Hallo zusammen,
hab eine neue SRG V7-Karte, seit August letztes Jahr in meiner OsCam im Einsatz gehabt.
Diese Karte hat bis Ende Oktober 23 einwandfrei in der OsCam funktioniert.
Da die SRG-Karten alle 30 Tage aktiviert werden müssen hab ich dies bisher manuel in meiner Dreambox aktiviert
und dann die Karte wieder in den Smargo am Server zurück.
Durch einen Fehler meinerseits, hab ich versehntlich über das OsCam-Webinteface des Servers manuel (Readers --> write EMM)
die falschen EMMS geschrieben, nämlich für HD+ ....
Seitdem sind jegliche Versuche, die Karte wieder zum Leben zu erwecken gescheitert, die Karte bleibt dunkel.
In der Dreambox direkt mit OsCam und Gbox 811k versucht zu aktivieren ... ohne Erfolg.
Die Frage wäre hier, ob man die V7 Karte noch retten kann, oder sie nur noch eine Eiskratzer ist.
Erkannt wird die Karte ja noch korrekt, aber alle versuche die Karte zu aktivieren sind bis jetzt leider fehlgeschlagen.
Besten Dank schon mal vorab für eure Hilfe!
folgende Konfiguration:
Server:
Debian Linux:
oscam r11719
Smargo: ORF und SRF
Mouse: HD05
Anbei das Logfile vom Start der Oscam:
Der Server hat folgende Konfiguration:
Client:
Dreambox 920 UHD
OscamDreambox r1543-11577
hab eine neue SRG V7-Karte, seit August letztes Jahr in meiner OsCam im Einsatz gehabt.
Diese Karte hat bis Ende Oktober 23 einwandfrei in der OsCam funktioniert.
Da die SRG-Karten alle 30 Tage aktiviert werden müssen hab ich dies bisher manuel in meiner Dreambox aktiviert
und dann die Karte wieder in den Smargo am Server zurück.
Durch einen Fehler meinerseits, hab ich versehntlich über das OsCam-Webinteface des Servers manuel (Readers --> write EMM)
die falschen EMMS geschrieben, nämlich für HD+ ....
Seitdem sind jegliche Versuche, die Karte wieder zum Leben zu erwecken gescheitert, die Karte bleibt dunkel.
In der Dreambox direkt mit OsCam und Gbox 811k versucht zu aktivieren ... ohne Erfolg.
Die Frage wäre hier, ob man die V7 Karte noch retten kann, oder sie nur noch eine Eiskratzer ist.
Erkannt wird die Karte ja noch korrekt, aber alle versuche die Karte zu aktivieren sind bis jetzt leider fehlgeschlagen.
Besten Dank schon mal vorab für eure Hilfe!
folgende Konfiguration:
Server:
Debian Linux:
oscam r11719
Smargo: ORF und SRF
Mouse: HD05
Anbei das Logfile vom Start der Oscam:
2024/02/03 19:55:15 00000000 s (main) System name = Linux
2024/02/03 19:55:15 00000000 s (main) Host name = OSCAM
2024/02/03 19:55:15 00000000 s (main) Release = 6.1.0-9-amd64
2024/02/03 19:55:15 00000000 s (main) Version = #1 SMP PREEMPT_DYNAMIC Debian 6.1.27-1 (2023-05-08)
2024/02/03 19:55:15 00000000 s (main) Machine = x86_64
2024/02/03 19:55:15 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 2177611
2024/02/03 19:55:15 00000000 s (config) userdb reloaded: 7 accounts loaded, 0 expired, 1 disabled
2024/02/03 19:55:15 00000000 s (main) signal handling initialized
2024/02/03 19:55:15 00000000 s (net) monitor: initialized (fd=6, port=988)
2024/02/03 19:55:15 00000000 s (net) cccam: initialized (fd=7, port=12345)
2024/02/03 19:55:15 00000000 s (reader) orfice [smargo] creating thread for device /dev/ttyUSB0
2024/02/03 19:55:15 00000000 s (reader) SRF_V7_Karte [smargo] creating thread for device /dev/ttyUSB1
2024/02/03 19:55:15 00000000 s (reader) HD+ [mouse] creating thread for device /dev/ttyUSB2
2024/02/03 19:55:15 00000000 s (main) waiting for local card init
2024/02/03 19:55:15 469C73A0 h (webif) webif: decompressed 161794 bytes back into 394760 bytes
2024/02/03 19:55:15 469C73A0 h (webif) HTTP Server running. ip=0.0.0.0 port=17001
2024/02/03 19:55:15 7FDB3B36 r (reader) orfice [smargo] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz= AUTO, cardmhz=369)
2024/02/03 19:55:15 448B90F8 r (reader) SRF_V7_Karte [smargo] Reader initialized (device=/dev/ttyUSB1, detect=cd, mhz= AUTO, cardmhz=369)
2024/02/03 19:55:15 37773C5D r (reader) HD+ [mouse] Reader initialized (device=/dev/ttyUSB2, detect=cd, mhz=357, cardmhz=357)
