Welcome!

Welcome to Satlover forums, full of great people, ideas and excitement.

Please register if you would like to take part. link..

Register Now

Alert: Don't Use Hotmail Email Accounts for registration

Collapse

Before Access to all Forums and Trial accounts you must need to activate your account Email address

CCCam tutorial Partie I

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • maty
    Banned
    • Feb 2010
    • 179

    CCCam tutorial Partie I

    PART I
    The first part is for beginners.
    Installing CCcam
    The CCcam archive is composed of 2 files, a bin file and a config file. In the original RAR
    archive, the authors have saved the Dreambox binary file as CCcam.ppc, whilst the config file
    is the same as for any version. It is suggested to rename the binary file in CCcam as it will
    help make the following Telnet procedures easier.
    Copy the bin file to /var/bin and set the rights (attributes) to 755. Copy the config file to
    /var/etc/
    We are now ready to check in details how CCcam really works, using the Telnet utility
    In Windows,
    Start RUN and type Telnet 192.168.1.10 (or your Dreambox IP number) and click OK
    Login (root)
    Now do the following.Type cd /var/bin to go to /var/bin, check whether you are in the correct
    directory (for Linux ls=dir), check the file colour, the CCcam file should be green.
    At the prompt, type “CCcam –dv” making sure to match the file name as well as capital
    letters
    The –dv command will give you the possibility to see each step that CCcam does, through an
    activity log that should look like the following one
    1) 16:09:26.209 CCcam: ===================================
    2) 16:09:26.212 CCcam: starting CCcam 1.2.0 compiled on Jul 5 2006@21:12:46
    3) 16:09:26.212 CCcam: ===================================
    4) 16:09:26.276 CCcam: online using nodeId 578103ff60952939
    5) 16:09:26.305 CCcam: DM70x0 detected
    6) 16:09:26.307 CCcam: create 2 cam device(s)
    7) 16:09:26.920 CCcam: provider num: fff830
    8) 16:09:26.920 CCcam: provider key: (hier steht die abonummer)
    9) 16:09:27.120 CCcam: provider num: 021c00
    10) 16:09:27.121 CCcam: provider key: (hier steht die abonummer)
    11) 16:09:27.215 CCcam: card added to broker with caid 500
    12) 16:09:28.018 CCcam: card added to broker with caid 4a70
    13) 16:09:28.072 CCcam: added 389 keys from /var/keys/SoftCam.Key
    14) 16:09:28.132 CCcam: added 541 keys from /var/keys/AutoRoll.Key
    15) 16:09:28.133 CCcam: static cw not found or bad
    16) 16:09:28.134 CCcam: read_ignorefile: cannot open /var/keys/CCcam.ignore or not found
    17) 16:09:28.135 CCcam: server started on port 12000
    If you suspect something is not correct, and would like to check the ECMS answers, these will
    appear directly on your DB when zapping channel. Just start a second Telnet session, type
    the command ps and press Enter. The active processes will be displayed and should look like
    the following example:
    1: root@dm7020:~> ps
    2: PID Uid VmSize Stat Command
    3: 1 root 608 S init [2]
    4: 2 root SWN [ksoftirqd/0]
    5: 3 root SW< [events/0]
    6: 4 root SW< [khelper]
    7: --- extra lines removed---
    8: 599 root 2100 S /var/bin/CCcam_1.2.1
    9: 600 root 2100 S /var/bin/CCcam_1.2.1
    Reading Log entries
    4) online using nodeId 578103ff60952939
    This is a unique identity number created for each server/client user upon connecting
    5) create 2 cam device (s) 7020
    2 CAM devices have been found.
    The following lines 7) 8) and 9) display data about the subscription card provider id number.
    9) provide num :021c00 is the provider number, which is Redlight/FullX
    11) card added to broker with caid 500
    This line identifies the CAId (Conditional Access Identification) in use to provide access to the
    service, which, in this case, is Viaccess. The subscription card is identified by both the CAId
    and the Provider, and therefore, in our example 0500:021c00.
    Some providers use many CAId’s. This is why in our log, Redlight/FullX is also listed as
    0600:021c00, where 0600 is the IRDETO CAId. It is very important to understand the system
    caid/provider as it will be taken into consideration again in this tutorial
    13) added 389 keys
    there are 389 keys read from the static key file
