Quantcast
Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Raspberry OSCAM.SERVER "use k1(DES) for CW decryption in unique pairing mode"

Kenny1982

Newbie
Registriert
6. April 2020
Beiträge
16
Reaktionspunkte
3
Punkte
23
Hallo,
Ich versuche gerade meinen Raspberry Pi als OSCAM Server laufen zu lassen.
Ich habe OSCAM rev.11579 installiert und versucht es einzustellen. Jedoch bekomme ich immer folgenden Fehler:

Code:
(reader)   90 20
(reader) Sky_V13_mouse [videoguard2] Decrypted payload
(reader)   00 00 00 00 00 2A 04 00 38 00 00 55 01 83 56 08
(reader) Sky_V13_mouse [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
(reader) Sky_V13_mouse [videoguard2] crypted CW is: 0000000000000000xxxxxxxxxxxxx
(reader) Sky_V13_mouse [videoguard2] use k1(DES) for CW decryption in unique pairing mode
(reader) Sky_V13_mouse [videoguard2] decrypted CW is: 0000000000000000xxxxxxxxxxxxxxxx
(reader) Sky_V13_mouse [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1
(reader) Sky_V13_mouse [videoguard2] cardreader_do_ecm: ret rc=1
(reader) Sky_V13_mouse [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)
(ecm)    Reader Sky_V13_mouse already answer, skip this ecm answer!
(reader) Sky_V13_mouse [videoguard2] ecm hash: xxxxxxxxxxxxxxxxxxxxxxxxDB3B real time: 169 ms
(reader) Sky_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
...

Ich habe zwar das OSCAM auf dem VU+Duo2 einwandfrei zum laufen bekommen, mit einem Raspberry Pi habe ich es allerdings noch nier probiert.
Kann mir jemand vielleicht sagen was ich falsch mache?
Anbei die Conf, User und Server vom Raspberry Pi und dem Receiver:

OSCAM Conf:
Code:
[global]
logfile = /tmp/oscam.log
nice = -10
maxlogsize = 1024
logduplicatelines = 1
disablelog = 1
clienttimeout = 10
clientmaxidle = 160
waitforcards = 0
cachedelay = 60

[cccam]
port = 3500
version = 2.3.0
reshare = 1
reshare_mode = 0
ignoreshare = 0
keepconnected = 1


[dvbapi]
enabled = 1
au = 1
user = dvbapi

[webif]
httpport = 1234
httpuser = xxxx
httppwd = xxxxxxxx
httphelplang = de
httpallowed = 127.0.0.1, 192.168.178.2-192.168.178.254


Raspberry Pi OSCAM User:
Code:
[account]
user = xxxxxxxx
pwd = xxxxxxxx
caid = 09C4
au = cardreader
group = 1



Raspberry Pi OSCAM Server:
Code:
[reader]
label = Sky_V13_mouse
protocol = mouse
device = /dev/ttyUSB0
caid = 09C4
boxid = xxxxxxxx
ins7e = 4D001660xxxxxxxxxxxxxxxx0000000000010202030002020203
ins7e11 = 15
k1_unique = xxxxxxxxxxxxxxxx
fix07 = 0
detect = cd
group = 1
emmcache = 1,1,2,0
blockemm-unknown = 1
blockemm-u = 1
blockemm-s = 1
blockemm-g = 1
saveemm-u = 1
disablecrccws = 1

VU+Duo2 OSCAM Server:
Code:
[reader]
label = Raspberry
protocol = cccam
device = 192.168.178.203,3500
user = xxxxxxxx
password = xxxxxxxx
inactivitytimeout = 30
group = 1
cccversion = 2.3.0
ccckeepalive = 1
 
Zuletzt bearbeitet von einem Moderator:
poste mal ein komlettes Startlog vom Oscam Start vom Raspi wenn der Client drauf zugreift. Ein DCW wird ja vom Raspi schon ausgeworfen.
 
