xxxsode
Meister
- Registriert
- 24. Dezember 2009
- Beiträge
- 931
- Reaktionspunkte
- 150
- Punkte
- 103
Code:
2020/12/20 11:10:53 00000000 s (main) System name = Linux
2020/12/20 11:10:53 00000000 s (main) Host name = raspberrypi
2020/12/20 11:10:53 00000000 s (main) Release = 4.19.75-v7l+
2020/12/20 11:10:53 00000000 s (main) Version = #1270 SMP Tue Sep 24 18:51:41 BST 2019
2020/12/20 11:10:53 00000000 s (main) Machine = armv7l
2020/12/20 11:10:53 00000000 s couldn't open statistics file: /var/etc/log/userfile.log
2020/12/20 11:10:53 00000000 s (config) services reloaded: 0 services freed, 12 services loaded, rejected 0
2020/12/20 11:10:53 00000000 s (config) userdb reloaded: 8 accounts loaded, 0 expired, 1 disabled
2020/12/20 11:10:53 00000000 s (main) signal handling initialized
2020/12/20 11:10:53 00000000 s (config) 291 service-id's loaded in 2 ms
2020/12/20 11:10:53 00000000 s (main) Cannot open /tmp/.oscam/oscam.version (errno=13 Permission denied)
2020/12/20 11:10:53 00000000 s (net) cs378x: initialized (fd=3, port=xxxx)
2020/12/20 11:10:53 00000000 s (net) cccam: initialized (fd=4, port=xxxx)
2020/12/20 11:10:53 00000000 s (reader) ORF [mouse] creating thread for device /dev/ORF3
2020/12/20 11:10:53 00000000 s (reader) ORF2 [mouse] creating thread for device /dev/ORF2
2020/12/20 11:10:53 00000000 s (reader) hd01 [mouse] creating thread for device /dev/HD+
2020/12/20 11:10:53 00000000 s (reader) Hustler_TV [mouse] creating thread for device /dev/Hustler
2020/12/20 11:10:53 00000000 s (reader) v13 [mouse] creating thread for device /dev/V13
2020/12/20 11:10:53 00000000 s (reader) Server [cs378x] creating thread for device xxxx
2020/12/20 11:10:53 00000000 s (main) waiting for local card init
2020/12/20 11:10:53 20B0D432 p (reader) Server [cs378x] proxyxxxxxx
2020/12/20 11:10:53 55689B2B h (webif) webif: decompressed 184990 bytes back into 488908 bytes
2020/12/20 11:10:53 55689B2B h (webif) HTTP Server running. ip=0.0.0.0 port=xxxx
2020/12/20 11:10:53 20B0D432 p (reader) Server [cs378x] proxy initialized, server xxxx
2020/12/20 11:10:53 291EF456 r (reader) v13 [mouse] Reader initialized (device=/dev/V13, detect=cd, mhz=600, cardmhz=357)
2020/12/20 11:10:53 14157471 r (reader) Hustler_TV [mouse] Reader initialized (device=/dev/Hustler, detect=cd, mhz=369, cardmhz=369)
2020/12/20 11:10:53 7EA0669A r (reader) ORF [mouse] Reader initialized (device=/dev/ORF3, detect=cd, mhz=358, cardmhz=358)
2020/12/20 11:10:53 69F1916F r (reader) ORF2 [mouse] Reader initialized (device=/dev/ORF2, detect=cd, mhz=358, cardmhz=358)
2020/12/20 11:10:54 56ACDBBB r (reader) hd01 [mouse] Reader initialized (device=/dev/HD+, detect=cd, mhz=600, cardmhz=357)
2020/12/20 11:10:54 7EA0669A r (reader) ORF [mouse] card detected
2020/12/20 11:10:54 56ACDBBB r (reader) hd01 [mouse] card detected
2020/12/20 11:10:54 69F1916F r (reader) ORF2 [mouse] card detected
2020/12/20 11:10:54 291EF456 r (reader) v13 [mouse] card detected
2020/12/20 11:10:54 14157471 r (reader) Hustler_TV [mouse] card detected
2020/12/20 11:10:55 14157471 r (reader) Hustler_TV [mouse] ATR: 3F 77 18 00 00 D3 8A 42 01 64 90 00
2020/12/20 11:10:55 7EA0669A r (reader) ORF [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2020/12/20 11:10:55 69F1916F r (reader) ORF2 [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2020/12/20 11:10:55 291EF456 r (reader) v13 [mouse] ATR: 3F FF 11 25 03 10 80 41 B0 07 69 FF 4A 50 70 00 00 50 31 01 00 11
2020/12/20 11:10:55 291EF456 r (reader) v13 [mouse] Setting baudrate to 16129 bps
2020/12/20 11:10:55 7EA0669A r (reader) ORF [mouse] Setting baudrate to 19200 bps
2020/12/20 11:10:55 69F1916F r (reader) ORF2 [mouse] Setting baudrate to 19200 bps
2020/12/20 11:10:55 14157471 r (reader) Hustler_TV [mouse] Setting baudrate to 119032 bps
2020/12/20 11:10:55 56ACDBBB r (reader) hd01 [mouse] ATR: 3F FF 95 00 FF 91 81 71 FE 47 00 44 4E 41 53 50 31 34 32 20 52 65 76 47 43 36 61
2020/12/20 11:10:55 56ACDBBB r (reader) hd01 [mouse] Setting baudrate to 187500 bps
