TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Technical Details on Today's Outage

124 pointsby xjia10 months ago

19 comments

dang10 months ago
Related ongoing thread:<p><i>CrowdStrike Update: Windows Bluescreen and Boot Loops</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41002195">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41002195</a> - July 2024 (3590 comments)
PedroBatista10 months ago
Light on technical and light on details.<p>Putting the actual blast radius aside, this whole thing seems a bit amateurish for a &quot;security company&quot; that pulls the contracts they do.
评论 #41014414 未加载
评论 #41013714 未加载
评论 #41014016 未加载
tail_exchange10 months ago
Can someone who actually understands what CrowdStrike does explain to me why on earth they don&#x27;t have some kind of gradual rollout for changes? It seems like their updates go out everywhere all at once, and this sounds absolutely insane for a company at this scale.
评论 #41013469 未加载
评论 #41013642 未加载
评论 #41013512 未加载
评论 #41013509 未加载
评论 #41013454 未加载
评论 #41013482 未加载
评论 #41014701 未加载
评论 #41013500 未加载
rdtsc10 months ago
&gt; The update that occurred at 04:09 UTC was designed to target newly observed, malicious named pipes being used by common C2 frameworks in cyberattacks<p>The obvious joke here is CS runs the malicious C2 framework. So the system worked as designed: it prevented further execution and quarantined the affected machines.<p>But given they say that’s just a configuration file (then why the hell is it suffixed with .sys?), it’s actually plausible. A smart attacker could disguise themselves and use the same facilities as the CS. CS will try to block them and blocks itself in the process?
nonfamous10 months ago
&gt;&gt;&gt; Systems that are not currently impacted will continue to operate as expected, continue to provide protection, and have no risk of experiencing this event in the future.<p>Given that this incident has now happened twice in the space of months (first on Linux, then on Windows), and that as stated in this very post the root cause analysis is not yet complete, I find that statement of “NO RISK” very hard to believe.
ungreased067510 months ago
This seems very unsatisfying. Not sure if I was expecting too much, but that’s a lot of words for very little information.<p>I’d like more information on how these Channel Files are created, tested, and deployed. What’s the minimum number of people that can do it? How fast can the process go?
hatsunearu10 months ago
I&#x27;m not a big expert but honestly this read like a bunch of garbage.<p>&gt; Although Channel Files end with the SYS extension, they are not kernel drivers.<p>OK, but I&#x27;m pretty sure usermode software can&#x27;t cause a BSOD. Clearly something running in kernel mode ate shit and that brought the system down. Just because a channel file not in kernel mode ate shit doesn&#x27;t mean your kernel mode software isn&#x27;t culpable. This just seems like a sleezy dodge.
评论 #41013458 未加载
评论 #41013430 未加载
评论 #41013496 未加载
patrickthebold10 months ago
&gt;The configuration update triggered a logic error that resulted in an operating system crash.<p>&gt; We understand how this issue occurred and we are doing a thorough root cause analysis to determine how this logic flaw occurred.<p>There&#x27;s always going to be flaws in the logic of the code, the trick is to not have single errors be so catastrophic.
评论 #41013590 未加载
pneumonic10 months ago
&gt; we are doing a &quot;root cause analysis to determine how this logic flaw occurred&quot;<p>That&#x27;s going to find a cause: a programmer made an error. That&#x27;s not the root of the problem. The root of the problem is allowing such an error to be released (especially obvious because of its widespread impact).
kyriakos10 months ago
Why is everyone blaming Microsoft? Is this something of an oversight in their side too? Can someone explain?
评论 #41017610 未加载
评论 #41014309 未加载
jchiu110610 months ago
Where are the technical details?
评论 #41013874 未加载
评论 #41032953 未加载
评论 #41013464 未加载
isthisreallife210 months ago
So - a malformed configuration is capable of crashing a kernel process. Sounds very exploitable. Very
canistel10 months ago
&gt; This issue is not the result of or related to a cyberattack.<p>Must be corrected to &quot;the issue is not the result of or related to a cyberattack by <i>external agents</i>&quot;.
geuis10 months ago
Weak.<p>Very weak and over corporate level of ass covering. And it doesn&#x27;t even come close to doing that.<p>They should just let the EM of the team involved provide a public detailed response that I&#x27;m sure is floating around internally. Just own the problem and address the questions rather than trying to play at politics, quite poorly.
0nate10 months ago
The lower you go in system architecture, the greater the impact when defects occur. In this instance, the Crowdstrike agent is embedded within the Windows Kernel, and registered with the Kernel Filter Engine illustrated in the diagram below.<p><a href="https:&#x2F;&#x2F;www.nathanhandy.blog&#x2F;images&#x2F;blog&#x2F;OSI%20Model%20in%20Practice%20v1.1%20-%20SingleSystem%20-%20Large.png" rel="nofollow">https:&#x2F;&#x2F;www.nathanhandy.blog&#x2F;images&#x2F;blog&#x2F;OSI%20Model%20in%20...</a><p>If the initial root cause analysis is correct, Crowdstrike has pushed out a bug that could have been easily stopped had software engineering best practices been followed: Unit Testing, Code Coverage, Integration Testing, Definition of Done.
automatoney10 months ago
To my biased ears it sounds like these configuration-like files are a borderline DSL that maybe isn&#x27;t being treated as such. I feel like that&#x27;s a common issue - people assume because you call it a config file, it&#x27;s not a language, and so it doesn&#x27;t get treated as actual code that gets interpreted.
bryan_w10 months ago
It kinda feels like someone added a watch for c:\COM\COM like we did back in the day on AOL
timbelina10 months ago
Can someone aim me at some RTFM that describes the sensor release and patching process, please? I&#x27;m lost trying to understand: When a new version &#x27;n&#x27; of the sensor is released, we upgrade a selected batch of machines and do some tests (mostly waiting around :-)) to see that all is well. Then we upgrade the rest of the fleet by OU. However, &#x27;cause we&#x27;re scaredy cats, we leave some critical kit on n-1 for longer. And some really critical kit even on n-2. (Yeah, there&#x27;s a risk in not applying patches I know but there are other outage-related risks that we balance; forget that for now) Our assumption is that n-1, n-2, etc are old, stable releases, and so when fan and shit collided yesterday, we just hopped on the console and did a policy update to revert to n-2 and assumed we&#x27;d dodged the bullet. But of course, that failed... you know what they say about assumptions :-) So in a long-winded way that leads to my three questions: Why did the &#x27;content update&#x27; take out not just n but n-whatever sensors equally as effectively? Are the n-whatever versions not actually stable? And if the n-whatever versions are not actually stable and are being patched, what&#x27;s the point of the versioning? Cheers!
xyst10 months ago
“Technical” detail report reads more like a lawyer generated report. This company is awful.<p>If I ever get a sales pitch from these shit brains, they will get immediately shut down.<p>Also fuck MS and their awful operating system that then spawned this god awful product&#x2F;company known as “CrowdStike Falcon”
评论 #41013911 未加载
评论 #41016934 未加载
评论 #41013644 未加载