• floofloof@lemmy.ca
    link
    fedilink
    English
    arrow-up
    86
    arrow-down
    2
    ·
    edit-2
    1 year ago

    "Microsoft hasn’t really been helpful in trying to track this, either. I’ve sent over logs and information, but they haven’t really followed this up. They seem more interested in closing the case.”

    That’s the Microsoft way: ignore the bug report for a month or two then close the case for “inactivity”.

    • lobut@lemmy.ca
      link
      fedilink
      arrow-up
      15
      ·
      1 year ago

      It’s sometimes the issue with relying on metrics and stuff and being purely quantitative. A lot of us of have worked at companies where it’s been like this. To deal with volume they need to rely on numbers to gauge so you tell the workers they’ll be ranked on closed cases.

  • elouboub@kbin.social
    link
    fedilink
    arrow-up
    60
    arrow-down
    13
    ·
    1 year ago

    With these updated routing tables, a lot of people were unable to make calls, as we didn’t have a correct state

    You’re relying on windows for critical infrastructure? Are you nuts?

      • elouboub@kbin.social
        link
        fedilink
        arrow-up
        27
        arrow-down
        3
        ·
        1 year ago

        Indeed, nothing is perfect, but closed source stuff doesn’t provide a lot of recourse. If you have a linux expert in your team, they can investigate and if need be even dig into the code of linux itself to find the core issue. Microsoft doesn’t provide anything even remotely similar.

          • elouboub@kbin.social
            link
            fedilink
            arrow-up
            17
            ·
            1 year ago

            Don’t need one. If you can read C/C++ you can read the kernel code. And in most cases, you won’t have to, as the problem is probably in a component in the distro. Those are written in python, ruby, or bash, which are all much more readable than C/C++.

            No such luck on windows

          • sugar_in_your_tea@sh.itjust.works
            link
            fedilink
            arrow-up
            6
            ·
            1 year ago

            I worked at a small company without a kernel dev and we periodically looked into the code to solve problems. I don’t know how much we upstreamed, but we relied on Linux so it was either the or try to get someone on the mailing list to care.

            It’s really not that hard to look through the kernel source, it’s pretty well written and documented. It’s a lot harder to be a kernel developer writing new code, but finding bugs and contributing fixes isn’t that bad.

          • ReversalHatchery@beehaw.org
            link
            fedilink
            arrow-up
            4
            ·
            1 year ago

            You don’t have to be a kernel dev for that. Reading source code is much easier than writing it. I myself have even read the code that handles the battery management drivers, and it’s mostly self documenting, even though I’m bad at C and it’s pointers, and also have never yet written a kernel driver.

    • eee@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      The US navy ran on windows xp for so long that they paid Microsoft to continue maintaining it after EOL.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    23
    ·
    1 year ago

    This is the best summary I could come up with:


    A few months ago, an engineer in a data center in Norway encountered some perplexing errors that caused a Windows server to suddenly reset its system clock to 55 days in the future.

    “With these updated routing tables, a lot of people were unable to make calls, as we didn’t have a correct state!” the engineer, who asked to be identified only by his first name, Simen, wrote in an email.

    Simen had experienced a similar error last August when a machine running Windows Server 2019 reset its clock to January 2023 and then changed it back a short time later.

    Windows systems with clocks set to the wrong time can cause disastrous errors when they can’t properly parse timestamps in digital certificates or they execute jobs too early, too late, or out of the prescribed order.

    The mechanism, Microsoft engineers wrote, “helped us to break the cyclical dependency between client system time and security keys, including SSL certificates.”

    Simen and Ken, who both asked to be identified only by their first names because they weren’t authorized by their employers to speak on the record, soon found that engineers and administrators had been reporting the same time resets since 2016.


    The original article contains 701 words, the summary contains 200 words. Saved 71%. I’m a bot and I’m open source!

  • Echo71Niner@lemm.ee
    link
    fedilink
    arrow-up
    22
    ·
    1 year ago

    Ignoring tickets and than closing it for inactivity is how big companies ignore their own fuck-ups.

    • candybrie@lemmy.world
      link
      fedilink
      arrow-up
      23
      ·
      1 year ago

      If you read the article it’s explained that some SSL implementations put random data in the time field (OpenSSL was given as an example). Microsoft knows about this and so needs a certain number of closely matching timestamps to be confident about the new time to change the system time. However, if you get particularly unlucky with a string of random timestamps that match, you end up with a random time.

      • deegeese@sopuli.xyz
        link
        fedilink
        arrow-up
        24
        ·
        1 year ago

        Yes, it’s a dog shit implementation to rely 3rd parties to make guarantees about their data that they never agreed to.

        Linux and MacOS handle this just fine. Why blame SSL when you’re the one using it wrong?

      • SheeEttin@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 year ago

        And most NTP clients already handle this by not changing the time automatically if it would be too much of a jump. Microsoft is trying to fix what’s not broken.

  • Treczoks@lemm.ee
    link
    fedilink
    arrow-up
    19
    ·
    1 year ago

    I’ve read the documentation on that feature, and still don’t get over it. How can anyone with knowledge of computers be so dumb to even consider such an idea, lest implement it?

    This feature is just a BIG flag waving “AbUsE mE!”

  • theshatterstone54@feddit.uk
    link
    fedilink
    arrow-up
    22
    arrow-down
    4
    ·
    1 year ago

    Fun fact: Apparently M$ laid off their QA team for Windows so if you’re wondering why updates break so much, that’s why.

    • rolandtb303@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      And when they laid off their QA team with the testing lab of thousands of unique computers, they replaced it with VMs and AI. Because VMs are a totally good way to troubleshoot very specific bugs. The AI part is used to supposedly figure out when you’re “idle” so what Windows can update.

      Imagine needing AI to update a computer lmao

  • Thann@lemmy.ml
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 year ago

    “The false assumption is that most SSL implementations return the server time,” Simen said. “This was probably true in a Microsoft-only ecosystem back when they implemented it, but at that time [when STS was introduced], OpenSSL was already sending random data instead.”

    This is so amazing, NTP is too insecure, so we relied on random data from random servers instead

  • Papamousse@beehaw.org
    link
    fedilink
    arrow-up
    4
    ·
    1 year ago

    Last problem I had was our server serving 2FA decided it was not on the same timezone, so when I tried to connect with my Authenticator code, it says “check your time on your cellphone”. I had to call IT…