Any Indian provider with local card support? (not card sharing)

dvbuserhere

Registered
Messages
8
Hello,

I want to use my DVB-S2 card to record TV. Is there any Indian provider which can be used with a local card (using a phoenix card reader) and oscam?

Thanks

PS: I am not looking for pair servers or card sharing. I will pay for the subscription to the satellite provider.
 

DM9004K

Registered
Messages
243
Hello,

I want to use my DVB-S2 card to record TV. Is there any Indian provider which can be used with a local card (using a phoenix card reader) and oscam?

Thanks

PS: I am not looking for pair servers or card sharing. I will pay for the subscription to the satellite provider.

Verious cards are working in oscam but not so easy to run
 

dvbuserhere

Registered
Messages
8
Verious cards are working in oscam but not so easy to run

Please can you suggest any provider with working oscam. I will buy the subscription for that service.

Most providers are going cardless which i guess could be an issue. In that case I will try to get hold of an older model of STB with card support.
 

dvbuserhere

Registered
Messages
8
I tried to setup Airtel but failed
Code:
2020/10/27 14:09:49 00000000 s **** OSCam << cardserver log switched, version 1.20_svn, build r11650 (x86_64-linux-gnu)
2020/10/27 14:09:49 00000000 s     (main) System name    = Linux
2020/10/27 14:09:49 00000000 s     (main) Machine        = x86_64
2020/10/27 14:09:49 00000000 s     (main) creating pidfile /var/run/oscam.pid with pid 147622
2020/10/27 14:09:49 00000000 s   (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2020/10/27 14:09:49 00000000 s     (main) signal handling initialized
2020/10/27 14:09:49 00000000 s   (reader) reader1 [mouse] creating thread for device /dev/ttyUSB0
2020/10/27 14:09:49 00000000 s     (main) waiting for local card init
2020/10/27 14:09:49 6A455118 h    (webif) webif: decompressed 185615 bytes back into 491040 bytes
2020/10/27 14:09:49 6A455118 h    (webif) HTTP Server running. ip=0.0.0.0 port=8888
2020/10/27 14:09:49 0466014D r   (reader) reader1 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2020/10/27 14:09:50 0466014D r   (reader) reader1 [mouse] card detected
2020/10/27 14:09:51 0466014D r   (reader) reader1 [mouse] ATR: 3F FD 14 25 02 50 80 0F 41 B0 0D 69 FF 4A 50 F0 80 00 42 52 03
2020/10/27 14:09:51 0466014D r   (reader) reader1 [mouse] Setting baudrate to 76800 bps
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Card type:   BRTV
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Rom version: 20AD
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Credit available on card: 0 euro
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Country Code: IND
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Pincode read: 0000
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] PCB settings: FF FF FF FF
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] type: VideoGuard Unknown Card, caid: 09BB
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] serial: ########, BoxID: ########, baseyear: 1997
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] ready for requests
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] found card system videoguard2
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No  1 out of max allotted of 1
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] card detected
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] type: VideoGuard Unknown Card
---snip-------
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 ECMTYPE 81 CAID 09BB PROVID 000000 ECMPID 0941 FAKECHID 0366 (unique part in ecm)
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 Filter 1 set ecmtable to EVEN (CAID 09BB PROVID 000000 FD 65535)
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 Filter 1 set chid to ANY CHID on fd 65535
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Sending packet to dvbapi client (fd=11):
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   40 3C 6F 2B 00 00 00 09 41 80 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 FF 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   04
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 request controlword for ecm 09BB@000000/0366/2FA5/63:2F071BEE0D762A92C5540AAA6760A7E9
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Processing socketdata completed after 1 packets with 0 bytes left unprocessed
2020/10/27 15:14:40 03C7D5DA r   (reader) reader1 [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2020/10/27 15:14:40 03C7D5DA r   (reader) reader1 [videoguard2] classD3 ins54: no cw --> Tier expired

The OSCAM config was like so,

Code:
/etc/oscam/oscam.server
[reader]
label                         = reader1
protocol                      = mouse
device                        = /dev/ttyUSB0
boxid                         = 12345678 (modified)
ins7e                         = 1111111111111111111111111111111111111111111111111111 (modified)
detect                        = cd
group                         = 1
emmcache                      = 1,3,2,0
blockemm-unknown              = 1
blockemm-g                    = 1
saveemm-u                     = 1
saveemm-s                     = 1
dropbadcws                    = 1
/etc/oscam/oscam.user
[account]
user       = tvh
pwd        = tvh
monlevel   = 4
uniq       = 0
group      = 1
/etc/oscam/oscam.dvbapi
M: 09AA 09BB:0
/etc/oscam/oscam.conf
[global]
#logfile                       = stdout
logfile                       = /var/log/oscam.log
maxlogsize = 10000
[dvbapi]
enabled                       = 1
au                            = 1
pmt_mode                      = 4
request_mode                  = 1
listen_port                   = 9000
user                          = tvh
boxtype                       = pc
[webif]
httpport                      = 8888
httpallowed                   = 127.0.0.1,192.168.0.0-192.168.255.255,10.0.0.0-10.255.255.255,172.16.0.0-172.31.255.255,255.255.255.255
httpshowmeminfo               = 1
httpshowuserinfo              = 1
httpshowecminfo               = 1
httpshowloadinfo              = 1
http_status_log               = 1

I think my INS7e string is incorrect. Anybody has a idea how to form the correct INS7e string?
 

