this post was submitted on 22 Jul 2024
152 points (98.7% liked)

Asklemmy

43826 readers
854 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy πŸ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
all 45 comments
sorted by: hot top controversial new old
[–] [email protected] 163 points 3 months ago (1 children)

Yup, kernel level "anti-cheat" is a rootkit spyware that "pinky swears" it's only spying for a good reason.

[–] [email protected] 111 points 3 months ago

Yes, works on the same layer.

[–] [email protected] 92 points 3 months ago (1 children)
[–] [email protected] 67 points 3 months ago (1 children)

Yeah really not much else needed to be said here. What happened with Crowdstrike is exactly the sort of exploit Kernel Level Anti-Cheat in general has been critized for enabling on consumer hardware.

[–] [email protected] 19 points 3 months ago

And why most Linux users would rather not play these games than allow that garbage on our PCs.

[–] [email protected] 76 points 3 months ago (2 children)

Yes, and I've seen it happening. Usually it doesn't instantly brick every PC, but it can sometimes brick certain PCs with specific configurations. Then it will be silently patched without acknowledgement for the bug.

I've seen it mess with (and crash) graphics and network drivers, rendering PCs useless until forced reboot. It can also mess up other games, processes, and even updates.

People have been warning gamers about kernel level anticheats since they were introduced, because no userland code should run with that level of privileges, period. However, people still installed those games not really understanding the threat, and that's why we have so many games with a kernel anticheat.

[–] [email protected] 29 points 3 months ago* (last edited 3 months ago)

Helldivers 2 fucked my PC up after one of their updates in May. Game literally became unplayable and corrupted my Steam database twice (causing me to have to reinstall Steam both times).

In PVP games, I can sort of understand the players' desire to have a cheat free experience, but in purely PvE coop games, it really feels so pointless and is such overkill. Regardless, there are better ways to accomplish anticheat that don't involve gaining kernel level access. The risk isn't worth it.

[–] [email protected] 6 points 3 months ago (1 children)

Because without the software, we can't play online. Full stop. Valve has tried to find another way without it and VAC2, but they keep winning and Valve gave up (seriously, play CS2, they're everywhere)

[–] [email protected] 1 points 3 months ago

You don't give your house keys to your home security system provider. Giving kernel access to anything, even if it's for your own good, is dumb. People don't understand the risks that come with it. People just think what the companies tell them to think. As a matter of fact, there are still cheaters in valorant. Vanguard isn't perfect, it can still be bypassed. VAC works fine for what it is, and it could still be refined. It bans more people monthly than Vanguard.

The biggest reason for kernel level anticheats is your sweet sweet data and more control of your computer. You don't need them. We have been playing online games since the 90s, and none used kernel anticheats. It was never necessary to sell your computer to Tencent in order to play a game which, again, still has cheaters.

[–] [email protected] 58 points 3 months ago (2 children)

Pro tip: don't install rootkits.

[–] [email protected] 17 points 3 months ago (1 children)

That unfortunately means, you can't play a lot of games. And for most people it's practically unknowable what the installer is doing, they don't expect a game to nuke their computer.

There needs to be accountability and a certain level of trust. Microsoft shouldn't allow kernel drivers for crap like anti cheat.

[–] [email protected] 13 points 3 months ago (1 children)

Yet another reason to use Linux. You don't have to know weather the installer comes with a root kit, the installer will just fail 😎

[–] [email protected] 2 points 3 months ago

That's... not remotely true? Linux can absolutely install kernel drivers. If you mean running windows games under wine then sure, but then we're no longer talking apples:apples. You could do the same thing on windows by running a game in a VM.

[–] [email protected] 2 points 3 months ago* (last edited 3 months ago)

Things we didn't think we'd have to tell people in the future.

[–] [email protected] 45 points 3 months ago* (last edited 3 months ago) (1 children)

It's also potentially a infiltration vector for malicious activity.

Genshin impacts anti-cheat has been used to enable ransomware taking over windows computers, and you don't even need to have Genshin installed.

It was a danger to all windows users just by existing, because the ransomware just came with the genshin anti-cheat, which it would install on its own. Because it was a "verified" piece of software windows would just go "oh ok seems cool, go right ahead" and the ransomware would gain complete control of the system through the anti-cheat.

