- Extended Copy Protection
:"XCP redirects here. For other uses, see
XCP (disambiguation) ."Extended Copy Protection (XCP) is a software package developed by the British company
First 4 Internet , (which on20 November 2006 , changed its name to Fortium Technologies Ltd - see links below), and sold as acopy protection ordigital rights management (DRM) scheme forcompact disc s. It was used on some CDs distributed by Sony BMG and sparked the2005 Sony BMG CD copy protection scandal ; in that context it is also known as the Sony rootkit.Security researchers beginning with
Mark Russinovich in October 2005 have described the program as functionally identical to arootkit : a software program used by computer hackers to conceal unauthorised activities on a computer system. Russinovich broke the story on his [http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx Sysinternals blog] , where it gained attention from the media and other researchers. The publicity, which grew to include a civil lawsuit and criminal investigations, soon forced Sony to discontinue use of the system.While Sony eventually recalled the CDs that contained the XCP system, the web-based uninstaller was investigated by noted security researchers
Ed Felten andJ. Alex Halderman , who [http://www.freedom-to-tinker.com/?p=927 discovered] that theActiveX component used for removing the software exposed users to far more significant security risks, including arbitrary code execution from any site on the internet.Description
The version of this software used in Sony CDs is the one marketed as "XCP-Aurora". The first time a user attempts to play such a CD on a Windows system, a program will be installed even before a dialog box prompts the user to accept a license agreement. [http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx] The
EULA did not mention that it installed hidden software. The software will then remain resident in the user's system, intercepting all accesses of the CD drive to prevent any media player or ripper software other than the one included with XCP-Aurora from accessing the music tracks of the Sony CD. No obvious way to uninstall the program is provided. Attempting to remove the software by deleting the associated files manually will render the CD drive inoperable due to registry settings that the program has altered.The included player software will play the songs and allow only a limited degree of other actions such as burning the music onto a certain number of other CDs or loading it onto certain DRM-protected devices such as a few portable music players. The popular
iPod , sold by Sony competitorApple Computer , does not support their DRM format and they could not use Apple's FairPlay.XCP conceals itself from the user by installing a patch to the Windows operating system. This patch stops ordinary system tools from displaying processes, registry entries, or files whose names begin with $sys$. Other XCP components include "Plug and Play Device Manager", which continuously monitors all other programs being run on the computer.
Security research
In the period that XCP has been publicly known, security researchers have been quick to analyze it and publish their findings. Many of these findings have been highly critical of Sony and First 4 Internet. Specifically, the software has been found to conceal its activity in the manner of a
rootkit (a common computer criminal's toolkit for hiding evidence); and moreover has been found to expose users to follow-on harm from viruses and trojans.XCP's cloaking technique, which makes all processes with names starting with
$sys$
invisible, can be used by other malware "piggyback ing" on it to ensure that it, too, is hidden from the user's view. The first malicious trojan to use this technique was discovered on10 November ,2005 according to a [http://news.bitdefender.com/NW193-en--First-Trojan-Using-Sony-DRM-Detected.html report] by theBitDefender antivirus company.Follow-up research by
Edward Felten andJ. Alex Halderman has shown that the Web-baseduninstaller Sony later offered for the software contains its own critical security problems. [http://www.freedom-to-tinker.com/?p=928] The software installs anActiveX component which allows any Web site to run software on the user's computer without restriction. This component is used by First 4 Internet's Web site to download and run the uninstaller, but it remains active afterward -- allowing any Web site the user visits to take over the computer.Since it is specific to Microsoft Windows, XCP has no effect on all other operating systems such as
Linux ,BSD ,OS/2 , Solaris, orMac OS X , meaning that users of those systems do not suffer the potential harm of this software, and they also are not impeded from "ripping " (or copying) the normal music tracks on the CD. (Some discs involved in the Sony scandal contained a competing technology,MediaMax fromSunnComm , which attempts to install a kernel extension on Mac OS X. However, due to thepermissions of Mac OS X, there were no widespread infections among Mac users.)Antivirus industry response
Shortly after independent researchers broke the story, security software vendors followed up, releasing detailed descriptions of the components of XCP — as well as software to remove the
$sys$*
cloaking component of it. On the other hand, no software has yet been released to remove the CD-ROM filter driver component.Computer Associates , makers of thePestPatrol anti-spyware software, characterize the XCP software as both a trojan horse and aroot kit [http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453096362] :XCP.Sony. Rootkit installs a DRM executable as a Windows service, but misleadingly names this service "Plug and Play Device Manager", employing a technique commonly used by malware authors to fool everyday users into believing this is a part of Windows. Approximately every 1.5 seconds this service queries the primary executables associated with all processes running on the machine, resulting in nearly continuous read attempts on the hard drive. This has been shown to shorten the drive's lifespan.
