Welcome to Doom9's Forum, THE in-place to be for everyone interested in DVD conversion. Before you start posting please read the forum rules. By posting to this forum you agree to abide by the rules. |
![]() |
#1 | Link |
Registered User
Join Date: Jan 2007
Posts: 9
|
Clarification on the state of AACS
So over the past few weeks, I've been keeping updated on the news and forum posts, and have come across two main themes: AACS is cracked and dead, and AACS is not cracked and not dead.
Now, for the average person (lets say...hmm..me, for instance ![]() And now to complicate things even FURTHER (not like trying to lie to your girlfriend about where you were last night and why you smell like either perfume or cologne (whichever way you fly), but complicated in the sense of being as rich as Bill Gates, there is just so much good news that seem similar but are different that one (me again for instance) isn't sure what to make of all of it) Some people (forgive me for not having their handle's in this post, but they know who they are) are now saying that there may, in the not too distant future, be a way to bypass AACS entirely through the modification of firmware on the hardware itself. So, like the title suggests, If someone could give the Doom9 state of the union, in terms which may be complicated but not including the ins and outs of hex editing, I (as well as many others I am sure) would be greatly indebted for the gift. Thanks. |
![]() |
![]() |
![]() |
#2 | Link | |
Registered User
Join Date: Sep 2006
Posts: 390
|
Ok. Good points. I will keep this as simple as I can
![]() Quote:
The functions of AACS could be divided this way:
Copy Protection If you can copy a disc and play it (eg burn it on a recordable) then you could say the copy-protection system is broken. AACS tries to prevent bit-by-bit copying by the use of the Volume ID and a secret way its stored on the disc (also using special keys to let the drive give this VID). When it comes to HD DVDs there is now a possibility to create a firmware (for the xbox drive) that would simulate a prerecorded disc (while using a recordable disc). This allows anyone with a burner to copy and play any HD DVD movie. In essence the AACS copy-protection system will be permanently broken when/if this patch comes out. This is the most basic attack: copy and playback only. Decryption protection If you can decrypt a disc you can also copy it (of course). But being able to decrypt a disc is a more severe attack on AACS. Because it also allows you to modify the content (like removing commercials/changing menus/re-authoring etc) and perform playback in (for example) linux or an open source player. In order to decrypt a disc you need the keys the content is encrypted with. These we usually refer to as Volume Unique Keys (although technically VUKs give Title Keys which are used to decrypt the content but this amounts to the same thing). What is important is that VUKs cannot be revoked. In other words: once we have a VUK for a disc then the AACS decryption-protection is broken for that disc. AACS cannot undo this. So how can we get VUKs? There are several ways to get VUKs for discs. But none of them are permanent solutions for retrieving all VUKs for all discs (released in the future).
The second method requires not one piece of information (like taking a single VUK out of the memory of WinDVD) but two pieces of information. We have several techniques now for a drive to reveal the Volume ID of a disc. So this part of the method is permanent. However the Processing Key will change every time they change to a new MKB version. And since we also need this second piece of information to calculate a VUK for a disc we always need to get the new Processing Key out of some player (whether its a Software Player or a standalone). The Processing Key (or better a Device Key) is very powerful though: if found it makes it possible to decrypt all discs released so far (assuming we can also retrieve the Volume IDs of those discs). Renewability and revocation With renewability I mean the ability for AACS to use new keys for new discs. This is still intact and will probably never be broken. This creates (for us) the necessity of finding a new Processing/Device Key each time they change to a new MKB version (which they will do in April/May) on new discs. Revocation is basicly for "getting back" at those who try to open AACS (that would be us ![]() Those are the elements of AACS and their state of "broken-ness" ![]() I hope that clears it up a bit. If you have questions just ask ![]() arnezami Last edited by arnezami; 20th April 2007 at 06:10. |
|
![]() |
![]() |
![]() |
#3 | Link |
Registered User
Join Date: Jan 2007
Posts: 9
|
arnezami,
Thanks for your timely reply. I do still have a few questions (don't worry, this shouldn't take a lot of explanation..hell one of them is just what an acronym stands for!), but you've done a fantastic job of explaining what is happening for those of us (or simply just me, although I hope that isn't the case!) who are kind of left in the dust by the complex technical nature of this endeavor. First, you mentioned "MKB", but there was no explanation for what it was. My guess Master Key Bit, but for some reason (perhaps grammatically, I don't know!) that doesn't seem to fit for me. Second, and this is in regards to stand alone players and revocation. From my understanding, most (if not all) of these next gen media players have an always on connection to the internet (via an ethernet line). So unlike with software players on a computer, the machine would automatically update without the owner even knowing. When you say "We have been speculation how to permanently disable this system " you mean you think that there is a way to get these stand alone players to stop "phoning home" and yet continue to play media (despite their leaked keys)? Third and finally, If AACS did trace what standalone machine gave out the key's, and shut it down, does that mean that anyone who bought that player is a proud owner of a new $1000 brick? Thanks again for the speedy reply, and thanks for all the work you've done on this (I know you have something to do with some of this, and should have mentioned you my first post to give credit where credit is due, so my bad) |
![]() |
![]() |
![]() |
#4 | Link |
Registered User
Join Date: Jan 2007
Posts: 274
|
It stands for " Media Key Block" There's a detailed explanation in the sticky on understanding AACS, but basically it's got multiple encrypted copies of the media key. The media key with the voume id let's you get to the VUK. Every player is in a group of players (called a subset difference set of players) and every player in an S-D set can decrypt the same one of the encrypted copies of the media key in the MKB.