2024/02/03 19:55:16 7FDB3B36 r (reader) orfice [smargo] card detected
2024/02/03 19:55:16 37773C5D r (reader) HD+ [mouse] card detected
2024/02/03 19:55:16 448B90F8 r (reader) SRF_V7_Karte [smargo] card detected
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] ATR: 3F FF 95 00 FF 91 81 71 FE 57 00 44 4E 41 53 50 34 35 30 20 52 65 76 57 36 30 14
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] Setting baudrate to 111600 bps
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] detected nagra merlin card in CAK7 mode
2024/02/03 19:55:18 7FDB3B36 r (reader) orfice [smargo] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2024/02/03 19:55:18 37773C5D r (reader) HD+ [mouse] Rom revision: DNASP450 RevW60
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] card detected
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] type: CryptoWorks
2024/02/03 19:55:19 37773C5D r (reader) HD+ [mouse] ready for requests
2024/02/03 19:55:19 37773C5D r (reader) HD+ [mouse] found card system nagra merlin
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] ROM: D N A S P 4 5 0
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] REV: R e v W 6 0
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] SER: ############
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] CAID: 186A
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 34 11 (sysid)
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] Provider Sys ID: 34 11 is active to: 2024/03/19
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] providers: 4 (04,08,0C,10)
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] found card system cryptoworks
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:19 00000000 >> OSCam << cardserver log switched, version 1.20_svn, build r11719 (x86_64-linux-gnu-ssl)
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0002, date: 2024/01/28 - 2024/10/04, name: Product 0002
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0001, date: 2023/06/25 - 2024/03/01, name: Product 0001
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] -----------------------------------------
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |id |tier |valid from |valid to |
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] +----+--------+------------+------------+
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |8011|006A |2024/01/26 |2025/01/26 |
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |8011|006B |2014/01/01 |2014/01/02 |
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] -----------------------------------------
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 00 00
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 80 11
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] ready for requests
2024/02/03 19:55:20 448B90F8 r (reader) SRF_V7_Karte [smargo] ATR: 3F 77 18 00 00 DA AC 41 14 64 90 00
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] using ecm #902 for long viaccess ecm
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] type: Viaccess (non-standard atr), caid: 0500, serial: ##########
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] providers: 6 (FFF430,070200,070210,070220,070230,070240)
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] Maturity level [F]=no age limit
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] ready for requests
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] found card system viaccess
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] card detected
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] serial: ##########
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 1, id: ####################, sa: ########, geo: empty
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 2, id: ####################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/10/02 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 02, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 03, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 04, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 05, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/08/28 - 2023/10/12
