…according to a Twitter post by the Chief Informational Security Officer of Grand Canyon Education.

So, does anyone else find it odd that the file that caused everything CrowdStrike to freak out, C-00000291-
00000000-00000032.sys was 42KB of blank/null values, while the replacement file C-00000291-00000000-
00000.033.sys was 35KB and looked like a normal, if not obfuscated sys/.conf file?

Also, apparently CrowdStrike had at least 5 hours to work on the problem between the time it was discovered and the time it was fixed.

  • @tiramichu@lemm.ee
    link
    fedilink
    English
    2124 months ago

    If I send you on stage at the Olympic Games opening ceremony with a sealed envelope

    And I say “This contains your script, just open it and read it”

    And then when you open it, the script is blank

    You’re gonna freak out

    • @Gork@lemm.ee
      link
      fedilink
      English
      434 months ago

      Ah, makes sense. I guess a driver would completely freak out if that file gave no instructions and was just like “…”

        • @planish@sh.itjust.works
          link
          fedilink
          English
          384 months ago

          That’s what the BSOD is. It tries to bring the system back to a nice safe freshly-booted state where e.g. the fans are running and the GPU is not happily drawing several kilowatts and trying to catch fire.

          • TimeSquirrel
            link
            fedilink
            4
            edit-2
            4 months ago

            No try-catch, no early exit condition checking and return, just nuke the system and start over?

            • AatubeOP
              link
              fedilink
              224 months ago

              what do you propose, run faulty code that could maybe actually nuke your system, not just memory but storage as well?

            • Morphit
              link
              fedilink
              English
              94 months ago

              A page fault can be what triggers a catch, but you can’t unwind what a loaded module (the Crowdstrike driver) did before it crashed. It could have messed with Windows kernel internals and left them in a state that is not safe to continue. Rather than potentially damage the system, Windows stops with a BSOD. The only solution would be to not allow code to be loaded into the kernel at all, but that would make hardware drivers basically impossible.

            • @reddit_sux@lemmy.world
              link
              fedilink
              English
              74 months ago

              BSOD is the ultimate catch statement of the OS. It will gracefully close all open data streams and exit. Of course it is not the usual exit so it gives a graphic representation of what not have gone wrong.

              If it would have been nuking it wouldn’t show anything.

        • @Kaboom@reddthat.com
          link
          fedilink
          English
          64 months ago

          For most things, yes. But if someone were to compromise the file, stopping when they see it invalid is probably a good idea for security

    • @deadbeef79000@lemmy.nz
      link
      fedilink
      English
      184 months ago

      Except “freak out” could have various manifestations.

      In this case it was “burn down the venue”.

      It should have been “I’m sorry, there’s been an issue, let’s move on to the next speaker”

      • @Strykker@programming.dev
        link
        fedilink
        English
        174 months ago

        Except since it was an antivirus software the system is basically told “I must be running for you to finish booting”, which does make sense as it means the antivirus can watch the system before any malicious code can get it’s hooks into things.

        • Morphit
          link
          fedilink
          English
          94 months ago

          I don’t think the kernel could continue like that. The driver runs in kernel mode and took a null pointer exception. The kernel can’t know how badly it’s been screwed by that, the only feasible option is to BSOD.

          The driver itself is where the error handling should take place. First off it ought to have static checks to prove it can’t have trivial memory errors like this. Secondly, if a configuration file fails to load, it should make a determination about whether it’s safe to continue or halt the system to prevent a potential exploit. You know, instead of shitting its pants and letting Windows handle it.

      • @the_crotch@sh.itjust.works
        link
        fedilink
        English
        124 months ago

        In this case it was “burn down the venue”.

        It was more like “barricade the doors until a swat team sniper gets a clear shot at you”.

      • @tiramichu@lemm.ee
        link
        fedilink
        English
        64 months ago

        You’re right of course and that should be on Microsoft to better implement their driver loading. But yes.

        • Morphit
          link
          fedilink
          English
          84 months ago

          The driver is in kernel mode. If it crashes, the kernel has no idea if any internal structures have been left in an inconsistent state. If it doesn’t halt then it has the potential to cause all sorts of damage.

    • @Imgonnatrythis@sh.itjust.works
      link
      fedilink
      English
      124 months ago

      Maybe. But I’d like to think I’d just say something clever like, “says here that this year the pummel horse will be replaced by yours truly!”

      • @Takios@discuss.tchncs.de
        link
        fedilink
        English
        174 months ago

        Problem is that software cannot deal with unexpected situations like a human brain can. Computers do exactly what a programmer tells it to do, nothing more nothing less. So if a situation arises that the programmer hasn’t written code for, then there will be a crash.

        • @deadbeef79000@lemmy.nz
          link
          fedilink
          English
          104 months ago

          Poorly written code can’t.

          In this case:

          1. Load config data
          2. If data is valid:
            1. Use config data
          3. If data is invalid:
            1. Crash entire OS

          Is just poor code.

