This article is designed to help Linux users to play the Blu-ray discs they have legally purchased on their computers. Since no official Blu-ray player software is available on their system, Linux users have to use open-source libraries capable of handling the DRM schemes that protect these disc contents. This is legal in most countries where interoperability allows this.
- 1 How it works
- 2 Playback
- 2.1 Preparation
- 2.2 Decryption process
- 2.3 Media players
- 2.4 Troubleshooting
- 3 See also
How it works
Contrary to the DVD CSS, which was definitely compromised once the unique encryption key had been discovered, Blu-ray uses stronger DRM mechanisms, which makes it a lot more difficult to manage. Firstly, the AACS standard uses a lot more complicated cryptographic process to protect the disc content, but also allows the industry to revoke compromised keys and distribute new keys through new discs. Secondly, Blu-ray may also use another layer of protection: BD+. Although most of commercial discs use AACS, a few of them additionally use BD+. In 2007, the AACS system was compromised and decryption keys were published on the Internet. Many decryption programs were made available, but the interest to Linux users was the capability of playing their discs - legally purchased - on their computers. Although the industry was able to revoke the first leaked decryption keys, new keys are regularly published in a cat and mouse play.
. This project does not offer any key or certificate that could be used to decode encrypted copyrighted material. However, combined with a key database file, it is possible to use it to play Blu-ray discs that use the AACS standard. This file is called
KEYDB.cfg and is accessed by libaacs in
~/.config/aacs. The format of this file is available at .
AACS decryption process
The AACS decryption process for a protected disc by a licensed player goes through four stages:
- The software/embedded player's Device Keys, together with the disc's Media Key Block (MKB) data are used to retrieve a "Processing Key", and with that (plus another datum from the MKB) to compute the Media Key.
- That Media Key, together with the disc's Volume ID (VID) obtained by the player presenting a valid Host Certificate to the drive is used to compute the Volume Unique Key (VUK).
- This VUK is used to unscramble the disc's scrambled Title Keys.
- Finally those Title Keys unscramble the disc's protected media content.
Note that it is the disc that contains the MKB. MKBs have been renewed since the first commercial Blu-ray release in 2006. The latest MKB is version 70, and many discs actually share the same MKB. The software player provides the Host key and certificate, whereas the drive contains a list of the Host key/certificates that have been revoked. Host key/certification revocation occurs when a newer disc (containing a higher MKB than the previous played disc) is decrypted, or played, or attempted to decrypt or play (the mere insertion of a disc does not update the drive). When this happens, the drive forever loses its capability to use older Host key/certificates.
KEYDB.cfg file either (or both):
- a valid (corresponding to the MKB version of the disc) Processing key and a valid (i.e. non revoked by the drive) Host key/certificate
- a valid VUK for the specific disc.
If libaacs finds a valid processing key for the disc MKB version as well as a valid Host key and certificates, it can start the decryption process from step 2. However, the Host key/certificates are regularly revoked through the propagation of new Blu-ray discs. Once revoked, a drive is not able to read both new and older discs. This is usually irreversible and can only be fixed by providing a more recent Host key/certificate (for Windows users, this corresponds to updating their software player). The advantage of this method is that until the Host key/certificate is revoked, and as long as the disc uses an MKB version for which the Processing key is known, libaacs is able to compute the VUK of any disc.
Thankfully, in case no valid Processing key is available and/or the Host certificate has been revoked, libaacs has an alternative way to decrypt a disc: by providing a valid VUK in the
KEYDB.cfg file. This allows libaacs to skip directly to step 3. Contrary to the Processing keys, VUKs are unique and specific to one disc ; however the great advantage is that once computed the VUK cannot be revoked. Note that if libaacs is able to perform step 2 (with a valid Host key/certificate), then it stores the VUK calculated in step 3 in
~/.cache/aacs/vuk. At subsequent viewings of the same disc, libaacs can reuse the stored VUK. Thus it may be a good idea to backup these VUKs or, even better, share them online.
There have been several efforts to compile VUKs from various sources. Early attempts were provided in various forums, such as Doom9.org. As the community got organised, a centralised VUK database was created at  with more than 24,000 published VUKs ; however, this website appears to be no longer maintained. A new initiative by the author of the FindVUK tool was then created at http://fvonline-db.bplaced.net/ with more than 90,000 downloadable entries, which makes it the most comprehensive source of public VUKs available.
