Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption Security Media Sony

Blu-ray Protection Bypassed 407

ReluctantRefactorer writes with an article in the Register reporting that Blu-ray copy-protection technology has been sidestepped by muslix64, the same hacker who bypassed the DRM technology of rival HD DVD discs last month. From the article: "muslix64's work has effectively sparked off a [cat]-and-mouse game between hackers and the entertainment industry, where consumers are likely to face compatibility problems while footing the bill for the entertainment industry's insistence on pushing ultimately flawed DRM technology on an unwilling public." WesleyTech also covers the crack and links the doom9 forum page where BackupBluRayv021 was announced.
This discussion has been archived. No new comments can be posted.

Blu-ray Protection Bypassed

Comments Filter:
  • by rminsk ( 831757 ) on Tuesday January 23, 2007 @04:23PM (#17727962)
    From the article "The early version of this utility only supports the decryption of Blu-ray discs whose CPS unit key is known." ... "A powerful crypto attack was used to analyze the memory dump obtained from a Blu-ray Disc software player (such as WinDVD or PowerDVD). The crypto attack helped to identify the encryption keys that are needed for decrypting the video files." So it has not been cracked as the keys still need to be found. This just decodes the contents once the keys are found.
  • Re:Oh well... (Score:5, Informative)

    by killtherat ( 177924 ) on Tuesday January 23, 2007 @04:50PM (#17728330)
    Actually both HD-DVD and Blu-Ray use the same DRM system, AACS, http://en.wikipedia.org/wiki/AACS [wikipedia.org]

  • by melted ( 227442 ) on Tuesday January 23, 2007 @04:53PM (#17728376) Homepage
    What he did crack is one software based player. There's now a difference. Key holders will now revoke the keys for that particular player, so it won't play newer movies anymore. There's no crack yet that would defeat the entire protection scheme.
  • Re:Oh well... (Score:5, Informative)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Tuesday January 23, 2007 @04:58PM (#17728444) Homepage
    Satellite TV encryption is dynamic. Got the keys? They just got revoked. Worked out the encryption? A download just changed it.

    A DVD is a static medium and the players aren't normally connected to a source of data, so they can't update them so fast, and they can't invalidate the encryption without making your existing disks unplayable (=class action lawsuit)... so it's considerably easier to break (and re-break as they issue new disks).
  • Re:Unfixable (Score:3, Informative)

    by powerlord ( 28156 ) on Tuesday January 23, 2007 @05:08PM (#17728620) Journal
    The only fix to this would be what a poster on that forum mentioned wouldn't it? You rely on a piece of silicon you control to do all the decoding and such, which would require a BluRay player card or something. You'd have to basically get rid of software players.


    Almost right. Dedicated silicon would be one way.

    Besides that, the only OTHER option would be for the entire system to be "secure" through things like so called "Trusted Computing" [wikipedia.org]. In parituclar check out the section on Memory Curtaining [wikipedia.org].

    You'll notice that in this case, "Trusted Computing" has nothing to do with the User trusting the platform, but rather with the Media Companies Trusting the system to look after their interests above that of the users.
  • Re:Unfixable (Score:3, Informative)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Tuesday January 23, 2007 @05:09PM (#17728630) Homepage
    There are ways of not doing so... for example putting bits of the key in different places in the memory map. Putting crucial bits of the key in kernel memory where userspace can't read it... deliberately obfuscating parts of the key (eg. xor the 10th byte with some value, thus invalidating it unless you know that it's been done).

    TPM will hold the key in unreadable (to unauthorised applications) static memory. Once that gets on your PC you've got to crack TPM first.. and that's going to set you back *at least* half an hour :p
  • Re:Oh well... (Score:5, Informative)

    by Goaway ( 82658 ) on Tuesday January 23, 2007 @05:12PM (#17728684) Homepage
    This hasn't been "cracked" in any meaningful sense of the word. All they've done is implement a decrypter working from the format specs, and worked out a way to hack decrypted keys out of a software player.

    At any point, the player can have its keys revoked and code changed, and we'll be back to square one.
  • by Gordo_1 ( 256312 ) on Tuesday January 23, 2007 @05:16PM (#17728734)
    http://hdkeys.com/ [hdkeys.com]
  • Re:Oh well... (Score:3, Informative)

    by Keruo ( 771880 ) on Tuesday January 23, 2007 @05:17PM (#17728742)
    Satellite TV encryption is dynamic. Got the keys? They just got revoked. Worked out the encryption? A download just changed it.

    Ever heard of card serving and softCAM?
    It completely bypasses the need to write in keys. Even if your keys get revoked while watching, the card client reauthenticates against the stream with new keys realtime.
    All you need is someone with legit card and sat box with network connectivity.

