Posted on 05-04-2018 07:26 AM
So recently with 10.13.4 rolling out we've noticed more users getting the error,
"touristd wants to use your confidential information stored in "http-proxy(ID)" in your keychain"
and
"parsecd wants to use your confidential information stored in "http-proxy(ID)" in your keychain"
Even though they put their info in and click on "always allow" it keeps popping up. I've been trying to figure out what these actually do. Seems like one is used for notification when a new OS is installed. Any way to stop these from popping up and annoying my users? Anyone else seeing this in High Sierra?
Posted on 05-15-2018 07:55 AM
Yes we have, goole search says its spotlight related so it might calm down with use but its always going into the login keychain to get proxy info....
Posted on 05-15-2018 02:29 PM
yep after some research its all over the webs about the always allow setting not working, so how to do it via script...
So basically, the only think I can think of doing is allowing parsecd as one of the allowed apps that does have to ask, as its a internal apple framework binary. I don't think it causes much of a security issue
security add-internet-password -a '$3' -s "$proxy" -P 80 -r htps -T "/System/Library/PrivateFrameworks/CoreParsec.framework/parsecd" -U /Users/$3/Library/Keychains/login.keychain
problem its the -U is supposed to modify if it can find it but it just keeps on adding, this is the the only way I can think it can work as I doubt you can pipe find-internet-password.
anyone better at this then me????
Posted on 05-16-2018 01:41 PM
touristd is related to the "Would you like to take a tour of macOS?" so I'm not surprised it's trying to phone Apple.
parsecd is indeed related to Spotlight. Specifically suggestions whenever you are typing.
Neither are anything to worry about.
Posted on 05-22-2018 06:01 AM
Yeah still having the issues. Will try the script and see if it helps.
UPDATE: script didn't seem to fix the issue. Will keep looking.
Posted on 06-08-2018 12:42 PM
Проблема решается путем настройки в программе "Связка ключей" в объекте "Вход" в списке связок ключей слева. Здесь нужно выбрать запись настройки прокси-сервера для протокола HTTP или HTTPS, которые формируются в вашей учетной записи при настройке сетевого интерфейса Ethernet и сохраняются здесь, в Связке ключей.
Открыть свойства записи и перейти на страницу "Доступ" со страницы "Атрибуты". Здесь выбрать один из вариантов предоставления доступа. Можно выбрать "Разрешить всем программам получать доступ к этом объекту", если нет необходимости ограничивать какие либо приложения.
Так была решена проблема для процессов parsecd, touristd, Kaspersky Anti-Virus Agent и AuthBrokerAgent в ОС "macOS High Sierra"
Posted on 06-08-2018 12:42 PM
Posted on 07-03-2018 06:39 AM
@ekrasotkin Agreed, this is how to achive it manually, however a lot of our mac users are not experienced with advance keychain workings so that is why I am trying to script it. going to give it another bash later on.
Posted on 07-12-2018 01:07 AM
Well i have just upraded to 10.13.6 and after this update it seems to be behaving itself now. can anyone else verify??
Posted on 08-13-2018 05:48 AM
Has anyone found a fix to this? We are getting these password/Keycahin requests in MacOS versions 10.13.4, 10.13.5 and 10.13.6
Posted on 08-29-2018 06:42 AM
We are seeing the parsecd problem as well. Haven't been able to find a solution yet. It seems like it's a lot less frequent when Safari and other Apple applications are closed and other browsers are used instead.
But that isn't a solution. I'd hate to have to tell our users to stop using Safari when they may prefer it.
Posted on 09-28-2018 10:28 AM
We're seeing both issues here. I have two separate cases with Apple about it. The touristd one got escalated since other companies are seeing it. The Parsecd one we're collecting more info on. Will see if Apple comes back with something.
Posted on 11-07-2018 03:06 PM
@roiegat , please do!
Posted on 11-08-2018 05:01 AM
@d.mccullough Still waiting to hear back from Apple. I sent them about 6 gigs of Wireshark data so they have plenty to sift through. I'm going to set up bi-weekly meetings with our Apple rep to check in on cases so I'll see if I can get an update soon.
Posted on 11-13-2018 10:56 AM
Roie, I can confirm that upgrading my own work machine to Mojave has resolved the issue. Might be more trouble than it's worth, but let's see what Apple says.
Posted on 01-24-2019 10:48 AM
Any updates? I am on 10.14.2 and still have issues with with touristd asking for creds and forcing proxy prompts. Using the manual approach from ekrasotkin has not worked for me. It will still prompt even if I grant access in the keychain.
Posted on 01-24-2019 11:34 AM
Nothing new from Apple. They are still analyzing all the data we gave them.
Posted on 07-17-2019 02:51 AM
Hi. Does anyone have any updates regarding this issue?
Posted on 07-17-2019 05:48 AM
So no new news in Mojave but Apple said the issue should be fixed in Catalina. They are having me test that now. But they did have me try the following command to see if it'll work:
defaults write com.apple.touristd allowQAPaths -bool no
Posted on 07-24-2019 08:42 AM
I suppose "fixed in Catalina" will be the best we're going to get... at least it's a resolution.