this post was submitted on 19 Jul 2024
137 points (100.0% liked)

linuxmemes

28504 readers
1153 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     

    CrowdStrike effectively bricked windows, Mac and Linux today.

    Windows machines won’t boot, and Mac and Linux work is abandoned because all their users are on twitter making memes.

    Incredible work.

    top 50 comments
    sorted by: hot top controversial new old
    [–] SexualPolytope@lemmy.sdf.org 19 points 1 year ago (2 children)

    Come on, it was right in their name. CrowdStrike. They were threatening us all this time.

    [–] mortemtyrannis@lemmy.ml 6 points 1 year ago* (last edited 1 year ago)

    We formed a crowd, then BAM, they striked.

    We should have seen this coming!!!

    [–] El_guapazo@lemmy.world 1 points 1 year ago

    Clown strike

    [–] Klanky@sopuli.xyz 11 points 1 year ago (1 children)

    I wish my Windows work machine wouldn’t boot. Everything worked fine for us. :-(

    [–] Affidavit@lemm.ee 4 points 1 year ago (2 children)

    Could be worse. I was the only member of my entire team who didn't get stuck in a boot loop, meaning I had to do their work as well as my own... Can't even blame being on Linux as my work computer is Windows 11, I got 'lucky'; I just got a couple of BSODs and the system restarted just fine.

    [–] Rivalarrival@lemmy.today 3 points 1 year ago (1 children)

    Funny, mine did a couple BSODs then restarted just fine, at first. Then a fist shaped hole appeared in the monitor and it wouldn't turn on again.

    Weird bug.

    [–] Ransack@lemmy.dbzer0.com 1 points 1 year ago (1 children)

    Lol why is it always the monitor to get beat. It only has one job, just to show you what the computer is outputting lol

    why is it always the monitor to get beat

    Because it's within arm's reach and the developers aren't.

    You're a much more honest person than I am. I'd have just claimed mine was BSODing too.

    [–] snausagesinablanket@lemmy.world 5 points 1 year ago (2 children)

    Imagine this happening during open heart surgery and all the monitors go blue!

    [–] AnxiousOtter@lemmy.world 4 points 1 year ago (2 children)

    Good lord I would hope critical surgical computers like that aren't networked externally... Somehow I'm guessing I'm wrong.

    [–] Hupf@feddit.de 7 points 1 year ago (1 children)

    Fear not, that's why we deploy extra security software to these critical systems. It's called Crowdsource or something.

    [–] harrys_balzac@lemmy.dbzer0.com 3 points 1 year ago (1 children)
    [–] BakedCatboy@lemmy.ml 3 points 1 year ago

    CohortAttack?

    [–] LaFinlandia@sopuli.xyz 1 points 1 year ago

    Maybe not everywhere, but all of ours are air gapped.

    [–] half@lemy.lol 1 points 1 year ago (2 children)

    Anecdotal, but my spouse was in surgery during the outage and it went fine, so I imagine they take precautions (like probably having a test machine for updates before they install anything on the real one, maybe)

    [–] Zacryon@feddit.org 1 points 1 year ago (1 children)

    Depending on the machine, I guess it's likely that those aren't using Windoofs at all. I would be surprised if there were devices in use during surgery who run on that.

    [–] Rivalarrival@lemmy.today 2 points 1 year ago

    Any critical devices should be airgapped while in service.

    [–] Blank@lemmy.world 1 points 1 year ago

    There were no test rings for this one and it wasn't a user controlled update. It was pushed by CS in a way that couldn't be intercepted/tested/vetted by the consumer unless your device either doesn't have CS installed or isn't on an external network.. or I suppose you could block CS connections at the firewall. πŸ€·β€β™‚οΈ

    [–] PrettyFlyForAFatGuy@feddit.uk 3 points 1 year ago* (last edited 1 year ago) (1 children)

    As a career QA, i just do not understand how this got through? Do they not use their own software? Do they not have a UAT program?

    Heads will roll for this

    [–] HyperMegaNet@lemm.ee 1 points 1 year ago (1 children)

    From what I've read, it sounds like the update file that was causing the problems was entirely filled with zeros; the patched file was the same size but had data in it.

    My entirely speculative theory is that the update file that they intended to deploy was okay (and possibly passed internal testing), but when it was being deployed to customers there was some error which caused the file to be written incorrectly (or somehow a blank dummy file was used). Meaning the original update could have been through testing but wasn't what actually ended up being deployed to customers.

    I also assume that it's very difficult for them to conduct UAT given that a core part of their protection comes from being able to fix possible security issues before they are exploited. If they did extensive UAT prior to deploying updates, it would both slow down the speed with which they can fix possible issues (and therefore allow more time for malicious actors to exploit them), but also provide time for malicious parties to update their attacks in response to the upcoming changes, which may become public knowledge when they are released for UAT.

    There's also just an issue of scale; they apparently regularly release several updates like this per day, so I'm not sure how UAT testing could even be conducted at that pace. Granted I've only ever personally involved with UAT for applications that had quarterly (major) updates, so there might be ways to get it done several times a day that I'm not aware of.

    None of that is to take away from the fact that this was an enormous cock up, and that whatever processes they have in place are clearly not sufficient. I completely agree that whatever they do for testing these updates has failed in a monumental way. My work was relatively unaffected by this, but I imagine there are lots of angry customers who are rightly demanding answers for how exactly this happened, and how they intend to avoid something like this happening again.

    [–] WhyFlip@lemmy.world 1 points 1 year ago (1 children)

    If only there were a way to check a file's integrity.

    [–] smb@lemmy.ml 1 points 1 year ago

    or maybe even automatically like in any well done CD or CI environment. at least their customers now know that they ARE the only test environment CS actually has or uses. Β―_(ツ)_/Β―

    "if only" - poem ("3 seconds" edition):

    if only.

    if only there would exist CEOs in the world that could learn from their noob-dumb-brain-dead-faults instead of always ever speaking about their successes which were always-ever really done by others instead.

    if only.

    if only there were shareholders willing to really look at that wreck that tells all his false success storys and lies, so CEOs could then maybe develop at least a minimum of willingness to learn. maybe a minimum of 3 seconds of learning per decade and per ceo could already help lots of companies a really huge lot.

    if only.

    if only there was damage compensation in effect so that shareholders would be actually willing to take at least some seconds - maybe 3 seconds of really looking at new CEOs could already help, but its only shareholders, not sure if they would be able to concentrate that long or maybe are already too much degenerated over the generations of beeing parasitic only - to look at the CEOs and the damage they cause before giving them ability to cause that damage over and over again.

    if only.

    [–] mogoh@lemmy.ml 3 points 1 year ago

    on twitter?!?

    [–] bappity@lemmy.world 2 points 1 year ago* (last edited 1 year ago) (3 children)

    ~~cloudstrike~~ crowdstrike should be sued into hell

    [–] GregorTacTac@lemm.ee 1 points 1 year ago (1 children)
    [–] Prunebutt@slrpnk.net 1 points 1 year ago (1 children)
    [–] Land_Strider@lemmy.world 2 points 1 year ago (1 children)

    Counter Stri... no not that.

    [–] bappity@lemmy.world 2 points 1 year ago

    "the bomb has been planted" - the intern that pushed the update at crowd strike or whatever

    [–] smb@lemmy.ml 1 points 1 year ago

    well maybe letting them pay compensation to all(!) victims (not just their customers) for all losses including lost time already would solve that problem.

    that would leave the decades-long unsolved problem of microsoft not beeing held liable for their buggy products (which is the reason for all security-products-as-a-workaround-to-compensate-that-crappy-os companies existance) open.

    why not in general hold companies liable for the damage they cause so they CAN develop beeing more cautious with what they do? i mean not ONLY cs should be sued to hell, but ALL of them should be sued until they are reasonable cautious with all possible damages they can cause (and already did in the past)

    Better rebrand to Clownstrife I guess.

    [–] muntedcrocodile@lemm.ee 2 points 1 year ago

    Let your plans be dark and impenetrable as night. And when you strike fall like a thunderbolt.

    [–] danc4498@lemmy.world 1 points 1 year ago (2 children)

    Is there a good eli5 on what crowdstrike is, why it is so massively used, why it seems to be so heavily associated with Microsoft and what the hell happened?

    [–] Baggie@lemmy.zip 5 points 1 year ago (1 children)

    Gonna try my best here:

    Crowdstrike is an anti-virus program that everyone in the corporate world uses for their windows machines. They released a update that made the program fail badly enough that windows crashes. When it crashes like this, it tries to restart in case it fixes the issue, but here it doesn't, and computers get stuck in a loop of restarting.

    Because anti-virus programs are there to prevent bad things from happening, you can't just automatically disable the program when it crashes. This means a lot of computers cannot start properly, which means you also cannot tell the computers to fix the problem remotely like you usually would.

    The end result is a bunch of low level techs are spending their weekends manually going to each computer individually, and swapping out the bad update file so the computer can boot. It's a massive failure on crowdstrikes part, and a good reason you shouldn't outsource all your IT like people have been doing.

    [–] themeatbridge@lemmy.world 2 points 1 year ago (1 children)

    It's also a strong indicator that companies are not doing enough to protect their own infrastructure. Production servers shouldn't have third party software that auto-updates without going through a test environment. It's one thing to push emergency updates if there is a timely concern or vulnerability, but routine maintenance should go through testing before being promoted to prod.

    [–] PainInTheAES@lemmy.world 1 points 1 year ago

    It's because this got pushed as a virus definition update and not a client update bypassing even customer staging rules that should prevent issues like this. Makes it a little more understandable because you'd want to be protected against current threats. But, yeah should still hit testing first if possible.

    [–] captain_aggravated@sh.itjust.works 2 points 1 year ago (10 children)

    Crowdstrike is a cybersecurity company that makes security software for Windows. It apparently operates at the kernel-level, so it's running in the critical path of the OS. So if their software crashes, it takes Windows down with it.

    This is very popular software. Many large entities including fortune 500 companies, transport authorities, hospitals etc. use this software.

    They pushed a bad update which caused their software to crash, which took Windows down with it on an extremely large number of machines worldwide.

    Hilariously bad.

    [–] smb@lemmy.ml 0 points 1 year ago (2 children)

    This is very popular software.

    if that's a "good" argument for you, then i've already heared that, and it nearly never really fits. here is another one for you that is an argument as generic as yours: "maybe try eating poo, trillions of flies cannot be wrong, poo is VERY popular food, much more popular than any human food !!! (as in mass per day as well as in its number of consumers)"

    load more comments (2 replies)
    load more comments (9 replies)

    Lol, they only bricked specific machines running their product. Everyone else was fine.

    This was a business problem, not a user problem.

    load more comments
    view more: next β€Ί