Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Oscam mit Sky V13, HD02 und ORF Karte möglich?

Zunächst mal die folgende Einstellung

Mouse:
Code:
unten, unten, unten, egal

und
oscam.server
Code:
enable = 1
setzen.

Da muss nichts blockiert werden.

Karte rein oscam komplett neu starten und die oscam.log vom oscam start an posten.
 
Die oscam.log ist von den Zeichen zu groß für den Spoiler o_O
Wie bekomme ich das denn hin richtig zu posten?

Achja, die Karte läuft noch nicht!
 
Zuletzt bearbeitet von einem Moderator:
Das kann ich mit Filezilla downloaden, oder?
 
Zuletzt bearbeitet:
Zuletzt bearbeitet:
das benötigst du definitiv wenn der Irdeto Mode Bestand haben soll.
Ist es eine C8..... Karte oder eine P4.....?

Ja, P4...
Muss ich sonst noch was anderes dann einstellen?

-------------------------------------------------------------------------------
>> OSCam << cardserver log switched at Wed May 16 17:19:20 2018
-------------------------------------------------------------------------------
2018/05/16 17:19:20 00000000 s >> OSCam << cardserver log switched, version 1.20-unstable_svn, build r11420 (arm-linux-gnueabihf)
2018/05/16 17:19:20 00000000 s (main) System name = Linux
2018/05/16 17:19:20 00000000 s (main) Host name = raspberrypi
2018/05/16 17:19:20 00000000 s (main) Release = 4.14.34-v7+
2018/05/16 17:19:20 00000000 s (main) Version = #1110 SMP Mon Apr 16 15:18:51 BST 2018
2018/05/16 17:19:20 00000000 s (main) Machine = armv7l
2018/05/16 17:19:20 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 4958
2018/05/16 17:19:20 00000000 s (config) userdb reloaded: 4 accounts loaded, 0 expired, 2 disabled
2018/05/16 17:19:20 00000000 s (main) signal handling initialized
2018/05/16 17:19:20 00000000 s (net) cs357x: initialized (fd=5, port=44357)
2018/05/16 17:19:20 00000000 s (net) newcamd: initialized (fd=6, port=22000)
2018/05/16 17:19:20 00000000 s (net) -> CAID: 1830 PROVID: 003411
2018/05/16 17:19:20 00000000 s (net) cccam: initialized (fd=7, port=33333)
2018/05/16 17:19:20 00000000 s (net) gbox: initialized (fd=8, port=7004)
2018/05/16 17:19:20 00000000 s (reader) ORF [mouse] creating thread for device /dev/ttyUSB0
2018/05/16 17:19:20 00000000 s (stat) loadbalancer: could not open /tmp/.oscam/stat for reading (errno=2 No such file or directory)
2018/05/16 17:19:20 00000000 s (main) waiting for local card init
2018/05/16 17:19:20 474C053B h (webif) webif: decompressed 177453 bytes back into 436236 bytes
2018/05/16 17:19:20 474C053B h (webif) HTTP Server running. ip=0.0.0.0 port=16002
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Buffers readed 0 bytes total time_us 75134
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 1 value 3b time_us 11798
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 2 value 78 time_us 31431
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 3 value 12 time_us 25
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 4 value 00 time_us 19
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 5 value 00 time_us 20
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 6 value 54 time_us 19
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 7 value c4 time_us 19
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 8 value 03 time_us 19
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 9 value 00 time_us 18
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 10 value 8f time_us 20
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 11 value f1 time_us 18
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 12 value 90 time_us 18
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Flush readed byte Nr 13 value 00 time_us 15819
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Buffers readed 13 bytes total time_us 134802
2018/05/16 17:19:20 37C736CE r (reader) ORF [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2018/05/16 17:19:21 37C736CE r (reader) ORF [mouse] card detected
2018/05/16 17:19:21 37C736CE r (reader) ORF [mouse] Buffers readed 0 bytes total time_us 75119
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] Buffers readed 0 bytes total time_us 75117