Code:
   (main) System name    = Linux  
   (main) Host name      = bpi-iot-ros-ai  
   (main) Release        = 5.1.1-BPI-Kernel  
   (main) Version        = #1 SMP Thu Aug 22 13:53:49 CST 2019  
   (main) Machine        = armv7l   (main) creating pidfile /tmp/.oscam/oscam.pid with pid 8149
  (config) userdb reloaded: 2 accounts loaded, 0 expired, 0 disabled  
    (main) signal handling initialized   
     (net) cccam: initialized (fd=5, port=3500, ip=192.168.178.203)
  (reader) Himmel_V13_mouse [mouse] creating thread for device /dev/ttyUSB0
(emmcache) loaded 0 emmcache records from /tmp/.oscam/oscam.emmcache in 0 ms
(emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms   
   (webif) webif: decompressed 162187 bytes back into 396528 bytes   
   (webif) HTTP Server running. ip=192.168.178.203 port=1234  
  (reader) Himmel_V13_mouse [mouse] Reader initialized  (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)  
  (reader) Himmel_V13_mouse [mouse] card detected  
  (client) encrypted cccam-client 192.168.178.202 granted (VU+Duo2, au=auto (1 reader))  
  (reader) Himmel_V13_mouse [mouse] ATR: XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX   
  (reader) Himmel_V13_mouse [mouse] Setting baudrate to 9600 bps     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:EF60BDFFAF31CD2A3D006A8FC301B498): rejected group (0 ms) (no matching reader)     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:429E524E27905371624F295983F0010A): rejected group (0 ms) (no matching reader)  
  (reader) Himmel_V13_mouse [mouse] Card type:   P1TV  
  (reader) Himmel_V13_mouse [mouse] Rom version: 10A7  
  (reader) Himmel_V13_mouse [mouse] Unable to get smartcard credit  
  (reader) Himmel_V13_mouse [mouse] classD0 ins7E11: Scheduling card reset for TA1 change from 11 to 15  
  (reader) Himmel_V13_mouse [mouse] found card system videoguard2  
  (reader) Himmel_V13_mouse [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No  1 out of max allotted of 1  
  (reader) Himmel_V13_mouse [videoguard2] card detected  
  (reader) Himmel_V13_mouse [videoguard2] type: VideoGuard Himmel Austria/Germany (09C4)  
  (reader) Himmel_V13_mouse [mouse] ATR: XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX   
  (reader) Himmel_V13_mouse [mouse] Setting baudrate to 153600 bps  
  (reader) Himmel_V13_mouse [mouse] Card type:   P1TV  
  (reader) Himmel_V13_mouse [mouse] Rom version: 10A7  
  (reader) Himmel_V13_mouse [mouse] Unable to get smartcard credit  
  (reader) Himmel_V13_mouse [mouse] FuseByte: 25  
  (reader) Himmel_V13_mouse [mouse] Region Code: 00BO0102  
  (reader) Himmel_V13_mouse [mouse] Country Code: DEU  
  (reader) Himmel_V13_mouse [mouse] Pincode read: XXXX  
  (reader) Himmel_V13_mouse [mouse] PCB settings: FF FF FF FF  
  (reader) Himmel_V13_mouse [mouse] type: VideoGuard Himmel Austria/Germany (09C4) FastMode, caid: 09C4  
  (reader) Himmel_V13_mouse [mouse] serial: ########, BoxID: ########, baseyear: 2004  
  (reader) Himmel_V13_mouse [mouse] ready for requests  
  (reader) Himmel_V13_mouse [mouse] found card system videoguard2  
  (reader) Himmel_V13_mouse [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No  1 out of max allotted of 1 
  (reader) Himmel_V13_mouse [videoguard2] card detected  
  (reader) Himmel_V13_mouse [videoguard2] type: VideoGuard Himmel Austria/Germany (09C4) FastMode  
  (reader) Himmel_V13_mouse [videoguard2] ------------------------------------------------------------------  
  (reader) Himmel_V13_mouse [videoguard2] |- class -|-- tier --|----- valid to ------|--- package name ----|  
  (reader) Himmel_V13_mouse [videoguard2] +---------+----------+---------------------+---------------------+  