2020/12/20 11:10:56 7EA0669A r (reader) ORF [mouse] card detected
2020/12/20 11:10:56 7EA0669A r (reader) ORF [mouse] type: CryptoWorks
2020/12/20 11:10:56 69F1916F r (reader) ORF2 [mouse] card detected
2020/12/20 11:10:56 69F1916F r (reader) ORF2 [mouse] type: CryptoWorks
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [mouse] detect native nagra card
2020/12/20 11:10:57 291EF456 r (reader) v13 [mouse] Card type: P1TV
2020/12/20 11:10:57 291EF456 r (reader) v13 [mouse] Rom version: 10A7
2020/12/20 11:10:57 291EF456 r (reader) v13 [mouse] Unable to get smartcard credit
2020/12/20 11:10:57 7EA0669A r (reader) ORF [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2020/12/20 11:10:57 291EF456 r (reader) v13 [mouse] classD0 ins7E11: Scheduling card reset for TA1 change from 11 to 15
2020/12/20 11:10:57 291EF456 r (reader) v13 [mouse] found card system videoguard2
2020/12/20 11:10:57 291EF456 r (reader) v13 [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:10:57 291EF456 r (reader) v13 [videoguard2] card detected
2020/12/20 11:10:57 291EF456 r (reader) v13 [videoguard2] type: VideoGuard Sky Austria/Germany (09C4)
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] using ecm #813 for long viaccess ecm
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] type: Viaccess (non-standard atr), caid: 0500, serial: ##########
2020/12/20 11:10:57 7EA0669A r (reader) ORF [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2020/12/20 11:10:57 7EA0669A r (reader) ORF [mouse] providers: 4 (04,08,0C,10)
2020/12/20 11:10:57 7EA0669A r (reader) ORF [mouse] found card system cryptoworks
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [mouse] providers: 4 (04,08,0C,10)
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [mouse] found card system cryptoworks
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] providers: 2 (FFF8F0,050F00)
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 000D, date: 2020/12/05 - 2021/01/05, name: Product 000D
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: 0001, date: 2020/12/19 - 2021/08/27, name: Product 0001
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] Maturity level [F]=no age limit
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] Using PIN 0000
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 0002, date: 2020/12/18 - 2021/08/26, name: Product 0002
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: 0002, date: 2020/12/19 - 2021/08/27, name: Product 0002
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 7FF7, date: 2020/12/19 - 2020/12/29, name: Product 7FF7
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: 7FFB, date: 2020/12/11 - 2021/01/10, name: Product 7FFB
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] Parental lock disabled
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 0001, date: 2020/12/18 - 2021/08/26, name: Product 0001
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: FFE0, date: 2020/12/18 - 2021/08/26, name: Product FFE0
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: FFE0, date: 2020/12/18 - 2021/08/26, name: Product FFE0
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: 7FF7, date: 2020/12/20 - 2020/12/30, name: Product 7FF7
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [mouse] ready for requests
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [mouse] found card system nagra
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] ROM: D N A S P 1 4 2
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] REV: R e v G C 6
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] SER: ############
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] CAID: 1830
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] Prv.ID: 00 00 34 11 (sysid)
2020/12/20 11:10:57 56ACDBBB r (reader) hd01 [nagra] Prv.ID: 00 00 00 00
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 7FFB, date: 2020/12/19 - 2021/01/18, name: Product 7FFB
