Moin moin zusammen,
hab mal nach der Anleitung hier im Board oscam server für homeCS auf dem Raspberry installiert. So weit alles gut.
Der Raspberry bekommt vom Router eine feste IP zugewiesen. Zugriff auf webif funktioniert. Smargo ausgepackt angesteckt und die V14 Karte mit dem Chip zur Seite mit den LED. LED gehen dabei aus.
Was mir auch aufgefallen ist, das macnhmal webif nicht mehr reichbar ist, wenn Karte im Smargo steckt. Über Putty hingegen komm ich drauf.
Dreambox wird nicht hell.
In der Dreambox Clone 800HDSe hab ich in die cccam.cfg C-Line so eingegeben:
C: 192.168.1.107 44444 Test1 Test1
Ich finde meinen Fehler nücht. Vielleicht mag ja jemand weiterhelfen
webif
server
user
conf
hab mal nach der Anleitung hier im Board oscam server für homeCS auf dem Raspberry installiert. So weit alles gut.
Der Raspberry bekommt vom Router eine feste IP zugewiesen. Zugriff auf webif funktioniert. Smargo ausgepackt angesteckt und die V14 Karte mit dem Chip zur Seite mit den LED. LED gehen dabei aus.
Was mir auch aufgefallen ist, das macnhmal webif nicht mehr reichbar ist, wenn Karte im Smargo steckt. Über Putty hingegen komm ich drauf.
Dreambox wird nicht hell.
In der Dreambox Clone 800HDSe hab ich in die cccam.cfg C-Line so eingegeben:
C: 192.168.1.107 44444 Test1 Test1
Ich finde meinen Fehler nücht. Vielleicht mag ja jemand weiterhelfen
webif
2014/01/18 20:46:31 0 s >> OSCam << cardserver started, version 1.20-unstable_svn, build r9374 (arm-linux-gnueabihf)
2014/01/18 20:46:31 0 s creating pidfile /tmp/.oscam/oscam.pid with pid 2052
2014/01/18 20:46:31 0 s userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2014/01/18 20:46:31 0 s signal handling initialized
2014/01/18 20:46:31 0 s camd35: initialized (fd=5, port=44444)
2014/01/18 20:46:31 0 s V14 [mouse] creating thread for device /dev/ttyUSB0
2014/01/18 20:46:31 0 s loadbalancer: can't read from file /tmp/.oscam/stat
2014/01/18 20:46:31 0 s waiting for local card init
2014/01/18 20:46:31 D428D8 h webif: decompressed 64207 bytes back into 189520 bytes
2014/01/18 20:46:31 D428D8 h HTTP Server running. ip=0.0.0.0 port=8888
2014/01/18 20:46:31 D40BD0 r V14 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=369, cardmhz=369)
2014/01/18 20:46:32 0 s init for all local cards done
2014/01/18 20:46:32 0 s anti cascading disabled
2014/01/18 20:48:49 D40BD0 r V14 [mouse] card detected
2014/01/18 20:48:50 D40BD0 r V14 [mouse] ATR: 3F FD 13 25 02 50 80 0F 41 B0 0A 69 FF 4A 50 F0 00 00 50 31 03
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Init card protocol T0, FI=1, F=372, D=4, N=2
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Setting baudrate to 39677 bps
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Calculated work ETU is 25.20 us reader mhz = 369
2014/01/18 20:48:50 D40BD0 r V14 [mouse] ATR Fsmax is 5 MHz, clocking card to wanted user cardspeed off 3.69 MHz (specified in reader->mhz)
2014/01/18 20:48:51 D40BD0 r V14 [mouse] Card type: P1TV
2014/01/18 20:48:51 D40BD0 r V14 [mouse] Rom version: 20AA
2014/01/18 20:48:52 D40BD0 r V14 [mouse] parental lock setting: FF FF FF FF
2014/01/18 20:48:52 D40BD0 r V14 [mouse] type: VideoGuard Sky Austria/Germany (098C), caid: 098C
2014/01/18 20:48:52 D40BD0 r V14 [mouse] serial: ########, BoxID: ########, baseyear: 2004
2014/01/18 20:48:52 D40BD0 r V14 [mouse] ready for requests
2014/01/18 20:48:52 D40BD0 r V14 [mouse] found card system videoguard2
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] THIS WAS A SUCCESFULL START ATTEMPT No 1 out of max alloted of 1
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] card detected
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] type: VideoGuard Sky Austria/Germany (098C)
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 007b, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 007d, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 008e, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c0, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c7, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c8, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c9, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ca, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00cb, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00f3, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00fa, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ff, expiry date: 2014/05/18-01:00:00
2014/01/18 20:49:20 D428D8 h all debug_level=65535
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c8, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c9, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ca, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00cb, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00f3, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00fa, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ff, expiry date: 2014/05/18-01:00:00
