• apfelwoiSchoppen@lemmy.world
    link
    fedilink
    English
    arrow-up
    58
    arrow-down
    8
    ·
    8 months ago

    Oh FFS. I love this era where companies will not accept the blame due to “liability”, even when they are explicitly to blame.

    • Blue_Morpho@lemmy.world
      link
      fedilink
      English
      arrow-up
      47
      arrow-down
      9
      ·
      edit-2
      8 months ago

      We all hate Microsoft for turning Windows into an ad platform but they aren’t wrong.

      They are legally required to give Crowdstrike or anyone complete low level access to the OS. They are legally required to let Crowdstrike crash your computer. Because anything else means Microsoft is in control and not the software you installed.

      It’s no different than Linux in that way. If you install a buggy device driver on Linux, that’s your/the driver’s fault, not Linux.

      • umami_wasabi@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 months ago

        But what if Windows have something similar to eBPF in Linux, and CS opted to use it, will this disaster won’t happen at all or in a much smaller scale and less impactful?

      • kescusay@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        8
        ·
        edit-2
        8 months ago

        The thing is, Microsoft’s virus-scanning API shouldn’t be able to BSOD anything, no matter what third-party software makes calls to it, or the nature of those calls. They should have implemented some kind of error handler for when the calls are malformed.

        So this is really a case of both Crowdstrike and Microsoft fucking up. Crowdstrike shoulders most of the blame, of course, but Microsoft really needs to harden their API to appropriately catch errors, or this will happen again.

        I’m an idiot. For some reason, I was thinking about the Windows Defender API, which can be called from third-party applications.

        • Heavybell@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          ·
          8 months ago

          I don’t believe there was any specific API in use here, for virus scanning or not. I suppose maybe the device driver API? I am not a kernel developer so I don’t know if that’s the right term for it.

          Crowdstrike’s driver was loaded at boot and caused a null pointer dereference error, inside the kernel. In userspace, when this happens, the kernel is there to catch it so only the application that caused it crashes. In kernelspace, you get a BSOD because there’s really nothing else to do.

          https://youtube.com/watch?v=wAzEJxOo1ts

          • kescusay@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            8 months ago

            I stand corrected. For some reason, I was thinking they used the actual Windows Defender API, which can be called programmatically from third-party applications, but you’re correct, it was a driver loaded at boot. Microsoft isn’t at all at fault, here.

          • kescusay@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 months ago

            Nope. It’s a lower level kernel API that has to be accessed at boot via a driver. The API I was thinking of - and I use the term “thinking” loosely, here - is an API that userspace applications can take advantage of to scan files after boot is already complete.

      • NeoNachtwaechter@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        11
        ·
        edit-2
        8 months ago

        They are legally required to let Crowdstrike crash your computer.

        I call Bullshit.

        If it had been Windows NT 3.5, there would have been no bluescreens around the world. It would have stopped the buggy software, given a message accordingly, and continued it’s job. That Windows was not stupid enough to crash itself just because of a null pointer in another software.

        Now you tell me that Windows NT 3.5 is illegal?

            • BearOfaTime@lemm.ee
              link
              fedilink
              English
              arrow-up
              3
              ·
              8 months ago

              They were legally required to permit third party to install a kernel mode driver.

            • Blue_Morpho@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              8 months ago

              Not then, but European anti trust lawsuits resulted in laws that require Microsoft to allow 3rd parties complete access. That means if the 3rd party software is a low level driver, it will crash the system. They are legally required to allow vendors the level of access that can crash the system.

      • 0x0@programming.dev
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        8
        ·
        8 months ago

        Yeah I saw the article that says they’re legally required but until I can actually read that document where it says “thou shall give everyone ring-0” access I’m gonna call it bullshit.

      • Cyth@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        16
        ·
        8 months ago

        I actually agree, I own my computer / OS and I should be able to do what you’re saying (install and break things). But Microsoft is a trillion dollar multi national corporation and I am certainly going to give them grief about this because I owe them less than nothing, let alone any good will.

        • Feyd@programming.dev
          link
          fedilink
          English
          arrow-up
          7
          ·
          8 months ago

          That doesn’t make any sense. How does arguing against your position do anything but harm it?

          Maybe just give them grief over the myriad negative things they do that don’t counter your position?

    • 800XL@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 months ago

      I don’t know enough about Windows 10/11, but aren’t they supposed to boot into a menu thet allows you to pick the last known good configuration before it evens boots to the gui?

  • Zak@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    4
    ·
    8 months ago

    The document states that Microsoft is obligated to make available its APIs in its Windows Client and Server operating systems that are used by its security products to third-party security software makers.

    The document does not, however say those APIs have to exist. Microsoft could eliminate them for its own security products and then there would be no issue.

    • brianorca@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 months ago

      It’s a third party kernel module, which Microsoft would love to be able to block, but legally can’t. It’s technically possible to write a virus scanner that runs in user space instead of the kernel, but it’s easier to make sure everything gets scanned if it’s in the kernel.

  • 0x0@programming.dev
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    5
    ·
    edit-2
    8 months ago

    The document that outlines the agreement between Microsoft and the European Commission is available as a Doc file on Microsoft’s website.

    …which seems to be inaccessible. I highly doubt this document specifically said “giv’em ring-0 access”, this is just MS trying to deflect blame and cash it at the same time.