BD+ is an additional but optional component of the Blu-ray DRM. In December 2013, VideoLAN released the long awaitedAUR which provides experimental support for BD+ decryption. The library does not provide keys or certificates required for BD+ decryption, you need to retrieve and install them separately.
bdplus-vm0.bz2. You want to put a folder named
~/.config/bdplus, not a file named
bdplus-vm0. You may have to rename the file to end with .tar.bz2 if you are using a GUI archiving tool.
- Install and .
- Download a
KEYDB.cfgfile from  and copy it in the directory
~/.config/aacs. This file contains VUK data required for attempting the decryption process described below for more than 90,000 discs. Note that all languages contain the same information to read a disc, only the name of the disc is translated. You may want to update this file regularly, as new versions are provided from time to time.
- Optionally, copy the PK and Host K/C data provided at  at the beginning of that
KEYDB.cfgfile. This provides PK and Host K/C data for discs up to MKB v68. This is only necessary for discs that may not already be listed in the VUK list, and will only work for drives that have never read a disc using MKB v70 or above.
- If necessary (i.e. if volumes are not mounted automatically on your system), mount the disc to a directory, e.g.:
# mount /dev/sr0 /media/blurays
Launch a Blu-ray software player, such as VLC, and try to play the disc (on VLC, select Media -> Open Disc, then in the Disc tab, chose Blu-ray. Be sure "No disc Menus" is checked.). The software player will then apply the decryption process described below:
- The user starts playing a Blu-ray with a video player having libbluray and libaacs support.
- If the BR disc is not scrambled with AACS, go to 4.1.
- If the BR disc is scrambled with AACS, libaacs will:
- Check if a valid VUK for the disc is already available in
~/.cache/aacs/vuk/. If yes, go to step 4.1, if not continue to next step.
- If a valid VUK is available, go to 4.1, if not continue to next step.
- If a valid PK (i.e. corresponding to the disc MKB version) and a valid (non-revoked by drive) Host key/certificate is available, libaacs will attempt to compute the VUK. The VUK is then stored in
~/.cache/aacs/vukfor future use. Go to step 4.1. If no valid PK/HKC are available, go to step 4.2.
- Check if a valid VUK for the disc is already available in
- The software player is able to play the disc content.
- The software player fails to read the disc content.
Decrypting using VUK (step 3.1 or 3.2.1)
Using the VUK specific to your disc will always work, and cannot be revoked by the industry, as it is the most downstream decryption key for a Blu-ray disc. However, there is one unique VUK per disc, corresponding to one VID, making this method rely on VUK lists or databases. The VUK will be known if either of these are true:
- decrypting using PK and Host K/C described below has worked once, and the generated VUK for your disc has been stored in
- the valid VUK for your disc has been obtained from a third party (i.e. is available in
KEYDB.cfg). This allows you to read a disc, even if the PK and host key/certificate have been revoked for your disc MKB version.
If none of these are true, then the software player will attempt decrypting the disc using the second method.
Decrypting using PK and Host K/C (step 3.2.2)
This method uses the Processing keys and a Host Key/Certificate present at the beginning of the
KEYDB.cfg file and will only work if they have not been revoked in your drive.
If this method is successful, after you play the disc, libaacs will store the VUK in
~/.cache/aacs/vuk. The filename is the disc ID and its content is the VUK itself. VLC will reuse this VUK even if it does not find a valid
KEYDB.cfg file, so it could be a good idea to backup this directory for the future.
DVDFab (under Wine).AUR provides experimental support for BD+ decryption, but if this fails, users will have to use commercial solutions, such as AUR or
BD+ mainly works by adding errors to the video stream, not enough to make it unwatchable but enough to make it unpleasant to watch due to near constant artifacting. These are fixed in official players by using "fixup tables", which are downloaded from the internet and provide a mapping to convert the broken video stream into the correct video stream. libbdplus stopped working a long time ago, and for right now there's no open source method of playing discs with BD+ protection.
These are media players capable of using libbluray and libaacs to play AACS-scrambled Blu-ray discs.
