Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security DRM Google Software The Internet Technology

Security Researcher Cracks Google's Widevine DRM (L3 Only) (zdnet.com) 76

The L3 protection level of Google's Widevine DRM technology has been cracked by a British security researcher who can now decrypt content transferred via DRM-protected multimedia streams. ZDNet's Catalin Cimpanu notes that while this "sounds very cool," it's not likely to fuel a massive piracy wave because "the hack works only against Widevine L3 streams, and not L2 and L1, which are the ones that carry high-quality audio and video content." From the report: Google designed its Widevine DRM technology to work on three data protection levels --L1, L2, and L3-- each usable in various scenarios. According to Google's docs, the differences between the three protection levels is as follows:

L1 - all content processing and cryptography operations are handled inside a CPU that supports a Trusted Execution Environment (TEE).
L2 - only cryptography operations are handled inside a TEE.
L3 - content processing and cryptography operations are (intentionally) handled outside of a TEE, or the device doesn't support a TEE

"Soooo, after a few evenings of work, I've 100% broken Widevine L3 DRM," [British security researcher David Buchanan] said on Twitter. "Their Whitebox AES-128 implementation is vulnerable to the well-studied DFA attack, which can be used to recover the original key. Then you can decrypt the MPEG-CENC streams with plain old ffmpeg." Albeit Buchanan did not yet release any proof-of-concept code, it wouldn't help anyone if he did. In order to get the DRM-encrypted data blob that you want to decrypt, an attacker would still need "the right/permission" to receive the data blob in the first place. If a Netflix pirate would have this right (being an account holder), then he'd most likely (ab)use it to pirate a higher-quality version of the content, instead of bothering to decrypt low-res video and lo-fi audio. The only advantage is in regards to automating the pirating process, but as some users have pointed out, this isn't very appealing in today's tech scene where almost all devices are capable of playing HD multimedia [1, 2].

This discussion has been archived. No new comments can be posted.

Security Researcher Cracks Google's Widevine DRM (L3 Only)

Comments Filter:
  • by ( 4475953 ) on Friday January 04, 2019 @06:11AM (#57903246)

    I didn't even know that Google is in this shit business. Good to know, in order to avoid products that use this DRM crap.

    • Widevine is used on stream transport and you almost certainly have watched something that was wrapped & unwrapped by their DRM code. Unlikely you will ever run across a consumer product that says "Widevine enabled".

      • Can you name any sites that use it?

        • Re:Oops (Score:5, Informative)

          by CastrTroy ( 595695 ) on Friday January 04, 2019 @09:42AM (#57903786)

          The most popular one is probably Netflix. If you use Netflix on an Android device you have used WideVine.

          • The most popular one is probably Netflix. If you use Netflix on an Android device you have used WideVine.

            Or Google Play video, or Amazon Video, or Hulu, or basically any Android app that plays commercial content. Maybe even YouTube; not sure.

            I believe that Android and ChromeOS devices these days are required to provide L1, while desktop Chrome and Firefox provide only L3. L2 pretty much doesn't exist. You can tell easily what your device has: If your Netflix (etc.) streams are limited to 480p, then the device supports L3. If you can watch HD (720p, 1080i/p, 4K), then the device supports L1.

            More detail:

            • I can watch full HD with a desktop browser on a cpu without encryption. Only 4K content seems to demand OS and hardware support for "trusted" computing.

        • If you use any IPTV service then you have had content wrapped with Widevine

  • I remember back in the early 2000s when google sounded like some sort of geek paradise where they also paid you.

    Now it's all about privacy violation and apparently DRM now too. Yuck.

  • Yawn ... (Score:5, Insightful)

    by dogsbreath ( 730413 ) on Friday January 04, 2019 @06:59AM (#57903332)

    With respect to piracy of entertainment streams, what does it matter when HDCP is so eminently hackable? Widevine has been around forever and has not made any difference to unauthorized recording and distribution of video and audio.

