Security Researchers Shouldn't Face DMCA Liability While Protecting Users From Faulty DRM

from the no-brainers dept

Longtime Techdirt readers may remember Alex Halderman, who conducted influential research into the problems created by CD-based DRM during his time as a grad student here at Princeton. He's now a professor at the University of Michigan, and he's working on a new project: seeking a DMCA exemption for security research related to defective DRM schemes that endanger computer security. We've seen in the past that DRM schemes can open up security vulnerabilities in users' computers, and Halderman argues that the public would benefit if security researchers could examine DRM schemes without being threatened with litigation under the DMCA for doing so.

The DMCA gives the Librarian of Congress the power to grant three-year exemptions for DRM circumventions that are perceived to be in the public interest, and one of the exemptions granted in the 2006 triennial review was for CD-based DRM schemes that create security problems. Alex points out in his filing that the most serious security vulnerabilities created by DRM since that rule-making have come not from CD-based DRM but from video game DRM, which has not been adequately studied by security researchers. A ton of prominent security researchers (including Alex and my mutual advisor, Ed Felten) have endorsed Alex's request, arguing that the threat of DMCA liability hampers their research. We hope the Librarian of Congress is listening. If you live near Palo Alto or Washington, DC, you can sign up to testify about Alex's proposal (or others) by filling out this form.


Reader Comments (rss)

(Flattened / Threaded)

  •  
    identicon
    Weird Harold, Mar 23rd, 2009 @ 11:15am

    Would it not be enough for them to document cause and effect without ripping the DRM apart? I use this DRM disc, and this happens. That should be more than enough.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Weird Harolds #2 Fan, Mar 23rd, 2009 @ 11:32am

      Re:

      Yeah! Understanding how something works is irrelevant!!

      You flip the light switch, and the light comes on. Needing more in-depth understanding is just wrong! (Damn near unpatriotic!) You should always trust powers greater than yourself (US Gov, Big Corporations). If you flip the switch and the light doesn't come one, just call the help line and some helpful customer service rep will help you in fixing it.

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        Weird Harold, Mar 23rd, 2009 @ 11:44am

        Re: Re:

        Idiot.

        I filp on the switch. The light is suppose to come on, and it doesn't. I check the things I can check (is the bulb burnt? Is the breaker off?) and then I report "the light isn't working". I don't have to rip the house apart to be able to say "the light isn't working".

        As for post #2:

        1) If you aren't discussing the code, just the end results, there is no DMCA possible. Showing what happens as a result of installing a given DRM product on a computer system is a "eye" thing - report what you can see, right down to changes on the system. If there is a problem you can point to the box and say "the newly installed DRM is making this happen". You don't have to reverse engineer the whole product to find that out.

        2) See #1 - if you aren't digging in their code but documenting only results, there should be no issues.

        3) Encryption by itself should not be an issue. Again, the intent is to document faults / security holes created, not to reverse engineer the product.

        3a) When in doubt, don't use the product.

        The issue with this sort of an exemption is that the kindly professor could examine the DRM and understand it, publish a paper on it, when is in turn used by a third party to hack the DRM. They should be documenting the problems, not looking to find new ones.

         

        reply to this | link to this | view in chronology ]

        •  
          identicon
          snowburn14, Mar 23rd, 2009 @ 12:35pm

          Re: Re: Re:

          "I filp on the switch. The light is suppose to come on, and it doesn't. I check the things I can check (is the bulb burnt? Is the breaker off?) and then I report "the light isn't working". I don't have to rip the house apart to be able to say "the light isn't working"."

          Well, that's great, but that wouldn't allow you to point to a particular thing and claim that it is the cause for the failure in the light. And that is exactly the intent of research into whether DRM is opening security vulnerabilities. You have to be able to point to something in their code that is causing a problem. Otherwise it would be the equivalent of flipping the switch, seeing the light did not turn on, and claiming the bulb is burnt out. Sure, that COULD be the cause, but the bulb manufacturer (aka the company responsible for the DRM) would claim it could be the fuse, the wiring, a rolling brownout, or any number of other things if you don't do a thorough analysis. And they would be right to do so.

           

          reply to this | link to this | view in chronology ]

      •  
        identicon
        TheStuipdOne, Mar 23rd, 2009 @ 11:48am

        Re: Re:

        Until the remote off switch that the power company installed in your wall gets hacked, overheats, explodes, and burns down your house.