To play Blu-ray discs in mplayer the basic playback command is:
$ mplayer br:///</bluray/mount/dir>
$ mplayer br://<title number> -bluray-device </bluray/mount/dir>
It is likely that you will need to enable hardware acceleration and multi core CPU support for the Blu-ray to play smoothly.
For nvidia cards, enable hardware acceleration by installing libvdpau and using the option
--hwdec=auto with mplayer. e.g:
$ mplayer --hwdec=auto br:///</bluray/mount/dir>
For multi core CPU support use the options
N is the number of cores, e.g:
$ mplayer --vd-lavc-threads=4 br:///</bluray/mount/dir>
Incorrect audio language
You can scroll through the playback languages using the
From your first mplayer output, you must find the codec used for the Blu-ray. It will be at the end of the line "Selected video codec".
For H.264 discs use the option
-vc ffh264vdpau. e.g:
$ mplayer -vc ffh264vdpau br:///</bluray/mount/dir>
For VC-1 discs use
-vc ffvc1vdpau. e.g:
$ mplayer -vc ffvc1vdpau br:///</bluray/mount/dir>
For MPEG discs use
-vc ffmpeg12vdpau. e.g:
$ mplayer -vc ffmpeg12vdpau br:///</bluray/mount/dir>
Start playback with:
$ vlc bluray://</bluray/mount/dir>
Start playback with:
$ xine bluray://</bluray/mount/dir>
If a valid VUK is found in
~/.cache/aacs/vuk, then libaacs does not need to use
KEYDB.cfg to decrypt the content. However, a
KEYDB.cfg file in
~/.config/aacs/ is still required (even if that file is empty).
Revoked Host key/certificate
Unfortunately, what may happen when trying to play a newer Blu-ray disc is the revocation of host key/certificates (which are keys of licensed software players) by your drive. When this happens,AUR will return this message:
The given Host Certficate / Private Key has been revoked by your drive.
This is part of the AACS protection scheme: editors are able to revoke old software player host keys that have leaked on the Internet and distribute the lists on newer commercial disc releases. This is irreversible and cannot be fixed even after reflashing the drive. The only two ways to correct this would be:
- to update the host key/certificate part in
KEYDB.cfgto ones that have not been revoked (yet)
- to add in
KEYDB.cfgthe VUK of each specific disc instead, as explained above. VUKs cannot be revoked by the industry.
When a disc (using mplayer or vlc) is succesfully decrypted, libaacs will store the VUK in
~/.cache/aacs/vuk. If the host key/certificate in
KEYDB.cfg is subsequently revoked, VLC will still be able to use the stored VUK, so it could be a good idea to backup the
~/.cache/aacs directory for the future.
InstallAUR. You need to run AUR from a directory that contains valid host key/certificate and processing keys:
cd /usr/share/aacskeys && aacskeys /media/blurays
If you wish, you may add the Blu-ray to the key database: edit
~/.config/aacs/KEYDB.cfg and add the information output by aacskeys using this syntax:
0x<unit key file hash> = Film Title | V | 0x<volume unique key>
If aacskeys is not able to generate the key
Try to generate the VolumeID with DumpVID using wine. The VolumeID can now be used to generate the Blu-ray VUK with aacskeys with the VolumeID option
Usage: aacskeys [options] <mountpath> [volume id / binding nonce]
Note: the DumpVID does not seem to be available anymore, so an alternative is to use makemkv or other shareware applications. makemkv apparently has an official (or maybe stolen) decryption key and is able to generate decrypted MKV files.
If you have the corresponding VUK but the Blu-ray won't play
Some drives need the sg module loaded.
sudo modprobe sg
For DVD, thepackage supplies the needed decryption libs. Below are some options for Blu-ray/HD-DVD decryption. Users can employ to backup a commercial Blu-ray movie under Fair Use guidelines:
- AUR - Open source
- AUR - Closed source/limited free beta, has a native Linux version
- vukextract VukExtract support+discussion - Open source software that uses proprietary DVDFab to extract VUKs
- AnyDVD HD - Commercial software requiring users to run it on an Microsoft OS in a VM.
- DVDFab HD Decrypter - Commercial software for Windows, but works fine using Wine.
- Aiseesoft Blu-ray Player - Commercial software player for Windows, but works fine using Wine.