CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

  • @[email protected]
    link
    fedilink
    1194 months ago

    Please, get this garbage out of the kernel. If it isn’t there to talk to hardware, third party code has no place in the kernel. The same shit that Crowdstrike did could easily happen with any of these useless anticheats.

    • @[email protected]
      link
      fedilink
      374 months ago

      In b4 msft creates a level between kernel and user level for this stuff to sit at. It will have read-only access to all of kernel memory, and will otherwise function the same, but when it crashes it won’t take the OS down, just certain programs that rely on it.

      What will they call it? “Observer” level? “Big Brother” level? “Overseer” level? Probably just something to do with “Verifying Trust/Integrity”. Google will also want to quietly stick something for “Web Integrity” there.

      • @Tokugero
        link
        94 months ago

        https://github.com/microsoft/ebpf-for-windows

        Right now it’s network level, but Linux’s implementation has since moved out from just packet filtering to full syscall filter and interaction; it’s generally accepted that Windows will be following suit with this implementation. Thought you’d like a name to the thing you described

      • @[email protected]
        link
        fedilink
        English
        5
        edit-2
        4 months ago

        Is it just me, or does this seem like a reasonable solution? Assuming it’s technically feasible.

        • @[email protected]
          link
          fedilink
          34 months ago

          It’s still giving third party software kernel level control over your device, so you’re still giving up any possibility of privacy and probably leaving yourself wide open to a backdoor attack, but that has been normalized. So to the degree that what people accept as reasonable these days is unreasonable, yeah, that’s why I think MSFT will try it.

    • @[email protected]
      link
      fedilink
      54 months ago

      As much as I despise MS and think they are equally incompetent, I don’t think it’s a good idea to lock down Windows. They will stop providing kernel access to 3rd parties at first, then a few months later you will only be able to download software from the Microsoft Store.

      Yes, it’s a security issue but them being allowed to close down their OS sets a dangerous precedent that will make Windows even more shittier and enshittified than it already is.

      • @[email protected]
        link
        fedilink
        94 months ago

        There is zero chance of that happening. This is exactly what people said when Apple created a Mac App Store. Surprise surprise you can still run any software you want on a Mac.

      • @[email protected]
        link
        fedilink
        English
        24 months ago

        They’d be seriously shooting themselves in the foot if they did that. Most corporations have 3rd party software that they would not be able or willing to give up, software development for Windows would be unable to test and debug, and I know from personal experience that many consumers find the already existing S Mode to be frustrating and confusing.

        • @[email protected]
          link
          fedilink
          14 months ago

          They kinda already do this. Any .exe you download outside the Microsoft Store requires double confirmation before you can execute it, unless it’s from Microsoft.

      • Phoenixz
        link
        fedilink
        04 months ago

        Good. Let them. Fuck Microsoft and literally ALL the crap they’ve produced. After having to deal with their shit for over 30 years I can’t wait for them to finally sink their own boat

  • kubica
    link
    fedilink
    424 months ago

    Sure, “restrict” the kernel access. And the first company to be granted the requisites for kernel access, CrowdStrike.

    • r00ty
      link
      fedilink
      114 months ago

      Exactly. Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen), or they will need to grant the access to those providers.

      If Microsoft think they will be able to curate every single device driver and other kernel module (like antivirus etc) and catch the kind of bug that caused this error? They’re deluded.

      I’ll wait and see what they actually propose before outright ruling it out. But, I can’t see how they do this in any realistic way.

      • @[email protected]
        link
        fedilink
        14 months ago

        Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen)

        How does Apple handle this?

        • r00ty
          link
          fedilink
          14 months ago

          How does Apple handle this?

          Really not sure if they have any kernel level antivirus products. Although the same question applies I guess to third party hardware drivers. How are they installed? What privilege level do they run in?

  • @[email protected]
    link
    fedilink
    40
    edit-2
    4 months ago

    Imo, third party companies just shouldn’t have access to the kernel level. Someone is always getting hacked, and having this level of access to potentially hundreds of millions of computers is a huge risk. Especially if it’s for something trivial, like anticheat in Helldivers 2.

  • @[email protected]
    link
    fedilink
    38
    edit-2
    4 months ago

    yes please. NO third party should have ring 0 access to your computer.

    bonus: no kernel level anticheat to fuck with linux users

  • Todd Bonzalez
    link
    fedilink
    344 months ago

    They’re going to implement something like eBPF for the Windows kernel. This will allow kernel-level modules to run with zero risk of crashing the kernel. If the module fails, it fails without taking down the kernel with it.

    Linux already has this. It works great. If Windows gets this, all antivirus and anti-cheat software is going to have to transition.

    Once that happens, it will be way easier to add anti-cheat software to Linux that operates the same as on Windows. It may be possible to load and unload it only when playing and actually having competition-grade gaming on Linux.

    Of course, this is a security disaster that I wouldn’t allow on any of my daily drivers, but I would enjoy playing Destiny on my Steamdeck if there’s a legit way for me to do it.

    • @[email protected]
      link
      fedilink
      2
      edit-2
      4 months ago

      According to wikipedia, both Windows and linux have it, and both are open source.

      Believe it or not, a lot of companies, no matter how cool and secure their marketing sounds, are just seriously incompetent.