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 3, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 02, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 03, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 04, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 05, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 4, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:24 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 5, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:24 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 6, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:25 00000000 s (main) init for all local cards done
2024/02/03 19:55:25 00000000 s (emmcache) loaded 44 emmcache records from /usr/local/etc/oscam.emmcache in 0 ms
2024/02/03 19:55:25 00000000 s (emmcache) loaded 44 emmstat records from /usr/local/etc/oscam.emmstat in 0 ms
2024/02/03 19:55:25 00000000 s (anticasc) anti cascading log initialized
2024/02/03 19:55:25 00000000 s (gbox) local gbox failed init
2024/02/03 19:55:25 5CD38CEA c (client) encrypted cccam-client lokale ip granted (dreamboxclient, au=auto (3 reader))
2024/02/03 19:55:25 5CD38CEA c (ecm) dreamboxclient (0500@070200/08DE/4332/38:32999647EBEC8AA6818D1B55E7701B9E): not found (165 ms) by SRF_V7_Karte (key to use is not the curr)
2024/02/03 19:55:35 5CD38CEA c (ecm) dreamboxclient (0500@070200/08DE/4332/38:2908F116CA09972993759917549CC8E4): not found (145 ms) by SRF_V7_Karte (key to use is not the curr)
2024/02/03 19:55:15 00000000 s (main) Host name = OSCAM
2024/02/03 19:55:15 00000000 s (main) Release = 6.1.0-9-amd64
2024/02/03 19:55:15 00000000 s (main) Version = #1 SMP PREEMPT_DYNAMIC Debian 6.1.27-1 (2023-05-08)
2024/02/03 19:55:15 00000000 s (main) Machine = x86_64
2024/02/03 19:55:15 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 2177611
2024/02/03 19:55:15 00000000 s (config) userdb reloaded: 7 accounts loaded, 0 expired, 1 disabled
2024/02/03 19:55:15 00000000 s (main) signal handling initialized
2024/02/03 19:55:15 00000000 s (net) monitor: initialized (fd=6, port=988)
2024/02/03 19:55:15 00000000 s (net) cccam: initialized (fd=7, port=12345)
2024/02/03 19:55:15 00000000 s (reader) orfice [smargo] creating thread for device /dev/ttyUSB0
2024/02/03 19:55:15 00000000 s (reader) SRF_V7_Karte [smargo] creating thread for device /dev/ttyUSB1
2024/02/03 19:55:15 00000000 s (reader) HD+ [mouse] creating thread for device /dev/ttyUSB2
2024/02/03 19:55:15 00000000 s (main) waiting for local card init
2024/02/03 19:55:15 469C73A0 h (webif) webif: decompressed 161794 bytes back into 394760 bytes
2024/02/03 19:55:15 469C73A0 h (webif) HTTP Server running. ip=0.0.0.0 port=17001
2024/02/03 19:55:15 7FDB3B36 r (reader) orfice [smargo] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz= AUTO, cardmhz=369)
2024/02/03 19:55:15 448B90F8 r (reader) SRF_V7_Karte [smargo] Reader initialized (device=/dev/ttyUSB1, detect=cd, mhz= AUTO, cardmhz=369)
2024/02/03 19:55:15 37773C5D r (reader) HD+ [mouse] Reader initialized (device=/dev/ttyUSB2, detect=cd, mhz=357, cardmhz=357)
2024/02/03 19:55:16 7FDB3B36 r (reader) orfice [smargo] card detected
2024/02/03 19:55:16 37773C5D r (reader) HD+ [mouse] card detected
2024/02/03 19:55:16 448B90F8 r (reader) SRF_V7_Karte [smargo] card detected
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] ATR: 3F FF 95 00 FF 91 81 71 FE 57 00 44 4E 41 53 50 34 35 30 20 52 65 76 57 36 30 14
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] Setting baudrate to 111600 bps
2024/02/03 19:55:17 37773C5D r (reader) HD+ [mouse] detected nagra merlin card in CAK7 mode
2024/02/03 19:55:18 7FDB3B36 r (reader) orfice [smargo] ATR: 3B 78 12 00 00 54 C4 03 00 8F F1 90 00
2024/02/03 19:55:18 37773C5D r (reader) HD+ [mouse] Rom revision: DNASP450 RevW60