Furthermore, XCP.Sony. Rootkit installs a device driver, specifically a CD-ROM filter driver, which intercepts calls to the CD-ROM drive. If any process other than the included Music Player (player.exe) attempts to read the audio section of the CD, the filter driver inserts seemingly random noise into the returned data making the music unlistenable.
XCP.Sony. Rootkit loads a system filter driver which intercepts all calls for process, directory or registry listings, even those unrelated to the Sony BMG application. This rootkit driver modifies what information is visible to the operating system in order to cloak the Sony BMG software. This is commonly referred to as rootkit technology. Furthermore, the rootkit does not only affect XCP.Sony. Rootkit's files. This rootkit hides every file, process, or registry key beginning with
$sys$
. This represents a vulnerability, which has already been exploited to hide "World of Warcraft " RING0 hacks as of the time of this writing, and could potentially hide an attacker's files and processes once access to an infected system had been gained.Computer Associates announced, on November 2005, that its anti-spyware product,PestPatrol , would be able to remove Sony's software. [http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453096362] [http://blogs.zdnet.com/Spyware/index.php?p=698] One month laterMicrosoft released an update for itsWindows Malicious Software Removal Tool which could clean the [http://www.microsoft.com/security/encyclopedia/details.aspx?name=WinNT/F4IRootkit F4IRootkit] malware. [http://msmvps.com/blogs/jubo/archive/2005/12/15/79171.aspx]The somewhat slow and incomplete response of some antivirus companies has, however, been questioned by
Bruce Schneier "information security expert" at Counterpane and author of security bible "Secrets and Lies". In an article for "Wired News ", Mr. Schneier asks, "What happens when the creators of malware collude with the very companies we hire to protect us from that malware?" His answer is that "users lose... A dangerous and damaging rootkit gets introduced into the wild, and half a million computers get infected before anyone does anything." [http://wired-vig.wired.com/news/privacy/0,1848,69601,00.html]Impact of XCP
Beginning as early as August 2005, Windows users reported crashes related to a program called "aries.sys", while inexplicably being unable to find the file on their computers. [http://www.saintsreport.com/forums/printthread.php?s=6d58ebd7f894333e767120b73ed32782&threadid=169497] This file is now known to be part of XCP. "Call for Help" host
Leo Laporte said that he had experienced a rise in reports of "missing" CD-ROM drives, a symptom of unsuccessful attempts to remove XCP. [http://www.grc.com/sn/SN-012.htm]Security researcher
Dan Kaminsky used DNS cache analysis to determine that 568,000 networks worldwide may contain at least one XCP-infected computer. Kaminsky's technique uses the fact that DNS nameservers cache recently-fetched results, and that XCP phones home to a specifichostname . By finding DNS servers that carry that hostname in cache, Kaminsky was able to approximate the number of networks affected. [http://www.doxpara.com/?q=sony] After the release of the data, Kaminsky learned that an as-yet undetermined number of "Enhanced CDs" without the rootkit also phone home to the same address that rootkit-affected discs use, so infection rates are still under active investigation.XCP flaw
According to analyst firm
Gartner , XCP suffers from the same flaw in implementing DRM as any DRM technology current or future that tries to apply DRM to audio CDs designed to be played on stand-alone CD players. According to Gartner, because the installation of XCP or any DRM software relies on the CD being multi-session, the application of a piece of opaque tape to the outer edge of the disk renders the data track of the CD unreadable, causing the PC to treat the disc as an ordinary single-session music CD.Facts|date=February 2008Slysoft 'sAnyDVD program, which removes copy protections from both standard and hi-definition video discs, also defeats DRM on audio CDs. When active and an audio CD is inserted,AnyDVD blocks the PC from accessing any session but the audio; rendering data sessions unreadable and preventing the installation of malware such as XCP. [AnyDVD Help file, v.6.3.1.5]Legal concerns
There is much speculation to what extent the actions taken by this software are a violation of various laws against unauthorized tampering with computers, or laws regarding invasion of privacy by "
spyware ", and how they subject Sony and First 4 Internet to legal liability. The States of California, New York, and Texas, as well as Italy, have already taken legal action against both companies and more class action lawsuits are likely. However, the mere act of attempting to view or remove this software in order to determine or prevent its alteration of Windows would theoretically constitute a civil or criminal offense under certain anti-circumvention legislation such as the controversialDigital Millennium Copyright Act in theUSA .The
