There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

aniki ,

ItS NoT A wInDoWs PrObLeM – Idiots, even on Lemmy

ricdeh ,
@ricdeh@lemmy.world avatar

I genuinely can’t tell at whom you are addressing this. Those claiming it is a Windows problem or those that say otherwise?

daellat ,

Hi, idiot here. Can you explain how it is a windows problem?

aniki ,

If you patch a security vulnerability, who’s fault is the vulnerability? If the OS didn’t suck, why does it need a 90 billion dollar operation to unfuck it?

Redhat is VALUED at less than that.

pitchbook.com/profiles/company/41182-21

It’s a fucking windows problem.

ricecake ,

Sure, but they weren’t patching a windows vulnerability, windows software, or a security issue, they were updating their software.

I’m all for blaming Microsoft for shit, but “third party software update causes boot problem” isn’t exactly anything they caused or did.

You also missed that the same software is deployed on Mac and Linux hosts.

Hell, they specifically call out their redhat partnership: www.crowdstrike.com/partners/falcon-for-red-hat/

Kusimulkku ,

Are the Mac and Linux machines having BSOD (-style) issues and trouble booting?

candybrie ,

No, because CrowdStrike didn’t bork the drivers for those systems. They could have, though.

ricecake ,

Nope, because they only shipped a corrupted windows kernel module.

It’s dumb luck that whatever process resulted in them shipping a broken build didn’t impact the other platforms.

thefartographer ,

How the fuck did my Fedora just bluescreen?? Crowdstrike!

audience laughter, freeze-frame

xtr0n ,

Crowdstrike completely screwed the pooch with this deploy but ideally, Windows wouldn’t get crashed by a bas 3rd party software update. Although, the crashes may be by design in a way. If you don’t want your machine running without the security software running, and if the security software is buggy and won’t start up, maybe the safest thing is to not start up?

MangoPenguin ,
@MangoPenguin@lemmy.blahaj.zone avatar

Are we acting like Linux couldn’t have the same thing happen to it? There are plenty of things that can break boot.

InEnduringGrowStrong ,
@InEnduringGrowStrong@sh.itjust.works avatar

CrowdStrike also supports Linux and if they fucked up a Windows patch, they could very well fuck up a linux one too. If they ever pushed a broken update on Linux endpoints, it could very well cause a kernel panic.

ricecake ,

Yeah, it’s a crowd strike issue. The software is essentially a kernel module, and a borked kernel module will have a lot of opportunities to ruin stuff, regardless of the OS.

Ideally, you want your failure mode to be configurable, since things like hospitals would often rather a failure with the security system keep the medical record access available. :/. If they’re to the point of touching system files, you’re pretty close to “game over” for most security contexts unfortunately. Some fun things you can do with hardware encryption modules for some cases, but at that point you’re limiting damage more than preventing a breach.

Architecture wise, the windows hybrid kernel model is potentially more stable in the face of the “bad kernel module” sort of thing since a driver or module can fail without taking out the rest of the system. In practice… Not usually since your video card shiting the bed is gonna ruin your day regardless.

Kusimulkku ,

It’s a problem affecting Windows, not problem caused by Windows I guess.

daellat ,

That’s what I was thinking so I was curious what the argument would be

GBU_28 ,

“even on Lemmy”

Like this is some highbrow collection of geniuses here?

barsquid ,

No just statistically we are all Arch (btw) Linux users who hate Windows.

Cornelius_Wangenheim , (edited )

Because it isn’t. Their Linux sensor also uses a kernel driver, which means they could have just as easily caused a looping kernel panic on every Linux device it’s installed on.

ytg ,

There’s no way of knowing that, though. Perhaps their Linux and Darwin drivers wouldn’t have paniced the system?

Regardless, doing almost anything at the kernel level is never a good idea

Carighan ,
@Carighan@lemmy.world avatar

This is, in a lot of ways, impressive. This is CrowdStrike going full “Hold my beer!” about people talking about what bad production deploy fuckups they made.

henfredemars ,

You know you’ve done something special when you take down somebody else’s production system.

KomfortablesKissen ,

I’m volunteering to hold their beer.

Everyone remember to sue the services not able to provide their respective service. Teach them to take better care of their IT landscape.

ricecake ,

Typically auto-applying updates to your security software is considered a good IT practice.

Ideally you’d like, stagger the updates and cancel the rollout when things stopped coming back online, but who actually does it completely correctly?

KomfortablesKissen ,

Applying updates is considered good practice. Auto-applying is the best you can do with the money provided. My critique here is the amount of money provided.

Also, you cannot pull a Boeing and let people die just because you cannot 100% avoid accidents. There are steps in between these two states.

ricecake ,

you cannot pull a Boeing and let people die

You say that, but have you considered the savings?

Iheartcheese ,
@Iheartcheese@lemmy.world avatar

People are temporary. Money is forever.

KomfortablesKissen ,

I have. They are not mine. The dead people could be.

Edit: I understand you were being sarcastic. This is a topic where I chose to ignore that.

clearedtoland ,

What’s the saying about dying a hero or becoming the villain?

slazer2au ,

Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)

marcos ,

Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.

Legendarylootz ,

The real malware is the security software we made along the way.

WhiskyTangoFoxtrot ,

We’ve known that since Norton and McAfee.

Logh ,

Funny how CrowdStrike already sounds like some malware’s name.

dmention7 ,

It literally sounds like a DDoS!

SkyNTP ,

Not too surprising if the people making malware, and the people making the security software are basically the same people, just with slightly different business models.

PriorityMotif ,
@PriorityMotif@lemmy.world avatar

Can’t get hacked if your machine isn’t running.

jaybone ,

You’re hired!

baggins ,

Yes but the difference is one of them is also going to help you fix it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines