Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Movies Media Encryption Security Software

First AACS Blu-Ray/HD-DVD Key Revoked 254

Thomas Charron writes "An update posted for Intervideo WinDVD 8 confirms that it's AACS key has been possibly revoked. WinDVD 8 is the software which had its device key compromised, allowing unfettered access to Blu-Ray and HD-DVD content, resulting in HD movies being made available via many torrent sites online. This is possibly the first known key revocation which has taken place, and little is known of the actual process used for key revocation. According to the release, 'Please be aware that failure to apply the update will result in AACS-protected HD DVD and BD playback being disabled,' which pretty much confirms that the key revocation has already taken place for all newly released Blu-Ray and HD-DVD discs."
This discussion has been archived. No new comments can be posted.

First AACS Blu-Ray/HD-DVD Key Revoked

Comments Filter:
  • let's have a vote (Score:3, Informative)

    by Anonymous Coward on Saturday April 07, 2007 @11:56AM (#18646755)
    How many of you like to have your computers controlled by media corporations and Microsoft? Voting time is now. http://defectivebydesign.org/ [defectivebydesign.org]
  • by Anonymous Coward on Saturday April 07, 2007 @12:00PM (#18646799)
    On the hardware end, if your player's device key is revoked, that player is effectively dead. When you insert a BD/HDDVD, a blacklist on the disc checks your player's device key against the keys in its list. If it finds a match, your player disables itself from playing ANY disc. In essence, playing any pre-revocation disc is okay. Any post-revocation disc will prevent playback ability for both pre and post variants.

    Supposedly this is a lot easier to deal with on the software end, though.
  • by scottnews ( 237707 ) on Saturday April 07, 2007 @12:26PM (#18647067)
    It means *NEW* HD-DVD and Bluray discs won't work on WinDVD 8. The key for WinDVD 8 has been revoked. Other players use different keys. Those have not been revoked. WinDVD has released a free update with a new key, and presumably an attempt to encrypt it.

    This is why HD-DVD and Bluray players require a network jack. It allows for old keys to be removed and new ones to be implemented, among other things.

  • by Kjella ( 173770 ) on Saturday April 07, 2007 @12:39PM (#18647199) Homepage
    What this means is that *NEW* HD-DVD and Bluray discs won't work on old players, unless patched.

    Actually:
    1. New discs won't play on the players who has had their keys revoked. Just to make that clear, this only has any effect for users of the WinDVD software player.
    2. If I remember correctly, the player will keep a version of the revocation keys. So from what I've understood, once you put in a disc which says "Hey, you're supposed to be revoked" that player will stop working until you get an upgrade.

    For a software player, this isn't more than what it just said - a required software update. It doesn't get nasty until hardware keys are found...
  • Re:Network jack?? (Score:4, Informative)

    by badfish99 ( 826052 ) on Saturday April 07, 2007 @01:15PM (#18647551)
    So when the key of your Samsung BD-P1000 is revoked, your player will no longer play any new disks that you buy. You will have to go out and buy a new player.
  • Re:Network jack?? (Score:1, Informative)

    by Anonymous Coward on Saturday April 07, 2007 @01:22PM (#18647615)
    This entire thread is complete bullshit. Keys are not revoked via a network jack. Keys are revoked by the simple act of releasing new discs that don't support them.
  • Re:Network jack?? (Score:4, Informative)

    by Dogtanian ( 588974 ) on Saturday April 07, 2007 @01:54PM (#18647891) Homepage

    This entire thread is complete bullshit. Keys are not revoked via a network jack. Keys are revoked by the simple act of releasing new discs that don't support them.
    Well, yes; I believe that was the point. WinDVD is able to be updated over the Internet, but this option isn't available for the Samsung DVD player (etc). If that were the only way of updating the firmware, then the industry would be faced with a choice of revoking the keys (i.e. having future releases no longer support that player) or not revoking them, thus leaving the crack open for exploit.

