To avoid such issues in the future, CrowdStrike should prioritize rigorous testing across all supported configurations.
Bold of them to assume there’s a future after a gazillion off incoming lawsuits.
Removed by mod
Contracts aren’t set in stone. Not only are those contracts modified before they are accepted by both parties, it’s difficult to limit liability when negligence is involved. CS is at worst going to be defending against those, at best defending against people dumping them ahead of schedule against their contracted term length.
Oh so you can fire QA department, get absolutely destructive update to millions of systems across the globe and this gross negligence doesn’t matter because of magic words in a contract? I don’t think so.
Removed by mod
Then how else is their legal liability is limited?
They killed off their QA department to chase profits which resulted in a broken product that crippled hundreds of organizations across the globe.
They don’t get to just shrug, say oopsie, and point at the contract.
They mean after Crowdstrike gets sold, the new company promises a more rigorous QA, and quietly rebrands it.
Slorp is now Bonto!
I think you mean after they sell their assets to a new company. Leave the lawsuits with the old company who will shut down.
Cloudstrike, wait no!
What are you doing Counterstrike
Additionally, organizations should approach CrowdStrike updates with caution
We would if we were able to control their “deployable content”.
Serious question, can you not? There isn’t an option to…like…set a review system first?
For antivirus definitions? No, and you wouldn’t want to.
But it sounds like this added files / drivers or something, not just antivirus rules?
We would if we were able to control their “deployable content”.
Minimum safe distance.
But I’ve read so many posts on here about how Linux is flawless!
not sure if you’re being sarcastic, but if anything this news paints linux deployment in an even better light.
This is good for Bitcoin
deleted by creator
For almost every use case a normal user needs, there is a gui. You do not need the terminal.
Tell me where to find executables for programs installed without using Terminal , a very very clickable task in windows
Huh? if you install anything via a software manager which is included with most user-friendly distros like Ubuntu, popos, mint or zorin, it comes with a .desktop file which makes it discoverable by using the means of the desktop environment - usually something like the start menu. And that’s not something new. That has been the case for years now.
/usr/bin
There, no clicking needed. 🙃
Hah not true in many many many cases
Did you ever use linux? There is a file explorer in most, if not all linux distributions.
Companies don’t really use Debian or Rocky in widescale production because they have no support.
Now red hat or ubuntu is a different matter.
Honestly though this does point out that this is a pattern of behavior on crowdstrikes part. This should have been the canary in the coalmine.
We actually use rocky and I think Debian at work for servers. We are currently migrating away from EOL centos .
We use Alma, which is basically Rocky. Before that, CentOS. Lots of people don’t need or want the expensive support contracts.
OSS support though donations and commits is the way to go unless you get value out of those contracts (we would not).
I don’t know about that. In the HPC space we use a lot of EL distros. Mainly Centos & now Rocky. Most of the nodes run the os in ram too. Though almost all those kind of systems have no internet connection and don’t use things like crowdstrike. I’ve worked for a few places where the only part of the company that used windows was the office staff eg accounting, hr, etc. everything else is/was using an EL distro or upstream of one eg Fedora. Those type of places usually don’t mess things like crowdstrike for a lot of different reasons eg the kind of data they’re processing and security requirements on that data.
In April, a CrowdStrike update caused all Debian Linux servers in a civic tech lab to crash simultaneously and refuse to boot.
And then, you boot their servers from a Linux Live USB, run TimeShift to restore the last system snapshot, refuse the latest patch from Cloudstrike and they all lived happily ever after.
None of these things are used in actual server operations.
And it’s not much more difficult to fix on Windows, except for the scale of the problem.
And on Windows you booted in safe mode and removed one file. What’s the point of your post?
boot their servers from a Linux live usb
If I ran a computer lab that wasn’t already net booted, I’d use this as the motivating factor to put that in place. Net booting to a repair image, or just reinstalling the whole OS either from scratch or a known good disk image, is where anybody who manages a fleet of computers should be.
There was a point in time where I had a pxe boot server vm set up on my laptop that I used to reload servers in our little row of racks at 365 main, because it let me quickly swap out the boot iso, and was faster than usb sticks were at the time.
Microsoft already has a very bad reputation, so they will be blamed for every issue on their OS.
Vista suffered from bad 3rd party drivers, then people proceeded to just dunk on M$ due to their already bad name. Despite Edge is nowadays just a different flavor of Chromium, people are still making “haha IE slow” memes, even those that still claim Google being the “savior of the internet”.
Because Linux sysadmins know to test a fucking update before applying to the whole company
I recently learned that this is the same company that gave us the bs Russia Gate.
So who do you think hacked the DNC and got their emails, then? Is it the same people who hacked the RNC but didn’t leak the emails? What makes you more qualified than CrowdStrike on this?
U.S. intelligence officials cannot make definitive conclusions about the hacking of the Democratic National Committee computer servers because they did not analyze those servers themselves. Instead, they relied on the forensics of CrowdStrike, a private contractor for the DNC that was not a neutral party, much as “Russian dossier” compiler Christopher Steele, also a DNC contractor, was not a neutral party. This puts two Democrat-hired contractors squarely behind underlying allegations in the affair – a key circumstance that Mueller ignores.
So no evidence it wasn’t Russia? No alternative? Ok.
https://www.theguardian.com/us-news/2020/aug/18/donald-trump-us-senate-report-russia-campaign
A report by the Senate intelligence committee… runs to nearly 1,000 pages and goes further than last year’s investigation into Russian election interference by special prosecutor Robert Mueller… identifies Konstantin Kilimnik as a Russian intelligence officer employed by the GRU, the military intelligence agency behind the 2018 poisoning of the Russian double agent Sergei Skripal. It cites evidence – some of it redacted – linking Kilimnik to the GRU’s hacking and dumping of Democratic party emails.
I recently learned that this is the same company that gave us the bs Russia Gate.
WTF you mean the US Senate?
https://www.theguardian.com/us-news/2020/aug/18/donald-trump-us-senate-report-russia-campaign