Posts by makikou

    OScam svn11377 WITHOUT EMU armV7 tested on solo4K


    Changes:


    ------------------------------------------------------------------------
    r11377 | manio | 2017-03-08 09:01:26 +0100 (Wed, 08 Mar 2017) | 9 lines


    dvbapi: do not send responses to all adapters, but to the origin (when decoding same srvid)


    When multiple different adapters was decoding the same srvid, then oscam
    was sending ECM responses to all adapters.
    As a result decrypt failed on client because of the unexpected responses.


    The commit fixes the problem (#4593).

    oscam-svn11357-armV7 NO-EMU tested on Solo4K on bh image



    Changes:
    ------------------------------------------------------------------------
    r11357 | theparasol | 2017-02-09 18:00:26 +0100 (Thu, 09 Feb 2017) | 2 lines


    Change man page so it matches the new allowed timeframe functionality


    ------------------------------------------------------------------------
    r11356 | theparasol | 2017-02-09 16:53:29 +0100 (Thu, 09 Feb 2017) | 8 lines


    - Add extended allowed timeframe request
    ------------------------------------------------------------------------
    r11355 | felixka | 2017-02-08 18:35:40 +0100 (Wed, 08 Feb 2017) | 1 line


    fix 11354. thx OP
    ------------------------------------------------------------------------
    r11354 | felixka | 2017-02-08 12:14:44 +0100 (Wed, 08 Feb 2017) | 5 lines


    [gbx]:
    - Remove residuals of obsolete gsms1 protocol
    - fix and update attack warnings
    ------------------------------------------------------------------------

    Does anyone know if this will work on a Vu Solo 4K, as im looking at the script and cant see it reference a arm processor so im guessing it dont work, can anyone point me in the right direction?


    Hi,
    try following lines or download attached file then extract it to /usr/script
    press green then blue buttons from your remote controller on BH image then execute your script.


    Regards!



    #!/bin/sh


    ############### Automatic Update of OSCAM ###############
    # This script updates oscam to the latest version #
    # This script is suitable for Vu + and dreambox #
    #########################################################


    #BASIC CONFIGURATION
    # The location of your oscam binary
    oscambin="/usr/bin/oscam";


    # The command to start OSCAM, you can call the script that you normally use to start/stop your emu
    oscamstart="/usr/camscript/Ncam_Oscam.sh start" #This is the path of the oscam launch script


    # The command to stop OSCAM, you can call the script that you normally use to start/stop your emu
    oscamstop="/usr/camscript/Ncam_Oscam.sh stop" #This is the path of the oscam launch script


    #hardware="mips-tuxbox-oe2.0" #if you are on mips (enigma2) dreambox (Models: 500HD, 7020HD, 7025, 7025+, 800HD, 800HD SE, 8000)
    #hardware="powerpc-tuxbox-old" #if you are on powerpc (enigma1) dreambox (Models: 7000, 56x0, 500, 500+, 600, 7020)
    #hardware="mips-wrt54g" #if you are running on a wrt54g router
    #hardware="x86_64-pc-linux"
    #hardware="i686-pc-linux"
    hardware="armV7" #if you have solo4k


    #tipo="webif-Light"
    #tipo="webif-libusb-ssl-Distribution"
    #tipo="webif-libusb-Distribution"
    tipo="webif-Distribution"


    #####################################################################################
    ####### DO NOT CHANGE ANYTHING FROM HERE, UNLESS YOU KNOW WHAT YOU ARE DOING ########
    #####################################################################################


    pageold="http://download.oscam.cc/index.php?&direction=0&order=mod&directory=1.20_TRUNK/$hardware/archives"
    prelinkold="http://download.oscam.cc/index.php?action=downloadfile&filename=oscam-svn%s-$hardware-$tipo.tar.gz&directory=1.20_TRUNK/$hardware/archives&"
    page="http://download.oscam.cc/index.php?&direction=0&order=mod&directory=1.20_TRUNK/$hardware"
    prelink="http://download.oscam.cc/index.php?action=downloadfile&filename=oscam-svn%s-$hardware-$tipo.tar.gz&directory=1.20_TRUNK/$hardware&"


    r_flag=
    h_flag=
    o_flag=


    while getopts "ohr:" opt; do
    case $opt in
    o) o_flag=1; page=$pageold; prelink=$prelinkold ;;
    r) r_flag=1; rev="$OPTARG" ;;
    h) h_flag=1 ;;
    esac
    done



    if [ ! -z '$h_flag' ]; then
    printf "\nUso: $0 [-ho] [-r revision svn]\n\n\
    Esempi:\n\
    $0 -h # Show this message and exit.\n\
    $0 # Download and install the latest revision svn\n\
    $0 -r 10200 # Download and install the revision 10200, if any.\n\t\t\t- Try with -or 10200 if fails.\n\
    $0 -o # Download and install the latest svn revision in the archive\n\
    $0 -or 9800 # Download and install the revision 9800 which is located in the archive\n\n"
    exit 0
    fi


    cd /tmp


    if [ -z '$r_flag' ]; then
    wget -O page.tmp $page
    rev=$(grep -m1 -o -E "oscam-svn[[:digit:]]+" page.tmp | sed 's/^[^0-9]*\([0-9]*\).*$/\1/')
    fi



    filename="oscam.tar.gz"
    extract="tar -xvzf $filename"


    echo "Downloading Oscam Latest Revision$rev ..."
    wget -O $filename $(printf $prelink $rev)


    if [ -f $filename ]; then
    echo "Extracting Oscam binary for $rev-$hardware ..."
    $extract
    if [ -f oscam ]; then
    echo "Extracted file : $filename"
    echo "Stopping currently running Oscam..."
    $oscamstop
    echo "Copying the new version to $oscambin"
    cp -f oscam $oscambin > /dev/null 2>&1
    echo "Oscam Starting Now ..."
    $oscamstart
    else
    echo ""
    echo "Unable to extract latest version from archive."
    echo "Revision not available!"
    if [ -z '$o_flag' ]; then
    echo ""
    echo " Try: $0 -or $rev"
    echo ""
    fi
    fi
    else
    echo "Download Error"
    echo ""
    fi



    rm page.tmp > /dev/null 2>&1
    rm oscam > /dev/null 2>&1
    rm $filename > /dev/null 2>&1
    cd ~

    Hello guys,



    Yesterday i opened the ssh,streamproxy,transtreamproxy ports to manage and stream. from my modem router i saw much unwanted visitors trying to connect to my solo4k receiver "bh 3.0.2h" via ssh and OpenWebIf content. I decided to change the default ports to reduce these attacks.
    everything is ok till i tried to modify the default ssh port from 22 to 2222.
    which I passed 4 hours on forums...google searching how to modify it.


    Quote

    Finally, if you want changing the default ssh port just add following line on /etc/default/dropbear file then reboot your receiver.
    DROPBEAR_PORT=2222



    Regards
    Makikou

    the patch i provided works with the version i provided but AEON from streamboard has reworked my patch to be compatible with the latest versions of oscam et from the build r10977 of oscam the twin protocol is working like for oscam ymod . the only problem is left is the freez of 1 second wich some users have played on the dvb-api.c file to improve the ecm request from the reader so the dcw doesnt come late and there is also this version of oscam wich works on the sh4 plateform wich some users stated that it's also freez free . but i dont have the source of this one .
    so finally there's some work to be done on the twin protocol reader to get rid of the freez and make it as stable as a real card reader .


    those two files attached works on the pkteam and hdmu and i think it's for sh4 plateform


    Hi,


    from your oscam.conf i found follwing lines,
    [reader]
    enable = 1
    label = Atlas
    protocol = serial
    device = twin://@/dev/ttyAS0
    ident = 0500:032830,042800,042400,023800;0604:000000;0D05:000000;0D95:000000;603:000000;1810:000000;0100:0041060,000065,00006A,00006C;1702:000000;1722:000000;09C4:000000;09C7:000000;09cd:000000;1801:000000;1802:000000;1803:000000;1810:000000;1830:000000;1830:003411;1833:000000;1834:000000;1834:000401;0B00:000000;
    Group = 1
    killbadcw = 1


    did you connected Atlas cristor dongle to your receiver by serial?
    Can i use this files to connect the dongle Atlas Cristor to my SOLO 4K?


    Best Regards