Hallo miteinander im zuge des austauschs der S02 Karten der bald ansteht möchte ich gerne auf Oscam umstellen. Das heißt wenn die Karte kommt möchte ich gleich vorbereitet sein. und zudem gegebenfals das Pairing (vieleicht verhindern).
mein Aktuelles System:
2*DM800 im Home Sharing mit Cccam
Enigma Version: 2012-11-03-3.2
Image Version: Release 3.2.4 2012-11-04
mit GP3
Was ich bereits gemacht habe:
Ich habe Oscam 1.20 installiert und Oscam und die drei Config Dateien nach...
oscam_1.20 => \var\bin (Rechte 755)
oscam.conf => \etc\tuxbox\config
oscam.user => \etc\tuxbox\config
oscam.server =>\etc\tuxbox\config
leider ist das einzige was im moment funktioniert, das ich auf die Web of von Oscam komme
Was ich gerne erreichen möchte:
Das S*Y auf der Server DM800 mit S02 Karte Hell wird und ich es dann per Home sharing zur 2ten DM800 schicke.
und wenn dann die V14 Karte aufschlägt muss ich ja nur noch einige einstellungen ändern usw... das kann ich aber zu dem zeitpunkt noch machen.
Erst mal ist wichtig dass das system wieder läuft.
Ich Poste hier jetzt am einfachsten mal meine Configs und die Live Log der Oscam nach neustart auf S*Y Kanal
So ich hoffe der Post hier ist verständlich und ihr könnt mir helfen.
Vielen dank schon mal im Vorraus Apek3
Live Log nach neustart
Oscam.Config
Oscam.Server
Oscam.User
mein Aktuelles System:
2*DM800 im Home Sharing mit Cccam
Enigma Version: 2012-11-03-3.2
Image Version: Release 3.2.4 2012-11-04
mit GP3
Was ich bereits gemacht habe:
Ich habe Oscam 1.20 installiert und Oscam und die drei Config Dateien nach...
oscam_1.20 => \var\bin (Rechte 755)
oscam.conf => \etc\tuxbox\config
oscam.user => \etc\tuxbox\config
oscam.server =>\etc\tuxbox\config
leider ist das einzige was im moment funktioniert, das ich auf die Web of von Oscam komme
Was ich gerne erreichen möchte:
Das S*Y auf der Server DM800 mit S02 Karte Hell wird und ich es dann per Home sharing zur 2ten DM800 schicke.
und wenn dann die V14 Karte aufschlägt muss ich ja nur noch einige einstellungen ändern usw... das kann ich aber zu dem zeitpunkt noch machen.
Erst mal ist wichtig dass das system wieder läuft.
Ich Poste hier jetzt am einfachsten mal meine Configs und die Live Log der Oscam nach neustart auf S*Y Kanal
So ich hoffe der Post hier ist verständlich und ihr könnt mir helfen.
Vielen dank schon mal im Vorraus Apek3
Live Log nach neustart
- 2014/08/18 10:43:04 0 s >> OSCam << cardserver started, version 1.20-unstable_svn, build r9822 (mipsel-unknown-linux-gnu-ssl-libusb-pcsc)
- 2014/08/18 10:43:04 0 s creating pidfile /tmp/.oscam/oscam.pid with pid 29900
- 2014/08/18 10:43:04 0 s services reloaded: 0 services freed, 2 services loaded, rejected 0
- 2014/08/18 10:43:04 0 s userdb reloaded: 5 accounts loaded, 0 expired, 0 disabled
- 2014/08/18 10:43:04 0 s signal handling initialized
- 2014/08/18 10:43:04 0 s 775 service-id's loaded in 24 ms
- 2014/08/18 10:43:04 0 s 4 provid's loaded
- 2014/08/18 10:43:04 0 s SkyGermany [internal] creating thread for device /dev/sci0
- 2014/08/18 10:43:04 0 s loadbalancer: can't read from file /tmp/.oscam/stat
- 2014/08/18 10:43:04 0 s waiting for local card init
- 2014/08/18 10:43:04 586C08 h webif: decompressed 154648 bytes back into 365608 bytes
- 2014/08/18 10:43:04 586C08 h HTTP Server running. ip=0.0.0.0 port=8888
- 2014/08/18 10:43:04 5AAD28 r SkyGermany [internal] Reader initialized (device=/dev/sci0, detect=cd, mhz=600, cardmhz=600)
- 2014/08/18 10:43:05 5AAD28 r SkyGermany [internal] card detected
- 2014/08/18 10:43:07 5AAD28 r SkyGermany [internal] ATR: 3B 9F 21 0E 49 52 44 45 54 4F 20 41 43 53 03 84 55 FF 80 6D
- 2014/08/18 10:43:07 5AAD28 r SkyGermany [internal] Init card protocol T14, FI=2, F=558, D=1, N=0
- 2014/08/18 10:43:07 5AAD28 r SkyGermany [internal] Calculated work ETU is 93.00 us reader mhz = 600
- 2014/08/18 10:43:08 5AAD28 r SkyGermany [internal] ATR Fsmax is 6 MHz, clocking card to 6.00 (specified in reader->mhz)
- 2014/08/18 10:43:09 5AAD28 r SkyGermany [internal] detect irdeto tunneled nagra card
- 2014/08/18 10:43:09 5AAD28 r SkyGermany [internal] no rsa key configured -> using irdeto mode
- 2014/08/18 10:43:09 5AAD28 r SkyGermany [internal] detect irdeto card
- 2014/08/18 10:43:16 5AAD28 r SkyGermany [internal] card system not supported
- 2014/08/18 10:43:16 5AAD28 r SkyGermany [internal] Normal mode failed, reverting to Deprecated Mode
- 2014/08/18 10:43:19 5AAD28 r SkyGermany [internal] ATR: 3B 9F 21 0E 49 52 44 45 54 4F 20 41 43 53 03 84 55 FF 80 6D
- 2014/08/18 10:43:19 5AAD28 r SkyGermany [internal] Init card protocol T14, FI=2, F=558, D=1, N=0
- 2014/08/18 10:43:19 5AAD28 r SkyGermany [internal] Calculated work ETU is 62.00 us reader mhz = 600
- 2014/08/18 10:43:19 5AAD28 r SkyGermany [internal] ATR Fsmax is 5 MHz, clocking card to 6.00 (specified in reader->mhz)
- 2014/08/18 10:43:20 5AAD28 r SkyGermany [internal] detect irdeto tunneled nagra card
- 2014/08/18 10:43:20 5AAD28 r SkyGermany [internal] no rsa key configured -> using irdeto mode
- 2014/08/18 10:43:20 5AAD28 r SkyGermany [internal] detect irdeto card
- 2014/08/18 10:43:25 5AAD28 r SkyGermany [internal] card system not supported
- 2014/08/18 10:43:25 5AAD28 r SkyGermany [internal] THIS WAS A FAILED START ATTEMPT No 1 out of max alloted of 1
- 2014/08/18 10:43:25 5AAD28 r SkyGermany [internal] card initializing error
Oscam.Config
## main configuration
#
[global]
preferlocalcards = 1
maxlogsize = 2000
