I'm trying to work out if this thread is a genuine idea being proposed or if it was simply to highlight the futility of SWF Verification. If it was the latter: Well demonstrated! ;)
On Tue, Mar 9, 2010 at 2:23 PM, Paul Webster <[email protected]> wrote: > And for practical purposes ... the UserAgent field changes with version > updates. > So - as software gets updated it would mean that the back-end would also > have to go through the library and re-generate keys for old material (or > recalculate it on the fly on access). > Taking just an invariable sub-string of the UserAgent field ("product" up to > the "/") would remove the issue. > > But is this an attempt to determine if "rogue"-application1 using the > UserAgent string of "legal"-application2 might be the basis of some sort of > legal protection (copyright or DCMA-style infringement)? > > Sounds unlikely to me - given that changing UA field is routinely done and > documented (e.g. Opera includes it in standard UI so that it can get into > sites that include code for specific browsers but don't recognise standard > Opera). > (MS-IE identifying itself as "Mozilla" is an example of hackery in this > area) > > Meanwhile - what happens when someone distributes one of more of the pairs > of user-agent/key - in that case the "rogue" app will not need direct access > to the original file. > > Personal view - I wish that the Flash verification had not been turned on - > and I would like to see the impact analysis that BBC did before doing it. > > Paul > ----- Original Message ----- From: "Iain Wallace" <[email protected]> > To: <[email protected]> > Sent: Tuesday, March 09, 2010 1:50 PM > Subject: Re: [backstage] Re: User Agent/Referrer Verification > > >> I think I replied from an address which isn't registered with the list >> earlier, so here's what I said again: >> >> The fact that this is all presumably going to be sent in the clear as >> opposed to encrypted means this would be technically very easy to >> reverse engineer. Aside from that, the key really is the resource, >> which you'd somehow need to protect in order to stop invalid user >> agents just spoofing all this info. In that respect it's very similar >> to swf verify, which doesn't work. >> >> Whether this can be claimed to be a copyright mechanism is a legal >> rather than technical issue IMO. >> >> On Tue, Mar 9, 2010 at 12:14 AM, Mo McRoberts <[email protected]> wrote: >>> >>> On 8-Mar-2010, at 22:55, Mo McRoberts wrote: >>> >>>> Learned Backstage types, >>> >>> [snip] >>> >>>> I’ve written it up here: >>>> http://nevali.net/post/435363058/user-agent-referrer-verification >>> >>> It’s been pointed out to me that the write-up would be better in the >>> e-mail, so here it is: >>> >>> This is a snippet of code which verifies access to a given resource based >>> upon a combination of access to a referring resource and a user-agent >>> string. The client generates an sha256-hmac based on the contents of the >>> referring resource (which the client must have access to) and its user-agent >>> string. This HMAC is sent along with the request for a resource. >>> >>> Thus, given a list of referring resources and valid user agents, the >>> server can generate a list of valid keys by performing the same sha256-hmac >>> process on each combination. If a client sends a request which does not >>> appear in this list of keys, the request is denied. >>> >>> I would be interested on an expert opinion as to whether this is >>> considered an “effective” technological copyright-protection mechanism >>> according to the Copyright, Designs and Patents Act 1988 (as amended by The >>> Copyright and Related Rights Regulation 2003), and whether implementing a >>> third-party client which implements this protocol (for the purposes of >>> interoperability) constitutes “any device, product or component which is >>> primarily designed, produced, or adapted for the purpose of enabling or >>> facilitating the circumvention of effective technological measures” as >>> specified by section 296ZB of the Act. >>> >>> Cheers! >>> >>> M. >>> >>> -- >>> mo mcroberts >>> http://nevali.net >>> iChat: [email protected] Jabber/GTalk: [email protected] Twitter: @nevali >>> >>> Run Leopard or Snow Leopard? Set Quick Look free with DropLook - >>> http://labs.jazzio.com/DropLook/ >>> >>> >>> >>> >>> >>> >>> >>> >>> >>> - >>> Sent via the backstage.bbc.co.uk discussion group. To unsubscribe, please >>> visit http://backstage.bbc.co.uk/archives/2005/01/mailing_list.html. >>> Unofficial list archive: >>> http://www.mail-archive.com/[email protected]/ >>> >> >> - >> Sent via the backstage.bbc.co.uk discussion group. To unsubscribe, please >> visit http://backstage.bbc.co.uk/archives/2005/01/mailing_list.html. >> Unofficial list archive: >> http://www.mail-archive.com/[email protected]/ >> > > - > Sent via the backstage.bbc.co.uk discussion group. To unsubscribe, please > visit http://backstage.bbc.co.uk/archives/2005/01/mailing_list.html. > Unofficial list archive: > http://www.mail-archive.com/[email protected]/ > - Sent via the backstage.bbc.co.uk discussion group. To unsubscribe, please visit http://backstage.bbc.co.uk/archives/2005/01/mailing_list.html. Unofficial list archive: http://www.mail-archive.com/[email protected]/