    Widevine protects the stream down to the user's endpoint where it is conveniently stripped of any effective protection. I don't see how the entire stream path can ever be completely locked down.

    Widevine exists only to satisfy contract demands by content providers to protect the streams. Lot$ spent (and passed on to the consumer) to do nothing.

    • Re: Yawn ... (Score:4, Interesting)

      by fuzzyfuzzyfungus ( 1223518 ) on Friday January 04, 2019 @08:44AM (#57903550) Journal
      I imagine that the main area of interest(aside from people doing cryptoanalysis for its own sake or professionally) is in getting output that hasn't been decompressed, potentially resized or munged a bit by the decoding device's particular color profile; and finally grabbed off the HDMI output and recompressed.

      If the stream provided to L3 clients is lousy enough you may still come out ahead by qualifying for L1-super-premium-secure and then HDCP stripping; but the clean copy will be worse than what was originally provided.

      There's also the matter of convenience: HDMI framegrabbers are much cheaper than they used to be; but setting up a capture arrangement based on one is still way more of a hassle than just being able to clean up a media file with just a little bit of software manipulation. Unless the provider caps the download bitrate to 'just fast enough for real-time, maybe 30-90 seconds of buffer to cover for glitches' the software attack is likely to be faster as well: analog hole or HDCP strip attacks are usually real-time at best(sometimes slower if re encoding is computationally expensive) unless the target can be coaxed to play back at greater than 1x speed and your capture device can cope with it

      Probably not going to set the world on fire in the Bluray rip scene; but could be very popular indeed for services that forbid or tightly restrict offline use in favor of streaming only and people who want access to that media when out and about without burning tons of cell data. Small screen makes resolution less of a concern and the fact that most phones don't exactly support simultaneous HDMI output and HDMI capture and encoding makes a pure software attack attractive.
      • RE: desire to use raw stream vs hdmi output

        True enough from the viewpoint of a purist.

        With respect to piracy, inability to grab the raw stream is of almost zero significance as long as there is a hackable end point.

    • Widevine exists only to satisfy contract demands by content providers to protect the streams. Lot$ spent (and passed on to the consumer) to do nothing.

      This. I'm not a fan of DRM.

      Though at least the cost isn't large, because AFAIK there is no license fee for Widevine. It does add some complexity to the device manufacturing process because keys have to be injected, but on a per-unit basis that's negligible.

      • Though at least the cost isn't large, because AFAIK there is no license fee for Widevine. It does add some complexity to the device manufacturing process because keys have to be injected, but on a per-unit basis that's negligible.

        True this. Last time I had anything to do with Widevine was before Google. Still becomes part of the streaming infrastructure and is both an implementation cost and ongoing expense.

    • Widevine exists only to satisfy contract demands by content providers to protect the streams. Lot$ spent (and passed on to the consumer) to do nothing.

      It might be lots of money in absolute terms, but it's peanuts on the scale of Netflix. Since they are a public company, we can look at their financial filings and take a look. The entirely of R&D spending is less than 10% of their total operating expenses, which is dominated by buying/creating content and continuing operating expenses (servers, bandwidth)

  • Did anyone even know about this before now?

  • by williamyf ( 227051 ) on Friday January 04, 2019 @08:43AM (#57903546)

    Yup. For all those 5 of us still using firefox post-52 Quantum, the old NPAPI plug-in architecture/plumbing is still inthere, alive and well. It is used to support certain "strategic" plug-ins. Only by "invite".

    Flash is the one which garnered the most publicity, but a few others still exist, and Google's SandVine is among them. In my install, the other one is Cisco's H264 decoder Plug in. Others may exist. Please notice that this has nothing to do with your previous install. If your plug-in is in the white list, it will be installed. If not, firefox will refuse to run it, even if all the plumbing is still there because "Quantum" and "Reasons"...

  • He cracked this bs and now Google and Netflix cut access to streaming of people with L3 devices. Even if you pay HD, you are now restricted to 480p.

To do nothing is to be nothing.

Working...