Forum / NoMachine for Mac / NoMachine audio not working on Mojave
- This topic has 18 replies, 2 voices, and was last updated 2 years, 7 months ago by mtosti63.
-
AuthorPosts
-
January 17, 2022 at 22:43 #37058mtosti63Participant
Hello – I have an issue with NoMachine 7.7.4 where the audio does not work when connecting via Windows 10 desktop. This has been an ongoing problem with this box.
Other macs work fine (but have 10.14 macOS intalled)
Security settings had nxnode and NoMachine checked in Microphone. nxnode is installed and checked in accessibility and full disk access.
SIP is disabled on this mac
restarting the nxservice does not pop up any errors.
I can connect fine and control the applications on the mac.
I have re-installed with no luck.
kextstat does not show any nx kext installed.
mediamac01:/ root# kextstat |grep nx
mediamac01:/ root#System report for applications
NoMachine:
Version: 7.7.4
Obtained from: Identified Developer
Last Modified: 1/17/22, 11:37 AM
Kind: Intel
64-Bit (Intel): Yes
Signed by: Developer ID Application: NoMachine S.a.r.l. (493C5JZAGR), Developer ID Certification Authority, Apple Root CA
Location: /Applications/NoMachine.app
Get Info String: NoMachine 7.7.4, Copyright (c) 2002-2021 NoMachineFrom system report Extensions
nxaudio:
Version: 4.1
Last Modified: 10/8/21, 1:11 PM
Bundle ID: com.nomachine.driver.nxau
Notarized: No
Loaded: No
Get Info String: NoMachine Audio Adapter Version 4.1.b2 copyright © 2002 – 2016 NoMachine
Obtained from: Identified Developer
Kind: Intel
Architectures: x86_64
64-Bit (Intel): Yes
Location: /System/Library/Extensions/nxaudio.kext
Kext Version: 4.1.b2
Loadable: Yes
Dependencies: Satisfied
Signed by: Developer ID Application: NoMachine S.a.r.l. (493C5JZAGR), Developer ID Certification Authority, Apple Root CASystem report shows No disabled software
Any ideas here?
Thanks
Mike
January 18, 2022 at 14:59 #37078kubaszym1ParticipantHello,
Please check if you see NoMachine Audio Adapter in your audio settings while the session is running.
If you don’t, please check if you can load nxaudio.kext by running the following command:
sudo kextutil -vvv /System/Library/Extensions/nxaudio.kext/
You can check the result by running:
kextstat | grep nxau
The output should look similar to this:
265 0 0xffffff7f83cd6000 0x5000 0x5000 com.nomachine.driver.nxau (4.1.b2) 78172556-B6A4-3112-BA41-E79D18108476
Then restart NoMachine server:
sudo /etc/NX/nxserver –restartKuba
January 19, 2022 at 01:47 #37086mtosti63ParticipantI am getting this when trying to install nxaudio
mediamac01:~ root# kextutil -vvv /System/Library/Extensions/nxaudio.kext
Defaulting to kernel file ‘/System/Library/Kernels/kernel’
Kext rejected due to system policy: <OSKext 0x7f7fb6d06160 [0x7fffa565d920]> { URL = “file:///Library/StagedExtensions/System/Library/Extensions/nxaudio.kext/”, ID = “com.nomachine.driver.nxau” }
Kext rejected due to system policy: <OSKext 0x7f7fb6d06160 [0x7fffa565d920]> { URL = “file:///Library/StagedExtensions/System/Library/Extensions/nxaudio.kext/”, ID = “com.nomachine.driver.nxau” }
Diagnostics for /System/Library/Extensions/nxaudio.kext:January 19, 2022 at 16:09 #37092kubaszym1ParticipantHi,
Try this. After running the command “sudo kextutil -vvv /System/Library/Extensions/nxaudio.kext” access System Preferences -> Security&Privacy -> General panel and click on the “Allow” button.
January 19, 2022 at 19:41 #37093mtosti63ParticipantI should also mention that in the system preferences->security->general tab, there were no notifications of blocked extensions.
January 20, 2022 at 19:53 #37110mtosti63ParticipantYes, I had that open and there was no notifications there. I expected it to be there but it was not.
