BackupHDDVD: Difference between revisions
m Task 14: cs1 template fixes: misused |publisher= (12×/0×); skipped: unrecognized periodical (4×); |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5) (Hey man im josh - 20898 |
||
(11 intermediate revisions by 8 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|AACS decryption software}} |
|||
{{good article}} |
{{good article}} |
||
{{Infobox |
{{Infobox software |
||
| name = BackupHDDVD |
| name = BackupHDDVD |
||
| screenshot = BackupHDDVD GUI Screenshot.png |
| screenshot = BackupHDDVD GUI Screenshot.png |
||
Line 6: | Line 7: | ||
| author = Muslix64 |
| author = Muslix64 |
||
| operating system = [[Microsoft Windows|Windows]] |
| operating system = [[Microsoft Windows|Windows]] |
||
| license = [[Freeware]]<ref>{{cite web|title=BackupHDDVD|url=http://www.softpedia.com/get/CD-DVD-Tools/CD-DVD-Rip-Other-Tools/BackupHDDVD.shtml|website=[[Softpedia]]|publisher=SoftNews| |
| license = [[Freeware]]<ref>{{cite web|title=BackupHDDVD|url=http://www.softpedia.com/get/CD-DVD-Tools/CD-DVD-Rip-Other-Tools/BackupHDDVD.shtml|website=[[Softpedia]]|publisher=SoftNews|access-date=22 November 2017}}</ref> |
||
}} |
}} |
||
'''BackupHDDVD''' is a small [[computer software]] [[utility program]] available in [[command line interface|command line]] and [[Graphical user interface|GUI]] versions which aids in the [[cryptography|decryption]] of commercial [[HD DVD]] discs protected by the [[Advanced Access Content System]]. It is used to [[backup|back up]] discs, often to enable playback on hardware configurations without full support for [[HDCP]]. The program's [[source code]] was posted online, but no licence information was given. |
'''BackupHDDVD''' is a small [[computer software]] [[utility program]] available in [[command line interface|command line]] and [[Graphical user interface|GUI]] versions which aids in the [[cryptography|decryption]] of commercial [[HD DVD]] discs protected by the [[Advanced Access Content System]]. It is used to [[backup|back up]] discs, often to enable playback on hardware configurations without full support for [[HDCP]]. The program's [[source code]] was posted online, but no licence information was given. |
||
Written by an anonymous programmer using the [[user (computing)|handle]] Muslix64, BackupHDDVD is distributed with none of the cryptographic keys necessary for decryption. Users wanting to use the software to decrypt a protected disc's contents must obtain the appropriate keys separately, a task with which neither the original author nor his or her versions of BackupHDDVD assist.<ref name="Techtree">{{cite web|url=http://www.techtree.com/India/News/Took_Eight_Days_to_Crack_HD_DVD/551-78152-581.html|title=Took Eight Days to Crack HD DVD!|date=2006-12-28|publisher= |
Written by an anonymous programmer using the [[user (computing)|handle]] Muslix64, BackupHDDVD is distributed with none of the cryptographic keys necessary for decryption. Users wanting to use the software to decrypt a protected disc's contents must obtain the appropriate keys separately, a task with which neither the original author nor his or her versions of BackupHDDVD assist.<ref name="Techtree">{{cite web|url=http://www.techtree.com/India/News/Took_Eight_Days_to_Crack_HD_DVD/551-78152-581.html|title=Took Eight Days to Crack HD DVD!|date=2006-12-28|publisher=Techtree|access-date=2007-01-02|archive-url=https://web.archive.org/web/20070104085534/http://www.techtree.com/India/News/Took_Eight_Days_to_Crack_HD_DVD/551-78152-581.html|archive-date=4 January 2007|url-status=dead}}</ref><ref name="PCMag1">{{cite magazine| url=https://www.pcmag.com/article2/0,1895,2078016,00.asp| title=Next-Gen DVD DRM Hacked—Maybe| author=Gardiner, Bryan| magazine=PC Magazine| date=2006-12-29| access-date=2007-01-02| archive-date=2008-04-21| archive-url=https://web.archive.org/web/20080421020559/http://www.pcmag.com/article2/0,1895,2078016,00.asp| url-status=dead}}</ref> |
||
BackupHDDVD represented the first known successful attack against AACS. The utility circumvents content protection by decrypting video files directly with [[Advanced Encryption Standard|AES]], the underling cryptographic cipher used by AACS. Using this technique, BackupHDDVD is able to completely bypass the AACS chain of trust, rendering it immune to revocation. The cost of this immunity is that users are forced to rely on keys leaking from commercial player software to use BackupHDDVD with new discs.<ref name="Infoworld">{{cite magazine|url=http://www.infoworld.com/article/06/12/29/HNdrmhacked_1.html|title=Hacker: Blu-ray, HD DVD copy protection cracked|author=Robert McMillan|magazine=InfoWorld|date=2006-12-29| |
BackupHDDVD represented the first known successful attack against AACS. The utility circumvents content protection by decrypting video files directly with [[Advanced Encryption Standard|AES]], the underling cryptographic cipher used by AACS. Using this technique, BackupHDDVD is able to completely bypass the AACS chain of trust, rendering it immune to revocation. The cost of this immunity is that users are forced to rely on keys leaking from commercial player software to use BackupHDDVD with new discs.<ref name="Infoworld">{{cite magazine|url=http://www.infoworld.com/article/06/12/29/HNdrmhacked_1.html|title=Hacker: Blu-ray, HD DVD copy protection cracked|author=Robert McMillan|magazine=InfoWorld|date=2006-12-29|access-date=2007-05-08| archive-url= https://web.archive.org/web/20070509045633/http://www.infoworld.com/article/06/12/29/HNdrmhacked_1.html| archive-date= 9 May 2007 | url-status= live}}</ref><ref>{{cite news|url=http://www.dailytech.com/article.aspx?newsid=5498&ref=y|author=Gabriel Ikram|work=DailyTech|title=Hackers Claim HD DVD Encryption Circumvented|date=2006-12-28|access-date=2007-01-02|archive-url=https://web.archive.org/web/20070930014602/http://www.dailytech.com/article.aspx?newsid=5498&ref=y|archive-date=2007-09-30|url-status=dead}}</ref> |
||
== History == |
== History == |
||
According to the creator of BackupHDDVD, he or she first set out to circumvent AACS to bypass a restriction in software HD DVD players which reduced the quality of AACS restricted [[1080p]] [[High-definition video|high definition]] video to that of standard definition DVD video or refused to play outright unless an HDCP compliant chain of video hardware was present.<ref name="Techtree" /> At the time only a few [[computer monitor]]s and [[video card]]s supported HDCP. As a result, configurations that would have allowed high-definition HD DVD viewing in software players were exceptionally rare.<ref name="PCWNoHDCP">{{cite magazine|url=http://www.pcworld.com/article/id,126345-page,1/article.html|magazine=PC World|author=Tom Mainelli|title=GeekTech: Want to View HD Content on Your PC? Upgrade Wisely|date=2006-07-13| |
According to the creator of BackupHDDVD, he or she first set out to circumvent AACS to bypass a restriction in software HD DVD players which reduced the quality of AACS restricted [[1080p]] [[High-definition video|high definition]] video to that of standard definition DVD video or refused to play outright unless an HDCP compliant chain of video hardware was present.<ref name="Techtree" /> At the time only a few [[computer monitor]]s and [[video card]]s supported HDCP. As a result, configurations that would have allowed high-definition HD DVD viewing in software players were exceptionally rare.<ref name="PCWNoHDCP">{{cite magazine|url=http://www.pcworld.com/article/id,126345-page,1/article.html|magazine=PC World|author=Tom Mainelli|title=GeekTech: Want to View HD Content on Your PC? Upgrade Wisely|date=2006-07-13|access-date=2007-05-04|archive-date=2007-09-30|archive-url=https://web.archive.org/web/20070930190210/http://www.pcworld.com/article/id,126345-page,1/article.html|url-status=dead}}</ref><ref name="ArsVistaHDCP">{{cite web|url=https://arstechnica.com/news.ars/post/20060214-6177.html|website=Ars Technica|author=Ken Fisher|title=The truth behind HDCP and video card support|date=2006-02-14|access-date=2007-05-04| archive-url= https://web.archive.org/web/20070406192527/http://arstechnica.com/news.ars/post/20060214-6177.html| archive-date= 6 April 2007 | url-status= live}}</ref> |
||
On December 18, 2006, a video which showed BackupHDDVD being used to decrypt and copy the film ''[[Full Metal Jacket]]'' to a hard drive was uploaded to [[YouTube]].<ref name="Yahoo">{{cite web|url=https://news.yahoo.com/s/nf/20061230/tc_nf/49022|title= |
On December 18, 2006, a video which showed BackupHDDVD being used to decrypt and copy the film ''[[Full Metal Jacket]]'' to a hard drive was uploaded to [[YouTube]].<ref name="Yahoo">{{cite web|url=https://news.yahoo.com/s/nf/20061230/tc_nf/49022|title= Hacker Cracks High-Def DVD Encryption System|date=2006-12-30| access-date=2007-01-02}} {{Dead link|date=September 2010|bot=H3llBot}}</ref> Two days after the video was uploaded, the initial version of the utility along with its [[source code]] and documentation was uploaded to a file hosting service. A link to the file was then posted by the utility's creator on the forums of [[Doom9]], a website devoted to DVD backup. The utility's documentation, along with the forum post, contained little information as to how necessary keys could be obtained. The author elaborated in another forum post, claiming that keys could be obtained by exploiting the necessity for them to be held in [[RAM|memory]] to allow playback in player software. |
||
Hacker Cracks High-Def DVD Encryption System|date=2006-12-30| accessdate=2007-01-02}} {{Dead link|date=September 2010|bot=H3llBot}}</ref> Two days after the video was uploaded, the initial version of the utility along with its [[source code]] and documentation was uploaded to a file hosting service. A link to the file was then posted by the utility's creator on the forums of [[Doom9]], a website devoted to DVD backup. The utility's documentation, along with the forum post, contained little information as to how necessary keys could be obtained. The author elaborated in another forum post, claiming that keys could be obtained by exploiting the necessity for them to be held in [[RAM|memory]] to allow playback in player software. |
|||
On January 2, 2007, the author posted the 1.0 version of the BackupHDDVD utility, which included support for the decoding of discs using volume keys.<ref>{{cite web|url=http://effectu.com/index.php?option=com_content&task=view&id=363|author=Michael O'Connor|title= BackupHDDVD v1.00 Released|date=2007-01-02| |
On January 2, 2007, the author posted the 1.0 version of the BackupHDDVD utility, which included support for the decoding of discs using volume keys.<ref>{{cite web|url=http://effectu.com/index.php?option=com_content&task=view&id=363|author=Michael O'Connor|title= BackupHDDVD v1.00 Released|date=2007-01-02| access-date=2007-01-02| archive-url= https://web.archive.org/web/20070114024443/http://effectu.com/index.php?option=com_content&task=view&id=363| archive-date= 14 January 2007 | url-status= live}}</ref> For several weeks following the utility's release no success using the author's key extraction technique was reported.<ref name="Engadget">{{cite web|url=https://www.engadget.com/2006/12/27/aacs-drm-cracked-by-backuphddvd-tool/|title= AACS DRM cracked by BackupHDDVD tool?| author=Block, Ryan|publisher=Engadget|date=2006-12-27| access-date=2007-01-02| archive-url= https://web.archive.org/web/20070102172230/http://www.engadget.com/2006/12/27/aacs-drm-cracked-by-backuphddvd-tool/| archive-date= 2 January 2007 | url-status= live}}</ref><ref name="Ars">{{cite web|url=https://arstechnica.com/news.ars/post/20061228-8510.html|title= HD DVD reportedly cracked, but difficult to verify|author=Ken Fisher|website=Ars Technica|date=2006-12-28| access-date=2007-01-02| archive-url= https://web.archive.org/web/20070103080047/http://arstechnica.com/news.ars/post/20061228-8510.html| archive-date= 3 January 2007 | url-status= live}}</ref> In mid-January 2007, a volume key was published by another member of the Doom9 forum along with an explanation of the technique used to obtain it. Other forum members quickly discovered keys for different titles. Keys for many discs are now readily available on the internet. |
||
AACS DRM cracked by BackupHDDVD tool?| author=Block, Ryan|publisher=''Engadget''|date=2006-12-27| accessdate=2007-01-02| archiveurl= https://web.archive.org/web/20070102172230/http://www.engadget.com/2006/12/27/aacs-drm-cracked-by-backuphddvd-tool/| archivedate= 2 January 2007 <!--DASHBot-->| deadurl= no}}</ref><ref name="Ars">{{cite web|url=https://arstechnica.com/news.ars/post/20061228-8510.html|title= HD DVD reportedly cracked, but difficult to verify|author=Ken Fisher|website=Ars Technica|date=2006-12-28| accessdate=2007-01-02| archiveurl= https://web.archive.org/web/20070103080047/http://arstechnica.com/news.ars/post/20061228-8510.html| archivedate= 3 January 2007 <!--DASHBot-->| deadurl= no}}</ref> In mid-January 2007, a volume key was published by another member of the Doom9 forum along with an explanation of the technique used to obtain it. Other forum members quickly discovered keys for different titles. Keys for many discs are now readily available on the internet. |
|||
Further development of BackupHDDVD was being hosted on [[SourceForge]] until the site received a [[DMCA]] [[takedown notice]] alleging a violation in late February. In compliance with the notice, the project was immediately removed. Several versions of BackupHDDVD have been released by individuals other than the original author, including some versions with GUIs and the ability to locate keys on the internet or scan for them in memory automatically. HDDecrypter, a port of BackupHDDVD to [[C (programming language)|C]] with a native Windows GUI is also available. This version supports multiple CPU threads and runs faster than its Java counterparts. While development of BackupHDDVD has ceased, a commercial HD DVD decryption utility called [[Slysoft]] [[AnyDVD HD]] exists which relies on [[AACS encryption key controversy|compromised AACS processing or media keys]] to allow for the backup or unrestricted viewing of any AACS-protected discs without the need for title or volume keys.<ref name="Dailytech">{{cite news|url=http://www.dailytech.com/article.aspx?newsid=6065|title=All Blu-ray Disc and HD DVD Encryption Defeated by Single Key|author=Marcus Yam|work=DailyTech|date=2007-02-13| |
Further development of BackupHDDVD was being hosted on [[SourceForge]] until the site received a [[DMCA]] [[takedown notice]] alleging a violation in late February. In compliance with the notice, the project was immediately removed. Several versions of BackupHDDVD have been released by individuals other than the original author, including some versions with GUIs and the ability to locate keys on the internet or scan for them in memory automatically. HDDecrypter, a port of BackupHDDVD to [[C (programming language)|C]] with a native Windows GUI is also available. This version supports multiple CPU threads and runs faster than its Java counterparts. While development of BackupHDDVD has ceased, a commercial HD DVD decryption utility called [[Slysoft]] [[AnyDVD HD]] exists which relies on [[AACS encryption key controversy|compromised AACS processing or media keys]] to allow for the backup or unrestricted viewing of any AACS-protected discs without the need for title or volume keys.<ref name="Dailytech">{{cite news|url=http://www.dailytech.com/article.aspx?newsid=6065|title=All Blu-ray Disc and HD DVD Encryption Defeated by Single Key|author=Marcus Yam|work=DailyTech|date=2007-02-13|access-date=2007-02-16|archive-url=https://web.archive.org/web/20070219103417/http://www.dailytech.com/Article.aspx?newsid=6065|archive-date=2007-02-19|url-status=dead}}</ref><ref name="PCMag">{{cite magazine|url=https://www.pcmag.com/article2/0,1895,2094932,00.asp |title=Beta Software to Copy HD DVDs Released |author=Mark Hachman |magazine=PC Magazine |date=2006-02-14 |access-date=2007-02-20 |archive-url=https://web.archive.org/web/20070223023506/http://www.pcmag.com/article2/0%2C1895%2C2094932%2C00.asp |archive-date=23 February 2007 |url-status=live }}</ref> |
||
== Background == |
== Background == |
||
Line 31: | Line 30: | ||
{{main|Advanced Access Content System}} |
{{main|Advanced Access Content System}} |
||
The AACS Licensing Authority (LA) assigns a series of 253 unique [[cryptographic key]]s to device manufacturers. When an AACS protected disc is manufactured, a series of up to 64 keys called title keys are generated and the video content on the disc is encrypted using these keys. The title keys are stored on the disc and themselves encrypted with another key called the volume unique key. The volume unique key for any disc can be calculated by all authorized devices using another key called a processing key, which is derived from a media key block stored on each disc. Authorized devices use one or more of the manufacturer's assigned device keys to decrypt the media key block, yielding a processing key and enabling further decryption of the volume and title keys, and finally the content.<ref name="arnezami">{{cite web|url=http://forum.doom9.org/showthread.php?t=122363|title=Understanding AACS (including Subset-Difference)|author=arnezami|date=2007-02-17| |
The AACS Licensing Authority (LA) assigns a series of 253 unique [[cryptographic key]]s to device manufacturers. When an AACS protected disc is manufactured, a series of up to 64 keys called title keys are generated and the video content on the disc is encrypted using these keys. The title keys are stored on the disc and themselves encrypted with another key called the volume unique key. The volume unique key for any disc can be calculated by all authorized devices using another key called a processing key, which is derived from a media key block stored on each disc. Authorized devices use one or more of the manufacturer's assigned device keys to decrypt the media key block, yielding a processing key and enabling further decryption of the volume and title keys, and finally the content.<ref name="arnezami">{{cite web|url=http://forum.doom9.org/showthread.php?t=122363|title=Understanding AACS (including Subset-Difference)|author=arnezami|date=2007-02-17|access-date=2007-03-18| archive-url= https://web.archive.org/web/20070303012909/http://forum.doom9.org/showthread.php?t=122363| archive-date= 3 March 2007 | url-status= live}}</ref> |
||
If a device key is to be revoked, the media key blocks on all discs manufactured after the time of revocation are encrypted in a way which does not enable the revoked device to obtain a valid processing key.<ref name="AACS-cce">{{cite web|url=http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf|title=Introduction and Common Cryptographic Elements|author=AACS-LA| |
If a device key is to be revoked, the media key blocks on all discs manufactured after the time of revocation are encrypted in a way which does not enable the revoked device to obtain a valid processing key.<ref name="AACS-cce">{{cite web|url=http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf|title=Introduction and Common Cryptographic Elements|author=AACS-LA|access-date=2007-03-22|archive-url=https://web.archive.org/web/20070302130221/http://www.aacsla.com/specifications/specs091/AACS_Spec_Common_0.91.pdf|archive-date=2007-03-02|url-status=dead}}</ref> Users trying to view new content on a revoked player would be forced to upgrade their player software to a more secure version, thereby limiting the scope of the compromise each time an exploit is discovered.<ref name="Betanews">{{cite web|url=http://www.betanews.com/article/Studios_Take_Claims_of_AACS_Crack_Seriously/1167427818|title= Studios Take Claims of AACS Crack Seriously|date=2006-12-29|author=Scott M. Fulton, III|publisher=BetaNews| access-date=2007-01-02| archive-url= https://web.archive.org/web/20070101225526/http://www.betanews.com/article/Studios_Take_Claims_of_AACS_Crack_Seriously/1167427818| archive-date= 1 January 2007 | url-status= live}}</ref><ref name="Reghardware">{{cite web|url=http://www.reghardware.co.uk/2006/12/28/hddvd_crypto_cracked/|title=HD DVD anti-rip encryption cracked|date=2006-12-28|author=Tony Smith|website=The Register|access-date=2007-01-02|archive-url=https://web.archive.org/web/20070103062420/http://www.reghardware.co.uk/2006/12/28/hddvd_crypto_cracked/|archive-date=3 January 2007|url-status=dead}}</ref> While a compromised device or processing key could be used to decrypt a large number of discs, BackupHDDVD does not use these keys because they can be revoked by AACS LA. Because the AACS revocation system works by preventing a given device or player from calculating a valid volume unique key, BackupHDDVD circumvents the system entirely by relying on volume or title keys leaked from authorized players. With these keys BackupHDDVD is not subject to device revocation and is able to decrypt the content directly, bypassing the key exchange and verification process.<ref name="arnezami" /><ref name="RegisterBeyondRevo">{{cite web|url=https://www.theregister.co.uk/2007/05/04/aacs_crack/|title=Latest AACS crack 'beyond revocation'|author=John Leyden|website=The Register|date=2007-04-04|access-date=2007-05-05| archive-url= https://web.archive.org/web/20070507083451/https://www.theregister.co.uk/2007/05/04/aacs_crack/| archive-date= 7 May 2007 | url-status= live}}</ref><ref name="ArsCantHack">{{cite web|url=https://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html|title=New AACS cracks cannot be revoked, says hacker|author=Jeremy Reimer|website=Ars Technica|date=2007-03-15|access-date=2007-05-05| archive-url= https://web.archive.org/web/20070505034539/http://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html| archive-date= 5 May 2007 | url-status= live}}</ref> |
||