          • @5C5C5C@programming.dev
            link
            fedilink
            English
            144 months ago

            When talking about the driver level, you can’t always just proceed to the next thing when an error happens.

            Imagine if you went in for open heart surgery but the doctor forgot to put in the new valve while he was in there. He can’t just stitch you up and tell you to get on with it, you’ll be bleeding away inside.

            In this specific case we’re talking about security for business devices and critical infrastructure. If a security driver is compromised, in a lot of cases it may legitimately be better for the computer to not run at all, because a security compromise could mean it’s open season for hackers on your sensitive device. We’ve seen hospitals held random, we’ve seen customer data swiped from major businesses. A day of downtime is arguably better than those outcomes.

            The real answer here is crowdstrike needs a more reliable CI/CD pipeline. A failure of this magnitude is inexcusable and represents a major systemic failure in their development process. But the OS crashing as a result of that systemic failure may actually be the most reasonable desirable outcome compared to any other possible outcome.

            • Morphit
              link
              fedilink
              English
              54 months ago

              This error isn’t intentionally crashing because of a security risk, though that could happen. It’s a null pointer exception, so there are no static or runtime checks that could have prevented or handled this more gracefully. This was presumably a bug in the driver for a long time, then a faulty config file came and triggered the crashes. Better static analysis and testing of the kernel driver is one aspect, how these live config updates are deployed and monitored is another.

            • @deadbeef79000@lemmy.nz
              link
              fedilink
              English
              44 months ago

              But the OS crashing as a result of that systemic failure may actually be the most reasonable desirable outcome compared to any other possible outcome.

              In which case this should’ve been documented behaviour and probably configurable.

            • @CeeBee_Eh@lemmy.world
              link
              fedilink
              English
              1
              edit-2
              4 months ago

              That’s a bad analogy. CrowdStrike’s driver encountering an error isn’t the same as not having disk IO or a memory corruption. If CrowdStrike’s driver didn’t load at all wasn’t installed the system could still boot.

              It should absolutely be expected that if the CrowdStrike driver itself encounters an error, there should be a process that allows the system to gracefully recover. The issue is that CrowdStrike likely thought of their code as not being able to crash as they likely only ever tested with good configs, and thus never considered a graceful failure of their driver.

              • @5C5C5C@programming.dev
                link
                fedilink
                English
                14 months ago

                I don’t doubt that in this case it’s both silly and unacceptable that their driver was having this catastrophic failure, and it was probably caused by systemic failure at the company, likely driven by hubris and/or cost-cutting measures.

                Although I wouldn’t take it as a given that the system should be allowed to continue if the anti-virus doesn’t load properly more generally.

                For an enterprise business system, it’s entirely plausible that if a crucial anti-virus driver can’t load properly then the system itself may be compromised by malware, or at the very least the system may be unacceptably vulnerable to malware if it’s allowed to finish booting. At that point the risk of harm that may come from allowing the system to continue booting could outweigh the cost of demanding manual intervention.

                In this specific case, given the scale and fallout of the failure, it probably would’ve been preferable to let the system continue booting to a point where it could receive a new update, but all I’m saying is that I’m not surprised more generally that an OS just goes ahead and treats an anti-virus driver failure at BSOD worthy.

          • @Takios@discuss.tchncs.de
            link
            fedilink
            English
            104 months ago

            I agree that the code is probably poor but I doubt it was a conscious decision to crash the OS.

            The code is probably just:

            1. Load config data
            2. Do something with data

            And 2 fails unexpectedly because the data is garbage and wasn’t checked if it’s valid.

            • Morphit
              link
              fedilink
              English
              34 months ago

              You can still catch the error at runtime and do something appropriate. That might be to say this update might have been tampered with and refuse to boot, but more likely it’d be to just send an error report back to the developers that an unexpected condition is being hit and just continuing without loading that one faulty definition file.

              • Gadg8eer
                link
                fedilink
                English
                24 months ago

                Unfortunately, an OS that covers such cases is a lost monetization opportunity, fuck the system, use a Linux distro, you get the idea. Microsoft makes money off of tech support for people too unversed in computers to fix it themselves.

      • @Hazzia@infosec.pub
        link
        fedilink
        English
        94 months ago

        I’m gonna take from this that we should have AI doing disaster recovery on all deployments. Tech CEO’s have been hyping AI up so much, what could possibly go wrong?

    • DigitalDilemma
      link
      fedilink
      English
      124 months ago

      Nice analogy, except you’d check the script before you tried to use it. Computers are really good at crc/hash checking files to verify their integrity, and that’s exactly what a privileged process like antivirus should do with every source of information.

    • @JasonDJ@lemmy.zip
      link
      fedilink
      English
      8
      edit-2
      4 months ago

      The funny bit is, I’m sure more than a few people at Crowdstrike are preparing 3 envelopes right now.

    • @CeeBee_Eh@lemmy.world
      link
      fedilink
      English
      14 months ago

      Ah yes. So Windows is the screaming in terror version and other systems are the “oh, sorry everyone, looks like there’s an error. Let’s just move on to the next bit” version.