February 2, 2022 at 12:28 #37305kubaszym1ParticipantHi,
First, in System preferences -> Security -> General Tab in section “Allow apps downloaded from” check if the option “App store and identified developers” is marked.
Then, please run this command:
sudo kextload -vvv /System/Library/Extensions/nxaudio.kext
Then you should be able to see the notifications about blocked software in System Preferences->Security->General Tab. Please allow loading system software from NoMachine S.a.r.l.. Then probably you will have to restart your machine or at least NoMachine server. You can find more information here: https://knowledgebase.nomachine.com/AR01P00962
February 3, 2022 at 03:01 #37313mtosti63ParticipantHello – I have already tried this, and the popup dialog does not appear on the general page.
But I get this error.
mediamac01:~ $ sudo kextload -vvv /System/Library/Extensions/nxaudio.kext
Password:
Requesting load of /System/Library/Extensions/nxaudio.kext.
/System/Library/Extensions/nxaudio.kext failed to load – (libkern/kext) system policy prevents loading; check the system/kernel logs for errors or try kextutil(8).How do I check the system kernel logs?
Thank you for your help
Mike
February 3, 2022 at 13:23 #37318kubaszym1ParticipantHello,
You can check the kernel or system logs with this command:
tail -f /var/log/system.log
tail -f /var/log/kernel.log
You can also use the ‘less’ command, for example:
less /var/log/kernel.log
February 4, 2022 at 19:24 #37327mtosti63ParticipantThere is no kernel log, but I did use log show
It just shows that the kernel extension is blocked.
2022-02-04 09:18:43.024634-0800 0x3e6b58 Default 0x37cfaa 201 0 trustd: [com.apple.securityd:policy] cert[2]: AnchorTrusted =(leaf)[force]> 0
2022-02-04 09:18:43.028939-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:security_exception] MacOS error: 3
2022-02-04 09:18:43.029020-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:SecError] Error checking with notarization daemon: 3
2022-02-04 09:18:43.029360-0800 0x3e6da0 Error 0x0 213 0 syspolicyd: Non-notarized kext blocked: <private>, Thu Oct 29 16:07:29 2020
2022-02-04 09:18:43.029702-0800 0x3e6da0 Error 0x0 213 0 syspolicyd: Kernel Extension BLOCKED: <private>
2022-02-04 09:18:43.029945-0800 0x380 Error 0x0 72 0 kextd: (IOKit) [com.apple.kext:kextlog] Kext rejected due to system policy: <OSKext 0x7f8769431c90 [0x7fffa54cd920]> { URL = “file:///Library/StagedExtensions/System/Library/Extensions/nxaudio.kext/”, ID = “com.nomachine.driver.nxau” }
2022-02-04 09:18:43.030007-0800 0x380 Error 0x0 72 0 kextd: (IOKit) [com.apple.kext:kextlog] com.nomachine.driver.nxau failed security checks; failing.
2022-02-04 09:18:43.031854-0800 0x3e6db1 Activity 0x37cfab 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.033510-0800 0x3e6db1 Activity 0x37cfac 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.035650-0800 0x3e6b58 Default 0x37cfac 201 0 trustd: [com.apple.securityd:rvc] asynchronously fetching CRL (http://crl.apple.com/root.crl) for client (syspolicyd[213]/0#-1 LF=0)
2022-02-04 09:18:43.035731-0800 0x3e6b58 Default 0x37cfac 201 0 trustd: [com.apple.securityd:policy] cert[2]: AnchorTrusted =(leaf)[force]> 0
2022-02-04 09:18:43.039772-0800 0x3e6db2 Default 0x0 213 0 syspolicyd: (CFNetwork) Task <E7A09516-2E07-497A-A4EC-6DEF9C19F9D5>.<33> resuming, QOS(0x19)
