this post was submitted on 19 Jul 2024
1275 points (99.4% liked)

Programmer Humor

19187 readers
1173 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 2 months ago

Who says it was accidental?

Netflix knew they were going to move from DVD rentals to streaming over the Internet. It is right in their name.

CrowdStrike knew they were eventually going to _________. It is right in their name.

[–] [email protected] 10 points 2 months ago

SHOULD'VE USED OPENBSD LMAO

[–] [email protected] 17 points 2 months ago (3 children)

Maybe this is a case of hindsight being 20/20 but wouldn't they have caught this if they tried pushing the file to a test machine first?

[–] [email protected] 6 points 2 months ago

It's a sequence of problems that lead to this:

  • The kernel driver should have parsed the update, or at a minimum it should have validated a signature, before trying to load it.
  • There should not have been a mechanism to bypass Microsoft's certification.
  • Microsoft should never have certified and signed a kernel driver that loads code without any kind signature verification, probably not at all.

Many people say Microsoft are not at fault here, but I believe they share the blame, they are responsible when they actually certify the kernel drivers that get shipped to customers.

[–] [email protected] 12 points 2 months ago (1 children)

I saw one rumor where they uploaded a gibberish file for some reason. In another, there was a Windows update that shipped just before they uploaded their well-tested update. The first is easy to avoid with a checksum. The second...I'm not sure...maybe only allow the installation if the windows update versions match (checksum again) :D

[–] [email protected] 4 points 2 months ago

Windows has beta channels for their updates

[–] [email protected] 13 points 2 months ago (1 children)

It's not hindsight, it's common sense. It's gross negligence on CS's part 100%

[–] [email protected] 2 points 2 months ago

Well, it is hindsight 20/20... But also, it's a lesson many people have already learned. There's a reason people use canary deployments lol. Learning from other people's failures is important. So I agree, they should've seen the possibility.

[–] [email protected] 7 points 2 months ago* (last edited 2 months ago)
[–] [email protected] 49 points 2 months ago (3 children)

The answer is obviously to require all users to change their passwords and make them stronger. 26 minimum characters; two capitals, two numbers, two special characters, cannot include '_', 'b' or the number '8', and most include Pi to the 6th place.

[–] [email protected] 9 points 2 months ago

Great! Now when I brute force the login, I can tell my program to not waste time trying '_', 'b' and '8' and add Pi to the 6th place in every password, along with 2 capitals, 2 numbers and 2 other special characters.

Furthermore, I don't need to check passwords with less than 26 characters.

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago) (1 children)

The modern direction is actually going the other way. Tying identity to hardware, preventing access on unapproved or uncompliant hardware. It has the advantage of allowing biometrics or things like simple pins. In an ideal world, SSO would ensure that every single account, across the many vendors, have these protections, although we are far from a perfect world.

[–] [email protected] 3 points 2 months ago (1 children)

SSO means you only need to compromise one piece of hardware to get access to everything.

[–] [email protected] 1 points 2 months ago (1 children)

Effectively, the other option is passwords, and people are really, really, bad at passwords. Password managers help, but then you just need to compromise the password manager. Strong SSO, backed by hardware, at least makes the attack need to be either physical, or running on a hardware approved by the company. When you mix that with strong execution protections, an EDR, and general policy enforcement and compliance checking, you get protection that beats the pants off 30 different passwords to 30 different sites, or more realistically, 3 passwords to 30 different sites.

[–] [email protected] 1 points 2 months ago

Yes, much better than 3-30 passwords.

But I view SSO as enterprise password manager with a nice UI. I don't trust it for anything super important.

[–] [email protected] 7 points 2 months ago (1 children)

Sorry, I don’t understand. Do you mean there have to be 6 digits of Pi in there, or the sixth character must be π? I’m down either way.

[–] [email protected] 28 points 2 months ago (1 children)

We won't tell you, and the rule gets re-rolled every 14 seconds. It may stay the same or it may change.

[–] [email protected] 5 points 2 months ago

Also, there are requirements we check for that we don't tell you about! 🤭

load more comments
view more: next ›