logfile = /tmp/oscam.log
#nice = -1
#WaitForCards = 1
# logging
#logfile = /var/log/oscam/oscam.log
#usrfile = /var/log/oscam/oscamuser.log
#cwlogdir = /var/log/oscam/cw
# monitor
[monitor]
#port = 988
#aulow = 120
#monlevel = 1
web interface
[webif]
httpport = 8888
httpuser = test
httppwd = 123
httphelplang = de
httphideidleclients = 1
httpallowed = 192.168.2.88-255.255.255.255
# anti-cascading
[anticasc]
#enabled = 1
#numusers = 1
#sampletime = 2
#samples = 5
#penalty = 1
#aclogfile = /var/log/oscam/aclog.log
#denysamples = 9
# protocols
[newcamd]
#key = 000102030405060708090A0B0C0D
#port = 10000@0100:FFFFFF;10001@0200:FFF000,FFFF00;10002@0300:FFFFFF
[radegast]
#port = 20000
#user = user1
#allowed = 192.168.0.0-192.168.255.255
[cs378x]
#port = 30000@0100:FFFFFF;30001@0200:FFF000,FFFF00;30002@0300:FFFFFF
[cccam]
#port = 40000
#version = 1.2.3
#build = 1234
#reshare = 2
[gbox]
#hostname = host.example.com
#port = 50000
#password = password1
[serial]
#device = user2@/dev/ttyS0?delay=1&timeout=300
[dvbapi]
enabled = 1
user = local
#socket = /tmp/camd.socket
boxtype = dreambox
au = 1
#
[global]
preferlocalcards = 1
maxlogsize = 2000
logfile = /tmp/oscam.log
#nice = -1
#WaitForCards = 1
# logging
#logfile = /var/log/oscam/oscam.log
#usrfile = /var/log/oscam/oscamuser.log
#cwlogdir = /var/log/oscam/cw
# monitor
[monitor]
#port = 988
#aulow = 120
#monlevel = 1
web interface
[webif]
httpport = 8888
httpuser = test
httppwd = 123
httphelplang = de
httphideidleclients = 1
httpallowed = 192.168.2.88-255.255.255.255
# anti-cascading
[anticasc]
#enabled = 1
#numusers = 1
#sampletime = 2
#samples = 5
#penalty = 1
#aclogfile = /var/log/oscam/aclog.log
#denysamples = 9
# protocols
[newcamd]
#key = 000102030405060708090A0B0C0D
#port = 10000@0100:FFFFFF;10001@0200:FFF000,FFFF00;10002@0300:FFFFFF
[radegast]
#port = 20000
#user = user1
#allowed = 192.168.0.0-192.168.255.255
[cs378x]
#port = 30000@0100:FFFFFF;30001@0200:FFF000,FFFF00;30002@0300:FFFFFF
[cccam]
#port = 40000
#version = 1.2.3
#build = 1234
#reshare = 2
[gbox]
#hostname = host.example.com
#port = 50000
#password = password1
[serial]
#device = user2@/dev/ttyS0?delay=1&timeout=300
[dvbapi]
enabled = 1
user = local
#socket = /tmp/camd.socket
boxtype = dreambox
au = 1
Oscam.Server
## reader configuration
#
# serial reader
[reader]
#label = reader1
#protocol = mouse
#detect = CD
#device = /dev/ttyS0
#group = 1
#emmcache = 1,3,2
#services = services1
#caid = 0100
# USB serial reader
[reader]
#label = reader2
#protocol = mouse
#detect = CD
#device = /dev/ttyUSB0
#aeskey = 000102030405060708090A0B0C0D0E0F
#group = 2
#emmcache = 1,3,2
#services = services2
#caid = 0200
# remote newcamd reader with fallback for group 1
[reader]
#label = remote1
#protocol = newcamd
#key = 0102030405060708091011121314
#device = 192.168.0.2,66666
#user = user1
#password = password1
#group = 1
#fallback = 1
# remote camd 3.78x reader with fallback for group 2
[reader]
#label = remote2
#protocol = cs378x
#device = 192.168.0.3,23456
#user = user2
#password = password2
#group = 2
#fallback = 1
# remote gbox reader
[reader]
#label = remote3
#protocol = gbox