    No need to clone cards, when you can "clone" the entire authentication module.
  • Re:One can hope..... (Score:1, Informative)

    by Anonymous Coward on Tuesday January 23, 2007 @05:19PM (#17728772)
    The CE industry by no means WANTS to waste our time developing, testing, and getting our DRM manifestations certified, we do so because we HAVE to to be able to play the content that's coming from the studios. The studios DEMAND the DRM, so they agree on the AACS, and similarly crappy schemes, and force us to implement them. If we could avoid it, we certainly would, and it would make our development lives MUCH easier as a result.
  • Re:Oh well... (Score:5, Informative)

    by Ruprecht the Monkeyb ( 680597 ) * on Tuesday January 23, 2007 @05:31PM (#17728894)
    Hardly. DVD had the fastest penetration of any consumer electronic device in history -- faster than cell phones, faster than VHS, faster than PCs. It had very little to do with DeCSS; it had to do with the three things.

    (A) the players are much less complicated to produce than VCRs, so the retail price rapidly dropped to the point where you virtually got a DVD player with your happy meal.

    (B) The retail price of DVDs started low and got lower. I bought my first DVD for $20, and nowadays you can find B-list titles, used DVDs, etc. for $5 or less. VHS, on the other hand, started really expensive -- most titles were $90 or up in the early years -- and only started getting cheap when DVD arrived on the scene.

    (C) There was already an established model and infrastructure for rental. It didn't take too long when VHS started, but it did take several years before 'renting a video' became a universal experience. With DVD, that happened pretty much from day one. People didn't hesitate to adopt a format when they could get content on it quickly and cheaply from the start. And Netflix has done more for the adoption of DVD than DeCSS.

    Not to say that DeCSS hasn't been a boon, but even now most consumers don't have the expertise/wherewhithal/inclination to copy DVDs. Most of the pirated discs on the subway were initially mass-produced copies, not home pirated versions.
  • Re:Oh well... (Score:1, Informative)

    by Anonymous Coward on Tuesday January 23, 2007 @05:35PM (#17728940)
    Yes. Similarly, I have a script that grabs new Dish Keys as they become available from the normal "sources" online, and uploads them (via serial connection, yuck. ancient) to my satellite receiver box.
  • Re:Oh well... (Score:2, Informative)

    by Dare nMc ( 468959 ) on Tuesday January 23, 2007 @05:36PM (#17728962)
    DVD never really took off until CSS was cracked

    Well, it's when costs came down that it took off, really it was fairly recent that anybody was ripping DVD's.

    personally I think it was cracked when it became popular. It wasn't very long into the cycle at all before bootleged DVD's were available (that would have more to do with affordable) actual ripping of disks is what I assume your refering to. That didn't have anything to do with any body I know buying their first DVD player (very un-scientific I know.)

  • by slew ( 2918 ) on Tuesday January 23, 2007 @05:40PM (#17729024)
    The fact that they just left the key in the clear in dram isn't something that was inevitable, just their particular implementation and something that is somewhat fixable.

    So to make a quick analogy, which security measure should they they have choosen?

    1. Leaving the door open to your house inviting someone that happens to be driving by to notice it and walk in...

    2. Leaving your door closed but unlocked requiring them to select your door out of several on your block to open...

    3. Locking your door with a 5-pin standard door lock that you would have to bump to open, but hoping the bad guys pick some other house to rob that choose security measure #1 or #2...

    4. Living in a cave under a mountain with bars on your one entrance/exit...

    Seems to me that they selected door #2, where selecting door #3 would have probably been a better choice in retrospect.

    As a quick example, the key could have been xored with "0xdeadbeef" in memory and some inline code to un-xor it as needed into cpu registers could be done. Although this is essentially non-cryptographic scrambling, it would have required someone to find and disassemble the decryption subroutine instead of just search a 2G memory dump for a key...

  • by Wesley Felter ( 138342 ) <wesley@felter.org> on Tuesday January 23, 2007 @05:45PM (#17729074) Homepage
    WinDVD Japanese edition was used if you read the Doom9 forums. Besides, there are only two software HD-DVD/Blu-ray players, so worst-case they could just revoke both.
  • Re:Oh well... (Score:4, Informative)

    by harl ( 84412 ) on Tuesday January 23, 2007 @05:54PM (#17729204)
    What about

    (D) It had features that made it significantly better than VHS

      (i) The seperation of a film into chapters coupled with the ability to the jump to said chapters.

      (ii) Able to store multiple sound tracks and/or cuts of the film.

      (iii) No rewinding.
  • by Anonymous Coward on Tuesday January 23, 2007 @06:12PM (#17729420)
    You're misrepresenting both sides. The MPAA and friends are saying "it's not about money; it's about control". The DeCSS and friends are saying "it's not about money; it's about control".

    Admittedly it could be that both sides are lying, but ostensibly, neither side cares about content sales. More to the point, it's been shown that "pirates" buy (as in pay money for) more content than non-"pirates", so if there is an effect in content sales, shouldn't they MPAA studios be getting MORE money?
  • Re:Oh well... (Score:3, Informative)

    by ucblockhead ( 63650 ) on Tuesday January 23, 2007 @06:37PM (#17729774) Homepage Journal
    Also

    (D) With random-access to scenes, Director's Commentaries and other bonus features, the DVD was more than just an evolutionary extension of the technology it replaced.
  • by ivan256 ( 17499 ) on Tuesday January 23, 2007 @06:46PM (#17729902)
    Not that you can't buy a Blu-ray drive for your PC already, but you're looking at spending the best part of a grand to do so.

