this post was submitted on 22 Jul 2024
43 points (100.0% liked)

Programmer Humor

32266 readers
115 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] -3 points 2 months ago (3 children)

So why is this considered a crowdstrike issue and not a Microsoft fuckup?

[–] [email protected] 2 points 2 months ago (2 children)

Windows: exists

Crowdstrike: stabs

You: why would Microsoft stab themselves?

[–] [email protected] 3 points 2 months ago

To be fair, kernel level access by third party software is kind of frowned upon in the Linux world. Ask any desktop Linux user how they feel about NVIDIA (the only third party kernel code an average Linux user will install) and their drivers randomly causing strange issues on their systems up to and including kernel panics compared to the experience on AMD where the driver is open and built into the kernel itself. For security software that needs low level visibility, there is eBPF, direct kernel level access isn't needed (though I believe CrowdStrike uses it, and thay actually did CrowdStrike Debian and Rocky Linux systems some time back).

MacOS blocked the majority of kernel extensions a few years ago as well.

Windows is the only OS where it has been designed in a way where kernel level access is the rule rather than the exception. So design flaws are at least partially at fault here.

[–] [email protected] 2 points 2 months ago

Windows: exists

Crowdstrike: exists

Windows: open belly, right here!

Crowdstrike: stabs

Crowdstrike released bad code into prod without giving it some hours of testing in local machines or whatever. Incredible fuckup, inimaginable. But, let's not take blame out of Microsoft, if a driver is faulty the system should be resilient enough no to crap the bed on login. At least enough for IT to be able to remotely access the system and fix it. The manual work the IT world has had to do because it's lost remote access to workstations is insane.

[–] [email protected] 0 points 2 months ago (1 children)

Same thing would happen on Linux if someone wrote a bad kernel module and integrated it into the OS. In fact, Crowdstrike did have a similar problem a few months ago on Linux.

I'm no fan of Microsoft, but this isn't their fault.

[–] [email protected] 0 points 2 months ago (1 children)

An OS should not have to require a 3rd party driver for security.

Microsoft should be writing that driver as an OS component. Drivers should be restricted for taking to hardware.

[–] [email protected] 0 points 2 months ago (1 children)

I thought only people who subscribed to CrowdStrike's services had that driver installed.

[–] [email protected] 1 points 2 months ago

That is true. The issue is that because there are so many permission escalation issues in windows, that many anti malware products must run as kernel drivers.

[–] [email protected] 0 points 2 months ago (1 children)

Can you explain why you think this is a Microsoft issue?

[–] [email protected] -1 points 2 months ago (1 children)

Doesn’t Microsoft allow crowdstrike to make updates? Being such a critical part of the OS it’s up to Microsoft to ensure their procedures are robust and being followed.

[–] [email protected] 0 points 2 months ago* (last edited 2 months ago) (1 children)

How do you implement that? How is it feasible that Microsoft tests all the third party drivers?

Don't get me wrong I believe Microsoft is partly to blame for this problem as well but for making it so hard for system admins to go around the system and solve things (as compared to Linux where you can do anything). I think sys admins would have solved this much faster if they were using Linux systems

I was just probing your argument because I guessed it was the typical nonsense of Microsoft bad, Linux good, without a good explanation

[–] [email protected] 0 points 2 months ago* (last edited 2 months ago) (1 children)

I think if it’s going on every windows computer windows should have a process in place to prevent what happened from happening. Windows are for profit, they have the money to do it right but they got greedy. A staggered rollout would have prevented most of it and is a very simple thing to require. Also if it’s going on every windows computer or most I wouldn’t consider that a third party anymore even if that’s how they keep liabilities at arms length

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (1 children)

I think if it’s going on every windows computer

It's not, its just popular. Its not windows job to police what software you choose to run on it.

However Windows does actually have an optional certification program called WHQL for kernal level drivers. Getting this certification lets updates get posted via windows' internal updater. It checks the driver calls apis correctly and doesn't misbehave with interrupt handling among other tests. Crowdstrike driver did pass this, and in fact there was no bug with the driver, the bug was with the configuration file. The configuration file updates about once an hour (and it really needs to do that), and does so outside the windows update process, making windows powerless to control its rollout. whql certification takes a few days to run and configuration files aren't really in scope.

[–] [email protected] 2 points 2 months ago

Thanks for the info, i didn’t know that and understand it a bit better now.