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] card detected
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] type: CryptoWorks
2024/02/03 19:55:19 37773C5D r (reader) HD+ [mouse] ready for requests
2024/02/03 19:55:19 37773C5D r (reader) HD+ [mouse] found card system nagra merlin
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] ROM: D N A S P 4 5 0
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] REV: R e v W 6 0
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] SER: ############
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] CAID: 186A
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 34 11 (sysid)
2024/02/03 19:55:19 37773C5D r (reader) HD+ [nagra merlin] Provider Sys ID: 34 11 is active to: 2024/03/19
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] type: CryptoWorks, caid: 0D98, ascii serial: #########, hex serial: ##########
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] issuer: CryptoWorks, id: 04, bios: v3, pin: unknown, mfid: 3F00
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] providers: 4 (04,08,0C,10)
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [smargo] found card system cryptoworks
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:19 00000000 >> OSCam << cardserver log switched, version 1.20_svn, build r11719 (x86_64-linux-gnu-ssl)
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] provider: 1, id: 04, name: Operator: FFFF
2024/02/03 19:55:19 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0002, date: 2024/01/28 - 2024/10/04, name: Product 0002
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0001, date: 2023/06/25 - 2024/03/01, name: Product 0001
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] -----------------------------------------
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |id |tier |valid from |valid to |
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] +----+--------+------------+------------+
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 2, id: 08, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |8011|006A |2024/01/26 |2025/01/26 |
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 3, id: 0C, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] |8011|006B |2014/01/01 |2014/01/02 |
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] -----------------------------------------
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 00 00
2024/02/03 19:55:20 37773C5D r (reader) HD+ [nagra merlin] Prv.ID: 00 00 80 11
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] provider: 4, id: 10, name: Operator: FFFF
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] chid: 0000, date: 1999/12/31 - 2000/01/07, name: DownLoad00000000퀀
2024/02/03 19:55:20 7FDB3B36 r (reader) orfice [cryptoworks] ready for requests
2024/02/03 19:55:20 448B90F8 r (reader) SRF_V7_Karte [smargo] ATR: 3F 77 18 00 00 DA AC 41 14 64 90 00
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] using ecm #902 for long viaccess ecm
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] type: Viaccess (non-standard atr), caid: 0500, serial: ##########
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] providers: 6 (FFF430,070200,070210,070220,070230,070240)
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] Maturity level [F]=no age limit
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] ready for requests
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [smargo] found card system viaccess
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] card detected
2024/02/03 19:55:22 448B90F8 r (reader) SRF_V7_Karte [viaccess] serial: ##########
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 1, id: ####################, sa: ########, geo: empty