    15) cw not found or BAD
    there are no static cw available; this does not represent a problem (optional)
    16) read_ignorefile: cannot open/var/keys/CCcam.ignore or not found
    this is also not important for the upcoming instructions
    17) server started on port 12000
    the server runs on port 12000 TCP(this is very important for your Router/Firewall settings)
    Keyfiles
    Unless the destination folder has been changed, by default, the key file is found in the
    var/keys folder.
    CCcam is using the SoftCam.key/Autoroll.key format, which is also used by other EMU
    systems.
    For this reason, there is no need for a purpose built key file format for this CAM. Keyfiles are
    an option as CCcam works also without any of them
    CCcam and cardsharing
    To configurate and connect the CCcam, you need to go to the ETC folder and edit the
    CCcam.cfg file.The CCcam config file itself is a little help file. Indeed, you will find many text
    lines starting with #. These lines provide help to set the CCcam, and there is no need to
    delete them as they are ignored by CCcam. Therefore, they can also be used to add any note
    or comment.
    The configuration lines can be written in any order. There is no standard order to respect.
    Indeed, when started, CCcam reads the first character of each line and executes the request.
    Let’s look at each line syntax now.
    F: Friends
    F: user1 pass1 1
    C: Connect
    C: server.dyndns.org 12000 user1 pass1
    The C line (where C stands for connect) enables the CCcam to connect to another server
    The URL or IP after C: is necessary to identify the server in the sharing network. 12000 is the
    port used by the server to communicate and user1 pass1 identify the user
    Note: each user is accepted only once by the server
    How to connect a client to a server:
    The F line launches the server, whilst the C line launches the client, and this is all you need.
    Should the client wish to share its subscription cards with the server, then you need to add a
    C line at the server, and an F line at the client.
    Log Diagnostic
    Should you wish to check whether the connections are working properly, then use the CCcam
    –dv Telnet command. This option will give you the possibility to check the log and make sure
    all is ok.It may be useful for beginners to do it with Telnet, and, once experienced, it may also
    be done using the the automatic script found in the blue panel.
    This is what the dialogue between the 2 decoders should look like
    1) 11:55:06.977 CCcam: found betacrypt caid: 0x1702 ecmpid: 0x100a id: 0x0
    2) 11:55:06.978 CCcam: found betacrypt caid: 0x1722 ecmpid: 0x100a id: 0x0
    3) 11:55:06.978 CCcam: found nagra caid: 0x1801 ecmpid: 0x1642 id: 0x0
    4) 11:55:06.978 CCcam: cam[0] set PMT for sid=a
    5) 11:55:06.979 CCcam: start EMM
    6) 11:55:06.996 CCcam: cam[0] ecm even nok caid:0x1702 id:0x0 pid:0x100a Premiere Sat (19E)
    tunneled Nagra (took 0.0010 seconds)
    7) 11:55:07.061 CCcam: cam[0] ecm even nok caid:0x1722 id:0x0 pid:0x100a Premiere Kabel (19E)
    tunneled Nagra (took 0.0003 seconds)
    Lines 1) 2) and 3) display information about the service encryption
    Pre***e is displayed with the 3 possidble CAId’s:
    1702 tunnel Nagra = betacrypt for DVB-S
    1722 tunnel Nagra = betacrypt for DVB-C
    1801 plain Nagra (not used or only on s04 card) = unused.
    The Pre**er provider is usually written with 6 digits.In this case, the service ID is 100a and
    identifies Pre**er1.
    Line 4) “Start EMM” marks the point where CCcam starts looking for keys
    The 2 following lines list the local server replies.In this example, the replies are negative ecm
    even nok caid:0x1722. This is normal as there are no cards in the receiver. The query lasted
    0.0003s.
    We then find the queries sent to the server:
    8) 11:55:07.194 CCcam: remote ecm -> 192.168.1.3:12000 0x1702(0x000)
    9) 11:55:07.331 CCcam: remote ecm <- 192.168.1.3:12000 ok (took 0.1364 seconds)
    10) 11:55:07.333 CCcam: cam[0] ecm even ok caid:0x1702 id:0x0 pid:0x100a Pre***re Sat (19E)
    tunneled Nagra (took 0.1383 seconds)>code<
    ecm even ok caid:0x1702 means that this query has been successfully transmitted through
    the LAN in 0.1383s
    killall CCcam marks the end of the log
    End of PART I
Working...