[–] [email protected] 1 points 3 months ago

I'm confused. If you don't install the game, how do you end up with the game specific anti cheat software on your system?

[–] [email protected] 41 points 3 months ago

Yes, the key difference being that nobody’s playing Valorant on airport displays. Just yesterday I installed a new early access game for two accounts at home and discovered that it just wouldn’t work with the non-admin account because of anti-cheat. All of this is making me consider going back to running games under flatpak.

[–] [email protected] 36 points 3 months ago (2 children)

Helldivers 2 does the same thing. If this continues it will be extremely advisable to move any non-gaming use-cases to a different computer as you have no idea what the "anti-cheat" is doing with that level of authority over your computer.

[–] [email protected] 24 points 3 months ago (1 children)

Or just dont buy those games.

[–] [email protected] 8 points 3 months ago (3 children)

That works until all* games come with root level anti cheat. It was the same with micro transactions which people still defend despite being utter shit.

  • Realistically this will never be 100% but it will be enough of the mass market AAA games like CoD etc to mean that if you functionally want to play a game made in the last X number of years you will need to accept this or stop playing games altogether. I think most people will continue to play games. Most people will continue to install root level anti cheat, knowingly or otherwise, and all of them will get fucked by an exploit of that software. They may never even know about it.
[–] [email protected] 5 points 3 months ago

This is pretty much what I’m afraid of. Even my knowledgeable friends dismissed the implications of a root kit so they could play Helldivers. Like 2 months later and they’re sick of it, and the damage is done. That game was a massive success despite what should have stopped everyone in their tracks.

[–] [email protected] 2 points 3 months ago

I think that's the point that I start just eating the performance hit and running those games in sandboxed VMs where possible

[–] [email protected] 1 points 3 months ago

That's why piracy must continue, pirates cracking can just extend to pulling those pesky anticheats out of the single player games.

[–] [email protected] 10 points 3 months ago (1 children)

I play HD2 under proton. Even if there is a rootkit, it's sandboxed.

[–] [email protected] 6 points 3 months ago

Proton is not actually sandboxed the way an actual container is.

A) if the program running in proton was given root access in some way, say by tricking people into entering their root password for a claimed update, it would have complete normal control of your entire system just like normal.

B)apps running in proton still have access to the regular file system.

Wine isn't an emulator or a vm.

[–] [email protected] 31 points 3 months ago (1 children)

I'm less worried about bugs causing boot loops with these kernel anti cheats and more worried about security holes.

I'm sure they test these things thoroughly though and take security extremely seriously.... right?

[–] [email protected] 2 points 3 months ago

Look up that one genshin fuck up on the internet. Their kernel anticheat was used by ransomware to completely take control of people's PCs. Best part? You didn't even need to have genshin installed, because the AC was bundled with the ransomware, and Windows would install it as it was "trusted software"

[–] [email protected] 22 points 3 months ago

I'm far from an expert, but Vanguard is a kernel-level program. If a kernel-level program crashed, the whole system crashes. So yes, any kernel-level program could do the same thing CrowdStrike did, intentionally or not.

Kernel-level programs can do whatever the hell they want.

[–] [email protected] 13 points 3 months ago* (last edited 3 months ago) (1 children)

It has comparable access, yes, ~~but assuming no malicious intentions, it's extremely unlikely that they achieve something as catastrophic.~~

~~If they fucked up in a similar fashion, that would cause your PC to bluescreen, too, but since League does not start up during boot, you could still use your PC, just not League.~~

Nope.

[–] [email protected] 27 points 3 months ago (2 children)

Vanguard doesn't care if LoL or valorant or any other game is running. Vanguard is in your kernel and will be starting regardless.

[–] [email protected] 12 points 3 months ago (2 children)

This is correct, as in windows a driver is the most straightforward method to runlevel0 access. It absolutely could at any time do exactly what crowdstrike did. But also so could Nvidia/amd with GPU drivers, your motherboard manufacturer with chipset and RGB drivers, etc. it's not quite the smoking gun people make it out to be, as there are a lot of legitimate reasons to have this kind of system access.

The egregious part was that crowdstrike users agreed to allow a vendor to bypass canary channels and deploy straight to their endpoints.