         

        reply to this | link to this | view in chronology ]

    •  
      identicon
      anon, Mar 23rd, 2009 @ 11:39am

      Re:

      As far as research goes, just documenting cause and effect is pretty insubstantial. "The tide ebbs twice in 24 hours, so it's caused by the daily cycle" problem being you really haven't come to any conclusion. you haven't proposed a hypothesis, and then tested it for support in other ways. It's just not good science to leave something with an unsupported thesis.

      In addition, since the purpose of DRM is usually to limit the Illegal distribution of content, this "ripping apart" is not violating the purpose. The DMCA probably shouldn't go after the people doing the research that could help their product become better, they should focus more on the people who are using the flaws in their DRM to attack or otherwise compromise peoples computers.

       

      reply to this | link to this | view in chronology ]

    •  
      identicon
      B, Mar 23rd, 2009 @ 12:06pm

      Re:

      The problem is they are trying to do what you suggest, Harold, and they run the risk of being threatened under the DCMA. If you check out the article he linked to, you'll see there's no mention of reverse engineering the code or trying to decompile the source material... the Princeton guys just tried to break SDMI's copy protection system (which presumably they did).

      In actuality the exception shouldn't be necessary, but since companies seem so intent upon abusing the DCMA to make people take down material they find objectionable (even if it isn't illegal), we find people asking for an additional safe harbor. Redundancy, thy name is government.

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      chris (profile), Mar 23rd, 2009 @ 12:50pm

      Re:

      Would it not be enough for them to document cause and effect without ripping the DRM apart? I use this DRM disc, and this happens. That should be more than enough.

      the tools and techniques used to test security are the same as those used to circumvent it.

      you run a debugger and watch stuff move around a systems memory, you run a fuzzer to see how a program deals with arbitrary data, you run sniffers to see what goes over the wire or proxies to catch stuff before it comes in or goes out so you can see what it is or what it does.

      the only difference between security research and cracking is what you intend to do with the information that you have gathered. researchers hack stuff and share what they know to improve the security of products while crackers share what they know in order to strip away protections.

       

      reply to this | link to this | view in chronology ]

    •  
      identicon
      hegemon13, Mar 23rd, 2009 @ 2:35pm

      Re:

      Yes, because everything about the inner workings of a piece of software can be determined from a limited external view. You really are out of your league here. Say that to a professional software tester, and they would flat-out laugh in your face.

      No, it's not nearly enough. Security flaws are not intentional "features," and they are often not apparent until after someone has exploited them. If they could be easily observed outside the code, all of Window's many security flaws would have been readily obvious shortly after release.

      A better question would be, why is this even a problem? If they use their knowledge to publish software patches for the purpose of circumvention, it would clearly still be illegal, and they could still be prosecuted.

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        Weird Harold, Mar 23rd, 2009 @ 2:43pm

        Re: Re:

        Again, the assumption is that there is a flaw, and that they are aware of it because it has been reported.

        You don't have to disassemble a black box to know what it does. Crap in this end, modified crap out of that end. If you are concerned about a piece of software, don't install it.

        I understand the desire to research and rip things apart, just like they would do to a bug or rock or whatever else they might study, and honestly, they can rip the DRM apart all they like - they just can't report it.

        More to the point: If they think there is a problem contact the manufacture, offer your services for free (because you would do it for free anyway) and get their permission. I am sure that most companies would love to uncover and fix flaws before they become security nightmares.

         

        reply to this | link to this | view in chronology ]

        •  
          identicon
          Easily Amused, Mar 23rd, 2009 @ 3:20pm

          Re: Re: Re:

          please shut up.

          you obviously have no clue what the adults are talking about... go back to the playroom.

           

          reply to this | link to this | view in chronology ]

        •  
          identicon
          Sneeje, Mar 23rd, 2009 @ 6:31pm

          Re: Re: Re:

          You don't have to disassemble a black box to know what it does

          You are officially insane if you really believe this and have obviously never done research. By that logic, I could completely understand how a car engine works by doing two things: putting in gas, oil, and water and analyzing the sounds, smells, etc that come out. It might work with simple binary systems, but not with complex ones.

          If that doesn't convince you, let's consider what will happen once the researchers decide that some DRM causes a problem X. The company responsible for the DRM will simply claim the problem results from the environment in which the DRM operates and there will be nothing the researches can say or do to counter the claim. Of course that will never hap--oh wait except for those e-voting companies... and Sony... but certainly no one else.

           

          reply to this | link to this | view in chronology ]

  •  
    identicon
    Should be more than enough, but it's not., Mar 23rd, 2009 @ 11:32am

    Perhaps it should be more than enough, but it's not for three reasons:


    1) Any type of DRM presentation is probably going to get hit with a DCMA takedown notice right before the conference begins. That has been the history of these things. Typically the conference organizers get jumpy and cancel the presentation, even if the takedown notice is bogus. At least with this protection the presenter would have something to show to the conference organizers.


    2) Digging into the problems of a DRM package is probably going to get the owner of the DRM package to claim that part of the package has been reverse engineered, or that the data provided would permit reverse engineering. The only real protection is to explicitly say that this type of research is covered by the exception.


    3) If the researcher is going to do a thorough job, some elements of the encryption are probably going to have to be explored. This does not mean the whole system needs to be cracked in all cases, but it is likely. Restricting the researchers is like telling a Doctor that he can examine a patient, but cannot touch them or use any type of x-ray, MRI, cat-scan, blood test, or anything else that lets them look inside the patient. This would work for some types of diagnosis, but there are a lot of things it would simply not work for.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Grab, Mar 23rd, 2009 @ 11:51am

    A matter of trust...

    If you trust that the encrypted data that your pc is sending to www.drm_is_not_evil.com is just the serial number and unique cpu hash like the DRM company claims then great!

    However if you have any security sense about you you would want to crack and verify that that the software is really only doing what they claim and it should not be a crime to do so.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Jesse, Mar 23rd, 2009 @ 12:36pm

    Weird Harold you are many types of moron in one pretty little package. You flip on a light switch, it doesn't work, so leave it at that right? "It doesn't work, so I'll just work in the dark." Don't figure out why it doesn't work, or how to fix it. Where the fuck are you from.

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    chris (profile), Mar 23rd, 2009 @ 12:42pm

    vendors gag security researchers all the time

    the DMCA is just a new twist on an old theme.

    microsoft, cisco, adobe, novell... every vendor has used gag orders at one time or another to silence a researcher who has discovered a fatal flaw.

    the real problem with DRM is that it's not real security, and so it doesn't hold up to real security research.

    real security research is proven by peer review. you prove something is secure by having people try to break it. you show everyone how it works and invite them to come smash it. if they succeed, then you fix the vulnerability, and if they fail, then you can feel safe that your solution is secure, for now.

    the anti-circumvention clause in the DMCA prevents this kind of research and so DRM technologies hide behind legalities. this is why DRM doesn't work and gets owned in a short period of time.

    thanks to the sony rootkit fiasco, you now have a legion of researchers who mistrust all implementations of DRM in addition to the people who are interested in circumventing it.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Mar 23rd, 2009 @ 1:27pm

    Ed Felten has provided a lot of great research over the years. Unfortunately, not everyone can make it to California. If you come across a way to utilize those who can't make it to California or DC, please let us know.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    RD, Mar 23rd, 2009 @ 2:59pm

    wha??

    What part of "security researcher" do you not get Harold? You think someone in the security field just does basic on/off testing and then goes "well, thats it boys! we cant figger this'n out now!" and throws up their hands and gives up, like you always do? The ENTIRE PURPOSE of a security researcher IS to break something and find out if its doing what its supposed to, and/or if there are any vulnerabilities and weaknesses in the system. Your "why do they need to?" idiocy just shows your ignorance about the entire subject.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Jesse, Mar 23rd, 2009 @ 3:32pm

    God you're so stupid. You clearly don't understand the basic principles of research. If the world was filled with weird harolds (I shudder to think) we would all still think that the world is flat and at the center of the universe.

    You have sucked so much corporate cock that the words that come out of your mouth don't make any sense.

    And you are a total hypocrite too, you know why? Because copyright law is at this point so absurd that pretty much every one on this planet has infringed copyright at some point, yourself included. At this point you can't defend copyright in its entirety without being a hypocrite.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Mar 23rd, 2009 @ 3:53pm

    Bad DRM without research by white hats is just a way of letting the black hats have a longer opening to security holes. Increases computer insecurity and lets the terrorists win. Therefore to support the DMCA is to support terrorism.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Weird Harold's former #5 fan, Mar 23rd, 2009 @ 4:35pm

    I am sure that most companies would love to uncover and fix flaws before they become security nightmares.

    All right, the gig is up. This sentence is all the proof we need that you're just a bored troll. I mean, nobody with a pulse could honestly believe such nonsense given how companies have treated security researchers who have uncovered flaws in their software in the past.

    You are joking, right?

    Right??

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Mar 23rd, 2009 @ 7:44pm

    Has Harold realized he is in over his head ?
    Maybe he has left to go make noises under some other bridge.

     

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This