IT administrators are struggling to deal with the ongoing fallout from the faulty CrowdStrike update. One spoke to The Register to share what it is like at the coalface.

Speaking on condition of anonymity, the administrator, who is responsible for a fleet of devices, many of which are used within warehouses, told us: “It is very disturbing that a single AV update can take down more machines than a global denial of service attack. I know some businesses that have hundreds of machines down. For me, it was about 25 percent of our PCs and 10 percent of servers.”

He isn’t alone. An administrator on Reddit said 40 percent of servers were affected, along with 70 percent of client computers stuck in a bootloop, or approximately 1,000 endpoints.

Sadly, for our administrator, things are less than ideal.

Another Redditor posted: "They sent us a patch but it required we boot into safe mode.

"We can’t boot into safe mode because our BitLocker keys are stored inside of a service that we can’t login to because our AD is down.

  • @[email protected]
    link
    fedilink
    English
    214 months ago

    I love the Linux bros coming out of the woodwork on this one when this could have very well have been Linux on the receiving end of this shit show. Given that it’s a kernal level software issue, and not necessarily an OS one.

    It’s largely infeasible to use Linux for many, most, of these endpoints. But facts are hard.

    • @[email protected]
      link
      fedilink
      English
      16
      edit-2
      4 months ago

      Hey man, let us have this one. Any immutable/atomic distribution could have either prevented this or easily rolled back the update. Not to mention a Linux offering by something like Red Hat, for example, wouldnt recommend installing closed source third party kernel modules for exactly this reason. Not sure about the feasibility of these endpoints, but the way things are generally done on, and the philosophy of, Linux could very well have avoided this catastrophe.

        • Captain Aggravated
          link
          fedilink
          English
          54 months ago

          An immutable distribution is one that treats the system files as read-only. Applications are handled separately, and updates to the system are done in an image-based way, rather than changing a few updated files, basically the OS gets replaced with an updated version. It prevents users or malicious outsiders from just changing system files. Fedora Silverblue and SteamOS as found on Valve’s Steam Deck are examples of immutable distros.

          Now, with soemthing like Crowdstrike that operates in kernel space…I’m too far outside my wheelhouse to grasp how that would work on an immutable system. How it would be implemented.

        • @[email protected]
          link
          fedilink
          English
          14 months ago

          My thought was mostly that this kind of invasive third party and closed source kernel module security wouldn’t have been necessary. But I’m pretty sure rollbacks can include kernel changes in a previous image.

    • @[email protected]
      link
      fedilink
      English
      8
      edit-2
      4 months ago

      They are just butt hurt that this whole thing really shines a light on how inaccurate the line of “the world runs on Linux” truly is.

      The world runs on a lot of different things for different reasons and that does not fit nicely into their Richard Stallman like world view.

    • @[email protected]
      link
      fedilink
      English
      14 months ago

      The Linux kernel has a special kernel extension scheme specifically to keep software like CloudStrike from crashing it https://ebpf.io/what-is-ebpf/ This is supported by CloudStrike on recent versions of Linux (if you’re running an older version, then yes CloudStrike still has the ability to ruin your day)