Studios Take Claims of AACS Crack Seriously|date=2006-12-29|author=Scott M. Fulton, III|publisher=''BetaNews''| accessdate=2007-01-02| archiveurl= https://web.archive.org/web/20070101225526/http://www.betanews.com/article/Studios_Take_Claims_of_AACS_Crack_Seriously/1167427818| archivedate= 1 January 2007 <!--DASHBot-->| deadurl= no}}</ref><ref name="Reghardware">{{cite web|url=http://www.reghardware.co.uk/2006/12/28/hddvd_crypto_cracked/|title= HD DVD anti-rip encryption cracked|date=2006-12-28|author=Tony Smith|website=The Register| accessdate=2007-01-02| archiveurl= https://web.archive.org/web/20070103062420/http://www.reghardware.co.uk/2006/12/28/hddvd_crypto_cracked/| archivedate= 3 January 2007 <!--DASHBot-->| deadurl= no}}</ref> While a compromised device or processing key could be used to decrypt a large number of discs, BackupHDDVD does not use these keys because they can be revoked by AACS LA. Because the AACS revocation system works by preventing a given device or player from calculating a valid volume unique key, BackupHDDVD circumvents the system entirely by relying on volume or title keys leaked from authorized players. With these keys BackupHDDVD is not subject to device revocation and is able to decrypt the content directly, bypassing the key exchange and verification process.<ref name="arnezami" /><ref name="RegisterBeyondRevo">{{cite web|url=https://www.theregister.co.uk/2007/05/04/aacs_crack/|title=Latest AACS crack 'beyond revocation'|author=John Leyden|website=The Register|date=2007-04-04|accessdate=2007-05-05| archiveurl= https://web.archive.org/web/20070507083451/https://www.theregister.co.uk/2007/05/04/aacs_crack/| archivedate= 7 May 2007 <!--DASHBot-->| deadurl= no}}</ref><ref name="ArsCantHack">{{cite web|url=https://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html|title=New AACS cracks cannot be revoked, says hacker|author=Jeremy Reimer|website=Ars Technica|date=2007-03-15|accessdate=2007-05-05| archiveurl= https://web.archive.org/web/20070505034539/http://arstechnica.com/news.ars/post/20070415-aacs-cracks-cannot-be-revoked-says-hacker.html| archivedate= 5 May 2007 <!--DASHBot-->| deadurl= no}}</ref> |
|||
== Features and limitations == |
== Features and limitations == |
||
Line 45: | Line 43: | ||
== Reaction == |
== Reaction == |
||
Reaction to the utility by Doom9 forum members, [[blog]]gers, and mainstream media has ranged from supportive to intensely hostile. By some, the circumvention of AACS was seen as a reaffirmation of fair use. Others felt that the utility was no more than a piracy tool and would bring about group punishment against consumers in the form of player revocation. One article compared proponents of BackupHDDVD to terrorists.<ref>{{cite web|url=http://www.dvdfile.com/index.php?option=com_content&task=view&id=5932&Itemid=11|title=The HD Disc Hacks|date=2007-02-21| |
Reaction to the utility by Doom9 forum members, [[blog]]gers, and mainstream media has ranged from supportive to intensely hostile. By some, the circumvention of AACS was seen as a reaffirmation of fair use. Others felt that the utility was no more than a piracy tool and would bring about group punishment against consumers in the form of player revocation. One article compared proponents of BackupHDDVD to terrorists.<ref>{{cite web|url=http://www.dvdfile.com/index.php?option=com_content&task=view&id=5932&Itemid=11|title=The HD Disc Hacks|date=2007-02-21|access-date=2007-03-18|archive-url = https://web.archive.org/web/20070316113644/http://www.dvdfile.com/index.php?option=com_content&task=view&id=5932&Itemid=11 |archive-date = March 16, 2007|url-status=dead}}</ref> When the release of the tool was first publicized, several articles claimed that AACS had been cracked.<ref name="Techtree" /><ref name="Yahoo" /> In fact no cryptographic weaknesses constituting a crack have yet been found in [[Advanced Encryption Standard|AES]], the underlying cryptographic system of AACS. Keys are actually obtained through a [[side-channel attack]].<ref name="AACSLA" /> |
||
Initially, it was thought that the compromise of HD DVD's security would entice some studios into adopting the competing [[Blu-ray Disc|Blu-ray]] format, but Blu-ray's AACS implementation has since been circumvented using a similar method. However, Blu-ray offers an additional layer of protection called [[BD+]]. |
Initially, it was thought that the compromise of HD DVD's security would entice some studios into adopting the competing [[Blu-ray Disc|Blu-ray]] format, but Blu-ray's AACS implementation has since been circumvented using a similar method. However, Blu-ray offers an additional layer of protection called [[BD+]]. |
||
There was some speculation that the player used by the utility's author to obtain keys would be [[Certificate revocation |
There was some speculation that the player used by the utility's author to obtain keys would be [[Certificate revocation|revoked]]. [[Cyberlink]], which sells the PowerDVD player software, was quick to deny that its software could be used to obtain keys.<ref>{{cite web|url=http://www.engadgethd.com/2007/01/02/cyberlink-responds-to-backuphddvd-crack-it-wasnt-us/|author=Richard Lawler|publisher=Engadget HD|title= Cyberlink responds to BackupHDDVD crack: It wasn't us|date=2007-01-02| access-date=2007-01-02| archive-url= https://web.archive.org/web/20070107174954/http://www.engadgethd.com/2007/01/02/cyberlink-responds-to-backuphddvd-crack-it-wasnt-us/| archive-date= 7 January 2007 | url-status= live}}</ref> [[Corel]] was silent about the role its [[WinDVD]] software had played in the leaking of volume and title keys. Both companies have since released updates for their player software.<ref name="AACSLA" /> |
||
Cyberlink responds to BackupHDDVD crack: It wasn't us|date=2007-01-02| accessdate=2007-01-02| archiveurl= https://web.archive.org/web/20070107174954/http://www.engadgethd.com/2007/01/02/cyberlink-responds-to-backuphddvd-crack-it-wasnt-us/| archivedate= 7 January 2007 <!--DASHBot-->| deadurl= no}}</ref> [[Corel]] was silent about the role its [[WinDVD]] software had played in the leaking of volume and title keys. Both companies have since released updates for their player software.<ref name="AACSLA" /> |
|||
The consortium behind the HD DVD format and the studios delivering films on the format did not release an official statement beyond that they were investigating the utility.<ref name="NYTimes">Markoff |
The consortium behind the HD DVD format and the studios delivering films on the format did not release an official statement beyond that they were investigating the utility.<ref name="NYTimes">{{Cite news |last=Markoff |first=John |date=2007-01-01 |title=Studios' DVDs Face a Crack in Security |language=en-US |work=The New York Times |url=https://www.nytimes.com/2007/01/01/technology/01hack.html |access-date=2023-01-29 |issn=0362-4331}}</ref> On January 24, 2007 AACS LA issued a statement acknowledging that AACS security had been compromised while urging software vendors to limit the availability of keys in memory.<ref name="AACSLA">{{cite web| url=http://www.aacsla.com/press| title=RESPONSE TO REPORTS OF ATTACKS ON AACS TECHNOLOGY| date=2007-01-24| access-date=2007-01-31| archive-url=https://web.archive.org/web/20070204103232/http://www.aacsla.com/press| archive-date=4 February 2007| url-status=dead}}</ref> Beginning with discs manufactured in late April, versions of PowerDVD and WinDVD responsible for leaking keys have been revoked and free updates are available to owners of affected versions.<ref>{{cite web|url=https://arstechnica.com/news.ars/post/20070407-corel-updates-windvd-to-stop-aacs-hackers.html| title=Corel updates WinDVD to stop AACS hackers| author=Reimer, Jeremy|website=Ars Technica|date=2007-04-07| access-date=2007-04-15| archive-url= https://web.archive.org/web/20070505112742/http://arstechnica.com/news.ars/post/20070407-corel-updates-windvd-to-stop-aacs-hackers.html| archive-date= 5 May 2007 | url-status= live}}</ref> |
||
== Notes == |
== Notes == |
||
Line 64: | Line 61: | ||
[[Category:Video software]] |
[[Category:Video software]] |
||
[[Category:Digital rights management circumvention software]] |
[[Category:Digital rights management circumvention software]] |
||
[[Category: |
[[Category:Windows-only freeware]] |
Latest revision as of 10:06, 24 August 2024
Original author(s) | Muslix64 |
---|---|
Stable release | Non [±] |
Preview release | 1.0.3 (January 25, 2007[±] | )
Operating system | Windows |
License | Freeware[1] |
BackupHDDVD is a small computer software utility program available in command line and GUI versions which aids in the decryption of commercial HD DVD discs protected by the Advanced Access Content System. It is used to back up discs, often to enable playback on hardware configurations without full support for HDCP. The program's source code was posted online, but no licence information was given.
Written by an anonymous programmer using the handle Muslix64, BackupHDDVD is distributed with none of the cryptographic keys necessary for decryption. Users wanting to use the software to decrypt a protected disc's contents must obtain the appropriate keys separately, a task with which neither the original author nor his or her versions of BackupHDDVD assist.[2][3]
BackupHDDVD represented the first known successful attack against AACS. The utility circumvents content protection by decrypting video files directly with AES, the underling cryptographic cipher used by AACS. Using this technique, BackupHDDVD is able to completely bypass the AACS chain of trust, rendering it immune to revocation. The cost of this immunity is that users are forced to rely on keys leaking from commercial player software to use BackupHDDVD with new discs.[4][5]
History
[edit]According to the creator of BackupHDDVD, he or she first set out to circumvent AACS to bypass a restriction in software HD DVD players which reduced the quality of AACS restricted 1080p high definition video to that of standard definition DVD video or refused to play outright unless an HDCP compliant chain of video hardware was present.[2] At the time only a few computer monitors and video cards supported HDCP. As a result, configurations that would have allowed high-definition HD DVD viewing in software players were exceptionally rare.[6][7]
On December 18, 2006, a video which showed BackupHDDVD being used to decrypt and copy the film Full Metal Jacket to a hard drive was uploaded to YouTube.[8] Two days after the video was uploaded, the initial version of the utility along with its source code and documentation was uploaded to a file hosting service. A link to the file was then posted by the utility's creator on the forums of Doom9, a website devoted to DVD backup. The utility's documentation, along with the forum post, contained little information as to how necessary keys could be obtained. The author elaborated in another forum post, claiming that keys could be obtained by exploiting the necessity for them to be held in memory to allow playback in player software.
On January 2, 2007, the author posted the 1.0 version of the BackupHDDVD utility, which included support for the decoding of discs using volume keys.[9] For several weeks following the utility's release no success using the author's key extraction technique was reported.[10][11] In mid-January 2007, a volume key was published by another member of the Doom9 forum along with an explanation of the technique used to obtain it. Other forum members quickly discovered keys for different titles. Keys for many discs are now readily available on the internet.
Further development of BackupHDDVD was being hosted on SourceForge until the site received a DMCA takedown notice alleging a violation in late February. In compliance with the notice, the project was immediately removed. Several versions of BackupHDDVD have been released by individuals other than the original author, including some versions with GUIs and the ability to locate keys on the internet or scan for them in memory automatically. HDDecrypter, a port of BackupHDDVD to C with a native Windows GUI is also available. This version supports multiple CPU threads and runs faster than its Java counterparts. While development of BackupHDDVD has ceased, a commercial HD DVD decryption utility called Slysoft AnyDVD HD exists which relies on compromised AACS processing or media keys to allow for the backup or unrestricted viewing of any AACS-protected discs without the need for title or volume keys.[12][13]
Background
[edit]The AACS Licensing Authority (LA) assigns a series of 253 unique cryptographic keys to device manufacturers. When an AACS protected disc is manufactured, a series of up to 64 keys called title keys are generated and the video content on the disc is encrypted using these keys. The title keys are stored on the disc and themselves encrypted with another key called the volume unique key. The volume unique key for any disc can be calculated by all authorized devices using another key called a processing key, which is derived from a media key block stored on each disc. Authorized devices use one or more of the manufacturer's assigned device keys to decrypt the media key block, yielding a processing key and enabling further decryption of the volume and title keys, and finally the content.[14]
If a device key is to be revoked, the media key blocks on all discs manufactured after the time of revocation are encrypted in a way which does not enable the revoked device to obtain a valid processing key.[15] Users trying to view new content on a revoked player would be forced to upgrade their player software to a more secure version, thereby limiting the scope of the compromise each time an exploit is discovered.[16][17] While a compromised device or processing key could be used to decrypt a large number of discs, BackupHDDVD does not use these keys because they can be revoked by AACS LA. Because the AACS revocation system works by preventing a given device or player from calculating a valid volume unique key, BackupHDDVD circumvents the system entirely by relying on volume or title keys leaked from authorized players. With these keys BackupHDDVD is not subject to device revocation and is able to decrypt the content directly, bypassing the key exchange and verification process.[14][18][19]
Features and limitations
[edit]Users must have either found decryption keys themselves or obtained them elsewhere for most versions of BackupHDDVD to work. The utility reads a text file containing volume or title keys and attempts to find a set of corresponding keys for the inserted disc. Through a standard AES library, it then decrypts each video file on the disc using the appropriate keys and writes the results to a location specified by the user. Direct file decryption allows the utility's functionality to remain unaffected by device key revocation and its performance unencumbered with AACS overhead.[3]
Originally intended to be a proof of concept, BackupHDDVD is severely limited in its ability to produce fully functional copies of commercial discs. Early versions were unable to properly decrypt discs which used the in-movie experience technology. New versions work around this limitation by excluding interactive content from decrypted copies. The utility cannot process HD DVD navigation functionality which enables menus, chapters, secondary audio tracks and subtitles, so these features are inaccessible in copies created by BackupHDDVD. Most versions provide no validation for keys and will still attempt to decrypt a disc's contents with an incorrect key, resulting in corrupt files.[11]
Legality
[edit]Under United States anti-circumvention law created by the Digital Millennium Copyright Act, BackupHDDVD may qualify as a device primarily intended to "circumvent a technological measure that effectively controls access to a [protected] work." If identified as such, it would be illegal to use or distribute.
Reaction
[edit]Reaction to the utility by Doom9 forum members, bloggers, and mainstream media has ranged from supportive to intensely hostile. By some, the circumvention of AACS was seen as a reaffirmation of fair use. Others felt that the utility was no more than a piracy tool and would bring about group punishment against consumers in the form of player revocation. One article compared proponents of BackupHDDVD to terrorists.[20] When the release of the tool was first publicized, several articles claimed that AACS had been cracked.[2][8] In fact no cryptographic weaknesses constituting a crack have yet been found in AES, the underlying cryptographic system of AACS. Keys are actually obtained through a side-channel attack.[21]
Initially, it was thought that the compromise of HD DVD's security would entice some studios into adopting the competing Blu-ray format, but Blu-ray's AACS implementation has since been circumvented using a similar method. However, Blu-ray offers an additional layer of protection called BD+.
There was some speculation that the player used by the utility's author to obtain keys would be revoked. Cyberlink, which sells the PowerDVD player software, was quick to deny that its software could be used to obtain keys.[22] Corel was silent about the role its WinDVD software had played in the leaking of volume and title keys. Both companies have since released updates for their player software.[21]
The consortium behind the HD DVD format and the studios delivering films on the format did not release an official statement beyond that they were investigating the utility.[23] On January 24, 2007 AACS LA issued a statement acknowledging that AACS security had been compromised while urging software vendors to limit the availability of keys in memory.[21] Beginning with discs manufactured in late April, versions of PowerDVD and WinDVD responsible for leaking keys have been revoked and free updates are available to owners of affected versions.[24]
Notes
[edit]- ^ "BackupHDDVD". Softpedia. SoftNews. Retrieved 22 November 2017.
- ^ a b c "Took Eight Days to Crack HD DVD!". Techtree. 2006-12-28. Archived from the original on 4 January 2007. Retrieved 2007-01-02.
- ^ a b Gardiner, Bryan (2006-12-29). "Next-Gen DVD DRM Hacked—Maybe". PC Magazine. Archived from the original on 2008-04-21. Retrieved 2007-01-02.
- ^ Robert McMillan (2006-12-29). "Hacker: Blu-ray, HD DVD copy protection cracked". InfoWorld. Archived from the original on 9 May 2007. Retrieved 2007-05-08.
- ^ Gabriel Ikram (2006-12-28). "Hackers Claim HD DVD Encryption Circumvented". DailyTech. Archived from the original on 2007-09-30. Retrieved 2007-01-02.
- ^ Tom Mainelli (2006-07-13). "GeekTech: Want to View HD Content on Your PC? Upgrade Wisely". PC World. Archived from the original on 2007-09-30. Retrieved 2007-05-04.
- ^ Ken Fisher (2006-02-14). "The truth behind HDCP and video card support". Ars Technica. Archived from the original on 6 April 2007. Retrieved 2007-05-04.
- ^ a b "Hacker Cracks High-Def DVD Encryption System". 2006-12-30. Retrieved 2007-01-02. [dead link ]
- ^ Michael O'Connor (2007-01-02). "BackupHDDVD v1.00 Released". Archived from the original on 14 January 2007. Retrieved 2007-01-02.
- ^ Block, Ryan (2006-12-27). "AACS DRM cracked by BackupHDDVD tool?". Engadget. Archived from the original on 2 January 2007. Retrieved 2007-01-02.
- ^ a b Ken Fisher (2006-12-28). "HD DVD reportedly cracked, but difficult to verify". Ars Technica. Archived from the original on 3 January 2007. Retrieved 2007-01-02.
- ^ Marcus Yam (2007-02-13). "All Blu-ray Disc and HD DVD Encryption Defeated by Single Key". DailyTech. Archived from the original on 2007-02-19. Retrieved 2007-02-16.
- ^ Mark Hachman (2006-02-14). "Beta Software to Copy HD DVDs Released". PC Magazine. Archived from the original on 23 February 2007. Retrieved 2007-02-20.
- ^ a b arnezami (2007-02-17). "Understanding AACS (including Subset-Difference)". Archived from the original on 3 March 2007. Retrieved 2007-03-18.
- ^ AACS-LA. "Introduction and Common Cryptographic Elements" (PDF). Archived from the original (PDF) on 2007-03-02. Retrieved 2007-03-22.
- ^ Scott M. Fulton, III (2006-12-29). "Studios Take Claims of AACS Crack Seriously". BetaNews. Archived from the original on 1 January 2007. Retrieved 2007-01-02.
- ^ Tony Smith (2006-12-28). "HD DVD anti-rip encryption cracked". The Register. Archived from the original on 3 January 2007. Retrieved 2007-01-02.
- ^ John Leyden (2007-04-04). "Latest AACS crack 'beyond revocation'". The Register. Archived from the original on 7 May 2007. Retrieved 2007-05-05.
- ^ Jeremy Reimer (2007-03-15). "New AACS cracks cannot be revoked, says hacker". Ars Technica. Archived from the original on 5 May 2007. Retrieved 2007-05-05.
- ^ "The HD Disc Hacks". 2007-02-21. Archived from the original on March 16, 2007. Retrieved 2007-03-18.
- ^ a b c "RESPONSE TO REPORTS OF ATTACKS ON AACS TECHNOLOGY". 2007-01-24. Archived from the original on 4 February 2007. Retrieved 2007-01-31.
- ^ Richard Lawler (2007-01-02). "Cyberlink responds to BackupHDDVD crack: It wasn't us". Engadget HD. Archived from the original on 7 January 2007. Retrieved 2007-01-02.
- ^ Markoff, John (2007-01-01). "Studios' DVDs Face a Crack in Security". The New York Times. ISSN 0362-4331. Retrieved 2023-01-29.
- ^ Reimer, Jeremy (2007-04-07). "Corel updates WinDVD to stop AACS hackers". Ars Technica. Archived from the original on 5 May 2007. Retrieved 2007-04-15.
External links
[edit]- Original post at Doom9