#mg-encrypted = D: { 192.168.0.4 { 12345 34567 { ABCD1234 { 9 9 }}}}
#group = 3
#caid = 0300
# remote CCcam reader
[reader]
#label = remote4
#protocol = cccam
#device = 192.168.0.5,45678
#user = user4
#password = password4
#group = 4
#caid = 0400
#cccversion = 1.2.34
#cccbuild = 5678
# remote radegast reader
[reader]
#label = remote5
#protocol = radegast
#device = 192.168.0.6,56789
#group = 5
#caid = 0500
# PCSC reader
[reader]
#label = mypcscreader
#protocol = pcsc
#device = 0
#aeskey = 0102030405060708090a0b0c0d0e0f10
#group = 6
#caid = 0600
# Smargo Smartreader+
[reader]
#label = mysmartreader
#protocol = smartreader
#device = 001:002
#aeskey = 0102030405060708090a0b0c0d0e0f10
#group = 7
#caid = 0700
# internal reader
[reader]
label = SkyGermany
protocol = internal
detect = CD
device = /dev/sci0
mhz = 600
group = 1
emmcache = 1,1,2
caid = 1702,1833
boxid = 12345678
boxkey = 1122334455667788
cardmhz = 600
[reader]
#label = myinternalreader
#protocol = internal
#device = /dev/sci0
#group = 8
#caid = 0800
# AD-Teknik AB Multiprogrammer 3.5 serial
[reader]
#label = reader9
#protocol = mp35
#detect = CD
#device = /dev/ttyS1
#group = 9
#emmcache = 1,3,2
#services = services9
#caid = 0900
# AD-Teknik AB Multiprogrammer 3.6 USB
[reader]
#label = reader10
#protocol = mp35
#detect = CD
#device = /dev/ttyUSB1
#group = 10
#emmcache = 1,3,2
#services = services10
#caid = 1000
# AD-Teknik AB USB Phoenix at 6.00 mhz
# sc8in1 reader
[reader]
#label = reader12
#protocol = sc8in1
#device = /dev/ttyUSB0:1
#group = 12
#emmcache = 1,3,2
#caid = 1200
#
# serial reader
[reader]
#label = reader1
#protocol = mouse
#detect = CD
#device = /dev/ttyS0
#group = 1
#emmcache = 1,3,2
#services = services1
#caid = 0100
# USB serial reader
[reader]
#label = reader2
#protocol = mouse
#detect = CD
#device = /dev/ttyUSB0
#aeskey = 000102030405060708090A0B0C0D0E0F
#group = 2
#emmcache = 1,3,2
#services = services2
#caid = 0200
# remote newcamd reader with fallback for group 1
[reader]
#label = remote1
#protocol = newcamd
#key = 0102030405060708091011121314
#device = 192.168.0.2,66666
#user = user1
#password = password1
#group = 1
#fallback = 1
# remote camd 3.78x reader with fallback for group 2
[reader]
#label = remote2
#protocol = cs378x
#device = 192.168.0.3,23456
#user = user2
#password = password2
#group = 2
#fallback = 1
# remote gbox reader
[reader]
#label = remote3
#protocol = gbox
#mg-encrypted = D: { 192.168.0.4 { 12345 34567 { ABCD1234 { 9 9 }}}}
#group = 3
#caid = 0300
# remote CCcam reader
[reader]
#label = remote4
#protocol = cccam
#device = 192.168.0.5,45678
#user = user4
#password = password4
#group = 4
#caid = 0400
#cccversion = 1.2.34
#cccbuild = 5678
# remote radegast reader
[reader]
#label = remote5
#protocol = radegast
#device = 192.168.0.6,56789
#group = 5
#caid = 0500
# PCSC reader
[reader]
#label = mypcscreader
#protocol = pcsc
#device = 0
#aeskey = 0102030405060708090a0b0c0d0e0f10
#group = 6
#caid = 0600
# Smargo Smartreader+
[reader]
#label = mysmartreader
#protocol = smartreader
#device = 001:002
#aeskey = 0102030405060708090a0b0c0d0e0f10
#group = 7
#caid = 0700
# internal reader
[reader]