Electronic Frontier Foundation 's Fred von Lohmann also heavily criticised [http://www.eff.org/deeplinks/archives/004145.php] the XCPEULA , shown for acceptance before the software installation, naming it the legalese rootkit.One of the primary reasons for the XCP experiment lies in the issue of adding on DRM to a legacy standard. These problems are explored by Professor Randal Picker, Professor of Law for the
University of Chicago School of Law, in his article, "Mistrust-Based Digital Rights Management", published in Volume 5 of the "Journal of Telecommunications and High Technology Law". CDs by themselves are incapable of updating legacy hardware such as stand-alone CD players, and lack the ability to change or upgrade the firmware in order to read DRM. Thus the DRM must be added on so as not to interfere with the function of the legacy players but still work when the same CD is placed in a computer. Professor Picker analyzes the four main issues with add-on DRM.The first problem, as demonstrated in the XCP example, is that capable consumers can simply by-pass the DRM. Turning off autorun prevented the rootkit installation and thus invalidated the DRM scheme.
The second problem is consumer reaction. Adding DRM to a legacy product like music CDs, which traditionally had no rights management scheme, will infuriate consumers. Professor Picker points out that in the wake of the negative publicity surrounding the Sony add-on DRM,
Amazon.com began alerting customers as to which Sony CDs contained XCP. Customers could avoid the DRM entirely, negating the effectiveness.The third problem lies in the legal response. The EFF, as well as state attorneys general, investigated and brought suit against Sony for the XCP program. Professor Picker does not analyze the legal merits of such suits, but the cost of litigation potentially outweighs the benefit of attempting to add-on DRM.
The fourth and final problem lies in the End User License Agreement attempted to be enforced by the add-on DRM. The ability to actually enforce these agreements on add-on DRM is limited by the mere fact that without active registration and tracking of the CDs, the company will have no one to enforce against. Thus, the benefit, enforcing the EULA against violators, is non-existent; the costs, however, of implementing the add-on DRM scheme, in the form of state and federal investigations, private lawsuits, negative publicity, consumer backlash and the technical limitations, far outweighs the benefits.
Copyright violations
Researcher Sebastian Porst [ [http://www.the-interweb.com/serendipity/index.php?/archives/55-Proof-that-F4I-violates-the-GPL.html Proof that F4I violates the GPL - Programming stuff ] ] , Matti Nikki [ [http://hack.fi/~muzzy/sony-drm/ Sony's XCP DRM ] ] and a number of software experts have published evidence that the XCP software infringes on the copyright of the
LAME mp3 encoder [ [http://www.the-interweb.com/serendipity/index.php?/archives/52-Is-Sony-in-violation-of-the-LGPL-Part-II.html Is Sony in violation of the LGPL? - Part II - Programming stuff ] ] ,mpglib [ [http://www.the-interweb.com/serendipity/index.php?/archives/54-Breakthrough-after-breakthrough-in-the-F4I-case.html Breakthrough after breakthrough in the F4I case - Programming stuff ] ] ,FAAC [ [http://www.the-interweb.com/serendipity/index.php?/archives/56-Two-new-F4I-license-infringements-found.html Two new F4I license infringements found - Programming stuff ] ] [ [http://sam.zoy.org/blog/2005-11-21-suspicious-activity-indeed Sam Hocevar’s .plan ] ] .Princeton researcher Alex Halderman discovered [http://www.freedom-to-tinker.com/?p=940] that on nearly every XCP CD, code which uses a modified version from
Jon Johansen 'sDRMS software which allows to openApple Computer 'sFairPlay DRM is included. He found the code to be inactive, but fully functional as he could use it to insert songs into Fairplay. DRMS, mpg123 and VLC are licensed under theGNU General Public License (GPL). The other software found, like LAME is licensed under the terms of theGNU Lesser General Public License (LGPL), also asfree software . If the claims are correct, thenSony/BMG was distributing copyrighted material illegally.Jon Johansen wrote in his blog [http://nanocrew.net/2006/01/31/sony-bmg-infringement/] that after talking with a lawyer, he thinks that he cannot sue; however, there are opinions that the advice he was given is wrong [http://www.techdirt.com/articles/20060201/0313222_F.shtml] .The LAME developers have put an open letter [http://lame.sourceforge.net/open_letter_sony_bmg.html] to Sony/BMG online.
