• @ricdeh
      link
      English
      475 months ago

      I genuinely can’t tell at whom you are addressing this. Those claiming it is a Windows problem or those that say otherwise?

    • @[email protected]
      link
      fedilink
      English
      32
      edit-2
      5 months ago

      You can not like windows, and also recognize that CrowdStrike isn’t from Microsoft - so a problem that CrowdStrike caused isn’t the fault of Windows.

      If that makes me a idiot by holding two different ideas in my head, so be it, but you are spending time with us, so thank you for elevating us!

      • @[email protected]
        link
        fedilink
        215 months ago

        I’m sorry, but distinguishing between different concepts is forbidden here. You go straight to jail.

      • @[email protected]
        link
        fedilink
        English
        15 months ago

        I’m waiting for the post mortem before declaring this to not be anything to do with MS tbh. It’s only affecting windows systems and it wouldn’t be the first time dumb architectural decisions on their part have caused issues (why not run the whole GUI in kernel space? What’s the worst that could happen?)

        • @[email protected]
          link
          fedilink
          English
          6
          edit-2
          5 months ago

          I agree it’s possible. But if you’re a software as a service vendor, it is your responsibility to be in the alpha and beta release channels, so if there is a show stopping error coming down the pipeline you can get in front of it.

          But more tellingly, we have not seen Windows boot loop today from other vendors, only this vendor. Right now the balance of probabilities is in the direction of crowd strike

        • @jorp
          link
          35 months ago

          Ah yes the classic presumption of guilt, a keystone of justice

          • @[email protected]
            link
            fedilink
            English
            05 months ago

            I’m not sure how to break this to you but this is just an internet forum, not a court of law

            • @jorp
              link
              25 months ago

              The reason courts use it is because they value having true opinions. But you’re welcome to not value that indeed

              • @[email protected]
                link
                fedilink
                25 months ago

                The reason courts have rules of how convinced one must be to declare guilt is because they dread punishing an innocent over allowing a guilty person free

                We aren’t in a position to hurt the probably guilty party so it doesn’t matter a bit of we jump to conclusions unfairly

    • @daellat
      link
      285 months ago

      Hi, idiot here. Can you explain how it is a windows problem?

        • @daellat
          link
          55 months ago

          That’s what I was thinking so I was curious what the argument would be

        • @[email protected]
          link
          fedilink
          50
          edit-2
          5 months ago

          Sure, but they weren’t patching a windows vulnerability, windows software, or a security issue, they were updating their software.

          I’m all for blaming Microsoft for shit, but “third party software update causes boot problem” isn’t exactly anything they caused or did.

          You also missed that the same software is deployed on Mac and Linux hosts.

          Hell, they specifically call out their redhat partnership: https://www.crowdstrike.com/partners/falcon-for-red-hat/

          • @[email protected]
            link
            fedilink
            135 months ago

            Crowdstrike completely screwed the pooch with this deploy but ideally, Windows wouldn’t get crashed by a bas 3rd party software update. Although, the crashes may be by design in a way. If you don’t want your machine running without the security software running, and if the security software is buggy and won’t start up, maybe the safest thing is to not start up?

            • @[email protected]
              link
              fedilink
              English
              205 months ago

              Are we acting like Linux couldn’t have the same thing happen to it? There are plenty of things that can break boot.

              • [email protected]
                link
                fedilink
                215 months ago

                CrowdStrike also supports Linux and if they fucked up a Windows patch, they could very well fuck up a linux one too. If they ever pushed a broken update on Linux endpoints, it could very well cause a kernel panic.

            • @[email protected]
              link
              fedilink
              145 months ago

              Yeah, it’s a crowd strike issue. The software is essentially a kernel module, and a borked kernel module will have a lot of opportunities to ruin stuff, regardless of the OS.

              Ideally, you want your failure mode to be configurable, since things like hospitals would often rather a failure with the security system keep the medical record access available. :/. If they’re to the point of touching system files, you’re pretty close to “game over” for most security contexts unfortunately. Some fun things you can do with hardware encryption modules for some cases, but at that point you’re limiting damage more than preventing a breach.

              Architecture wise, the windows hybrid kernel model is potentially more stable in the face of the “bad kernel module” sort of thing since a driver or module can fail without taking out the rest of the system. In practice… Not usually since your video card shiting the bed is gonna ruin your day regardless.

            • @candybrie
              link
              225 months ago

              No, because CrowdStrike didn’t bork the drivers for those systems. They could have, though.

            • @[email protected]
              link
              fedilink
              85 months ago

              Nope, because they only shipped a corrupted windows kernel module.

              It’s dumb luck that whatever process resulted in them shipping a broken build didn’t impact the other platforms.

      • @barsquid
        link
        -25 months ago

        No just statistically we are all Arch (btw) Linux users who hate Windows.

    • @Cornelius_Wangenheim
      link
      21
      edit-2
      5 months ago

      Because it isn’t. Their Linux sensor also uses a kernel driver, which means they could have just as easily caused a looping kernel panic on every Linux device it’s installed on.

      • YTG123
        link
        fedilink
        -75 months ago

        There’s no way of knowing that, though. Perhaps their Linux and Darwin drivers wouldn’t have paniced the system?

        Regardless, doing almost anything at the kernel level is never a good idea

        • @[email protected]
          link
          fedilink
          65 months ago

          Also, it’s less about “their” drivers and more about what a kernel module can do.
          Saying “there’s no way to know” doesn’t fit, because we do know that a malformed kernel module can destabilize a linux or mac system.

          “Malformed file” isn’t a programming defect or something you can fix by having a better API.

          • @[email protected]
            link
            fedilink
            05 months ago

            Having the data exposed to userspace via an API would avoid having to have a kernel module at all… Which when malformed wouldn’t compromise the kernel.

            • @[email protected]
              link
              fedilink
              45 months ago

              I mean, sure. But typically operating systems don’t expose that type of information to user space, instead providing a kernel interface with user mode configuration.

              It’s why they use the same basic approach on mac and Linux.

        • @[email protected]
          link
          fedilink
          55 months ago

          Security operations being one of the things that is often best done at the kernel level because of the need to monitor network and file operations in a way you can’t in user mode.