  • @[email protected]
    link
    fedilink
    294 months ago

    My understanding is that EU regulators had an issue because Windows Defender rolled out kernel mode/kernel data protection, which gave Microsoft a de-facto monopoly in that market segment if no one else was allowed to use the same technology in their products.

    Microsoft complaining that the Crowdstrike incident was the EU’s fault is an argument in favor of a Microsoft monopoly, which the EU has been pretty consistently against, and EU opposition to this should not have been a surprise to Microsoft.

    • bountygiver [any]
      link
      fedilink
      English
      2
      edit-2
      4 months ago

      microsoft could get away with this monopoly accusations by opening up official read-only APIs for that, so you can have antiviruses use it and have a proper procedure for user to give consent for the antivirus to have access to said API.

      • @[email protected]
        link
        fedilink
        14 months ago

        I agree, all they need to make sure is for their own tool to have the same access as everyone else.

    • @[email protected]
      link
      fedilink
      English
      94 months ago

      In that case, the entire windows ecosystem collapses when Microsoft messes up windows defender… at least if its spread out it hurts less people

  • d-RLY?
    link
    fedilink
    184 months ago

    Probably a good move for them to make tbh. I like how CrowdStrike’s name already sounds like it should be the name of a big malware/virus/zeroday. So we should have seen it coming.

  • squid
    link
    fedilink
    64 months ago

    A legal precedent should be established to hold companies as large as CrowdStrike liable for their actions. This liability should be significant enough to ensure that future companies will think twice before releasing faulty code. We should not be asking for or supporting Microsoft’s efforts to further lock down their product.

  • WerySkok :verified_think:
    link
    fedilink
    64 months ago

    @mudle somehow, I don’t think that’s the way to resolve future problems, it just looks like Apple’s way, which sometimes isn’t great for customers

    • @[email protected]OPM
      link
      fedilink
      34 months ago

      You have a point, but if Microsoft completely locks down the kernel, preventing any third party software/driver from running at the kernel-level, Anti-Cheat developers will have to find a new way to implement Anti-Cheat. This may open up the possibility of some newer form of Anti-Cheat being user-space; or at the very least NOT ring 0, which in-turn may open up the possibility of this new form of Anti-Cheat working underneath Linux.

      Or maybe we’re all still screwed because this new form of Anti-Cheat will perform on a basis that trusts that there is no third party access to the Windows kernel because of how restricted it is, therefore nullifying the need to be ring 0, but it still might not work under Linux due to the freedom/access users have to the kernel.

      But then again, in order to implement any third party driver into the Windows kernel, it has to be signed and/or approved by Microsoft first (IIRC). But cheaters get around this through various means. So maybe nothing changes; but if Microsoft DOES restrict kerne-level access, this leads me to think that Anti-Cheat will have to change in some form or another, which may lead to it working on Linux.

      TBH, The only way(s) I see Anti-Cheat moving forward at all, is:

      • Hardware level Anti-Cheat (similar to a DMA card. Maybe it requires a certain type firmware that is universally used across all/most major video game companies)

      • Some form of emulated environment. Maybe like a specific kernel that is used for each game.
      • WerySkok :verified_think:
        link
        fedilink
        54 months ago

        @mudle btw afaik Valve’s working on AI anticheat, which analyzes player’s behaviour, I think nowadays that would be the most viable direction for non-kernel anticheats

        • @[email protected]OPM
          link
          fedilink
          44 months ago

          I completely forgot about AI Anti-Cheat, lol. But yes, this is another form of Ant-Cheat that seems to be very effective. (Although I don’t much like the idea)

  • UnfortunateShort
    link
    54 months ago

    Funny how you can create a microkernel only to then fuck up privileges so bad that software (e.g. graphics drivers, anything running with real-time prio) can easily crash your system without recovery.

    The architecture of Windows is both, remarkably good and weirdly underutilized.

  • @[email protected]
    link
    fedilink
    44 months ago

    Why not have a structure in place that has Microsoft review/test code from third parties. At the end of the day it is Microsoft that took the public hit so they should be the last line of defence in this process.

    Those that wish to have their code sit at the privileged/kernel level should either pay up or supply Microsoft with resources to do the tests Microsoft would require.

    What shouldn’t happen is third parties doing their work at a privileged level without the oversight.

    • @dueuwuje @mudle

      If I understand it correctly, it already has been (at least formally) reviewed by microsoft before signing and allowing that signed code run kernel-mode. But the crowdstrike’s driver module was not just running malware scanner on itself, it was interpreting what is basically unsigned code that was easier and faster to update. This unsigned files were the ones containing faulty update.

      At least that what I understand from https://www.youtube.com/watch?v=wAzEJxOo1ts , it may not be entirely correct or I may have misunderstood.

      But if it is true, it may be more sensible to make an API so software with specific permissions could access information needed to effectively function as antivirus, without being run in kernel mode.

      • @[email protected]OPM
        link
        fedilink
        24 months ago

        But if it is true, it may be more sensible to make an API so software with specific permissions could access information needed to effectively function as antivirus, without being run in kernel mode.

        I’ve come to this conclusion as well. I believe Apple has similar functionality with their “kernel-extensions”, I believe it’s called.

    • The_Worst
      link
      fedilink
      English
      24 months ago

      Sure, as long as Microsoft doesn’t give its own products more access to the kernel than competitors.