    Of course, this is not the case; there are likely other ways of updating firmware on "real" HD-DVD players, but they're likely to be less transparent to consumers.
  • by evilviper ( 135110 ) on Saturday April 07, 2007 @02:01PM (#18647967) Journal

    The problem with that is then on every disc each key needs to be encoded.

    No, it doesn't. Mathematics isn't nearly that primitive. You absolutely don't have to, nor does AACS store every individual key on a disk. It's called "broadcast encryption" and it existed before AACS. Each player doesn't have a single, globally unique key. It has several keys which, in combination, are globally unique. See: http://web.archive.org/web/20060604054302/http://w ww.lotspiech.com/AACS/ [archive.org]

    Sorry, it just won't work.

    Sorry, you know nothing about cryptography. That is, in fact, how AACS works. Your ignorance of it doesn't change reality.
  • by SiliconEntity ( 448450 ) on Saturday April 07, 2007 @02:42PM (#18648369)
    once you put in a disc which says "Hey, you're supposed to be revoked" that player will stop working until you get an upgrade.
    This myth appears to have originated...

    It's not a myth at all. Try reading section 4.8 of the AACS Introduction and Common Cryptographic Elements [aacsla.com] spec:

    An AACS licensed drive shall retain in non-volatile storage, the most recent Host Revocation List (HRL) data which it encounters and has verified. To do this, for the first AACS drive authentication to the media inserted, the drive shall read an MKB recorded on the media to check if its version is higher than the version of HRL that it has stored in its non-volatile memory... If the version of MKB recorded on the media is higher than the version of HRL that the drive has stored in its non volatile memory, the drive verifies the signature in the Host Revocation List Record of MKB as specified in section 3.2.5.2. If the signature is successfully verified, the drive shall replace the previously stored HRL data, if any, with the newly read HRL data.
    What this means is that disks are distributed with Host Revocation Lists on them, cryptographically signed by AACS. Whenever a disk is inserted, the drive checks to see if the HRL on the disk is newer than the one it has in nonvolatile memory, and if so, it checks the AACS signature on the new one and stores it in memory. This allows a drive to refuse to talk to a given host software. Likewise there is a drive revocation list that the hosts are supposed to hold which tells them not to talk to certain drive versions, in case an attack is found in some models of drives.
  • Having a network port is a mandatory feature for all HD DVD players, so updated keys and other updates can be easily delivered. It's mainly there for downloadable content (like adding subtitles in a new langauge for an existing disc).

    Blu-ray, however, has networking optional, and most Blu-ray players don't have a port.

    Yet another way in which the baseline functionality in HD DVD is much higher than Blu-ray.
  • by Erpo ( 237853 ) on Saturday April 07, 2007 @07:43PM (#18651127)

    once you put in a disc which says "Hey, you're supposed to be revoked" that player will stop working until you get an upgrade.

    This myth appears to have originated...

    It's not a myth at all. Try reading section 4.8 of the AACS Introduction and Common Cryptographic Elements spec


    It isn't a myth, but Host Revocation and Drive Revocation are trivial to bypass and are not what is being described in this article.

    HRLs and DRLs only serve to stop Hosts (PCs) and drives (HD-DVD or Blu-Ray) from communicating with eachother. For example, if a host's certificate is revoked and the drive knows this, the drive will not read certain bits off of the data medium and pass them along the ATA bus back to the PC. The bits are still on the medium and they are not encrypted or anything like that. The drive will just refuse to read them. This has already been fixed in at least one instance by flashing the drive's firmware. In any case, all one would need to do to get around this for good would be to make an HD-DVD or Blu-Ray drive that just reads the bits off of the medium and passes them back to the host PC just like a CD-ROM or DVD-ROM drive does.

