this post was submitted on 22 Jul 2024
390 points (97.8% liked)

Technology

68567 readers
4521 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 45 comments
sorted by: hot top controversial new old
[–] [email protected] 128 points 8 months ago (2 children)

To avoid such issues in the future, CrowdStrike should prioritize rigorous testing across all supported configurations.

Bold of them to assume there's a future after a gazillion off incoming lawsuits.

[–] [email protected] 25 points 8 months ago (3 children)

They mean after Crowdstrike gets sold, the new company promises a more rigorous QA, and quietly rebrands it.

[–] [email protected] 16 points 8 months ago

Slorp is now Bonto!

[–] [email protected] 3 points 8 months ago (1 children)
[–] [email protected] 2 points 8 months ago

What are you doing Counterstrike

[–] [email protected] 3 points 8 months ago

I think you mean after they sell their assets to a new company. Leave the lawsuits with the old company who will shut down.

[–] [email protected] 74 points 8 months ago (3 children)

Additionally, organizations should approach CrowdStrike updates with caution

We would if we were able to control their "deployable content".

[–] [email protected] 36 points 8 months ago* (last edited 8 months ago)

I read on another thread that an admin was emulating a testing environment by blocking CrowdStrike IPs on their firewall for the whole network before each update, with the exception of a couple machines. It's stupid that he has to do this but hey, his network was unaffected

[–] [email protected] 7 points 8 months ago (1 children)

Serious question, can you not? There isn't an option to...like...set a review system first?

[–] [email protected] 15 points 8 months ago (1 children)

For antivirus definitions? No, and you wouldn’t want to.

[–] [email protected] 6 points 8 months ago (1 children)

But it sounds like this added files / drivers or something, not just antivirus rules?

[–] [email protected] 3 points 8 months ago

We would if we were able to control their “deployable content”.

Minimum safe distance.

[–] [email protected] 62 points 8 months ago (2 children)

But I've read so many posts on here about how Linux is flawless!

[–] [email protected] 46 points 8 months ago (1 children)

not sure if you're being sarcastic, but if anything this news paints linux deployment in an even better light.

[–] [email protected] 12 points 8 months ago

This is good for Bitcoin

[–] [email protected] 19 points 8 months ago (1 children)

Are you shocked that bad software can crash multiple operating systems or something?

[–] [email protected] 45 points 8 months ago (3 children)

Nah, but there were some Linux evangelists claiming this couldn't possibly happen to Linux and it only happened to Windows because Windows is bad. And it was your own fault for getting this BSOD if you're still running Windows.

And sure, Windows bad and all, but this one wasn't really Microsofts fault.

[–] [email protected] 8 points 8 months ago* (last edited 8 months ago)

The sane ones of us know well that a faulty driver is a faulty driver, but! Linux culture is different. Which is why this happened so spectacularly with Windows. EDIT: and not with Linux

[–] [email protected] 0 points 8 months ago (1 children)
[–] [email protected] 11 points 8 months ago (1 children)

Yeah, it supports kernel modules, so is also vulnerable to bad third party kernel code.

[–] [email protected] 6 points 8 months ago (2 children)

🤔if nobody makes a third party kernel module, then there is still no risk

[–] [email protected] 4 points 8 months ago

Security through apathy!

[–] [email protected] 4 points 8 months ago

Also, even if they do, you can choose to not load it.

It amused me that so many people had this installed, but had no idea what it was for.

[–] [email protected] -3 points 8 months ago

if they dont know the boot sequence is a thing maybe their opinion on this doesnt really matter 🤷🏼

[–] [email protected] 10 points 8 months ago (1 children)

Companies don't really use Debian or Rocky in widescale production because they have no support.

Now red hat or ubuntu is a different matter.

Honestly though this does point out that this is a pattern of behavior on crowdstrikes part. This should have been the canary in the coalmine.

[–] [email protected] 1 points 8 months ago

We actually use rocky and I think Debian at work for servers. We are currently migrating away from EOL centos .

[–] [email protected] 2 points 8 months ago (2 children)

In April, a CrowdStrike update caused all Debian Linux servers in a civic tech lab to crash simultaneously and refuse to boot.

And then, you boot their servers from a Linux Live USB, run TimeShift to restore the last system snapshot, refuse the latest patch from Cloudstrike and they all lived happily ever after.

[–] [email protected] 1 points 8 months ago

None of these things are used in actual server operations.

[–] [email protected] 1 points 8 months ago

And it's not much more difficult to fix on Windows, except for the scale of the problem.

[–] [email protected] -1 points 8 months ago

Because Linux sysadmins know to test a fucking update before applying to the whole company

[–] [email protected] -1 points 8 months ago (1 children)

I recently learned that this is the same company that gave us the bs Russia Gate.

[–] [email protected] 2 points 8 months ago* (last edited 8 months ago) (1 children)

So who do you think hacked the DNC and got their emails, then? Is it the same people who hacked the RNC but didn't leak the emails? What makes you more qualified than CrowdStrike on this?

[–] [email protected] 0 points 8 months ago

U.S. intelligence officials cannot make definitive conclusions about the hacking of the Democratic National Committee computer servers because they did not analyze those servers themselves. Instead, they relied on the forensics of CrowdStrike, a private contractor for the DNC that was not a neutral party, much as “Russian dossier” compiler Christopher Steele, also a DNC contractor, was not a neutral party. This puts two Democrat-hired contractors squarely behind underlying allegations in the affair – a key circumstance that Mueller ignores.