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 2, id: ####################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/10/02 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 02, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 03, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 04, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 05, expiry date: 2023/09/22 - 2023/10/23
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/08/28 - 2023/10/12
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 3, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 01, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 02, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 03, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 04, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] class: 05, expiry date: 2023/10/16 - 2023/11/16
2024/02/03 19:55:23 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 4, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:24 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 5, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:24 448B90F8 r (reader) SRF_V7_Karte [viaccess] provider: 6, id: #######################, sa: ########, geo: FF FF FF FF
2024/02/03 19:55:25 00000000 s (main) init for all local cards done
2024/02/03 19:55:25 00000000 s (emmcache) loaded 44 emmcache records from /usr/local/etc/oscam.emmcache in 0 ms
2024/02/03 19:55:25 00000000 s (emmcache) loaded 44 emmstat records from /usr/local/etc/oscam.emmstat in 0 ms
2024/02/03 19:55:25 00000000 s (anticasc) anti cascading log initialized
2024/02/03 19:55:25 00000000 s (gbox) local gbox failed init
2024/02/03 19:55:25 5CD38CEA c (client) encrypted cccam-client lokale ip granted (dreamboxclient, au=auto (3 reader))
2024/02/03 19:55:25 5CD38CEA c (ecm) dreamboxclient (0500@070200/08DE/4332/38:32999647EBEC8AA6818D1B55E7701B9E): not found (165 ms) by SRF_V7_Karte (key to use is not the curr)
2024/02/03 19:55:35 5CD38CEA c (ecm) dreamboxclient (0500@070200/08DE/4332/38:2908F116CA09972993759917549CC8E4): not found (145 ms) by SRF_V7_Karte (key to use is not the curr)
Der Server hat folgende Konfiguration:
[global]
logfile = /var/log/oscam/oscam.log
nice = -1
usrfile = /var/log/oscam/oscamuser.log
cwlogdir = /var/log/oscam/cw
emmlogdir = /var/log/oscam/emm
[anticasc]
enabled = 1
numusers = 1
samples = 5
penalty = 1
aclogfile = /var/log/oscam/aclog.log
denysamples = 4
[cccam]
port = 12345
nodeid = 123456789
version = 2.3.0
reshare = 3
[monitor]
port = 988
aulow = 120
monlevel = 1
[webif]
httpport = 123456
httpuser = ##########
httppwd = ##########
httpshowecminfo = 1
httpallowed = 127.0.0.1,local lan
aulow = 120
logfile = /var/log/oscam/oscam.log
nice = -1
usrfile = /var/log/oscam/oscamuser.log
cwlogdir = /var/log/oscam/cw
emmlogdir = /var/log/oscam/emm
[anticasc]
enabled = 1
numusers = 1
samples = 5
penalty = 1
aclogfile = /var/log/oscam/aclog.log
denysamples = 4
[cccam]
port = 12345
nodeid = 123456789
version = 2.3.0
reshare = 3
[monitor]
port = 988
aulow = 120
monlevel = 1
[webif]
httpport = 123456
httpuser = ##########
httppwd = ##########
httpshowecminfo = 1
httpallowed = 127.0.0.1,local lan
aulow = 120
[reader]
label = orfice
protocol = smargo
device = /dev/ttyUSB0
smargopatch = 1
caid = 0D98
detect = cd
mhz = 534
cardmhz = 369
group = 1
emmcache = 1,3,2,0
saveemm-u = 1
[reader]
label = SRF_V7_Karte
description = SRF_V7_Karte
enable = 0
protocol = smargo
device = /dev/ttyUSB1
caid = 0500
detect = cd
mhz = 534
cardmhz = 369
ident = 0500:070200,070210,070220,070230,070240
group = 3
emmcache = 1,1,2,0
saveemm-u = 1
saveemm-s = 1
saveemm-g = 1
auprovid = 000001
[reader]
label = HD+
enable = 0
protocol = mouse
device = /dev/ttyUSB2
caid = 186A
mod1 = 123456
data50 = 123456
mod50 = 123456
key60 = 123456
exp60 = 123456
nuid = 123456
cwekey = 1BCA123456EA9C6
detect = cd
nagra_read = 2
detect_seca_nagra_tunneled_card= 0
group = 2
emmcache = 1,1,2,0
blockemm-unknown = 1
blockemm-u = 1
label = orfice
protocol = smargo
device = /dev/ttyUSB0
smargopatch = 1
caid = 0D98
detect = cd
mhz = 534
cardmhz = 369
group = 1
emmcache = 1,3,2,0
saveemm-u = 1
[reader]