2014/01/18 20:49:20 D428D8 h all debug_level=65535
2014/01/18 20:49:20 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 20:49:20 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 20:50:22 0 --- Skipped 61 duplicated log lines ---
2014/01/18 20:51:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:52:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:53:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:54:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:55:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:56:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:57:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:58:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:59:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:00:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:01:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:02:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:03:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:04:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:05:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:06:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:07:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:08:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:09:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:09:27 0 --- Skipped 5 duplicated log lines ---
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:27 D428D8 h WebIf: Received stale header from 192.168.1.105 (nonce=e92d9c1a8a3201d9c5b1600fea0526a2, expectednonce=3a87c8264443ce07830e2708134054cd, opaque=10dd1af9c654204378239650a87e4bad).
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:27 0 --- Skipped 3 duplicated log lines ---
2014/01/18 21:09:27 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:28 0 --- Skipped 4 duplicated log lines ---
2014/01/18 21:09:28 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 21:10:28 0 --- Skipped 59 duplicated log lines ---
2014/01/18 21:10:40 0 --- Skipped 12 duplicated log lines ---
2014/01/18 21:10:40 D428D8 h WebIf: Received stale header from 192.168.1.105 (nonce=3a87c8264443ce07830e2708134054cd, expectednonce=5d07aa3069e577793e7c2ed142bc613b, opaque=10dd1af9c654204378239650a87e4bad).
2014/01/18 21:10:40 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:10:40 D428D8 h all debug_level=65535
2014/01/18 20:46:31 0 s creating pidfile /tmp/.oscam/oscam.pid with pid 2052
2014/01/18 20:46:31 0 s userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2014/01/18 20:46:31 0 s signal handling initialized
2014/01/18 20:46:31 0 s camd35: initialized (fd=5, port=44444)
2014/01/18 20:46:31 0 s V14 [mouse] creating thread for device /dev/ttyUSB0
2014/01/18 20:46:31 0 s loadbalancer: can't read from file /tmp/.oscam/stat
2014/01/18 20:46:31 0 s waiting for local card init
2014/01/18 20:46:31 D428D8 h webif: decompressed 64207 bytes back into 189520 bytes
2014/01/18 20:46:31 D428D8 h HTTP Server running. ip=0.0.0.0 port=8888
2014/01/18 20:46:31 D40BD0 r V14 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=369, cardmhz=369)
2014/01/18 20:46:32 0 s init for all local cards done
2014/01/18 20:46:32 0 s anti cascading disabled
2014/01/18 20:48:49 D40BD0 r V14 [mouse] card detected
2014/01/18 20:48:50 D40BD0 r V14 [mouse] ATR: 3F FD 13 25 02 50 80 0F 41 B0 0A 69 FF 4A 50 F0 00 00 50 31 03
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Init card protocol T0, FI=1, F=372, D=4, N=2
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Setting baudrate to 39677 bps
2014/01/18 20:48:50 D40BD0 r V14 [mouse] Calculated work ETU is 25.20 us reader mhz = 369
2014/01/18 20:48:50 D40BD0 r V14 [mouse] ATR Fsmax is 5 MHz, clocking card to wanted user cardspeed off 3.69 MHz (specified in reader->mhz)
2014/01/18 20:48:51 D40BD0 r V14 [mouse] Card type: P1TV
2014/01/18 20:48:51 D40BD0 r V14 [mouse] Rom version: 20AA
2014/01/18 20:48:52 D40BD0 r V14 [mouse] parental lock setting: FF FF FF FF
2014/01/18 20:48:52 D40BD0 r V14 [mouse] type: VideoGuard Sky Austria/Germany (098C), caid: 098C
2014/01/18 20:48:52 D40BD0 r V14 [mouse] serial: ########, BoxID: ########, baseyear: 2004
2014/01/18 20:48:52 D40BD0 r V14 [mouse] ready for requests
2014/01/18 20:48:52 D40BD0 r V14 [mouse] found card system videoguard2
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] THIS WAS A SUCCESFULL START ATTEMPT No 1 out of max alloted of 1
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] card detected
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] type: VideoGuard Sky Austria/Germany (098C)
