TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Systemd Talks Up Automatic Boot Assessment in Light of the CrowdStrike Outage

13 pointsby madspindel10 months ago

5 comments

foresto10 months ago
Ever since systemd landed in the distros I use (Debian &amp; family), that project has been <i>by far</i> the single most common cause of breakage on the systems for which I am responsible.<p>However good or bad the intentions and ideas here might be, the project has demonstrated many times over that it is not capable of reliably filling the roles to which it aspires. I&#x27;m not interested in extending its reach even further.<p>In short, no thanks.
评论 #41038442 未加载
rlpb10 months ago
Ubuntu uses grub recordfail and has done so for years. Userspace records if the boot was successful and the bootloader can use this to change it&#x27;s behaviour (eg. boot a previous kernel). I think by default it stops at the boot menu for user intervention but on a headless system you can configure it to automatically boot the previous kernel&#x2F;initrd instead. I think Debian has the same but I&#x27;m not sure.<p>Ubuntu Core (eg. for the upcoming immutable desktop) also supports this kind of thing fully automatically.<p>So it&#x27;s not just systemd and the alternatives are widely deployed already.<p>But anyway as others point out it won&#x27;t mitigate risk on a system that injects bad code from outside of the boot process.
greatgib10 months ago
Lennart is omitting to say that systemd is probably responsible for that much worse terrible crashes than CrowdStrike.<p>It&#x27;s probably the worse thing to do to give the key to the boot kingdom to systemd, doing random things to your configuration when it feels so...
westurner10 months ago
&gt; <i>The only problem? Major Linux distributions aren&#x27;t yet onboard with using the Automatic Boot Assessment feature.</i><p>systemd.io&#x2F;AUTOMATIC_BOOT_ASSESSMENT&#x2F; : <a href="https:&#x2F;&#x2F;systemd.io&#x2F;AUTOMATIC_BOOT_ASSESSMENT&#x2F;" rel="nofollow">https:&#x2F;&#x2F;systemd.io&#x2F;AUTOMATIC_BOOT_ASSESSMENT&#x2F;</a><p>From <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29995566">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29995566</a> :<p>&gt; <i>Which distro has the best out-of-the-box output for:?</i><p><pre><code> systemd-analyze security </code></pre> &gt; <i>Is there a tool like `audit2allow` for systemd units?</i><p>And also automatic variance in boot sequences with timeouts.<p>Where does it explain that a systemd service unit is always failing at boot?
评论 #41037180 未加载
salawat10 months ago
Lennart is talking out of his ass, as the implication with CrowdStrike is that the Falcon module would have been running well for a while before the content update, and would only have fallen over once the agent looked for the new content update on system and tried to load it.<p>Any assessment systemd could have done would see failure to boot, and would either try to roll back to a kernel with an old agent module version, which would probably do the same thing, or go back to a kernel without the Crowd Strike Module at all if available.<p>Computers aren&#x27;t magic. They don&#x27;t know things. They can&#x27;t bisect their own configuration or intuit what subcomponent caused what behavior. That&#x27;s your job.
评论 #41037130 未加载