[–] [email protected] 5 points 3 months ago* (last edited 3 months ago) (1 children)

And that's the problem, like CrowdStrike Vanguard will update itself in the background unlike your GPU driver which you need to go through an update process explicitly, so if the same thing happens where they pushed a bad update, the same outcome of causing failed boots without prompt could happen.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago)

Does Vanguard not seek testing and validation by Microsoft before pushing updates?

I saw the recent video from the Task Manager designer Dave's Garage on YouTube, lack of thorough official validation seemed to be an important part of the CrowdStrike problem.

[–] [email protected] 0 points 3 months ago

What non algorith streaming sites are there? The reason these people appear to be in the majority is because most people who agree wont post " i agree with the protests" under those yea but windows amd etc get through the microsoft driver signing wich is the process where microsoft checks if the drivernis broken or not. The crowdstrike driver got its updates via microcode. Think off the driver as a engine that runs code from a file. The druver was signed but the code it exevuted was broken. I dont know how vanguard handels updates but i guess they take a similar approach as crowdstroke did and only got their "engine" signed but kot the actual code that the driver executes. Else they need to resign their driver every time they donupdates and that wouΓΆd be costry and slow.

[–] [email protected] 6 points 3 months ago* (last edited 3 months ago)

Huh, seems like you're right:

Riot Vanguard is an on-boot application. That means if you do choose to disable it and later decide you’d like to play VALORANT, you will have to restart your computer.

https://support-valorant.riotgames.com/hc/en-us/articles/360046160933-What-is-Vanguard

I guess, it's only user-space drivers which Windows can load at runtime then?
At least, I'm hoping that's a technical limitation of Windows. Otherwise, this is fucking stupid.

Well, it always is fucking stupid, but it would be even more so.

[–] [email protected] 11 points 3 months ago* (last edited 3 months ago) (2 children)

Theoretically it should only be running during gameplay, and that's probably true as I'm sure security researchers would've pointed it out if games installed a persistently running rootkit. So it's different than Crowdstrike which was running immediately from boot.

So there is that, if it caused your PC to crash it should be fine after reboot. The driver has God power though as far as your PC goes so if it was the point of entry for a malicious attack you could be really screwed.

Edit: apparently I'm wrong and it runs all the time what the fuck

[–] [email protected] 23 points 3 months ago

Vanguard is always running at all times.

Honestly no idea why it isn't considered malware.

[–] [email protected] 10 points 3 months ago

It runs all the time and launches during boot. A ring0 anticheat that only runs while the game is running would be even more pointless

[–] [email protected] 11 points 3 months ago

Preface: I'm not an expert in this yet but I'm pretty interested in learning about systems-level topics so if I'm wrong please correct me!

Yes, the thing about anticheats and anti viruses is that they are only useful when they have access to the underlying resources that a virus or cheat engine might try to modify. In other words, if cheating software is going to use kernel-level access to modify the game, then an anticheat would also need kernel-level access to find that software. It very quickly became an arms race to the lowest level of your computer. It's the same with anti viruses.

IMO the better strategy would be to do verification on a server level, but that probably wouldn't be able to catch a lot of cheats like wall hacks or player outlines. At some point you just have to accept that some cheaters are going to get through and you'll have to rely on a user-reporting system to get cheaters because there will always be a way to get past the anticheats and installing a separate rootkit for each game isn't exactly a great idea.

[–] [email protected] -1 points 3 months ago (1 children)

In theory, yes. Vanguard uses ring 0 access; and Failures/crashes on the code that are running on that level will lead to BSOD.

In practice, Riot very likely tests Vanguard on various hardware as parts of their tests before shipping updates on it, as it's used by all players that play Lol and Valorant; and a fuckup like that would mess the trust they've built between the players. Players are trusting them to run ring 0 code on their computer, so they can have a cheatless experience after all.

[–] [email protected] 51 points 3 months ago (1 children)

In practice, CrowdStrike very likely tests Falcon on various hardware as parts of their tests before shipping updates on it, as it's used by a huge amount of enterprises; and a fuckup like that would mess the trust they've built with those enterprises. Enterprises are trusting them to run ring 0 code on their computer, so they can have a malware-less experience after all.

[–] [email protected] 8 points 3 months ago

Welp, they're a good example of what happens if they don't do proper testing.