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 0019 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 001a --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 0014 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 001e --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 001f --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 0038 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 003a --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 003b --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 003c --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 003d --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 003e --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 0037 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 0046 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 007b --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 007d --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 008e --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 00e5 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 00f0 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 00f3 --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 00 ---|-- 00ff --| 2020/08/04-01:00:00 |   
  (reader) Himmel_V13_mouse [videoguard2] |-- 01 ---|-- 0108 --| 2020/07/22-01:00:02 |   
  (reader) Himmel_V13_mouse [videoguard2] ------------------------------------------------------from-ins70--     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:XXXXX): timeout (11 ms) by Himmel_V13_mouse     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:XXXXX): timeout (10 ms) by Himmel_V13_mouse     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:XXXXX): timeout (11 ms) by Himmel_V13_mouse     
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:XXXXX): timeout (11 ms) by Himmel_V13_mouse   
   (webif) all debug_level=2   
   (webif) all debug_level=6  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1     
     (ecm) get cw for ecm: (ecm) ...   (reader) Himmel_V13_mouse [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_ecm: cardreader_do_checkhealth returned rc=1  
  (reader) Himmel_V13_mouse [videoguard2] write to cardreader   (reader)  ...      
     (ecm) VU+Duo2 (09C4@000000/125D/0065/A7:XXXXXXXXXXXXXXXXXXXX): timeout (11 ms) by Himmel_V13_mouse     
     (ecm) cw:      (ecm)   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   
  (reader) Himmel_V13_mouse [videoguard2] Answer from cardreader:  
  (reader)   90 20   
  (reader) Himmel_V13_mouse [videoguard2] write to cardreader  
  (reader)   ...   
  (reader) Himmel_V13_mouse [videoguard2] Answer from cardreader:  
  (reader)   ...  
  (reader) Himmel_V13_mouse [videoguard2] Decrypted payload  
  (reader)   ...   
  (reader) Himmel_V13_mouse [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83  
  (reader) Himmel_V13_mouse [videoguard2] crypted CW is: 0000000000000000XXXXXXXXXXXXXXXX 
  (reader) Himmel_V13_mouse [videoguard2] use k1(DES) for CW decryption in unique pairing mode  
  (reader) Himmel_V13_mouse [videoguard2] decrypted CW is: 0000000000000000XXXXXXXXXXXXXXXX  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_ecm: after csystem->do_ecm rc=1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_do_ecm: ret rc=1  
  (reader) Himmel_V13_mouse [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc=1 (ERROR=0)     
     (ecm) Reader Himmel_V13_mouse already answer, skip this ecm answer!  
  (reader) Himmel_V13_mouse [videoguard2] ecm hash: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX real time: 166 ms
 
Zuletzt bearbeitet von einem Moderator:
ändere mal die oscam.conf beim Raspi und teste:
[global]
logfile = /tmp/oscam.log
nice = -10
maxlogsize = 1024
logduplicatelines = 1
disablelog = 1
clienttimeout = 10
clientmaxidle = 160
waitforcards = 0
cachedelay = 60

[cccam]
port = 3500
version = 2.3.0

[webif]
httpport = 1234
httpuser = xxxx
httppwd = xxxxxxxx
httphelplang = de
httpallowed = 127.0.0.1, 192.168.178.2-192.168.178.254
 
und noch mal testen. oscam.conf beim Raspi:
[global]
logfile = /tmp/oscam.log
nice = -1
maxlogsize = 1024

[cccam]
port = 3500
version = 2.3.0

[webif]
httpport = 1234
httpuser = xxxx
httppwd = xxxxxxxx
httphelplang = de
httpallowed = 127.0.0.1, 192.168.178.2-192.168.178.254
 
Code:
    (main) Version        = #1 SMP Tue Feb 25 10:04:19 CET 2020
    (main) Machine        = mips
    (main) Stb model      = dm8000
    (main) Stb vumodel    = vuduo2
    (main) Stb boxtype    = vuduo2
    (main) creating pidfile /tmp/oscam.pid with pid 1285
  (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
    (main) signal handling initialized
     (net) cccam: initialized (fd=4, port=22209)
  (reader) Raspberry [cccam] creating thread for device 192.168.178.203
(emmcache) loaded 0 emmcache records from /etc/tuxbox/config/oscam.emmcache in 0 ms
  (reader) 192.168.178.203: resolved ip=192.168.178.203
(emmcache) loaded 0 emmstat records from /etc/tuxbox/config/oscam.emmstat in 0 ms
  (reader) Raspberry [cccam] connecting to 192.168.178.203:3500 (client) plain dvbapi-client granted (dvbapi_local, au=auto (3 reader))
  (dvbapi) dvbapi channelcache loaded from /etc/tuxbox/config/oscam.ccache
  (dvbapi) Detected /dev/dvb/adapter0/demux0 Api: 0, userconfig boxtype: 1 maximum number of filters is 64 (oscam limit is 64)
  (dvbapi) Detected /dev/dvb/adapter0/ca0 device, total available descramblers: 16
   (webif) webif: decompressed 165838 bytes back into 404248 bytes
   (webif) HTTP Server running. ip=0.0.0.0 port=83
  (reader) Raspberry [cccam] proxy initialized, server 192.168.178.203:3500
  (dvbapi) Demuxer 0 ecmpid 0 CAID: 09C4 ECM_PID: 1B35 PROVID: 000000
  (dvbapi) Demuxer 0 ecmpid 1 CAID: 098C ECM_PID: 1A35 PROVID: 000000
  (dvbapi) Demuxer 0 ecmpid 2 CAID: 098D ECM_PID: 1C35 PROVID: 000000
  (dvbapi) Demuxer 0 found 3 ECM pids and 3 STREAM pids in CA PMT
  (dvbapi) Demuxer 0 trying to descramble PID 0 CAID 09C4 PROVID 000000 ECMPID 1B35 ANY CHID PMTPID 0065 VPID 05FF
     (ecm) dvbapi_local (09C4@000000/125D/0065/A7:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX): found (498 ms) by Raspberry
     (ecm) dvbapi_local (09C4@000000/125D/0065/A7:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX): found (449 ms) by Raspberry
     (ecm) dvbapi_local (09C4@000000/125D/0065/A7:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX): found (500 ms) by Raspberry
    (webif) all debug_level=4 (webif) all debug_level=6
   (cccam) cccam: keepalive (ecm) get cw for ecm:
     (ecm)   ...
  (reader) casc ecm (Raspberry):
  (reader)   ...
   (cccam) cccam: ecm-task 4
   (cccam) cccam(r) Raspberry: sending ecm for sid 0065(167) to card 00000064, hop 1, ecmtask 4
   (cccam) cccam(r) Raspberry: no ecm pending!
   (cccam) cccam(r) Raspberry: parse_msg=1
   (cccam) cccam(r) Raspberry: cws: 4 XXXXXXXXXXXXXXXX0000000000000000
   (cccam) cccam(r) Raspberry: no ecm pending! (ecm) dvbapi_local (09C4@000000/125D/0065/A7:XXXXXXXXXXXXXXXXXXX): found (489 ms) by Raspberry

Ich sende nun den Start_log des Clients, da noch keine Veränderung gab
 
Zuletzt bearbeitet von einem Moderator:
[reader] label = Raspberry protocol = cccam device = 192.168.178.203,3500 user = xxxxxxxx password = xxxxxxxx inactivitytimeout = 30 group = 1 cccversion = 2.3.0 ccckeepalive = 1
trag mal das noch in der oscam.server bei der VU+ ein:
[reader]
label = Raspberry
protocol = cccam
device = 192.168.178.203,3500
user = xxxxxxxx
password = xxxxxxxx
inactivitytimeout = 30
group = 1
cccversion = 2.3.0
ccckeepalive = 1
disablecrccws = 1
 
:D Das wars
Vielen lieben dank.


Kannst du mir noch einen Tip geben wo ich mich weiter einlesen kann über EMMs selber schreiben, blocken etc. ?
 
Naja da brauchst du im Moment nicht weiter aufpassen. Die Karte ist gepairt, was soll da passieren. Schreiben kannst du bedenkenlos 827030... bis 827040... auf jeden Fall, das sind Verlängerer. Der Standardverlängerer bei V13 war glaub ich der 827024... Den kannst du auch bedenkenlos schreiben. Viel mehr braucht man da nicht beachten.
 
Zurück
Oben