|
![]() |
![]() |
![]() |
#5 | Link | |||
Registered User
Join Date: Sep 2006
Posts: 390
|
Its really good that you ask these questions. If you have them others will too
![]() Quote:
Quote:
Quote:
[edit]I read your question wrong: only the standalone which keys were released will be revoked. Not others. Sorry. Regards, arnezami Last edited by arnezami; 15th April 2007 at 06:45. |
|||
![]() |
![]() |
![]() |
#6 | Link | |
Registered User
Join Date: Jan 2007
Posts: 274
|
Quote:
An AACS disc can have MKBs, SKBs and revocation lists. These are three broad categories that make up the AACS DRM. Right now only the first category (MKBs) seems to be in use. What are these categories? MKBs - revoking players An AACS disc has a movie on it that is encrypted (doh!) and you need a key to decrypt and play it. You get that key from an MKB on the disc. A player starts with one of its "device keys" and goes through a lengthy process to get the final decryption key. Right now the entirety of each movie is encrypted with one key, and the "lengthy process" involves a number of keys including: "processing key," "media key," "title key," "volume unique key" and a "volume id" on the disc. Basically, this category relates to who gets to decrypt the bulk of the movie (right now the "bulk " of the movie is all of the movie). The MKB has multiple copies of the same key you need for decryption of the movie (right now 512 copies), but they are all encrypted differently so that each group of players can decrypt only one of them. The group of players for each encrypted copy of the key in an MKB is known as a "subset difference set" (see the sticky to find out why). By changing the MKB, different groups of players (S-D sets) can be defined, and any combination of one or more players can be implicitly "revoked" and prevented from getting the key they need to decrypt the movie simply by leaving out of the MKB the key they could decrypt. SKBs - Sequence Key Blocks and traitor tracing This system is not currently in use, but may be soon. Essentially, it is a method of figuring out which device has been compromised so that its keys can be eliminated from the MKB, making the device revoked. Although the majority of a movie is encrypted using the MKB and device key system above, on a disc having SKBs, part of the movie (up to 32 short segments) can be encrypted with multiple additional keys. At each of the 32 spots, there are up to 8 different short segments, only one of which is used by by a player at each of the 32 points. A player has "sequence keys" and those keys are used with the SKB to decrypt one of the 8 variations at each of the 32 points in the movie. Different players would decrypt a different variation at each segment. Looking at the decrypted movie (or alternatively at released sequence keys) tells the AACS LA (Licensing Authority) which of the eight variations at each segment was decrypted. This produces an identifiable "fingerprint" that is tied to the device that decrypted the movie and tells them something about who released the keys. It is intended to let them figure out who should be revoked with the next MKB they release. Revocation Lists - Drives, Hosts and Content Last comes the revocation lists. There are 3 - the HRL - Host Revocation List, the DRL - Drive Revocation List, and the CRL - Content Revocation List. These explicit revocation lists are also not currently known to be in use, but may be used soon. The lists are located on the AACS disc and once the disc is inserted into a compliant device, the device (in theory) forever after keeps that list of revocations. A "Host" is software - like WinDVD. A drive (like the Xbox HD-DVD add-on drive) reads an AACS disc and if the disc has a new HRL, the drive stores that new list in non-volatile RAM. The drive will then refuse to hand over information to the revoked host/software that it needs to play an AACS encrypted movie. Similarly, the drive can be revoked by a DRL and the software can refuse to play discs on the revoked drive. Content revocation seems unlikely to be used as they would have to start replacing discs to everyone. I hope that summary helps explain where the various parts fit in to the whole picture. Last edited by FoxDisc; 24th April 2007 at 01:46. |