    You can get Blu-ray *burners* for your PC for under $500.
  • by kad77 ( 805601 ) on Tuesday January 23, 2007 @07:50PM (#17730676)
    This is a shameless appeal for some coders with HDDVD or BluRay drives to come out of the Slashdot woodwork and finish what muslix64 started. He said he will not finish the AACS decryption tool beyond where it stands, and it has some some serious problems:

    Read this forum post for a detailed explanation of the current revision:
    http://forum.doom9.org/showthread.php?p=941169#pos t941169 [doom9.org]

    See Professor Ed Felten's excellent blog explaining AACS in detail:
    http://www.freedom-to-tinker.com/ [freedom-to-tinker.com]

    The official AACS specifications, straight from the source:
    http://www.aacsla.com/specifications/ [aacsla.com]

    Your contributions will apply to both HDDVD and BluRay, of course.
  • Re:Oh well... (Score:5, Informative)

    by Lumpy ( 12016 ) on Tuesday January 23, 2007 @08:16PM (#17730952) Homepage
    Dude, Sattelite TV has been cracked for decades.... DECADES!...

    You can buy on ebay a china Mpeg2 reciever with a firmware on it that receives all Dish network programming without paying. and every time it stops working you get the new key on your PC via one of the rss feeds out there. IT is brain dead easy and dirt cheap.

    Sattelite Tv has been broken hard for a really long time, longer than DVD... I remember helping a friend pull the epoxy off a VideoCipherII board in college to mod the prom so it would descramble everything (Playboy channel is what we were after)

    The sattelite TV hack stuff is so pervasive it makes guys like me that are into FTA mpeg2 TV fight to find real info for our hobby. Every search turns up 60% hack and crack and 40% real FTA info.

  • Re:Oh well... (Score:3, Informative)

    by Andy Dodd ( 701 ) <atd7NO@SPAMcornell.edu> on Tuesday January 23, 2007 @09:39PM (#17731728) Homepage
    Who said it had to be a teenager?

    Andrew "Bunnie" Huang was a grad student when he reverse engineered the Xbox.
  • by pionzypher ( 886253 ) on Tuesday January 23, 2007 @10:41PM (#17732356)
    DVD copying isn't widespread. (At least in the USA; parts of Asia like China are a different story.)

    I disagree, Netflix + dvdshrink = a great american past time.

    It's right up there with lemonade and apple pie.
  • Re:Oh well... (Score:0, Informative)

    by Anonymous Coward on Wednesday January 24, 2007 @01:24AM (#17733996)
    I've said it once...and I'll say it again...rape metaphors are not funny
  • Re:Oh well... (Score:5, Informative)

    by monsted ( 6709 ) on Wednesday January 24, 2007 @06:28AM (#17735684)
    Blu-Ray actually uses BD+ [wikipedia.org] as well.
  • by greg1104 ( 461138 ) <gsmith@gregsmith.com> on Wednesday January 24, 2007 @11:28AM (#17737858) Homepage
    And thus this isn't a very useful crack, because the minute it is revealed, it gets plugged. Maybe earlier, if they figure it out anyway.

    The only reason the software player used is visible at all right now is because the people involved are still working out the process. Once that gets nailed down and the scene goes completely underground, there will be people who crack disks and release the volume keys into the wild, and no one will have any idea how they got them. When one visits a Warez size to find out a serial number to install software, did you learn anything about the disassembler used to crack the key? Nope. Same thing will happen here.

    AACS is as secure as it gets. It uses proper crypto, unlike CSS. Copy protection is a fundamentally unsolvable problem, but apart from that there is nothing wrong with AACS.

    It's as secure as it gets, except for the fact that it's fundamentally flawed. I'm with you here.

    And what does "implement revocation securely" even mean?

    Examples of the kind of thing I think about:

    a) You have two copies of a disc from successive mastering runs. The only difference between them is that the later generation pressing has removed a player key that existed on the previous version. Can you learn anything from comparing the two, given that you know how to decrypt the earlier one? Here I'd imagine AACS is genuinely secure.

    b) The maker of your software player has been found guilty of releasing a hackable player whose keys can be extracted. They revoke that key and release an update with a new one. How much easier is it to find out that new key, given that you already broke the previous version and know its player key? Presumably the new release still shares a lot of code with the broken one, which reduces how many bytes need to be sorted through to discover where the new key and its related decryption code are at considerably. Each time a new player update comes out that is known to have a different key from the previous one, a bit more will be exposed about what part of the player does the decryption, making future cracks even easier.

    And here's a slightly different idea to chew on, from the business side:

    c) The key issuers of the content providers get so desperate that they start revoking keys given any provocation. A player manufacturer feels their key was revoked unfairly, because their player was secure (cough); they then sue the key authority for the hardship they and their customers were put through by this unfair revocation. What happens? I'm sure there's a clause about this in the licensing agreement, but this is America; we sue people in ridiculous fashion all the time here with unpredictable outcome.

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...