Feeds

Stealth plan puts copy protection into every hard drive

And buggers backups, imaging and RAID

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Exclusive Hastening a rapid demise for the free copying of digital media, the next generation of hard disks is likely to come with copyright protection countermeasures built in.

Technical committees of NCTIS, the ANSI-blessed standards body, have been discussing the incorporation of content protection currently used for removable media into industry-standard ATA drives, using proprietary technology originating from the 4C Entity. They're the people who brought you CSS2: IBM, Toshiba Intel and Matsushita.

The scheme envisaged brands each drive with a unique identifier at manufacturing time.

The proposals are already at an advanced stage: three drafts have already been discussed for incorporating CPRM (Content Protection for Recordable Media) into the ATA specification by the NCTIS T.13 committee. The committee next meets in February. If, as expected, the CPRM extensions become part of the ATA specification, copyright protection will be in every industry-standard hard disk by next summer, according to IBM.

However, what's likely to create a firestorm of industry protest is that the proposed mechanism introduces problems to moving data between compliant and non-compliant hard drives. Modifications to existing backup programs, imaging software, RAID arrays and logical volume managers will be required to cope with the new drives, The Register has discovered.

The ramifications are enormous. Although the benefit to producers is great - bringing the holy grail of secure content one step closer - the costs to consumers will be significant. For example, corporate IT departments will be unable to mix compliant and non-compliant ATA drives as they try to enforce uniform back up policies, we've discovered. Restoring personal backups to a different physical drive - a common enough occurrence when a disk has failed - will require authentication with a central server. Imaging software used by OEMs and large corporates to distribute one-to-many disk images will also need to be modified.

And the move casts a shadow over some of the hottest emerging business models: the network attached storage industry, which relies on virtualising media pools, the digital video recorder market currently led by TiVo and Replay, and the nascent peer-to-peer model all face technical disruption.

How it works

Today, CPRM is implemented on DVD and removable SD disks. But the SCSI and ATA/ATAPI proposals incorporate an extension of the scheme to allow the encryption to be used on hard drives, in addition to removable drives and ATAPI devices such as CD-ROMs and DVD drives.

The proposal makes use of around a megabyte of read-only storage on each hard drive that isn't usually accessed by the end user for a "Media Key Block". According to research scientist Jeffrey Lotspiech of IBM's Almaden Research Lab, this is a matrix of 16 columns and some 3000 rows. A static "Media Unique Key" in a separate, hidden area of the drive, identifies the individual drive. Making use of broadcast encryption and one way key algorithms, would-be hackers face a daunting number of keys to break. CPRM adds new commands into the ATA specification.

But because the system makes use of the physical location on the device of the encrypted item, software designed for non-compliant drives will break in some circumstance when encrypted data files are moved.

"It requires both drives to be compliant when data is to move from one disk to another," says Lotspiech. "And a compliant application to get all that data to the new drive".

So a hard drive containing small individual containing non-copyable files of say, Gartner reports, will essentially be unrestorable using existing backup programs.

Similar problems arise with RAID arrays using IDE disks, acknowledges IBM. "This may help IT managers when auditing for copyright compliance," suggests IBM spokesman Mike Ross.

However the decision to make an organisation CPRM compliant. Free copying is no longer an option:-

"It's not up to us to determine or guess what the content provider might permit," says Ross. "Nothing will handcuff proper backup and restoring provided the content provider permits it. Some may not permit it - but what will the customers reaction be then?"

Well, quite. Clearly key management becomes an urgent priority when CPRM-aware drives are introduced next year, as CPRM-aware content will surely follow. The decision to go with CPRM in an organisation is also an all or nothing proposition - it can't be introduced gradually.

But for home users, the party's over. CRPM paves the way for CPRM-compliant audio CDs, and the free exchange of digital recordings will be limited to non-CPRM media.

The Register understands there is fierce opposition to the plan from Microsoft and its OEM customers. Generating hundreds of thousands of images each week, the PC industry relies on data going from one master to many reliably and smoothly. Imaging programs face the same problem as restore software: the target disk isn't the same as the originator disk. Microsoft Redmond already has put in a counter-proposal that eschews low-level hardware calls.

Where were you when they copy-protected the hardware, Daddy?

The intellectual property is owned by the 4C Entity, and administered by License Management International, LLC - a limited liability company based in Morgan Hill, California. Company founder John Hoy told The Register that "LMI,LC holds no intellectual property. Entities are granted a master license."

Per-device royalties are payable to LLI,LC. License fees of between 2c and 17c have been mooted for each device, according to documents circulated to the T.13 group. 5c is the current rate for a DVD device.

Three possible paths lie ahead. CPRM may be bounced out of the T.x committees. Or manufacturers may choose not to implement it, and opt for an incomplete ATA or SCSI specification. This is deemed unlikely. Or thirdly, manufacturers may choose to implement the new command set, but not activate it.

Although it hardly has a prominent media profile - yet - CPRM in hardware is the most comprehensive mechanism for enforcing rights protection the industry has seen, and is likely to be viewed by content producers as a magic bullet. Its progress depends on whether its proponents can overcome industry and consumer opposition. Which might be brewing right about ... now. ®

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.