Copyright violations which Sony could be accused [http://www.anselsbrain.com/?p=25] of include:
* No "prominent notices" for including of GPL and LGPL software.
* Statically linking GPL code into the program but not providing the source code of the whole program under GPL.
* Statically linking LGPL code but not providing the source of the LGPL parts and the binary code of the non-LGPL parts to allow relinking with updated LGPL code.
* Placing restrictions on the use of the code outside of what GPL/LGPL allow, e.g. not “licensing at no charge to all third parties” under the LGPL and GPL.Sony already provides [http://www.sony.net/Products/OpenMG/overview/tech.html] a version of id3lib's source code on its web site, but unrelated to XCP.
ony's response
On a
National Public Radio program,Thomas Hesse , President of Sony BMG's global digital business division asked "Most people, I think, don't even know what a rootkit is, so why should they care about it?" [http://www.npr.org/templates/story/story.php?storyId=4989260] He explained that "The software is designed to protect our CDs from unauthorized copying andripping and Rootkit technology is one of the best ways to do just that."Sony also contends that the "component is not malicious and does not compromise security," but "to alleviate any concerns that users may have about the program posing potential security vulnerabilities, this update has been released to enable users to remove [the root kit] component from their computers."
A patch [http://cp.sonybmg.com/xcp/english/updates.html] to remove the cloaking of the software has been released; this patch does not completely remove XCP, but disables its technique of hiding itself from view.
An uninstaller for XCP-Aurora is now available from the Sony-BMG web site [http://cp.sonybmg.com/xcp/english/updates.html] . An analysis of this uninstaller has been published by Mark Russinovich — who initially uncovered XCP — entitled "More on Sony: Dangerous Decloaking Patch, EULAs and Phoning Home" [http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html] . Obtaining the uninstaller requires one to use a specific browser (Microsoft
Internet Explorer ) and to fill out an online form with their email address, receive an email, install the patch, fill out a second online form, and then they will receive a link to the uninstaller. The link is personalized, and will not work for multiple uninstalls. Furthermore, Sony's Privacy Policy [http://www.sonybmg.com/privacypolicy.html] states that this address can be used for promotions, or given to affiliates or "reputable third-parties who may contact you directly".It has also been reported that the uninstaller might have security problems which would allow remote code execution [http://hack.fi/~muzzy/sony-drm/] . Sony's uninstall page will attempt to install an ActiveX control when it is displayed in Internet Explorer. This ActiveX control is marked "Safe for scripting," which means that any web page can utilize the control and its methods. Some of the methods provided by this control are dangerous, as they may allow an attacker to download and execute arbitrary code.
On
11 November ,2005 , Sony [http://today.reuters.co.uk/news/newsArticle.aspx?type=technologyNews&storyID=2005-11-11T183106Z_01_MOL166114_RTRIDST_0_TECH-SONY-COPYPROTECTION-DC.XML&archived=False announced] they would suspend manufacturing CDs using the XCP system:"As a precautionary measure, Sony BMG is temporarily suspending the manufacture of CDs containing XCP technology," it said in a statement.
"We also intend to re-examine all aspects of our content protection initiative to be sure that it continues to meet our goals of security and ease of consumer use," Sony BMG added.
This followed comments by
Stewart Baker , theDepartment of Homeland Security 's assistant secretary for policy, in which he took DRM manufacturers to task, as reported in the [http://blogs.washingtonpost.com/securityfix/2005/11/the_bush_admini.html "Washington Post"] :In a remark clearly aimed directly at Sony and other labels, Stewart continued: "It's very important to remember that it's your intellectual property — it's not your computer. And in the pursuit of protection of intellectual property, it's important not to defeat or undermine the security measures that people need to adopt in these days."
