A New Security Layer

Earlier this month AWS posted an interesting blog titled “Secure content using CloudFront Functions“. It discussed how OTT service providers, who are AWS customers, can leverage such functionality to increase the level of security in their streaming services. The blog went on to explain how AWS offers Signed Cookies and Signed URLs as the basis for content protection mechanisms, and compliments it with CloudFront Functions for more flexible functionality. Signed Cookies and Signed URLs deal with access to unauthorized content by users, a scenario that web application designers often face. In other words, you want to make sure that a user can only access what that user is entitled to.
When it comes to OTT services, however, there are other use cases that are no less impactful, as OTT has several vulnerabilities. One such vulnerability, and a fundamental one at that, lies in the use of tokens that are inherent to the OAuth framework, on which OTT exchanges are based. Tokens are susceptible to abuse, as they are easily duplicated and reused. And so the challenge is to verify that a token is only used by the user and client to whom it was granted.
The common method being offered in such cases is to include the IP address of the client requesting authorization in the token or cookie. It can then be validated against the IP address of the client attempting to access content using the token or cookie, to ensure it is the same one.
This method, however, is far from robust, nor is it fully secure.
IP addresses don’t necessarily remain static, whether because the user is on the move, or just switching between Wi-Fi and cellular. In such cases, the streaming video would be disrupted, offering a sub-optimal user experience. Additionally, multiple devices could be located behind Network Address Translation (NAT) sharing the same IP address, or they could be proxied through another server, so that all would appear to be coming from the same IP address. The CDN vendors who offer this method acknowledge that it is not recommended, and that their customers who attempted it refrain from using it.
Another attempt to avoid token abuse is to try to assign an ID to the client. It is, however, very difficult to prevent such an ID from being duplicated, similar to the way that tokens are duplicated.
A different threat lies in access by what appears to be legitimate users, that are, in fact, abusive client impersonators. This is one of the common methods used by illegal actors, that has recently been widely observed across streaming service providers as the source of stolen content.
Thus, if you want to keep pirates out of your service, a solution that addresses the currently existing vulnerabilities should, at least, have the following properties:
Deploying a solution with the above properties would ensure that you can keep pirates out of your service, as well as avoid paying the CDN and associated infrastructure costs generated by free-riding pirate subscribers.
We, at Synamedia, have built such a solution. As you can imagine, it was far from trivial to achieve all of the aforementioned properties. But now that we have, Service Providers can benefit from our extensive experience in the field, our deep understanding of piracy techniques, and our highly advanced technology.
Nitsan Baider is a Director of Product Management at Synamedia. In his role he leads the development of new and innovative security solutions for streaming OTT service providers, taking them to market, and evangelizing them. Nitsan has spent many years in cyber security and has led several products in the past. He holds a B.Sc. In Mathematics and Computer Science from Tel-Aviv University. In his spare time, Nitsan enjoys playing piano.
Sign up to Synamedia events and news