2020/12/20 11:10:57 69F1916F r (reader) ORF2 [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] Maturity level [F]=no age limit
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] ready for requests
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [mouse] found card system viaccess
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [viaccess] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:10:57 14157471 r (reader) Hustler_TV [viaccess] card detected
2020/12/20 11:10:57 7EA0669A r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] IRD ID: ############
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] active to: 2021/02/09 11:59
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] -----------------------------------------
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] |id |tier |valid from |valid to |
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] +----+--------+------------+------------+
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/12/20 11:10:58 14157471 r (reader) Hustler_TV [viaccess] serial: ##########
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] |8011|0BB8 |2019/05/31 |2021/02/07 |
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2020/12/20 11:10:58 56ACDBBB r (reader) hd01 [nagra] -----------------------------------------
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] chid: 001D, date: 2020/12/05 - 2021/01/05, name: Product 001D
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/12/20 11:10:58 14157471 r (reader) Hustler_TV [viaccess] provider: 1, id: ####################, sa: ########, geo: empty
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2020/12/20 11:10:58 291EF456 r (reader) v13 [mouse] ATR: 3F FF 15 25 03 10 80 41 B0 07 69 FF 4A 50 70 00 00 50 31 01 00 15
2020/12/20 11:10:58 291EF456 r (reader) v13 [mouse] Setting baudrate to 258064 bps
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 69F1916F r (reader) ORF2 [cryptoworks] ready for requests
2020/12/20 11:10:58 14157471 r (reader) Hustler_TV [viaccess] provider: 2, id: ############################, sa: ########, geo: FF FF FF FF
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] chid: 0031, date: 2020/12/05 - 2021/01/05, name: Product 0031
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000
2020/12/20 11:10:58 7EA0669A r (reader) ORF [cryptoworks] ready for requests
2020/12/20 11:10:59 14157471 r (reader) Hustler_TV [viaccess] class: 0D, expiry date: 2020/09/03 - 2021/09/03
2020/12/20 11:10:59 14157471 r (reader) Hustler_TV [viaccess] CA 28 initialisation successful!
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] Card type: P1TV
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] Rom version: 10A7
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] Unable to get smartcard credit
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] FuseByte: 25
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] Region Code: 00BO0103
2020/12/20 11:10:59 291EF456 r (reader) v13 [mouse] Country Code: DEU
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] Pincode read: 1429
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] PCB settings: FF FF FF FF
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] Parental control disabled
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] type: VideoGuard Sky Austria/Germany (09C4) FastMode, caid: 09C4
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] serial: ########, BoxID: ########, baseyear: 2004
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] ready for requests
2020/12/20 11:11:00 291EF456 r (reader) v13 [mouse] found card system videoguard2
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] card detected
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] type: VideoGuard Sky Austria/Germany (09C4) FastMode
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] ------------------------------------------------------------------
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] +---------+----------+---------------------+---------------------+