    What's being described in this article is that the software player's "device keys" are being revoked. Here is how that works (basically):

    Each disc contains video that is encrypted with a master key. Each player contains a set of "device keys". The subset difference tree algorithm (part of the AACS spec) is used to encrypt the master key so that it can only be decrypted by a certain set of device keys. Before WinDVD 8 was revoked, the subset difference tree algorithm was used to encrypt the master key for each disc so that it could be decrypted by any set of device keys. Now, according to the article (or at least the summary), new discs are being produced for which any set of device keys can be used to recover the master key except WinDVD 8's device keys.

    So, if you managed to get a copy of WinDVD 8's device keys before today, you were set. You could decrypt, play, and copy any Blu-Ray or HDDVD disc. Now, you can't decrypt, play, or copy new Blu-Ray or HDDVD discs, at least until you get your hands on a new set of device keys...

    Note: I have deliberately dumbed down my explanation of the spec for two reasons. First, there are several intermediate keys that are involved in the process. Explaining the function of each and every intermediate key between the device keys and the title key would take a long time and not contribute any real information about the "spirit" of how AACS works. Second, the AACS spec is not fully implemented. According to what I have read, the AACS spec includes the concept of sequence keys that can be used for "forensic" purposes. However, the Sequence Key Blocks required to get any benefit from that part of the spec are not present on current Blu-Ray and HDDVD media.
  • by ThePhilips ( 752041 ) on Saturday April 07, 2007 @09:05PM (#18651543) Homepage Journal

    Since you are selling not original - but copy - no way it would classify as "first sale". IOW, private copies are reserved for private use - sale/rent/etc aren't private uses.

    P.S. IANAL

  • by Skreems ( 598317 ) on Saturday April 07, 2007 @09:28PM (#18651681) Homepage
    It's not. Or more specifically, not in the way you want.

    Storing the revocation list like this is likely only useful so that the device can give the user specific instructions to go look for an update, and maybe disable itself even for older discs. Every new disc will still fail to provide a disc key to the player, as the player key will not be included in the tree of allowed ones. You still couldn't play new discs, the best you might do is prevent the player from understanding that it needs an upgrade.
  • by brandond1976 ( 638849 ) on Saturday April 07, 2007 @10:17PM (#18652045) Homepage

    This is why HD-DVD and Bluray players require a network jack. It allows for old keys to be removed and new ones to be implemented, among other things.
    HD-DVD is the only one that requires the player have the necessary hardware to access the network. In Bluray it is optional.
  • by swillden ( 191260 ) * <shawn-ds@willden.org> on Saturday April 07, 2007 @10:51PM (#18652235) Journal

    Well, yes; I believe that was the point. WinDVD is able to be updated over the Internet, but this option isn't available for the Samsung DVD player (etc). If that were the only way of updating the firmware, then the industry would be faced with a choice of revoking the keys (i.e. having future releases no longer support that player) or not revoking them, thus leaving the crack open for exploit.

    None of that matters for hardware players, because each individual player can be revoked independently, without affecting the one that came off the line immediately before it, or the one that came right after it. They don't bother issuing unique keyset to each copy of a software player, for obvious reasons, but hardware players all have unique key sets so if the keys in one of them are compromised, and known to be compromised, then that specific player can be revoked so that future disks won't play on it. No updates to other players are required.

    What makes this magic possible is a very clever and sophisticated key derivation scheme. Basically, there is an enormous tree of trees of possible keys, and each player is given a carefully-chosen subset of them, which allows that player to derive a large part of the possible keys, but not all of them. To revoke a key essentially just means choosing to encrypt future disks with a key that particular player cannot derive with keys.

    The number of key blocks that must be placed on each disk to make this scheme work is linear in the number of revoked players. In fact, it can be shown mathematically that if r players have been revoked, then at most 2r+1 key blocks are required on each disk. Simulations show that assuming a random distribution of revocations, on average only 1.28r blocks are required. Each key block is 16 bytes in length, so they can revoke millions of players without significantly affecting the space available on the disk.

"The four building blocks of the universe are fire, water, gravel and vinyl." -- Dave Barry

Working...