Easy meat (the Custom Firmware section of the forum would be the normal starting point, and a search for "decryption" would provide what you seek):I want to decrypt a HD file but cannot find the latest suggested informatiom and would appreciate a link or links.
Users of the CF have the option/facility to decrypt recordings automatically, immediately after (or even while) they are recorded. However, this can also be done off-line. In the case where the original HDR-FOX is broken with no intention to replace, and where the recordings have not been decrypted:
- You will need the HDD from the HDR-FOX, and you will need to know the serial number and MAC (as printed on the product label). These details could also be obtained from the unit itself, if it weren't broken...
- Hook up the HDD to a PC. This is not as straightforward as it sounds, because the HDD is formatted Ext3, which is a Linux format and Windows will not play ball with it. The physical hook-up can be direct if your PC has a spare SATA bay, or using an external USB-SATA adapter. I then prefer to boot Linux (using a downloaded live boot Linux DVD or bootable USB if necessary), but some people have had success by loading an Ext3 driver in Windows (see Things Every... section 12). NB: Booting a "Live Linux" means you can use the PC in Linux without affecting the Windows installation. Modern Linuxes are very Windows-like, so they are not difficult to use.
You only need to copy off the .ts files to somewhere accessible at this stage, after that you can reboot to Windows if you're more comfortable with that. The other files (.hmt. .nts etc) are of no relevance away from a HDR-FOX.
- For the decryption utility, see:
- For the decryption key:
How to compute the key (from https://wiki.hummy.tv/wiki/Custom_Firmware_Package_Notes#Stripts): concatenate the 12 hex digits of the MAC, with 20 hex digits obtained from the S/N by converting the first 10 digits to hex ASCII. Presuming the S/N is purely numeric, this is not so difficult as it sounds because the decimal-to-hexASCII conversion is simply to prefix each digit with "3". Thus, for example: for MAC 00-03-78-bd-11-f3 and S/N 6371044960-1234, the first 12 hex digits of the key will be 000378bd11f3, and the subsequent 20 digits 36333731303434393630, so the whole key is 000378bd11f336333731303434393630.
The various flags are only relevant to hardware decryption on an HDR-FOX. Any of the software methods, on or off the box, only require the .ts as input and the .hmt (containing the flags) is irrelevant.I assume i need to remove the "enc" tag before using a script, is this correct?
That's the one, never tried it myself but I'm sure we would know if it didn't work.I had run one of these:
https://hpkg.tv/misc/stripts-linux
It's still "custom"!I was not sure if this was the correct forum as I was using Linux to decrypt!
Don't bother starting a new thread, we'll move this one.I will go and re-check what I did and got to the CF forum if I still have a problem.
Are you confident you have the correct encryption key?I had run one of these:
but it failed with a UTF-8 error in the first line so wrote here just in case I was not using the latest recommended method.
Can you expand on that a bit more? Or at least show your command and what it produces?I had run one of these:
https://hpkg.tv/misc/stripts-linux but it failed with a UTF-8 error in the first line
Yes.I assume the above is correct!?
You don't have to - you can run it from the current directory with e.g.Do I need to put the "stripts64" in a specific folder to run it
./stripts64
but it's probably easier to move it to somewhere like /usr/local/bin which should be in the PATH variable, then you can just run it without worrying where it is.Running it tells you what the syntax is but basically it'swhat is the command I must use to pipe the file through stripts to unencrypt the file?
stripts64 -@key filein.ts fileout.ts
substituting for filein, fileout and key as appropriate.Yes, it's on the Diagnostics page in the WebIf, at the bottom labelled "Native Encryption Key".I assume I will need the fox's key and can get the mac address/serial number manually and assume there is a terminal in the CF to find the key but not yet found it!
No, you're doing things right. Something has indeed changed, as mine has stopped working too. It seems libcrypto.so.1.1 has been obsoleted.It seems to need libcrypto but it seems thing have changed (or I am still doing something wrong).
Attached are some outputs. Its opening openssl but it seems there is no libcrypto.
I managed to get the old one running by recovering the old library file from a backup, just to prove it to myself, but it's not recommended.do I need to try to install it manually from somewhere else!?
This works for me: https://dl.dropbox.com/s/vu3whg47ph0teiu/stripts.zipI'll have to see if I can compile a new one against whatever is contemporary.