CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

141 points

Please, get this garbage out of the kernel. If it isn’t there to talk to hardware, third party code has no place in the kernel. The same shit that Crowdstrike did could easily happen with any of these useless anticheats.

permalink
report
reply
40 points

In b4 msft creates a level between kernel and user level for this stuff to sit at. It will have read-only access to all of kernel memory, and will otherwise function the same, but when it crashes it won’t take the OS down, just certain programs that rely on it.

What will they call it? “Observer” level? “Big Brother” level? “Overseer” level? Probably just something to do with “Verifying Trust/Integrity”. Google will also want to quietly stick something for “Web Integrity” there.

permalink
report
parent
reply
24 points

WSS: Windows Subsystem for Stalkers.

permalink
report
parent
reply
8 points

https://github.com/microsoft/ebpf-for-windows

Right now it’s network level, but Linux’s implementation has since moved out from just packet filtering to full syscall filter and interaction; it’s generally accepted that Windows will be following suit with this implementation. Thought you’d like a name to the thing you described

permalink
report
parent
reply
7 points
*

Is it just me, or does this seem like a reasonable solution? Assuming it’s technically feasible.

permalink
report
parent
reply
5 points

It’s still giving third party software kernel level control over your device, so you’re still giving up any possibility of privacy and probably leaving yourself wide open to a backdoor attack, but that has been normalized. So to the degree that what people accept as reasonable these days is unreasonable, yeah, that’s why I think MSFT will try it.

permalink
report
parent
reply
2 points

This is exactly how ebpf was implemented for the Linux kernel. You can build watchdog processes that can see what’s happening in the kernel and build kernel interrupts but it’s actually all executed in user space and not rewriting the kernel itself. Since it’s a proper api, it also means it’s incredibly hard to fundamentally break the system, unlike when you’re just blowing away kernel code with your own shit like all these security products do.

permalink
report
parent
reply
6 points
*
Deleted by creator
permalink
report
parent
reply
8 points

As much as I despise MS and think they are equally incompetent, I don’t think it’s a good idea to lock down Windows. They will stop providing kernel access to 3rd parties at first, then a few months later you will only be able to download software from the Microsoft Store.

Yes, it’s a security issue but them being allowed to close down their OS sets a dangerous precedent that will make Windows even more shittier and enshittified than it already is.

permalink
report
parent
reply
9 points

There is zero chance of that happening. This is exactly what people said when Apple created a Mac App Store. Surprise surprise you can still run any software you want on a Mac.

permalink
report
parent
reply
5 points

They’d be seriously shooting themselves in the foot if they did that. Most corporations have 3rd party software that they would not be able or willing to give up, software development for Windows would be unable to test and debug, and I know from personal experience that many consumers find the already existing S Mode to be frustrating and confusing.

permalink
report
parent
reply
2 points

They kinda already do this. Any .exe you download outside the Microsoft Store requires double confirmation before you can execute it, unless it’s from Microsoft.

permalink
report
parent
reply
0 points

Good. Let them. Fuck Microsoft and literally ALL the crap they’ve produced. After having to deal with their shit for over 30 years I can’t wait for them to finally sink their own boat

permalink
report
parent
reply
49 points
*

yes please. NO third party should have ring 0 access to your computer.

bonus: no kernel level anticheat to fuck with linux users

permalink
report
reply
46 points
*

Imo, third party companies just shouldn’t have access to the kernel level. Someone is always getting hacked, and having this level of access to potentially hundreds of millions of computers is a huge risk. Especially if it’s for something trivial, like anticheat in Helldivers 2.

permalink
report
reply

@Wahots @mudle , I hold that same relative feeling, but people do own their computers and if they want to play League of Legends and let someone into the kernel, who am I to tell them no? I ran league in Lutris, so no chance of making that decision even if I wanted to.

permalink
report
parent
reply
7 points
*

and let someone into the kernel,

Problem is, that similarly to invasion of privacy, this is not visible, and so they don’t understand what’s happening. It’s just one more program, what could happen? It’s not like somebody coming and inspecting your house, in that it is not noticeable in practice.

permalink
report
parent
reply

@ReversalHatchery , I completely agree. My ring 0 is sacred and I can’t prove there isn’t anything in it already, but I wouldn’t knowingly shove third party stuff into my kernel. I like to keep my apps restricted from anything they don’t need on my system in userland. However, millions upon millions of people installed Tencent’s Vanguard to play League of Legends like it wasn’t any big deal (it is). If people want an inner ring security module, I suppose that’s a bit their choice. 🤷🏽‍♂️

permalink
report
parent
reply
4 points

Yeah, those security agents can become attack vectors themselves, so running them kernel level is nuts.

permalink
report
parent
reply
1 point

Enterprise level AVs are going to sit in the kernel so they can watch for anomalies in the OS. There are better EDRs out there than Crowdstrike, and virus definitions are an outdated way of detecting anamalous behavior anyway.

permalink
report
parent
reply
45 points

Sure, “restrict” the kernel access. And the first company to be granted the requisites for kernel access, CrowdStrike.

permalink
report
reply
11 points

Exactly. Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen), or they will need to grant the access to those providers.

If Microsoft think they will be able to curate every single device driver and other kernel module (like antivirus etc) and catch the kind of bug that caused this error? They’re deluded.

I’ll wait and see what they actually propose before outright ruling it out. But, I can’t see how they do this in any realistic way.

permalink
report
parent
reply
3 points

Either they’re going to make Windows Defender have the monopoly on antivirus and endpoint protection (EU will shut them down faster than a crowdstrike bluescreen)

How does Apple handle this?

permalink
report
parent
reply
1 point

How does Apple handle this?

Really not sure if they have any kernel level antivirus products. Although the same question applies I guess to third party hardware drivers. How are they installed? What privilege level do they run in?

permalink
report
parent
reply
43 points

They’re going to implement something like eBPF for the Windows kernel. This will allow kernel-level modules to run with zero risk of crashing the kernel. If the module fails, it fails without taking down the kernel with it.

Linux already has this. It works great. If Windows gets this, all antivirus and anti-cheat software is going to have to transition.

Once that happens, it will be way easier to add anti-cheat software to Linux that operates the same as on Windows. It may be possible to load and unload it only when playing and actually having competition-grade gaming on Linux.

Of course, this is a security disaster that I wouldn’t allow on any of my daily drivers, but I would enjoy playing Destiny on my Steamdeck if there’s a legit way for me to do it.

permalink
report
reply
6 points
*

According to wikipedia, both Windows and linux have it, and both are open source.

Believe it or not, a lot of companies, no matter how cool and secure their marketing sounds, are just seriously incompetent.

permalink
report
parent
reply

Linux Gaming

!linux_gaming@lemmy.ml

Create post

Gaming on the GNU/Linux operating system.

Recommended news sources:

Related chat:

Related Communities:

Please be nice to other members. Anyone not being nice will be banned. Keep it fun, respectful and just be awesome to each other.

Community stats

  • 1.9K

    Monthly active users

  • 943

    Posts

  • 10K

    Comments