2013/10/15 19:43:43 0 s >> OSCam << cardserver started, version 1.20-unstable_svn, build r8975 (i486-linux-gnu)
2013/10/15 19:43:43 0 s creating pidfile /tmp/.oscam/oscam.pid with pid 14896
2013/10/15 19:43:43 0 s userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2013/10/15 19:43:43 0 s signal handling initialized
2013/10/15 19:43:43 0 s newcamd: initialized (fd=5, port=XXXXX)
2013/10/15 19:43:43 0 s -> CAID: 09C4 PROVID: 000000
2013/10/15 19:43:43 0 s cccam: initialized (fd=6, port=XXXXX)
2013/10/15 19:43:43 0 s v13 [
smartreader] creating thread for device Serial:Reader 1AB1325
2013/10/15 19:43:43 0 s loadbalancer: can't read from file /tmp/.oscam/stat
2013/10/15 19:43:43 0 s waiting for local card init
2013/10/15 19:43:43 9E5D4E0 r v13 [
smartreader] De SR_init
2013/10/15 19:43:43 9E5D4E0 r v13 [
smartreader] Using 0x01/0x82 as endpoint for
smartreader hardware detection
2013/10/15 19:43:43 9E62CB0 h webif: decompressed 54245 bytes back into 154648 bytes
2013/10/15 19:43:43 9E62CB0 h HTTP Server running. ip=0.0.0.0 port=15112
2013/10/15 19:43:43 9E5D4E0 r Found reader with serial Reader 1AB1325 at 004:002
2013/10/15 19:43:43 9E5D4E0 r Found
smartreader device Serial:Reader 1AB1325
2013/10/15 19:43:43 9E5D4E0 r v13 [
smartreader] Pthread Wordt gecreeerd
2013/10/15 19:43:43 9E5D4E0 r v13 [
smartreader] Reader initialized (device=Serial:Reader 1AB1325, detect=cd, mhz=600, cardmhz=357)
2013/10/15 19:43:52 9E5D4E0 r v13 [
smartreader] Card type: P1TV
2013/10/15 19:43:52 9E5D4E0 r v13 [
smartreader] Rom version: 10A7
2013/10/15 19:43:53 9E5D4E0 r v13 [
smartreader] parental lock setting: FF FF FF FF
2013/10/15 19:43:53 9E5D4E0 r v13 [
smartreader] type: VideoGuard Sky Germany (09C4) FastMode, caid: 09C4
2013/10/15 19:43:53 9E5D4E0 r v13 [
smartreader] serial: ########, BoxID: ########, baseyear: 2004
2013/10/15 19:43:53 9E5D4E0 r v13 [
smartreader] ready for requests
2013/10/15 19:43:53 9E5D4E0 r v13 [
smartreader] found card system videoguard2
2013/10/15 19:43:53 9E5D4E0 r v13 [videoguard2] card detected
2013/10/15 19:43:53 9E5D4E0 r v13 [videoguard2] type: VideoGuard Sky Germany (09C4) FastMode
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0056, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0057, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0058, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 005a, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 005d, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 005e, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0065, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0066, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0067, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0068, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 0069, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006a, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006b, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006c, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006d, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006e, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 006f, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:56 9E5D4E0 r v13 [videoguard2] tier: 007b, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 007d, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 0081, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 008e, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00c0, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00c7, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00c8, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00c9, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00ca, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00cb, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00d4, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00f3, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00fa, expiry date: 2014/01/14-00:01:00
2013/10/15 19:43:57 9E5D4E0 r v13 [videoguard2] tier: 00ff, expiry date: 2014/01/14-00:01:00
2013/10/15 19:44:02 0 s init for all local cards done
2013/10/15 19:44:02 0 s anti cascading disabled
2013/10/15 19:44:02 9E6E7C8 c client connected to XXXXX port
2013/10/15 19:44:02 0 --- Skipped 1 duplicated log lines ---
2013/10/15 19:44:02 9E6CAD8 c anonymous disconnected from 192.168.1.178
2013/10/15 19:44:02 9E6ADE8 c client connected to XXXXX port
2013/10/15 19:44:02 9E6ADE8 c anonymous disconnected from 192.168.1.178
2013/10/15 19:44:04 9E6E7C8 c WARNING: Setting TCP_KEEPIDLE to 10 minutes for bugged DiabloWifi. Note that this might lead to not detected broken connections or multiple connections.
2013/10/15 19:44:04 9E6E7C8 c encrypted newcamd:XXXXX-client 192.168.1.178 granted (test, au=off)
2013/10/15 19:44:04 9E6E7C8 c user test authenticated successfully (DiabloCam-UW)
2013/10/15 19:44:04 9E6E7C8 c AU disabled for user test
2013/10/15 19:44:04 9E6E7C8 c test (09C4&000000/025B/0083/B3:12512E49ED1A4C8441308D09A5599A10): found (227 ms) by v13
2013/10/15 19:44:07 9E6E7C8 c test (09C4&000000/025B/0083/B3:8B93F60279842BBF5326429A9878B707): found (204 ms) by v13
2013/10/15 19:44:14 9E6E7C8 c test (09C4&000000/025B/0083/B3:066C6E1F46A24C847BA05670D8BE63D5): found (203 ms) by v13