|
![]() |
![]() |
![]() |
#7 | Link |
Registered User
Join Date: Jan 2007
Posts: 9
|
Thanks to all that have replied, reading through all that technical jargon in some of the other threads...well...lets just leave it at that and you can use your imaginations
![]() ![]() and p.s. wouldn't it suck to buy a $1000 brick? Someone could come out with a www.smashmyBDplayer.com (think smashmyWii and smashmyPS3)....By the way, I patent, trademark, and copyright that idea, and will sue anyone who tries to steal it from me!!!!!! hmm there are no emotiocons while editing, otherwise I would have one of those "looking to take over the world" faces. ![]() Last edited by Gnodab; 9th April 2007 at 22:37. Reason: added the p.s.! :) |
![]() |
![]() |
![]() |
#8 | Link |
Registered User
Join Date: Jun 2006
Posts: 8
|
And the Revocation Lists are versioned...
Would it be possible to fake an empty or false Revocation List with the highest possible version number, and what would happen to a Drive after that happened? Presumably it would no longer be possible for the AACS LA to brick your drive or software player? Has anyone looked at this method of attacking AACS yet? |
![]() |
![]() |
![]() |
#9 | Link |
Resident DRM Hater
Join Date: Oct 2006
Location: International waters
Posts: 242
|
Someone mentioned the idea once, but apparently it'd have to be signed with their digital signature, so it's not going to happen any time soon. However, we may be able to use debug commands or firmware hacks to just insert a list of our own, bypassing signatures entirely, but this would be on a per-drive basis.
__________________
Because Moogles pwn. |
![]() |
![]() |
![]() |
#10 | Link | |
Registered User
Join Date: Sep 2006
Posts: 390
|
Quote:
We can (in principle) tell our own drive to ignore new HRL versions on new discs. But the only thing this will do is that our drive will still give its Volume ID to old versions of WinDVD and PowerDVD. But this won't do us much good (well maybe sometimes an older version works a little better than a newer one but usually its the other way around) because new discs won't play on these old versions anyway (because of the new Processing Key used in the new MKB version). So in the end breaking the HRL isn't so exiting. Breaking the DRL would be (if your drive happens to be revoked) but that can only be done by hacking/cracking each new version of a Software Player. And since there won't be much demand for it (who has their drive revoked?) and don't see this happening soon. arnezami |
|
![]() |
![]() |
![]() |
#13 | Link |
Registered User
Join Date: May 2004
Posts: 288
|
This thread is a good read very educational!
Here is more on the impending revocation; More Cracks Appear in AACS High-Def Armor |
![]() |
![]() |
![]() |
#15 | Link | |
Registered User
Join Date: Aug 2004
Posts: 65
|
Quote:
|
|
![]() |
![]() |
![]() |
#17 | Link |
Registered User
Join Date: Feb 2007
Posts: 23
|
This has been an extremely informative read! Thank you to all who added to it to help explain it.
I know for sure I have spent quite sometime trying to understand how AACS works (reading the stick at teh top of this forum) and sure cannot get much to work (except that there are trucks and presents!) When they revoke a player, is it some John B Hacker personal player or is it all of the same models that John has? Like if Leglit Lanny had the same player John had, would hers be disabled so to say? Or am i completely missing the concenpt here. |
![]() |
![]() |
![]() |
#18 | Link | |
Registered User
Join Date: Jan 2007
Posts: 274
|
Quote:
A reasonable guess is that all hardware players have a different device number so that John's hardware player can be revoked without revoking any other hardware players. All copies of a software player at the same version level from the same company are likely to have the same device number and would be revoked as a group. |
|
![]() |
![]() |
![]() |
#20 | Link | |
Registered User
Join Date: Sep 2006
Posts: 390
|
Quote:
![]() I've added a link to this thread in my sticky post (the one about the subset difference) arnezami |
|
![]() |
![]() |
![]() |
Thread Tools | Search this Thread |
Display Modes | |
|
|