label = SRF_V7_Karte
description = SRF_V7_Karte
enable = 0
protocol = smargo
device = /dev/ttyUSB1
caid = 0500
detect = cd
mhz = 534
cardmhz = 369
ident = 0500:070200,070210,070220,070230,070240
group = 3
emmcache = 1,1,2,0
saveemm-u = 1
saveemm-s = 1
saveemm-g = 1
auprovid = 000001
[reader]
label = HD+
enable = 0
protocol = mouse
device = /dev/ttyUSB2
caid = 186A
mod1 = 123456
data50 = 123456
mod50 = 123456
key60 = 123456
exp60 = 123456
nuid = 123456
cwekey = 1BCA123456EA9C6
detect = cd
nagra_read = 2
detect_seca_nagra_tunneled_card= 0
group = 2
emmcache = 1,1,2,0
blockemm-unknown = 1
blockemm-u = 1
[account]
user = dreamboxclient
pwd = #########
au = 1
emmreassembly = 2
group = 1,2,3
user = dreamboxclient
pwd = #########
au = 1
emmreassembly = 2
group = 1,2,3
Client:
Dreambox 920 UHD
OscamDreambox r1543-11577
[global]
logfile = /tmp/oscam.log
logduplicatelines = 1
pidfile = /var/run/oscam.pid
clienttimeout = 5000
fallbacktimeout = 2500
bindwait = 20
unlockparental = 1
nice = -1
maxlogsize = 1000
block_same_ip = 0
block_same_name = 0
[cache]
max_time = 18
[dvbapi]
enabled = 1
au = 1
user = DVBApi
boxtype = dreambox
[webif]
httpport = 8888
httpUser = root
httpPwd =
httprefresh = 10
httppollrefresh = 10
httpallowed = 127.0.0.1,0.0.0.0-255.255.255.255
httposcamlabel = OscamDreambox
logfile = /tmp/oscam.log
logduplicatelines = 1
pidfile = /var/run/oscam.pid
clienttimeout = 5000
fallbacktimeout = 2500
bindwait = 20
unlockparental = 1
nice = -1
maxlogsize = 1000
block_same_ip = 0
block_same_name = 0
[cache]
max_time = 18
[dvbapi]
enabled = 1
au = 1
user = DVBApi
boxtype = dreambox
[webif]
httpport = 8888
httpUser = root
httpPwd =
httprefresh = 10
httppollrefresh = 10
httpallowed = 127.0.0.1,0.0.0.0-255.255.255.255
httposcamlabel = OscamDreambox
[reader]
label = Remote-CCcam_(User_1)
description = dreamboxclient
protocol = cccam
device = lokale ip,123456
user = dreamboxclient
password = ###########
inactivitytimeout = 30
group = 1
cccversion = 2.3.0
ccckeepalive = 1
[reader]
label = lowerSlot
protocol = internal
device = /dev/sci0
mod1 = intern
data50 = intern
mod50 = intern
key60 = intern
exp60 = intern
nuid = intern
cwekey = intern
detect = cd
mhz = 540
cardmhz = 2700
group = 1
emmcache = 1,1,31,0
blockemm-unknown = 1
blockemm-g = 1
[reader]
label = upperSlot
enable = 0
protocol = internal
device = /dev/sci1
detect = cd
cardmhz = 2700
group = 1
emmcache = 1,1,31,0
[reader]
label = emulator
enable = 0
protocol = emu
device = emulator
disablecrccws_only_for = 0E00:000000
caid = 0500,0604,0E00,1010,1801,2600,2602,2610
detect = cd
ident = 0500:000000,007400,007800,021110,023800;0604:000000;0E00:000000;1010:000000;1801:000000,001101,002111,007301;2600:000000;2602:000000;2610:000000
group = 1
emmcache = 2,1,2,1
emu_auproviders = 0604:010200;0E00:000000;1010:000000;2610:000000
label = Remote-CCcam_(User_1)
description = dreamboxclient
protocol = cccam
device = lokale ip,123456
user = dreamboxclient
password = ###########
inactivitytimeout = 30
group = 1
cccversion = 2.3.0
ccckeepalive = 1
[reader]
label = lowerSlot
protocol = internal
device = /dev/sci0
mod1 = intern
data50 = intern
mod50 = intern
key60 = intern
exp60 = intern
nuid = intern
cwekey = intern
detect = cd
mhz = 540
cardmhz = 2700
group = 1
emmcache = 1,1,31,0
blockemm-unknown = 1
blockemm-g = 1
[reader]
label = upperSlot
enable = 0
protocol = internal
device = /dev/sci1
detect = cd
cardmhz = 2700
group = 1
emmcache = 1,1,31,0
[reader]
label = emulator
enable = 0
protocol = emu
device = emulator
disablecrccws_only_for = 0E00:000000
caid = 0500,0604,0E00,1010,1801,2600,2602,2610
detect = cd
ident = 0500:000000,007400,007800,021110,023800;0604:000000;0E00:000000;1010:000000;1801:000000,001101,002111,007301;2600:000000;2602:000000;2610:000000
group = 1
emmcache = 2,1,2,1
emu_auproviders = 0604:010200;0E00:000000;1010:000000;2610:000000
[account]
user = DVBApi
keepalive = 1
au = 1
group = 1
user = DVBApi
keepalive = 1
au = 1
group = 1