TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Microsoft technical breakdown of CrowdStrike incident

415 pointsby nar00110 months ago

22 comments

rdtsc10 months ago
&gt; We plan to work with the anti-malware ecosystem to take advantage of these integrated features to modernize their approach, helping to support and even increase security along with reliability.<p>&gt; Providing safe rollout guidance, best practices, and technologies to make it safer to perform updates to security products.<p>&gt; Reducing the need for kernel drivers to access important security data.<p>They are being as diplomatic as they can, but it&#x27;s definitely a slap to CS. Read as &quot;they don&#x27;t know how to roll things out, they need guidance on basic QA practices, we&#x27;ll happily teach them...&quot;. Then, they list a set of facilities running in user-mode to avoid needing to run as many things in kernel mode.<p>I would be interested what the water cooler discussion about CS was like inside Microsoft. Especially in teams needed to respond to customers about &quot;Your windows OS is broken, our hospital patients are suffering...&quot;.
评论 #41097063 未加载
评论 #41096317 未加载
评论 #41095939 未加载
评论 #41095929 未加载
评论 #41097332 未加载
评论 #41096639 未加载
评论 #41098057 未加载
评论 #41103154 未加载
评论 #41100897 未加载
评论 #41099158 未加载
评论 #41095854 未加载
dmattia10 months ago
I suppose I was expecting something more authoritative here. They confirm that there was an attempted read-out-of-bounds, as CrowdStrike said, but that&#x27;s not really new information at this point. I suppose we&#x27;ll need to wait for more detailed analysis from CrowdStrike at some point.<p>This post explains why security software has historically run in kernel-mode, and really seems to be pushing new technology that Microsoft has that would push security vendors into user-mode (with APIs that attempt to assist with many of the reasons why they have historically used kernel-mode).<p>Crowdstrike already runs in user-mode on both Mac and Linux (from what I can tell), and it seems like running in user-mode on Windows would significantly lessen the risk of catastrophic failures like a blue-screen-of-death. I know the bulk of the failures here belong to CrowdStrike, but I can&#x27;t help but think about the fact that Apple kicked security vendors out of kernel-mode a ways back, and that if Windows had done similarly, an issue like this probably wouldn&#x27;t have been possible. By even offering kernel-mode options to external vendors, I believe Microsoft is creating risk for themselves.
评论 #41095784 未加载
评论 #41095983 未加载
评论 #41095873 未加载
评论 #41095866 未加载
评论 #41095808 未加载
评论 #41096067 未加载
Animats10 months ago
So how did this kernel level driver get through WHQL verification? The Static Driver Verifier should have caught this.[1] Do some security vendors get to bypass that? Microsoft is very quiet about that.<p>That&#x27;s the sort of thing a negligence lawyer focuses on. Partner at Brown Rudrick: <i>&quot;The most likely legal theory will be one of negligence. [Congress] will drag the guy over the coals, they&#x27;ll maybe implicate him and his company and put in place a negligence action. There&#x27;ll maybe be a couple of plaintiffs lawyers who dig up some exceptional theory on negligence, and get some class action lawsuits going. Again, we still don&#x27;t know all the facts in this case, and there are other dimensions which have not yet been fully explored, including how CrowdStrike had access to kernel level updates on the Microsoft operating system? How come Microsoft didn&#x27;t have any control over these updates being pushed on their kernel?&quot;</i><p>The first two class actions are already starting.<p>[1] <a href="https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;windows-hardware&#x2F;drivers&#x2F;devtest&#x2F;static-driver-verifier" rel="nofollow">https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;windows-hardware&#x2F;drivers&#x2F;d...</a><p>[2] <a href="https:&#x2F;&#x2F;www.channele2e.com&#x2F;analysis&#x2F;crowdstrike-legal-and-liability-implications-as-recovery-progresses" rel="nofollow">https:&#x2F;&#x2F;www.channele2e.com&#x2F;analysis&#x2F;crowdstrike-legal-and-li...</a>
评论 #41097485 未加载
评论 #41097439 未加载
akira250110 months ago
&gt; where security and availability are non-negotiable.<p>Yep. You just have to pretend that everyone who deployed Windows had an actual competitive choice available to them.<p>&gt; A second benefit of loading into kernel mode is tamper resistance.<p>I guess availability is negotiable after all.
评论 #41095824 未加载
squirrel10 months ago
Telling that there’s no mention of eBPF, which is standard on Linux and available on Windows, but hasn’t been brought into the main Windows OS. Static analysis might or might not have caught the Blue Friday bug, but it certainly increases the protection level over the current do-as-you-wish model for kernel modules.
EasyMark10 months ago
Oh I like this breakdown a lot. Fairly technical, links to resources used, flow of debug process, didn’t get lost in a the weeds of details and how clever they were. I wish more debug retrospectives were like this. It seems like you end up with 100 pages of analysis or a couple of vague paragraphs.
userbinator10 months ago