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 005d --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 005e --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 007b --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 007d --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 0081 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 008e --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00c0 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00c8 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00c9 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00ca --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00cb --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00c7 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00e4 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00e5 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00f3 --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] |-- 00 ---|-- 00ff --| 2021/01/06-00:00:00 |
2020/12/20 11:11:00 291EF456 r (reader) v13 [videoguard2] ------------------------------------------------------from-ins70--
2020/12/20 11:11:01 00000000 s (main) init for all local cards done
2020/12/20 11:11:02 00000000 s (emmcache) loaded 145975 emmcache records from /var/etc/oscam.emmcache in 1056 ms
2020/12/20 11:11:02 00000000 s (emmcache) loaded 6637 emmstat records from /var/etc/oscam.emmstat in 28 ms
2020/12/20 11:11:02 00000000 s (anticasc) anti cascading disabled
2020/12/20 11:11:02 135C2812 c (client) plain dvbapi-client granted (anonymous, au=off)
2020/12/20 11:11:02 06C29256 c (client) anonymous disconnected from xxxx
2020/12/20 11:11:02 25D52728 c (client) encrypted cs378x-client xxxx granted (ORF98-Sode, au=auto (9 reader))
2020/12/20 11:11:02 4AD72F9E c (client) encrypted cs378x-client xxxx granted (CE2-Au99, au=off)
2020/12/20 11:11:02 3D911479 c (client) encrypted cs378x-client xxxx granted (V13-Sode, au=auto (9 reader))
2020/12/20 11:11:02 135C2812 c (dvbapi) dvbapi channelcache loaded from /var/etc/oscam.ccache
2020/12/20 11:11:02 135C2812 c (dvbapi) ERROR: Could not detect DVBAPI version.
2020/12/20 11:11:02 4AD72F9E c (camd35) unknown [cs357x/cs378x] command from CE2-Au99! (64) n=32
2020/12/20 11:11:02 25D52728 c (camd35) ORF98-Sode emm-request sent (reader=ORF, caid=0D98, auprovid=000004)
2020/12/20 11:11:02 25D52728 c (ecm) ORF98-Sode (0D98/33F6/80): found (158 ms) by ORF (L/2/2/2) - ORF2K HD (cwc LEARN)
2020/12/20 11:11:02 25D52728 c (camd35) ORF98-Sode emm-request sent (reader=ORF2, caid=0D98, auprovid=000004)
2020/12/20 11:11:02 25D52728 c (ecm) ORF98-Sode (0D98/4E27/80): found (160 ms) by ORF2 (L/1/2/2) - Puls 4 Austria (cwc LEARN)
2020/12/20 11:11:02 3D911479 c (camd35) V13-Sode emm-request sent (reader=v13, caid=09C4, auprovid=000000)
2020/12/20 11:11:02 3D911479 c (ecm) V13-Sode (09C4/0087/A7): found (189 ms) by v13 - Sky Cinema Premieren +24 HD
2020/12/20 11:11:02 25D52728 c (camd35) ORF98-Sode emm-request sent (reader=ORF, caid=0D98, auprovid=000004)
2020/12/20 11:11:02 25D52728 c (ecm) ORF98-Sode (0D98/14B8/80): found (302 ms) by ORF (L/1/2/2) - Puls 24 HD (cwc LEARN)
2020/12/20 11:11:02 3D911479 c (ecm) V13-Sode (09C4/0083/A7): found (342 ms) by v13 - Sky Cinema Premieren HD
2020/12/20 11:11:02 3D911479 c (ecm) V13-Sode (09C4/0008/A7): found (495 ms) by v13 - Sky Cinema Fun
2020/12/20 11:11:02 0C59542E c (client) encrypted cs378x-client 5.196.74.133 granted (HD1830-Sode, au=off)
2020/12/20 11:11:03 0C59542E c (ecm) HD1830-Sode (1830/EF11/92): found (317 ms) by hd01 - VOX HD (cwc LEARN)
2020/12/20 11:11:03 0C59542E c (ecm) HD1830-Sode (1830/EF10/92): found (299 ms) by hd01 - RTL HD (cwc LEARN)
2020/12/20 11:11:04 3D911479 c (ecm) V13-Sode (09C4/0087/A7): found (146 ms) by v13 - Sky Cinema Premieren +24 HD
2020/12/20 11:11:04 0F0F0D41 c (client) encrypted cs378x-client xxxx granted (Hustler-Sode, au=auto (9 reader))
Zuletzt bearbeitet von einem Moderator: