Jump to content

Vista Supports Enhanced DRM Protection


Recommended Posts

Posted (edited)

Straight from Microsoft's kernel improvement documentation:

The Windows Vista operating system introduces a new type of process, called a protected process, that enhances support for digital rights management functionality in Windows Vista and Windows Longhorn Server. These protected processes exist alongside typical processes in Windows Vista.

Differences between a Typical Process and a Protected Process. The primary difference between a typical Windows process and a protected process is the level of access that other processes in the system can obtain to protected processes.

In earlier versions of Windows operating systems, before Windows Vista, the process model allows a parent process to acquire a handle to and manipulate the state of any child process it creates. Similarly, processes that are created by users with sufficient privileges (that is, a system administrator) can access and manipulate the state of all processes on the system. This behavior remains unchanged for typical Windows processes. However, the level of access to protected processes and to threads within those processes is significantly more constrained in Windows Vista.

Significant Functionality Constraints of Protected Processes. Developers who are accustomed to interacting with typical Windows processes will notice the following significant differences in interacting with protected processes. A typical Windows process cannot take the following actions on a protected process:

1. Inject a thread into another process. A call to CreateRemoteThread requires a handle that must have the PROCESS_CREATE_THREAD, PROCESS_QUERY_INFORMATION, PROCESS_VM_OPERATION, PROCESS_VM_WRITE, and PROCESS_VM_READ access rights

2. Debug an active protected process. A call to DebugActiveProcess requires PROCESS_ALL_ACCESS.

Which Applications Can Create a Protected Process. Currently only the Windows Protected Media Path can create protected processes.

Vendors of any product that monitors and reports on processes in the system (such as software debuggers, anti-malware applications, and so on) should be aware of the specific constraints on protected processes and should test their software on systems that are running protected processes.

For the uninitiated, most tools designed to bypass DRM do so by the inject/debug techniques. Also note that this protection is built into the kernel. Any attempts to modify the kernel will result in a BSOD, so there is no way to disable this protection.

Edited by Aegis

Posted
Any attempts to modify the kernel will result in a BSOD, so there is no way to disable this protection.
There's always a workaround... but this is probably one of the main reasons why I'm not going to be switching to Vista.
Posted

Nope, I doubt it. Windows Server 2003 SP1 and Windows x64 Edition also contain this protection (which is the reason why no one can create a custom bootscreen for these OSes) and it has yet to be cracked.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...