I'm pretty sure that if Microsoft provided a decent way to do what Crowdstrike does, most companies would opt for that.
So... Sucks to suck I guess.
This is a most excellent place for technology news and articles.
I'm pretty sure that if Microsoft provided a decent way to do what Crowdstrike does, most companies would opt for that.
So... Sucks to suck I guess.
The document states that Microsoft is obligated to make available its APIs in its Windows Client and Server operating systems that are used by its security products to third-party security software makers.
The document does not, however say those APIs have to exist. Microsoft could eliminate them for its own security products and then there would be no issue.
The document that outlines the agreement between Microsoft and the European Commission is available as a Doc file on Microsoft's website.
...which seems to be inaccessible. I highly doubt this document specifically said "giv'em ring-0 access", this is just MS trying to deflect blame and cash it at the same time.
Personally, I don't see the issue. Microsoft shouldn't be responsible for when a third party creates a buggy kernel module.
And when you, as a company, decide to effectively install a low-level rootkit on all your machines in hopes that it will protect you against whatever, you accept the potential side effects. Last week, those side effects occurred.
Hard to say yet, if Microsoft is responsible or not. The thing is they certified it, as a stable and tested driver. But it isn't just a driver, but an interpreter/loader that loads code at runtime and executes it. In kernel mode. If Microsoft knew this they're definitely responsible for certifying it, but maybe crowdstrike hid this behavior until it was deployed to the customers.
Is this even relevant? Wasn't it a kernel driver module?
It's a third party kernel module, which Microsoft would love to be able to block, but legally can't. It's technically possible to write a virus scanner that runs in user space instead of the kernel, but it's easier to make sure everything gets scanned if it's in the kernel.
This whole thing just exposes that people getting paid big bucks for this shit, aint really that smart or planning for anything, they are just collecting rent until something blows up lol
even when it was the bears I knew it was regulation and taxes.
Oh FFS. I love this era where companies will not accept the blame due to "liability", even when they are explicitly to blame.
We all hate Microsoft for turning Windows into an ad platform but they aren't wrong.
They are legally required to give Crowdstrike or anyone complete low level access to the OS. They are legally required to let Crowdstrike crash your computer. Because anything else means Microsoft is in control and not the software you installed.
It's no different than Linux in that way. If you install a buggy device driver on Linux, that's your/the driver's fault, not Linux.
~~The thing is, Microsoft's virus-scanning API shouldn't be able to BSOD anything, no matter what third-party software makes calls to it, or the nature of those calls. They should have implemented some kind of error handler for when the calls are malformed.~~
~~So this is really a case of both Crowdstrike and Microsoft fucking up. Crowdstrike shoulders most of the blame, of course, but Microsoft really needs to harden their API to appropriately catch errors, or this will happen again.~~
I'm an idiot. For some reason, I was thinking about the Windows Defender API, which can be called from third-party applications.
I don't believe there was any specific API in use here, for virus scanning or not. I suppose maybe the device driver API? I am not a kernel developer so I don't know if that's the right term for it.
Crowdstrike's driver was loaded at boot and caused a null pointer dereference error, inside the kernel. In userspace, when this happens, the kernel is there to catch it so only the application that caused it crashes. In kernelspace, you get a BSOD because there's really nothing else to do.
I stand corrected. For some reason, I was thinking they used the actual Windows Defender API, which can be called programmatically from third-party applications, but you're correct, it was a driver loaded at boot. Microsoft isn't at all at fault, here.
You are not wrong, but people don't want to hear it. Do we want to retain control over what goes into kernel space or not? If so, we have to accept that whatever we stuff in there can crash the entire thing. That's why we have stuff like driver signatures. Which Crowdstrike apparently bypassed with a technical loophole from how I understand it.
Meanwhile a Microsoft employee on how to prevent such an issue under Linux: https://www.phoronix.com/news/systemd-Auto-Boot-Assessment
I don't know enough about Windows 10/11, but aren't they supposed to boot into a menu thet allows you to pick the last known good configuration before it evens boots to the gui?
It's been a while since I had such a massive problem under Windows but the last time you could try to restore one of the last backups and usually that failed because Windows restore points are/were crap.
Yeah we tried that where I work (I'm not IT) and it failed. Safe mode didn't work either 'cause it couldn't authenticate the user for login as the server was down as well.