2022-02-04 09:18:43.040126-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) [com.apple.CFNetwork:ATS] Task <E7A09516-2E07-497A-A4EC-6DEF9C19F9D5>.<33> {strength 0, tls 4, ct 0, sub 0, sig 1, ciphers 0, bundle 1, builtin 0}This is more events around the error
2022-02-04 09:18:43.016700-0800 0x3e6d71 Default 0x0 213 0 syspolicyd: (CFNetwork) NSURLSession/NSURLConnection HTTP load failed (kCFStreamErrorDomainSSL, -9813)
2022-02-04 09:18:43.016862-0800 0x3e6d71 Error 0x0 213 0 syspolicyd: (CFNetwork) Task <E3816861-4BDB-4DBF-BA8C-FDD24FCD0A5F>.<32> HTTP load failed (error code: -1202 [3:-9813])
2022-02-04 09:18:43.017118-0800 0x3e6db3 Error 0x0 213 0 syspolicyd: (CFNetwork) Task <E3816861-4BDB-4DBF-BA8C-FDD24FCD0A5F>.<32> finished with error – code: -1202
2022-02-04 09:18:43.017386-0800 0x3e6d71 Error 0x0 213 0 syspolicyd: cloudkit request failed: Error Domain=NSURLErrorDomain Code=-1202 UserInfo={NSURLErrorFailingURLPeerTrustErrorKey=<private>, NSLocalizedRecoverySuggestion=Would you like to connect to the server anyway?, _kCFStreamErrorDomainKey=3, _kCFStreamErrorCodeKey=-9813, NSErrorPeerCertificateChainKey=<private>, NSUnderlyingError=0x7fd607d00eb0 {Error Domain=kCFErrorDomainCFNetwork Code=-1202 UserInfo={_kCFStreamPropertySSLClientCertificateState=0, kCFStreamPropertySSLPeerTrust=<private>, _kCFNetworkCFStreamSSLErrorOriginalValue=-9813, _kCFStreamErrorDomainKey=3, _kCFStreamErrorCodeKey=-9813, kCFStreamPropertySSLPeerCertificates=<private>}}, NSLocalizedDescription=<private>, NSErrorFailingURLKey=<private>, NSErrorFailingURLStringKey=<private>, NSErrorClientCertificateStateKey=0}
2022-02-04 09:18:43.019923-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:security_exception] MacOS error: 3
2022-02-04 09:18:43.020022-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:SecError] Error checking with notarization daemon: 3
2022-02-04 09:18:43.020849-0800 0x3e6da0 Activity 0x37cfa9 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.022514-0800 0x3e6da0 Activity 0x37cfaa 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.024510-0800 0x3e6b58 Default 0x37cfaa 201 0 trustd: [com.apple.securityd:rvc] asynchronously fetching CRL (http://crl.apple.com/root.crl) for client (syspolicyd[213]/0#-1 LF=0)
2022-02-04 09:18:43.024634-0800 0x3e6b58 Default 0x37cfaa 201 0 trustd: [com.apple.securityd:policy] cert[2]: AnchorTrusted =(leaf)[force]> 0
2022-02-04 09:18:43.028939-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:security_exception] MacOS error: 3
2022-02-04 09:18:43.029020-0800 0x3e6da0 Default 0x0 213 0 syspolicyd: (Security) [com.apple.securityd:SecError] Error checking with notarization daemon: 3
2022-02-04 09:18:43.029360-0800 0x3e6da0 Error 0x0 213 0 syspolicyd: Non-notarized kext blocked: <private>, Thu Oct 29 16:07:29 2020
2022-02-04 09:18:43.029702-0800 0x3e6da0 Error 0x0 213 0 syspolicyd: Kernel Extension BLOCKED: <private>
2022-02-04 09:18:43.029945-0800 0x380 Error 0x0 72 0 kextd: (IOKit) [com.apple.kext:kextlog] Kext rejected due to system policy: <OSKext 0x7f8769431c90 [0x7fffa54cd920]> { URL = “file:///Library/StagedExtensions/System/Library/Extensions/nxaudio.kext/”, ID = “com.nomachine.driver.nxau” }
2022-02-04 09:18:43.030007-0800 0x380 Error 0x0 72 0 kextd: (IOKit) [com.apple.kext:kextlog] com.nomachine.driver.nxau failed security checks; failing.
