[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3638036.3640276acmconferencesArticle/Chapter ViewAbstractPublication PagesmhvConference Proceedingsconference-collections
short-paper

Next-Generation Access Tokens to Fight CDN Leeching

Published: 14 March 2024 Publication History

Abstract

Stealing content directly from the Content Delivery Network (CDN) of legitimate content providers has become too easy. It is time for CDNs to join the fight against piracy, rather than turning a blind eye to the issue.
In a classic form of piracy, one of the legitimate clients grabs the regular video stream displayed on her screen, using a screen-casting tool for instance, and redistributes it on a dedicated illegal infrastructure for pirate viewers. While being a known curse, such piracy has not really taken off due to the cost that pirate providers have to bear for the illegal delivery infrastructure and the lower quality of the pirate stream. Yet, in a new form of piracy, referred to as CDN leeching, pirates simply share some tokens that grant access to the content from the delivery infrastructure of the legal service provider. It doubles the pain for Over-The-Top (OTT) service providers: not only some illegal users access their content without authorization, but also the content provider pays for the delivery to these pirates. Furthermore, the 'pirate stream' quality is on par with the legal service, which increases churn from the legal services. Despite the implementation of authentication tokens and Digital Rights Management (DRM), OTT video streaming services have hardly hampered the ramp up of CDN leeching.
Streaming security experts have largely overlooked the role of the CDNs for a long time. To fight piracy, service providers have first focused on trusted hardware authentication from controlled set-top-boxes, and then implemented DRM for their OTT services. The CDN tokens have been designed to offer a light-weight optional security layer without compromising the streaming scalability, which is the baseline purpose of CDN servers. The adoption of software-based authentication to support mobile devices and the vulnerabilities of DRMs, epitomized by Widevine L3 [2], have put CDNs in a more central position and calls for revisiting the design of CDN tokens.
A CDN token is a small digital object, which encodes the requirements to be granted access to a resource [1, 4]. It is piggybacked in every request from the client to the CDN server. This involves three entities: the content provider, the client, and the CDN server. The client triggers the generation of a new token by sending some data related to its next request(s) to the content provider. The content provider validates the request(s) and issues an encrypted and integrity-protected token, usually relying on some cryptographic primitives. The client then sends the token along with its request(s) to the CDN server, which (i) decrypts the token, (ii) validates the integrity of the token, (iii) checks whether the requirements of the token are met, and (iv) validates the access if everything checks out. Crypto-secrets needed to perform these tasks are typically acquired from the content provider and managed at configuration level.
One-time tokens, constructed for one specific request and one specific client, guarantee that a token cannot be replayed. However, it requires scaling the security part of the delivery infrastructure accordingly. A single client generates many requests during a video streaming session: every five seconds, the client requests a manifest, a video segment, and an audio segment, not mentioning other related data. Issuing and validating tokens for each individual object and user may be challenging for most existing content provider's token servers or CDN servers.
In practice, the streaming community has not agreed on a best practice yet. The CTA Wave working group, which standardizes a common CDN token format [3], has postponed the release of its first reference document. Meanwhile, the industry, in desperate need for a token, has designed multiple proprietary formats, which prevents re-use and multi-vendor delivery services. We also miss a reference study on the best implementation of time expiration in tokens. The community distinguishes short-lived tokens (which either have a short expiration time or refer to a small number of consecutive assets) and long-lived tokens (which either have a long expiration tine or refer to a long series of consecutive assets).
In this paper, we will bridge those two gaps. First, we will identify the parts of CAT that will undoubtedly be implemented in the final specification and thus can already be implemented and adopted by the industry. We strongly believe that we cannot wait any further the definition of a token, so we call for an informal adoption of a subset of claims. Second, we will compare the impact of long and short-lived tokens to help infrastructure administrators identifying the sweet operating spot for their service. Eventually, we will explore the concept of mixed-lived token, which could make pirate operations more difficult, and the changes it would require from content providers, video players, and CDN servers.

References

[1]
Daniel Fett, Brian Campbell, John Bradley, Torsten Lodderstedt, Michael B. Jones, and David Waite. 2023. OAuth 2.0 Demonstrating Proof of Possession (DPoP). RFC 9449. https://doi.org/10.17487/RFC9449
[2]
Gwendal Patat, Mohamed Sabt, and Pierre-Alain Fouque. 2022. WideLeak: How Over-the-Top Platforms Fail in Android. In 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022. IEEE, 501--508. https://doi.org/10.1109/DSN53405.2022.00056
[3]
CTA Wave. (In progress). Common Access Token. Draft.
[4]
CTA Wave. (In progress). Fast and Readable Geographical Hashing. Draft.

Cited By

View all
  • (2024)Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access PatternsCyber Security, Cryptology, and Machine Learning10.1007/978-3-031-76934-4_12(178-189)Online publication date: 12-Dec-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MHV '24: Proceedings of the 3rd Mile-High Video Conference
February 2024
150 pages
ISBN:9798400704932
DOI:10.1145/3638036
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 March 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Content Delivery Networks
  2. DRM
  3. Security
  4. Tokens

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

MHV '24
Sponsor:
MHV '24: Mile-High Video Conference
February 11 - 14, 2024
CO, Denver, USA

Upcoming Conference

MHV '25
Mile-High Video Conference
February 18 - 20, 2025
Denver , CO , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)55
  • Downloads (Last 6 weeks)3
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Minimally Intrusive Access Management to Content Delivery Networks Based on Performance Models and Access PatternsCyber Security, Cryptology, and Machine Learning10.1007/978-3-031-76934-4_12(178-189)Online publication date: 12-Dec-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media