DM9004K

Registered
Messages
243
I tried to setup Airtel but failed
Code:
2020/10/27 14:09:49 00000000 s **** OSCam << cardserver log switched, version 1.20_svn, build r11650 (x86_64-linux-gnu)
2020/10/27 14:09:49 00000000 s     (main) System name    = Linux
2020/10/27 14:09:49 00000000 s     (main) Machine        = x86_64
2020/10/27 14:09:49 00000000 s     (main) creating pidfile /var/run/oscam.pid with pid 147622
2020/10/27 14:09:49 00000000 s   (config) userdb reloaded: 1 accounts loaded, 0 expired, 0 disabled
2020/10/27 14:09:49 00000000 s     (main) signal handling initialized
2020/10/27 14:09:49 00000000 s   (reader) reader1 [mouse] creating thread for device /dev/ttyUSB0
2020/10/27 14:09:49 00000000 s     (main) waiting for local card init
2020/10/27 14:09:49 6A455118 h    (webif) webif: decompressed 185615 bytes back into 491040 bytes
2020/10/27 14:09:49 6A455118 h    (webif) HTTP Server running. ip=0.0.0.0 port=8888
2020/10/27 14:09:49 0466014D r   (reader) reader1 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2020/10/27 14:09:50 0466014D r   (reader) reader1 [mouse] card detected
2020/10/27 14:09:51 0466014D r   (reader) reader1 [mouse] ATR: 3F FD 14 25 02 50 80 0F 41 B0 0D 69 FF 4A 50 F0 80 00 42 52 03
2020/10/27 14:09:51 0466014D r   (reader) reader1 [mouse] Setting baudrate to 76800 bps
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Card type:   BRTV
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Rom version: 20AD
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Credit available on card: 0 euro
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Country Code: IND
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] Pincode read: 0000
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] PCB settings: FF FF FF FF
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] type: VideoGuard Unknown Card, caid: 09BB
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] serial: ########, BoxID: ########, baseyear: 1997
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] ready for requests
2020/10/27 14:09:53 0466014D r   (reader) reader1 [mouse] found card system videoguard2
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] THIS WAS A SUCCESSFUL START ATTEMPT No  1 out of max allotted of 1
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] card detected
2020/10/27 14:09:53 0466014D r   (reader) reader1 [videoguard2] type: VideoGuard Unknown Card
---snip-------
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 ECMTYPE 81 CAID 09BB PROVID 000000 ECMPID 0941 FAKECHID 0366 (unique part in ecm)
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 Filter 1 set ecmtable to EVEN (CAID 09BB PROVID 000000 FD 65535)
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 Filter 1 set chid to ANY CHID on fd 65535
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Sending packet to dvbapi client (fd=11):
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   40 3C 6F 2B 00 00 00 09 41 80 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 FF 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
2020/10/27 15:14:40 21B87D0D c   (dvbapi)   04
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Demuxer 0 request controlword for ecm 09BB@000000/0366/2FA5/63:2F071BEE0D762A92C5540AAA6760A7E9
2020/10/27 15:14:40 21B87D0D c   (dvbapi) Processing socketdata completed after 1 packets with 0 bytes left unprocessed
2020/10/27 15:14:40 03C7D5DA r   (reader) reader1 [videoguard2] classD3 ins54: no cw --> Card needs pairing/extra data
2020/10/27 15:14:40 03C7D5DA r   (reader) reader1 [videoguard2] classD3 ins54: no cw --> Tier expired

The OSCAM config was like so,

Code:
/etc/oscam/oscam.server
[reader]
label                         = reader1
protocol                      = mouse
device                        = /dev/ttyUSB0
boxid                         = 12345678 (modified)
ins7e                         = 1111111111111111111111111111111111111111111111111111 (modified)
detect                        = cd
group                         = 1
emmcache                      = 1,3,2,0
blockemm-unknown              = 1
blockemm-g                    = 1
saveemm-u                     = 1
saveemm-s                     = 1
dropbadcws                    = 1
/etc/oscam/oscam.user
[account]
user       = tvh
pwd        = tvh
monlevel   = 4
uniq       = 0
group      = 1
/etc/oscam/oscam.dvbapi
M: 09AA 09BB:0
/etc/oscam/oscam.conf
[global]
#logfile                       = stdout
logfile                       = /var/log/oscam.log
maxlogsize = 10000
[dvbapi]
enabled                       = 1
au                            = 1
pmt_mode                      = 4
request_mode                  = 1
listen_port                   = 9000
user                          = tvh
boxtype                       = pc
[webif]
httpport                      = 8888
httpallowed                   = 127.0.0.1,192.168.0.0-192.168.255.255,10.0.0.0-10.255.255.255,172.16.0.0-172.31.255.255,255.255.255.255
httpshowmeminfo               = 1
httpshowuserinfo              = 1
httpshowecminfo               = 1
httpshowloadinfo              = 1
http_status_log               = 1

I think my INS7e string is incorrect. Anybody has a idea how to form the correct INS7e string?

My dear friend it is no so simple to run airtel card in oscam u need k1 key to run this card which is too difficult to find
 
Top