I&#x27;m going to be the controversial one here and say that, as bad as CrowdStrike was, the alternative of having only Microsoft be able to decide what people can do is far worse. I&#x27;ve already seen many others trying to use this incident to advocate for digital totalitarianism.
评论 #41097413 未加载
superposeur10 months ago
I’m surprised no one has yet noted that Microsoft itself is a chief CrowdStrike competitor.
评论 #41096342 未加载
zh310 months ago
I do have to wonder how many agonising layers of review this went through with the marketing and legal departments as part of shifting the blame.<p>If you want to decide which OS&#x2F;distros to avoid for critical stuff, look to see who&#x27;s learning from the incident (even if not bitten by it) compared to those saying &quot;it wasn&#x27;t our fault&quot; (and that&#x27;s not just MS).
tonymet10 months ago
Did either release from MS or Crowdstrike explain how this crash bypassed QC? I&#x27;m still baffled that a 100% repro crash even made it anywhere near the later stages of QC. This is something easily caught by the earliest CI phases , at the developer and at least first build automation phase, let alone human QC.
评论 #41100017 未加载
评论 #41096440 未加载
评论 #41096576 未加载
jacobgorm10 months ago
I used to work on Control Flow Integrity (CFI&#x2F;XFI) research at places like MSR Silicon Valley and VMware, as far back as 2006. Back then, sandboxing a kernel module like ramdisk.sys was doable with a lot of binary rewriting magic, and later with custom LLVM passes, but nowadays it should be a simple matter of compiling the code with clang and the appropriate flags, to completely rule out this type of memory safety error, turning a BSOD into a polite log message and disabling the faulty driver.
评论 #41095777 未加载
评论 #41095748 未加载
eqvinox10 months ago
&gt; Move tool-tip APIs from kernel to user mode<p>?!?!
WalterBright10 months ago
What I heard is that CrowdStrike normally rate limits pushing a fix. This is so that if the fix is bad, the damage is limited. But for some reason, the rate limiter was turned off and the update went out to everyone.
评论 #41098486 未加载
waterTanuki10 months ago
I am still to this day gobsmacked how a company the size of Microsoft doesn&#x27;t do all of it&#x27;s security in-house like Apple, which locked down kernel access to macos some time ago. The blame is mostly on CrowdStrike, but Microsoft does share responsibility in allowing third-parties to pepper the kernel with whatever code they want to.
评论 #41097605 未加载
评论 #41097702 未加载
ldjkfkdsjnv10 months ago
The true story is that I bet some major divisions of Crowdstrike are ran by non technical people that got there through non meritocratic means. Theres generally been no repercussions for their underperformance, much like boeing. Crowdstrike business is built on relationships, not technical supremacy. And bada bing bada boom, we have a complete failure of basic technical competency (no rigourous role out process).
评论 #41095767 未加载
评论 #41095789 未加载
gjsman-100010 months ago
Reminder that Microsoft <i>could</i> have programmed Windows to notice if a driver has caused a blue screen three times in a row, and prompt if you want to disable the driver on boot. After all, Windows <i>already</i> collects how many times a driver causes a crash. This would have made recovery one click instead of heading into Safe Mode and needing BitLocker keys.<p>But they didn’t.<p>And Microsoft, I argue, <i>also</i> has blood on their hands for every hospital this hit. Giving users a prompt to disable the driver, after three successive failed boots, would have saved lives.
评论 #41096668 未加载
评论 #41096292 未加载
评论 #41096383 未加载
评论 #41096143 未加载
评论 #41098129 未加载
评论 #41096429 未加载
评论 #41095980 未加载
评论 #41095941 未加载
评论 #41095793 未加载
评论 #41095827 未加载
rldjbpin10 months ago
one thing from this whole fiasco that i wished bring to conversation was the fact that (crucial&#x2F;market-dominant) digital&#x2F;IT services don&#x27;t have the same level of liability as mundane, physical goods.<p>a simple plastic covering of your new dyson has more legal scrutiny and action (see the &quot;children may choke&quot; warnings they all need to come with) than software that we otherwise block in the name of &quot;national security&quot;.<p>given how much overvalued tech companies are in this region, i believe it is high time to start legally recognizing the real-life impact of digital tech. to hell with the &quot;but muh innovation&quot; argument.
DeathMetal300010 months ago
“Windows has announced a commitment around the Rust programming language as part of Microsoft’s Secure Future Initiative (SFI) and has recently expanded the Windows kernel to support Rust.”
janice199910 months ago
At least they&#x27;re not blaming the European Union in this breakdown (as they did earlier).
评论 #41096064 未加载
评论 #41095776 未加载
评论 #41095810 未加载
评论 #41095837 未加载
评论 #41095870 未加载
sammyteee10 months ago
I stopped reading after &quot;Windows is an open and flexible platform&quot;
someonehere10 months ago
Unless actually required by your org, choose the N -1 policy in CS to avoid snafus like this in the future. It’s in the console so use it.
评论 #41097299 未加载
aurelien10 months ago
You use a distribution made with foot for secretary and gamers and you blindly try to explain where the problem is.<p>You are the clown&#x27;s of the world, that&#x27;s all ... xD