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] Init card protocol T0, FI=1, F=372, D=2, N=0
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] Setting baudrate to 19200 bps
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] Calculated work ETU is 52.10 us reader mhz = 357
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] Buffers readed 0 bytes total time_us 75115
2018/05/16 17:19:22 37C736CE r (reader) ORF [mouse] ATR Fsmax is 5 MHz, clocking card to wanted user cardclock of 3.57 MHz (specified in reader->mhz)
2018/05/16 17:19:23 37C736CE r (reader) ORF [mouse] card detected
2018/05/16 17:19:23 37C736CE r (reader) ORF [mouse] type: CryptoWorks
2018/05/16 17:19:24 37C736CE r (reader) ORF [mouse] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2018/05/16 17:19:24 37C736CE r (reader) ORF [mouse] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2018/05/16 17:19:24 37C736CE r (reader) ORF [mouse] providers: 4 (04,08,0C,10)
2018/05/16 17:19:24 37C736CE r (reader) ORF [mouse] found card system cryptoworks
2018/05/16 17:19:24 37C736CE r (reader) ORF [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max alloted of 1
2018/05/16 17:19:24 37C736CE r (reader) ORF [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2018/05/16 17:19:24 37C736CE r (reader) ORF [cryptoworks] chid: 000D, date: 2018/05/14 - 2018/06/14, name: Product 000D
2018/05/16 17:19:24 37C736CE r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000͊2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] chid: 001D, date: 2018/05/14 - 2018/06/14, name: Product 001D
2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000͊2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000͊2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] chid: 0031, date: 2018/05/14 - 2018/06/14, name: Product 0031
2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000͊2018/05/16 17:19:25 37C736CE r (reader) ORF [cryptoworks] ready for requests
2018/05/16 17:19:26 00000000 s (main) init for all local cards done
2018/05/16 17:19:26 00000000 s (emmcache) loaded 0 emmcache records from /tmp/.oscam/oscam.emmcache in 1 ms
2018/05/16 17:19:26 00000000 s (emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms
2018/05/16 17:19:26 00000000 s (anticasc) anti cascading disabled
2018/05/16 17:19:26 4B11BB4D c (gbox) new connection from 127.0.0.1
2018/05/16 17:19:26 4B11BB4D c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2018/05/16 17:19:26 5318FB91 c (client) encrypted cs357x-client 192.168.1.156 granted (Wohnzimmer, au=auto (3 reader))
2018/05/16 17:19:26 553EA973 c (client) encrypted cs357x-client 192.168.1.150 granted (Martin, au=auto (3 reader))
2018/05/16 17:19:26 5318FB91 c (ecm) Wohnzimmer (1843@000000/0000/EF14/89:A6C2555A1F87DF582CDC24634EE55F5F): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:26 553EA973 c (ecm) Martin (0650@000000/0000/33F9/4E:E579E7969D456BEAEE29F293C83D6F6A): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:26 553EA973 c (ecm) Martin (0D95@000004/0000/33F9/B8:38F0F2BF5F5C0D8163B9442C94E83B86): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:26 553EA973 c (ecm) Martin (0648@000000/0001/33F9/4C:303BBA4E2C04F55CA1096BABB1756691): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:27 553EA973 c (ecm) Martin (0648@000000/000D/33F9/4C:43A813A1EEB57F910698EEEF32EA4AAC): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:27 553EA973 c (ecm) Martin (06E2@000000/0001/33F9/6E:258242247B3D52CD1C28CA66F73C85ED): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:29 4B11BB4D c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2018/05/16 17:19:29 553EA973 c (camd35) Martin emm-request sent (reader=ORF, caid=0D98, auprovid=000004)
2018/05/16 17:19:29 553EA973 c (ecm) Martin (0D98@000004/0000/33F5/80:64AE3075898FC9B56C371413ADD707C4): rejected group (0 ms) (no matching reader)
2018/05/16 17:19:29 553EA973 c (ecm) Martin (06E2@000000/000D/33F8/6F:266463ED71AA069993AD833968F664A8): rejected group (1 ms) (no matching reader)
2018/05/16 17:19:29 553EA973 c (ecm) Martin (0650@000000/0000/33F5/4E:2CCB2BE368A80BCE47A560C4BB6B7CDC): rejected group (0 ms) (no matching reader)
 
Hab ich geändert... oscam dann neugestart... läuft aber immer noch nicht.

Muss ich irgendwie auf pairing oder so beim rumtesten aufpassen?
 
Die Karte sollte eigentlich nur mit ORF sein.

Bei "AU disabled" ist kein hacken gesetzt.

[reader]
label = ORF
description = ORF (Irdeto Mode)
protocol = mouse
device = /dev/ttyUSB0
caid = 0650
boxkey = 1122334455667788
rsakey = DF57B08C0F13E67BD17AD37EAAF4EAA25393F8A0EFE8ACE6708AAF97C985CBA8A6C13826963BD3092EB9FC72F773A430724706AA5E1D14E1747842D32069A12D
force_irdeto = 1
detect = cd
group = 1
emmcache = 1,1,2,0

Der LOG ist vor dem ändern auf 0650 entstanden.
 
deine Karte wird im CW Mode eingelesen, daher Caid 0D98, siehe log
 
SERVER (neuer Raspberry Server):

# oscam.server generated automatically by Streamboard OSCAM 1.20-unstable_svn SVN r11420
# Read more:

[reader]
label = HD+
description = Easymouse HD01
enable = 0
protocol = mouse
device = /dev/ttyUSB0
autospeed = 0
caid = 1843
boxkey = A7*7C
rsakey = BF3*D5
detect = cd
group = 1
emmcache = 1,1,2,0

[reader]
label = ORF
description = ORF (Irdeto Mode)
protocol = mouse
device = /dev/ttyUSB0
caid = 0650
boxkey = 11*8
rsakey = DF57*D
force_irdeto = 1
detect = cd
group = 1
emmcache = 1,1,2,0

[reader]
label = SKY
description = Sky V13
enable = 0
protocol = mouse
device = /dev/ttyUSB8
caid = 09C4
detect = cd
group = 1
blockemm-unknown = 1
blockemm-u = 1
blockemm-s = 1
blockemm-g = 1
saveemm-u = 1
blockemm-bylen = 1-31,36,38,40-41,65-72,74-124,126,128-129,131,141-255

Unix starttime: 1526491607
Starttime: 16.05.2018 17:26:47
Version: oscam-1.20-unstable_svn-r11420
Compiler: arm-linux-gnueabihf
Box type: generic (generic)
PID: 601
TempDir: /tmp/.oscam
ConfigDir: /var/etc/
WebifPort: 16002

GBox tmp_dir: not defined using: /tmp/.oscam
value read during start up, not refreshed if changed later in webif!

Web interface support: yes
LiveLog support: yes
jQuery support intern: yes
Touch interface support: yes
SSL support: no
DVB API support: yes
DVB API with AZBOX support: no
DVB API with MCA support: no
DVB API with COOLAPI support: no
DVB API with COOLAPI2 support: no
DVB API with STAPI support: no
DVB API with STAPI5 support: no
DVB API read-sdt charsets: yes
Irdeto guessing: yes
Anti-cascading support: yes
Debug mode: yes
Monitor: yes
Loadbalancing support: yes
Cache exchange support: yes
CW Cycle Check support: yes
LCD support: no
LED support: no
Clockfix with realtime clock: yes
IPv6 support: no

camd 3.3x: no
camd 3.5 UDP: yes
camd 3.5 TCP: yes
newcamd: yes
CCcam: yes
CCcam share: yes
gbox: yes
radegast: yes
scam: yes
serial: yes
constant CW: yes
Pandora: yes
ghttp: yes

Reader support: yes

Nagra: yes
Irdeto: yes
Conax: yes
Cryptoworks: yes
Seca: yes
Viaccess: yes
NDS Videoguard: yes
DRE Crypt: yes
TONGFANG: yes
Bulcrypt: yes
Griffin: yes
DGCrypt: yes

cardreader_phoenix: yes
cardreader_drecas: yes
cardreader_internal_azbox: no
cardreader_internal_coolapi: no
cardreader_internal_coolapi2: no
cardreader_internal_sci: yes
cardreader_sc8in1: yes
cardreader_mp35: yes
cardreader_smargo: yes
cardreader_pcsc: yes
cardreader_smartreader: yes
cardreader_db2com: yes
cardreader_stapi: no
cardreader_stapi5: no
cardreader_stinger: yes

# oscam.user generated automatically by Streamboard OSCAM 1.20-unstable_svn SVN r11420
# Read more:

[account]
disabled = 1
user = cccam
pwd = cccam
hostname = localhost
caid = 1830
uniq = 1
au = HD+
group = 1

[account]
disabled = 1
user = NEWUSER1
pwd = pass
betatunnel = 1833.FFFF:1702
group = 1

[account]
user = Martin
pwd = *
au = 1
group = 1

[account]
user = Wohnzimmer
pwd = *
au = 1
group = 1

# oscam.conf generated automatically by Streamboard OSCAM 1.20-unstable_svn SVN r11420
# Read more:

[global]
logfile = /var/log/ipc/OScam.log
maxlogsize = 2480

[cache]

[cs357x]
port = 44357

[newcamd]
port = 22000@1830:003411
key = 0102030405060708091011121314

[gbox]
port = 7004
hostname = 192.168.0.118,7004
my_password = 2222CCCC
ccc_reshare = 1
gsms_disable = 0

[cccam]
port = 33333
nodeid = 3CC9E3ED1041155A
version = 2.3.0
reshare = 1

[webif]
httpport = 16002
httpuser = oscam
httppwd = oscam
httprefresh = 15
httpallowed = 127.0.0.1,192.168.0.0-192.168.255.255,10.0.0.0-10.255.255.255,172.16.0.0-172.31.255.255


CLIENT (früherer Server):
#weitere Einträge erst einmal nicht notwendig)
#logfile = Pfad bei freetz, Debian usw. evtl. ändern
#
[global]
logfile = /var/log/oscam.log
maxlogsize = 256
nice = -1
preferlocalcards = 1
fallbacktimeout = 2500
ecmfmt = c/s/l
emmlogdir = /var/


#interner CCcam Server für CCcam Clients, CCcam Version nur bei Problemen ändern
#Portangabe evtl. auf eigenen weitergeleiteten Port ändern, reshare evtl. später
#Wichtig: keinen Standardport wie 12000 verwenden!
#
[cccam]
port = 33333
reshare = 1
ignorereshare = 0
version = 2.3.0
keepconnected = 1
#stealth = 1
#stealth ist alternativ

[cs357x]
port = 44357

#internes Protokoll, um das Bild auf dem TV durch die Serverbox=Receiver mit Oscam hell werden zu lassen,
#benötigt einen user account dvbapi in oscam.user
#beides bei freetz, Debian usw. nicht erforderlich, gesamten [dvbapi] Abschnitt hier entfernen
#allerdings nur auf Server mit freetz/IPC usw.entfernen, Oscam Clients, also Receiver mit Oscam, brauchen [dvbapi]
#
[dvbapi]
enabled = 1
au = 1
boxtype = dreambox
user = lokal
#andere Receiver boxtype evtl. ändern, im Webinterface!!! von Oscam unter Configuration-DVBApi auswählen!!!



#Oscam Webinterface, Browser-Adresse IPdesServers:17000
#
[webif]
httpport = 17000
httpuser = oscam
httppwd = oscam
httprefresh = 10
httpallowed = 127.0.0.1,192.168.0.0-192.168.255.255
http_status_log = 1

# oscam.user generated automatically by Streamboard OSCAM 1.20-unstable_svn SVN r11039
# Read more:

[account]
user = lokal
au = v13
group = 1,2

[account]
user = buero
pwd = buero
group = 1,2

[account]
user = wohnzimmer
pwd = wohnzimmer
group = 1,2

[account]
user = schlafzimmer
pwd = schlafzimmer
group = 1,2

[account]
user = buero solo4k
pwd = buero
group = 1,2

# oscam.server generated automatically by Streamboard OSCAM 1.20-unstable_svn SVN r11039
# Read more:

[reader]
label = v13
protocol = internal
device = /dev/sci0
caid = 09C4
boxid = 12345678
ins7e11 = 15
detect = cd
mhz = 450
cardmhz = 2700
group = 1
emmcache = 1,1,10,0
blockemm-unknown = 1
blockemm-u = 1
blockemm-s = 1
blockemm-g = 1
saveemm-u = 1
blockemm-bylen = 1-31,36,38,40-41,65-72,74-124,126,128-129,131,141-255
ndsversion = 2

[reader]
label = hd01
description = HD+schwarz
protocol = internal
device = /dev/sci1
caid = 1843
boxkey = A7642F57BC96D37C
rsakey = BF3*D5
detect = cd
mhz = 450
cardmhz = 2700
group = 2

[reader]
label = emulator
enable = 0
protocol = emu
device = emulator
caid = 0D00,0D02,090F,0500,1801,0604,2600,FFFF,0E00,4AE1
detect = cd
ident = 0D00:000000,000004,000010,000014,000020,0000C0,0000C4,0000C8,0000CC;0D02:000000,00008C,0000A0,0000A4,0000A8;090F:000000;0500:000000,030B00,023800,021110,007400,007800;1801:000000,007301,001101;0604:000000;2600:000000;FFFF:000000;0E00:000000;4AE1:000000
group = 1
emmcache = 1,1,2,1
emu_auproviders = 0500:030B00;0604:010200;0E00:000000;4AE1:000000

[reader]
label = ServerRaspi
description = ServerRaspi
protocol = cs357x
device = 192.168.1.133,44357
user = Martin
password = *
group = 1

[reader]
label = Easymouse_HD+
description = Easymouse HD+
enable = 0
protocol = mouse
device = /dev/ttyUSB0
caid = 1843
boxkey = A76*C
rsakey = BF3*5
detect = cd
group = 2

[reader]
label = orf_(irdeto)
enable = 0
protocol = internal
device =
detect = cd
group = 2



Der derzeitige Client war früher mein Server. Von daher sind einige Einstellugen noch anzupassen...

der Resi der die emm zur mouse schicken soll....
Entschuldigung, das verstehe ich nicht... was meinst du mit "Resi"?
 
Zuletzt bearbeitet:
Zurück
Oben