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 007b, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 007d, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 008e, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c0, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c7, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c8, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c9, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ca, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00cb, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00f3, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00fa, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ff, expiry date: 2014/05/18-01:00:00
2014/01/18 20:49:20 D428D8 h all debug_level=65535
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c8, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00c9, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ca, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00cb, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00f3, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00fa, expiry date: 2014/05/18-01:00:00
2014/01/18 20:48:52 D40BD0 r V14 [videoguard2] tier: 00ff, expiry date: 2014/05/18-01:00:00
2014/01/18 20:49:20 D428D8 h all debug_level=65535
2014/01/18 20:49:20 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 20:49:20 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 20:50:22 0 --- Skipped 61 duplicated log lines ---
2014/01/18 20:51:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:52:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:53:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:54:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:55:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:56:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:57:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:58:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 20:59:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:00:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:01:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:02:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:03:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:04:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:05:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:06:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:07:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:08:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:09:22 0 --- Skipped 60 duplicated log lines ---
2014/01/18 21:09:27 0 --- Skipped 5 duplicated log lines ---
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:27 D428D8 h WebIf: Received stale header from 192.168.1.105 (nonce=e92d9c1a8a3201d9c5b1600fea0526a2, expectednonce=3a87c8264443ce07830e2708134054cd, opaque=10dd1af9c654204378239650a87e4bad).
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:27 0 --- Skipped 3 duplicated log lines ---
2014/01/18 21:09:27 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 21:09:27 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:09:28 0 --- Skipped 4 duplicated log lines ---
2014/01/18 21:09:28 D40BD0 r V14 [videoguard2] cardreader_do_checkhealth: reader->card_status = 2, ret = 1
2014/01/18 21:10:28 0 --- Skipped 59 duplicated log lines ---
2014/01/18 21:10:40 0 --- Skipped 12 duplicated log lines ---
2014/01/18 21:10:40 D428D8 h WebIf: Received stale header from 192.168.1.105 (nonce=3a87c8264443ce07830e2708134054cd, expectednonce=5d07aa3069e577793e7c2ed142bc613b, opaque=10dd1af9c654204378239650a87e4bad).
2014/01/18 21:10:40 D428D8 h WebIf: Origin checked. Result: access from 192.168.1.105 => allowed
2014/01/18 21:10:40 D428D8 h all debug_level=65535
server
[reader]
label = V14
protocol = mouse
device = /dev/ttyUSB0
caid = 098C
boxid = 12345678
#ins7e11 = 15
detect = cd
mhz = 369
cardmhz = 369
group = 1
emmcache = 1,3,2
label = V14
protocol = mouse
device = /dev/ttyUSB0
caid = 098C
boxid = 12345678
#ins7e11 = 15
detect = cd
mhz = 369
cardmhz = 369
group = 1
emmcache = 1,3,2
user
[account]
user = test1
pwd = test1
caid = 098c
au = V14
group = 1
user = test1
pwd = test1
caid = 098c
au = V14
group = 1
conf
[global]
logfile = /tmp/oscam.log
nice = -1
maxlogsize = 2048
clienttimeout = 10
clientmaxidle = 160
waitforcards = 1
cachedelay = 60
[cs357x]
port = 44444
[webif]
httpport = 8888
httpuser = user88
httppwd = user88
httphelplang = de
httpallowed = 127.0.0.1,192.168.1.1-192.168.1.254
logfile = /tmp/oscam.log
nice = -1
maxlogsize = 2048
clienttimeout = 10
clientmaxidle = 160
waitforcards = 1
cachedelay = 60
[cs357x]
port = 44444
[webif]
httpport = 8888
httpuser = user88
httppwd = user88
httphelplang = de
httpallowed = 127.0.0.1,192.168.1.1-192.168.1.254