According to the "
New York Times " [http://www.nytimes.com/2005/11/14/business/14rights.html] , Sony BMG said "about 4.7 million CDs containing the software had been shipped, and about 2.1 million had been sold." 52 albums were distributed by Sony-BMG that contained XCP. [http://cp.sonybmg.com/xcp/english/titles.html]On
14 November ,2005 , Sony announced it was recalling the affected CDs and plans to offer exchanges to consumers who purchased the discs. [http://www.usatoday.com/tech/news/computersecurity/2005-11-14-sony-cds_x.htm?csp=34]Albums with XCP
:"Full article:
List of compact discs sold with XCP ":"See also: http://cp.sonybmg.com/xcp/english/titles.html
The Electronic Freedom Foundation published its original list of 19 titles on
9 November 2005 [http://www.eff.org/deeplinks/archives/004144.php] .On15 November 2005 "The Register " published an [http://www.theregister.co.uk/2005/11/15/sony_bmg_bodycount/ article] saying there may be as many as 47 titles.Sony BMG says there are 52 XCP CDs. [http://cp.sonybmg.com/xcp/english/titles.html]Amazon says it's treating the XCP CDs as defective merchandise and will offer a refund with shipping, as long as the customer specifies the request. [http://www.usatoday.com/tech/news/computersecurity/2005-11-15-sony-qa_x.htm]
See also
*
Fortium Technologies
*MediaMax
*Digital Rights Management
*Copy protection
*OpenMG , Sony DRM used bySony Connect
*2005 Sony BMG CD copy prevention scandal
* StarForce copy protection
* Apple FairPlay DRM
*Janus (DRM) References
* Krebs, Brian. " [http://blogs.washingtonpost.com/securityfix/2005/11/calif_ny_lawsui.html Calif. Lawsuit Targets Sony] ". "Washington Post";
8 November ,2005 .External links
* [http://cp.sonybmg.com/xcp/ Sony BMG XCP Help Page]
* [http://www.f4i.co.uk/ First 4 Internet]
* [http://www.fortium.co.uk/ Fortium Technologies Ltd (new name adopted by First 4 Internet)]
* [http://wck2.companieshouse.gov.uk/a87b42528cc28362d53b47fd96b37c59/compdetails/ Companies House page showing change of name from First 4 Internet to Fortium Technologies.]
* [http://www.xcp-aurora.com/ XCP-Aurora]
* [http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html Analysis of XCP as a rootkit]
* [http://www.europe.f-secure.com/v-descs/xcp_drm.shtml F-Secure report]
* [http://cp.sonybmg.com/xcp/english/updates.html Online and downloadable patch available from Sony]
* [http://www.worship.co.za/BlackAndWhiteInc/xcp.htm XCP Removal Instructions] (Doesn't require download of additional software)
* [http://www.dozleng.com/updates/topic7048 Detailed removal instructions from malware expert Kevin MacAleavey]
* [http://www.grc.com/securitynow.htm#12 Security Now! Podcast #12 which discusses XCP-Aurora in detail]
* [http://blog.washingtonpost.com/securityfix/2005/11/virus_writers_exploit_sony_ant.html Virus Writers Exploit Sony Anti-Piracy Software]
* [http://www.eff.org/IP/DRM/Sony-BMG/?f=open-letter-2005-11-14.html Electronic Frontier Foundation open letter to Sony BMG]
* [http://dewinter.com/modules.php?name=News&file=article&sid=215 Spyware Sony seems to breach copyright]
* [http://www.wired.com/news/privacy/0,1848,69573,00.html Wired News on the Dan Kaminsky's infection numbers]
* [http://wired-vig.wired.com/news/privacy/0,1848,69601,00.html Bruce Schneier for Wired news on "the real story"]
* [http://www.eff.org/news/archives/2005_11.php#004192 EFF Files Class Action Lawsuit Against Sony BMG]
* [http://www.freedom-to-tinker.com/?p=960 CD DRM: Attacks on Disc Recognition]
* [http://itpolicy.princeton.edu/pub/sonydrm-ext.pdf "Lessons from the Sony CD DRM Episode"] (PDF format), by J. Alex Halderman andEdward Felten ,February 14 , 2006
Wikimedia Foundation. 2010.