Knowledge - Troubleshooting Linux Sensors - Communications Issues
Knowledge - Troubleshooting Linux Sensors - Communications Issues
Canonical Documentation
The content of this article is derived from the Falcon Sensor for Linux deployment guide, which can be found in the
Falcon console under Support → Docs. This document is updated by our product management and technical writing
teams, and should be considered canonical. If there is a discrepancy between the information found in this KB article and
those guides, the guides are authoritative.
Service Dependencies
Supported version of OpenSSL
libssl
libc
libcrypto
these runtime services:
network
systemd
local-fs
sysinit
multi-user
shutdown
Some organizations' network configurations allow them to simply whitelist the endpoints' DNS names and/or ELB FQDNs,
while other configurations may need all of the static IPs backing the endpoints whitelisted. If whitelisting by IP is necessary,
all IP's in the pools should be included.
Troubleshooting your communications issues should include working with your own organization's network team to ensure
that sensor traffic is whitelisted as documented in the KB article, "Sensor Communication Information".
https://supportportal.crowdstrike.com/articles/Knowledge/Troubleshooting-Linux-Sensors-Communications-Issues/p 1/4
9/10/2020 Knowledge Article
Disable deep packet inspection (also called "HTTPS interception," "TLS interception," or "SSL inspection") or similar
network configurations. Common sources of interference with certificate pinning include antivirus systems, firewalls, or
proxies.
Please ensure that no SSL inspection is occurring on Falcon traffic. If you must utilize SSL inspection in your environment,
you must whitelist all Falcon traffic from SSL inspection.
You can confirm this by examining the certificate chain using OpenSSL, which you may need to install first. Please see the
article, "Using OpenSSL to Find Certificate Chain Issues," for instructions on how to do this.
CURL
Example command syntax:
Note: The examples above assume that your Falcon instance is hosted in our commercial cloud. If you’re on a different
cloud – for example, GovCloud or EU Cloud – you’ll need to change the server you test against. See “Sensor
Communication Information” for other options that fit your specific cloud.
OpenSSL
Following the guidance from the article "Using OpenSSL to Find Certificate Chain Issues" can also be used to verify
connectivity.
https://supportportal.crowdstrike.com/articles/Knowledge/Troubleshooting-Linux-Sensors-Communications-Issues/p 2/4
9/10/2020 Knowledge Article
SSLv2 and SSLv3 are no longer supported on any operating system. In terms of security, disabling SSLv2 is advised by
most companies in the security sector as well as OpenSSL, and even SSLv3 is being criticized for its vulnerabilities.
.rpm installations:
/etc/httpd/conf.d/ssl.conf
.deb installations:
/etc/apache2/mods-enabled/ssl.conf
3. On the second session: run the sensor stop and start commands in sequence:
https://supportportal.crowdstrike.com/articles/Knowledge/Troubleshooting-Linux-Sensors-Communications-Issues/p 3/4
9/10/2020 Knowledge Article
Engaging Support
Troubleshooting Linux Sensors can be a complex process, and we hope this guide has provided you enough to isolate
your issue so you can find a solution. However, if you can't, CrowdStrike Support and our Engineering teams are standing
by to guide you through the process.
The biggest thing to understand is that this guide was written based on our own run-books: if you see a step or request for
hard data in this guide for a scenario that applies to your situation, we're probably going to request it of you.
Be specific, and provide the details. A vague statement that it doesn't work will be responded with a request
for additional, basic details first. Provide relevant details: Hostnames, OS versions and kernel versions, times
(with timezones), sensor version levels.
Be conservative with screenshots, and watch the cropping. Unless it's important to see how a thing is
presented, don't use a screenshot when raw text output, or a permalink to a specific Falcon console report, or
query string (as examples) will do the job more effectively. We can't copy/paste and search through a screenshot
of text, or reproduce your experience. And if the screenshot is over-cropped, we (literally) can't see the bigger
picture. Provide screenshots only when a screenshot makes more sense than other formats.
When describing a process you're following, provide repro details. The KB article, "Best Practices for
Describing Your Support Issues," will describe how to write solid repro steps.
Append the hostnames that output files come from to the output filenames. If you generate a TCPDump
file, or export falcon-diagnostic script output, rename these files with the source hostname so we know where it
came from: hostname-TCPDump.DATE.pcap, hostname-falcon-diag.DATE.tar.xz are examples.
URL
Troubleshooting-Linux-Sensors-Communications-Issues
Name
https://supportportal.crowdstrike.com/articles/Knowledge/Troubleshooting-Linux-Sensors-Communications-Issues/p 4/4