2022-02-04 09:18:43.031854-0800 0x3e6db1 Activity 0x37cfab 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.033510-0800 0x3e6db1 Activity 0x37cfac 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessary
2022-02-04 09:18:43.035650-0800 0x3e6b58 Default 0x37cfac 201 0 trustd: [com.apple.securityd:rvc] asynchronously fetching CRL (http://crl.apple.com/root.crl) for client (syspolicyd[213]/0#-1 LF=0)
2022-02-04 09:18:43.035731-0800 0x3e6b58 Default 0x37cfac 201 0 trustd: [com.apple.securityd:policy] cert[2]: AnchorTrusted =(leaf)[force]> 0
2022-02-04 09:18:43.039772-0800 0x3e6db2 Default 0x0 213 0 syspolicyd: (CFNetwork) Task <E7A09516-2E07-497A-A4EC-6DEF9C19F9D5>.<33> resuming, QOS(0x19)
2022-02-04 09:18:43.040126-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) [com.apple.CFNetwork:ATS] Task <E7A09516-2E07-497A-A4EC-6DEF9C19F9D5>.<33> {strength 0, tls 4, ct 0, sub 0, sig 1, ciphers 0, bundle 1, builtin 0}
2022-02-04 09:18:43.040324-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) TIC Enabling TLS [33:0x7fd6e7c68cc0]
2022-02-04 09:18:43.040378-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) TIC TCP Conn Start [33:0x7fd6e7c68cc0]
2022-02-04 09:18:43.040440-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (libnetwork.dylib) [com.apple.network:] [C33 Hostname#d4ef87ea:443 tcp, url hash: 706b58d4, tls] start
2022-02-04 09:18:43.040616-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (libnetwork.dylib) [com.apple.network:] nw_connection_report_state_with_handler_locked [C33] reporting state preparing
2022-02-04 09:18:43.040890-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) Task <E7A09516-2E07-497A-A4EC-6DEF9C19F9D5>.<33> setting up Connection 33
2022-02-04 09:18:43.042101-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (libnetwork.dylib) [com.apple.network:] nw_socket_handle_socket_event [C33.1:3] Socket received CONNECTED event
2022-02-04 09:18:43.042182-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (libnetwork.dylib) [com.apple.network:] nw_endpoint_flow_protocol_connected [C33.1 IPv4#3234e4f5:443 in_progress socket-flow (satisfied)] Transport protocol connected
2022-02-04 09:18:43.043007-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) TIC TLS Event [33:0x7fd6e7c68cc0]: 1, Pending(0)
2022-02-04 09:18:43.047916-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) TIC TLS Event [33:0x7fd6e7c68cc0]: 11, Pending(0)
2022-02-04 09:18:43.048005-0800 0x3e6db3 Default 0x0 213 0 syspolicyd: (CFNetwork) TIC TLS Event [33:0x7fd6e7c68cc0]: 14, Pending(0)
2022-02-04 09:18:43.048285-0800 0x3e6da0 Activity 0x37cfad 213 0 syspolicyd: (Security) SecTrustEvaluateIfNecessaryFastAsync
2February 7, 2022 at 16:25 #37367kubaszym1ParticipantHello,
You can update the NoMachine application to the newest version (7.8.2). Then, after the installation you should see the notification about blocked extensions. Enter the Security & Privacy as before, click the lock to make changes and allow system software from NoMachine. Please note that the possibility to unblock the loading of NoMachine system extensions is available only for 30 minutes after the system has issued the ‘System Extension Blocked’ dialog.
February 7, 2022 at 20:27 #37369mtosti63ParticipantStill no general security preferences popup
The installer did not even make a popup that i needed to go to system preferences.
February 8, 2022 at 15:28 #37386kubaszym1ParticipantHello,
You can check if NoMachine kernel extensions are in the kext policy database:
sudo sqlite3 “/var/db/SystemPolicyConfiguration/KextPolicy” “SELECT * FROM kext_policy;” | grep nomachine
Please send us the result of this command.
Also, do you use any Mobile Device Management like JAMF?
February 8, 2022 at 19:17 #37392mtosti63Participantsqlite3 “/var/db/SystemPolicyConfiguration/KextPolicy” “SELECT * FROM kext_policy;” | grep nomachine
493C5JZAGR|com.nomachine.driver.nxau|1|NoMachine S.a.r.l.|21February 14, 2022 at 14:07 #37511kubaszym1ParticipantHello,
You can try this command:
/usr/sbin/spctl kext-consent add 493C5JZAGR
If it still doesn’t work, please send me any notifications you will get.
-
AuthorPosts
This topic was marked as solved, you can't post.