed correctly.

    Before you use the web application open the developer tools. This can be done by right clicking and click on inspect

    This will open a window like this

    Next navigate to the network tab in the inspect window

    When this is done, use the web application's functionality and when you are finished or come to an issue you can use the download button to get a HAR file, save the file to your system and send this to the Support Desk

    hashtag
    Windows

    hashtag
    Error while retrieving readers

    hashtag
    Is the smartcard service running?

    The Smartcard service is a Windows service that manages the connection to the eID and card reader. Therefore, this service must be running for you to be able to access the eID. You can check this as follows:

    • Open "Windows Services".

    • Search for "Smartcard service" as shown in the following screenshot:

    Check the following Smartcard service settings (based on the screenshot above):

    • The status column for the Smartcard service shows 'Running'.

    • The 'Log On As' column shows 'Local Service'.

    Are the Smartcard service settings NOT as they should be? Then do whichever of the following two options applies:

    1. The Smartcard service is not running.

    Start the Smartcard service, as follows:

    • Double-click the Smartcard service.

    • Click 'Start' and then 'OK'.

    2. The Smartcard service is not logged on as a 'Local Service'.

    • Double-click the Smartcard service.

    • Select the second tab, 'Log On'.

    • Select 'This account'.

    • In the white text box, type: loc.

    • Then click 'Check names'.

    • The name 'Local service' now appears in the text box.

    • Then click 'OK'.

    • Leave the password boxes empty.

    hashtag
    DNS probe finished nxdomain error

    In some cases there is a possibility that the system is not able to retrieve the domain information, in this case the T1C is not usable. To solve this problem you can follow these steps described here;

    hashtag
    Error during installation MSI error 2502 or 2503

    When installing the T1C the possibility of the errors 2502 or 2503 originate from the fact that permissions in the temp folder (C:\Windows\Temp) are not correct, and since the MSI installer relies on this they need to be correct. You need to have permissions next to the administrator rights.

    You need to have permissions as <My User> next to the administrator rights.

    More information can be found here;

    hashtag
    Antivirus

    The Trust1Connector and some installation files are digitally signed. On some machines however the Trust1Connector is flagged/blocked by an antivirus. Disabling the antivirus temporary can allow the user to install the Trust1Connector for some antivirus tools. Below we provide procedures for some antivirus softwares to be able to install the Trust1Connector.

    hashtag
    ESET

    If the user receives an notification that a script from the Trust1Connector is blocked as shown below:

    The procedure at can be used to solved the issue.

    hashtag
    Kaspersky

    When using the Kaspersky and kaspersky web protection you can add an exclusion rule to the belfiusweb page. After you added this rule, restart the computer to make sure all settings are applied.

    hashtag
    A9. T1C List Type Conent Issue

    If the connector is not starting with the error message: "Can not contact the DS service"

    Go to the user folder in %LocalAppData%

    Go to BelfiusConnector folder and remove the selected files below:

    Restart your pc or mac, and the restart will re-initialise the device keys.

    The problem should be solved after executing this step.

    macOS Sonoma bug: SCardControl() returns SCARD_E_NOT_TRANSACTEDLudovic Rousseau's blogchevron-right
    macOS Sonoma and smart cards statusLudovic Rousseau's blogchevron-right
    sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool yes
    defaults read /Library/Preferences/com.apple.security.smartcard.plist useIFDCCID
    he domain/default pair of (/Library/Preferences/com.apple.security.smartcard.plist, useIFDCCID) does not exist
    sudo defaults write /Library/Preferences/com.apple.security.smartcard useIFDCCID -bool no
    core.readersExcludeByName("Bit4id", callback);
    {
      "data": [
      ],
      "success": true
    }
    C:\Windows\SysWOW64\vcruntime140.dll
    Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VisualStudio\14.0\VC\Runtimes\X64
    Click 'Browse'.
    Click 'Apply'.
  • Click 'OK'.

  • Go back to the first tab, 'General', and restart the service.

  • Click 'Start'.

  • Click 'Stop'.

  • https://www.hostinger.com/tutorials/fix-dns_probe_finished_nxdomainarrow-up-right
    https://answers.microsoft.com/en-us/windows/forum/windows_8-windows_install/windows-8-install-some-software-using-msi/48881523-1a5d-4c43-abc4-01b1ce3ebf3aarrow-up-right
    https://support.eset.com/kb2908/?locale=en_US&viewlocale=en_USarrow-up-right
    Logo
    Logo
    MacOS 14 (Sonoma) Smart Card Reade… | Apple Developer Forumsforums.developer.apple.comchevron-right
    Logo
    Logo
    MacOS 14 (Sonoma) Smart Card Reade… | Apple Developer Forumsforums.developer.apple.comchevron-right

    Chrome LNA update 28-10-2025

    In this document the impact of the Google Chrome update of 28-10-2025 on the Trust1Connector is discussed. Apart from the impact for service desks and end-users you will also find all necessary information to adapt your configuration.

    hashtag
    What was updated?

    Chrome has updated its Local Network Access Restrictions.

    hashtag
    What is Local Network Access?

    restricts the ability of websites to send requests to servers on a user's local network (including servers running locally on the user's machine), requiring the user grant the site permission before such requests can be made. The ability to request this permission is restricted to secure contexts.

    hashtag
    Why does Local Network Access needs restrictions?

    Chrome is adding a new permission prompt for sites that make connections to a user's local network as part of the . The aim is to protect users from cross-site request forgery (CSRF) attacks targeting routers and other devices on private networks, and to reduce the ability of sites to use these requests to fingerprint the user's local network.

    More technical information and official release notes of Google can be found .

    hashtag
    Why is the Trust1Connector impacted?

    The Trust1Connector is using the local system of the user. This is one of the fundaments of the Trust1Connector. It runs decentralized in the userspace of the computer.

    The new update of Chrome is preventing the browser to connect to the local system except if security policies are respected and previous security were done. Malicious websites are not able to address the connector from a browser. Trust1Team has of course implemented these updates already.

    hashtag
    End-user impact

    The end-user will get a pop-up that requests permission for local access. Just click ‘allow’ and the connector will run smoothly.

    hashtag
    Impact for service desks and partners

    There is NO need for a new version starting from version 3.8.x and up. As always we advise you to update to the latest version of the Trust1Connector which is version 3.8.8. If you are using the default version of the Trust1Connector then all clients are automatically updated with the latest version via our Distribution Server.

    There is an impact if you work with iframes. Please read the following in which the problem and resolutions are described.

    hashtag
    What if I selected 'Block' and want to revert that decision?

    If you have selected 'Block' during the screen shown above, that means that the connector will not be able to connect to the browser. To revert that back:

    • use the "Clear browsing data" tool (Ctrl+Shift+Del or Menu > History > Clear browsing data), select "All time" for the time range, check boxes for "Cookies and other site data" and "Cached images and files," and click "Clear data," which signs you out of accounts and requires a browser restart.

    triangle-exclamation

    You must close all browser windows, and restart the browser

    hashtag
    What if after following the steps above, it is still not working?

    A last resort solution is to disable 'Local Network Access' temporary.

    In the browser type in the following URL: chrome://flags

    triangle-exclamation

    The same applies for browsers: EDGE, BRAVE AND OTHER CHROME BASED BROWSERS

    In the top search bar of the page, search for: 'Local Network Access'

    And set all selectors to 'disabled'

    Setting this disables the feature updated in Chromium browsers for local network access

    Enable Debug Logging

    Instructions on how to enable 'debug' logging on a production device

    hashtag
    Introduction

    By default, the connector has tracing set to 'info', which limits logging output to it's bare minimum.

    For unexpected issues in production, the debug flags have been compiled in the connector, but they are not activeated by default.

    This page describes how to enable debug logs for OSX and Windows.

    hashtag
    Mac OSX

    The debug level can be modified throught the launchagent on OSX.

    The possible values are: info|warn|debug

    hashtag
    Update log level

    Go to the directory of the launch-agents:

    cd ~/Library/LaunchAgents/

    A connector .plist file can be found (depending on the partner, the naming is different):

    Default Trust1Connector launch-agent:

    com.t1t.t1c.api.plist

    The file has a parameter declaring the log level:

    The following line can be modified for example to 'debug' log level:

    for example:

    update to 'debug' level

    hashtag
    Restart the Connector service

    After modifying the launch-agent, the service must be restarted. To do so, you need to use launchctl:

    Stop the service:

    launchctl unload com.t1t.t1c.api.plist

    Start the service:

    launchctl load com.t1t.t1c.api.plist

    The activity monitor can be used to verify if the processes are started correctly:

    hashtag
    Verify logging output

    Go to the logs-folder where the connector is installed (depends on the partner configuration), by default:

    cd ~/Library/Application\ Support/Trust1Team/Trust1Connector/logs

    Open the log file and notice the debug logging appears :-).

    hashtag
    Windows

    The connector, upon installation, creates a Windows registry entry to start when a device reboots/restarts. The entry declaration can be found when using the 'registry editor' on Windows with the following path:

    [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]

    What happens is that the t1c-launch executable is called to bootstrap/initialize the connector processes. After a succesfull bootstrap, the t1c-launch process is killed, and the following 3 processes are running:

    triangle-exclamation

    In some cases, the t1c-reg.exe will not be running. When that's the case, the connector installed on the device is running in standalone mode. Standalone mode is the mode used when the device is NEVER part of a shared environment (VDI, Citrix, Remote desktop, ...). By default, the connector is installed with a registry process running along the api and sandbox process.

    hashtag
    Update log level and restart

    On Windows, the process to enable a different log level is easier than with Mac OSX.

    You just need to call the t1c-launch process with additional command line parameters.

    To find the t1c-launch binary, you typically can find it in the 'LocalAppData' folder of the logged-in user:

    In Windows Explorer type the following path:

    %localappdata%

    Select the folder from the partner who's connector has been installed:

    Open a terminal command, you can do this by starting a n ew command terminal form the Menu Search, or by typing: 'cmd' as a path in the Windows Explorer (opens a terminal window directly in the present folder).

    Execute the launcher with new parameters:

    t1c-launch --restart --log "none,t1c_rust_api=debug"

    hashtag
    Verify logging output

    Go to the logs-folder where the connector is installed (depends on the partner configuration), by default:

    %localappdata%/Trust1Connector/Logs

    Open the log file and notice the debug logging appears :-).

    Local Network Accessarrow-up-right
    Local Network Access specificationarrow-up-right
    herearrow-up-right
    release notearrow-up-right
    Logo
    Logo
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    	<key>Label</key>
    	<string>com.t1t.t1c.acc.api</string>
    	<key>Program</key>
    	<string>/Users/michallispashidis/Library/Application Support/Trust1Team/Trust1Connector-Acceptance/t1c-acc-api</string>
    	<key>ProgramArguments</key>
    	<array>
    		<string>/Users/michallispashidis/Library/Application Support/Trust1Team/Trust1Connector-Acceptance</string>
    		<string>-f</string>
    		...
    		<string>-x</string>
    		<string>51883</string>
    		<string>--log</string>
    		<string>none,t1c_rust_api=info</string>
    		<string>--env</string>
    		<string>prod</string>
    	</array>
    	<key>RunAtLoad</key>
    	<true/>
    </dict>
    </plist>
    
    <string>none,t1c_rust_api=info</string>
    <string>none,t1c_rust_api=debug</string>
    Latest supported Visual C++ Redistributable downloadsMicrosoftLearnchevron-right

    Changing Device date/time

    Issues related to device time not in sync

    hashtag
    Introduction

    The connector can only work when the device date/time is correctly set. This is due to the security applied on exchanged tokens and keys.

    When a connector has been installed on a device, at a moment which is in the past (other day/time), this results in the connector not working, even though the date/time has been set correctly on the system (post-installation).

    hashtag
    Solution

    To solve this problem the followin steps need to be executed:

    • remove all device related keys

    • restart the connector

    hashtag
    Windows

    Go to the installation folder of the connector:

    %localappdata%/Trust1Connector

    Delete all security relate files (selected below):

    Those files are:

    • device.priv

    • device.pub

    • device_der.priv

    • device_der.pub

    circle-info

    Those files will be automatically generated by the connector after the next step

    Restart the connector by executing the 't1c-launch'

    The process will be stopped, and restarted. The 't1c-launch' process must stop running, and the new processes will trigger the re-generation of the new keys.

    Due to this action, the device performs a new registration to the Distribution service, this can be verified in the api.log file (in the /Logs folder)

    hashtag
    Mac OSX

    Go to the installation folder of the connector:

    cd ~/Library/Application\ Support/Trust1Team/Trust1Connector/

    Open the folder in finder:

    open .

    Delete all security relate files (selected below):

    Those files are:

    • device.priv

    • device.pub

    • device_der.priv

    • device_der.pub

    circle-info

    Those files will be automatically generated by the connector after the next step

    Use the terminal to open the connector installation folder:

    cd ~/Library/Application\ Support/Trust1Team/Trust1Connector

    Execute the t1c-launch to restart

    ./t1c-launch --restart

    The process will be stopped, and restarted. The 't1c-launch' process must stop running, and the new processes will trigger the re-generation of the new keys.

    Due to this action, the device performs a new registration to the Distribution service, this can be verified in the api.log file (in the /Logs folder)

    Logo

    device_x509_der.pub

  • ds-ssl.json

  • ds-txs.bck

  • device_x509_der.pub

  • ds-ssl.json

  • ds-txs.bck