label = SkyGermany
protocol = internal
detect = CD
device = /dev/sci0
mhz = 600
group = 1
emmcache = 1,1,2
caid = 1702,1833
boxid = 12345678
boxkey = 1122334455667788
cardmhz = 600
[reader]
#label = myinternalreader
#protocol = internal
#device = /dev/sci0
#group = 8
#caid = 0800
# AD-Teknik AB Multiprogrammer 3.5 serial
[reader]
#label = reader9
#protocol = mp35
#detect = CD
#device = /dev/ttyS1
#group = 9
#emmcache = 1,3,2
#services = services9
#caid = 0900
# AD-Teknik AB Multiprogrammer 3.6 USB
[reader]
#label = reader10
#protocol = mp35
#detect = CD
#device = /dev/ttyUSB1
#group = 10
#emmcache = 1,3,2
#services = services10
#caid = 1000
# AD-Teknik AB USB Phoenix at 6.00 mhz
# sc8in1 reader
[reader]
#label = reader12
#protocol = sc8in1
#device = /dev/ttyUSB0:1
#group = 12
#emmcache = 1,3,2
#caid = 1200
Oscam.User
## user configuration
#
# user for group 1 with Betacrypt tunnel, no monitoring, only one connection possible, AU enabled
[account]
user = local
#pwd = password1
#monlevel = 0
#uniq = 1
group = 1,2
au = 1
#services = services1
betatunnel = 1833.FFFF:1702
#ident = 0100:000000
caid = 1702,1833,0D05
# user for group 2 with monitor access, AU enabled
[account]
#user = user2
#pwd = password2
#monlevel = 1
#uniq = 0
#group = 2
#au = reader2
#services = services2
#ident = 0200:000000
#caid = 0200
# user for group 2 without monitor access, AU disabled, account disabled
[account]
#user = user3
#pwd = password3
#disabled = 1
#group = 2
#services = services2
#ident = 0200:000000
#caid = 0200
# user for group 3 without monitor access, only one connection possible, AU disabled, multiple idents
[account]
#user = user4
#pwd = password4
#monlevel = 0
#uniq = 1
#group = 3
#ident = 0300:000000,FFFFFF;0400:FFFFFF
#caid = 0300
# user for group 5 with anti-cascading, only 1 logging allowed, send fake CWs as penalty
[account]
#user = user5
#pwd = password5
#group = 5
#services = services5
#ident = 0500:000000
#caid = 0500
#numusers = 1
#penalty = 1
#
# user for group 1 with Betacrypt tunnel, no monitoring, only one connection possible, AU enabled
[account]
user = local
#pwd = password1
#monlevel = 0
#uniq = 1
group = 1,2
au = 1
#services = services1
betatunnel = 1833.FFFF:1702
#ident = 0100:000000
caid = 1702,1833,0D05
# user for group 2 with monitor access, AU enabled
[account]
#user = user2
#pwd = password2
#monlevel = 1
#uniq = 0
#group = 2
#au = reader2
#services = services2
#ident = 0200:000000
#caid = 0200
# user for group 2 without monitor access, AU disabled, account disabled
[account]
#user = user3
#pwd = password3
#disabled = 1
#group = 2
#services = services2
#ident = 0200:000000
#caid = 0200
# user for group 3 without monitor access, only one connection possible, AU disabled, multiple idents
[account]
#user = user4
#pwd = password4
#monlevel = 0
#uniq = 1
#group = 3
#ident = 0300:000000,FFFFFF;0400:FFFFFF
#caid = 0300
# user for group 5 with anti-cascading, only 1 logging allowed, send fake CWs as penalty
[account]
#user = user5
#pwd = password5
#group = 5
#services = services5
#ident = 0500:000000
#caid = 0500
#numusers = 1
#penalty = 1
Zuletzt bearbeitet: