Welcome to Doom9's Forum, THE in-place to be for everyone interested in DVD conversion. Before you start posting please read the forum rules. By posting to this forum you agree to abide by the rules. |
|
![]() |
|
Thread Tools | Search this Thread | Display Modes |
![]() |
#41 | Link |
ангел смерти
![]() Join Date: Nov 2004
Location: Lost
Posts: 9,555
|
If nothing else, with source included someone else can come along and pick it up years after it's been abandoned, and add their own updates and improvements to it. I've done that a couple of times. Binaries on the forum are iffy, but source is always welcome, especially since external file hosts tend to come and go.
|
![]() |
![]() |
![]() |
#42 | Link | |
Registered User
Join Date: Dec 2013
Posts: 471
|
Just want to tell that I got an email from cyren / f-prot:
Quote:
Gesendet von meinem D5803 mit Tapatalk |
|
![]() |
![]() |
![]() |
#43 | Link |
Registered User
Join Date: Jun 2005
Posts: 257
|
Version 0.70 fails to validate the VUK even though it is valid. Appears to happen with all discs
Code:
2015-10-03 16:09:05 # 1207999 # DVDfab_GetVukFromDump - File >C:\Utils\FindVUK_0.70\dump\6915989258FC4C802F37198172DA6F89E2B9B488_BARBARELLA..dmp< DiscID >6915989258FC4C802F37198172DA6F89E2B9B488< Offset_Folder_DiscId >0x114< Offset_DiscId_Vuk >0x5F< 2015-10-03 16:09:06 # 1208467 # ------------------------------------ 2015-10-03 16:09:06 # 1208473 # VolumeName: BARBARELLA 2015-10-03 16:09:06 # 1208478 # DiscID : 6915989258FC4C802F37198172DA6F89E2B9B488 2015-10-03 16:09:06 # 1208483 # VUK : 2C71BCD772B0567DAF39B3BB9F4A2796 2015-10-03 16:09:06 # 1208488 # ------------------------------------ 2015-10-03 16:09:06 # 1208496 # AACS folder on disc is reachable - ValidateVUK is possible 2015-10-03 16:09:06 # 1208502 # AACS folder on bluray is reachable! 2015-10-03 16:09:06 # 1208526 # Information: preferred Bluray-MetaTitle language found >Barbarella< 2015-10-03 16:09:06 # 1208545 # FeatureDescriptor :00 00 00 0C 00 00 00 40 01 0D 01 04 01 01 01 01 2015-10-03 16:09:06 # 1208550 # AacsVersion :1 2015-10-03 16:09:06 # 1208555 # AacsActive :1 2015-10-03 16:09:06 # 1208559 # BindingNonceGenSupp :1 2015-10-03 16:09:06 # 1208564 # BindingNonceBlockCnt :1 2015-10-03 16:09:06 # 1208568 # BusEncryptionSupp :0 2015-10-03 16:09:06 # 1208572 # ReadDriveCertificate :0 2015-10-03 16:09:06 # 1208576 # AgidCount :1 2015-10-03 16:09:06 # 1208580 # Get UnitKeys 2015-10-03 16:09:06 # 1208594 # UnitKeyCount >7< 2015-10-03 16:09:06 # 1208598 # >>> UnitKey: 584FDD75AD8BC136BCD829CFD7F0B90C 2015-10-03 16:09:06 # 1208603 # >>> UnitKey: 12B4D0D990284F4D1B94DE7846E8BAA7 2015-10-03 16:09:06 # 1208608 # >>> UnitKey: A828A551C4BCCE2E05B677683C053236 2015-10-03 16:09:06 # 1208613 # >>> UnitKey: 89A4C27DD1FFE6F49A2ECE0C73DB2F5A 2015-10-03 16:09:06 # 1208619 # >>> UnitKey: AE14752A7489779F9AD15152C8C825B9 2015-10-03 16:09:06 # 1208625 # >>> UnitKey: 0E0A2EE4398919D0D544B2D08A6F07F2 2015-10-03 16:09:06 # 1208631 # >>> UnitKey: 9FDA1562148C2A9B5CCB8FC6506EB7CB 2015-10-03 16:09:06 # 1209141 # File >F:\BDMV\STREAM\00011.m2ts< is encrypted! 2015-10-03 16:09:06 # 1209146 # ERROR! Validation of VUK failed >0< Code:
2015-10-03 16:22:13 # 1980482 # DVDfab_GetVukFromDump - File >C:\Utils\FindVUK_0.68\dump\6915989258FC4C802F37198172DA6F89E2B9B488_BARBARELLA..dmp< DiscID >6915989258FC4C802F37198172DA6F89E2B9B488< Offset_Folder_DiscId >0x114< Offset_DiscId_Vuk >0x5F< 2015-10-03 16:22:14 # 1980977 # ------------------------------------ 2015-10-03 16:22:14 # 1980983 # VolumeName: BARBARELLA 2015-10-03 16:22:14 # 1980988 # DiscID : 6915989258FC4C802F37198172DA6F89E2B9B488 2015-10-03 16:22:14 # 1980993 # VUK : 2C71BCD772B0567DAF39B3BB9F4A2796 2015-10-03 16:22:14 # 1980998 # ------------------------------------ 2015-10-03 16:22:14 # 1981071 # AACS folder on disc is reachable - ValidateVUK is possible 2015-10-03 16:22:14 # 1981079 # AACS folder on bluray is reachable! 2015-10-03 16:22:14 # 1981089 # Information: no bdmv-meta-dl directory available on disc - cannot read meta-title (-6) 2015-10-03 16:22:15 # 1981640 # FeatureDescriptor :00 00 00 0C 00 00 00 40 01 0D 01 04 01 01 01 01 2015-10-03 16:22:15 # 1981645 # AacsVersion :1 2015-10-03 16:22:15 # 1981649 # AacsActive :1 2015-10-03 16:22:15 # 1981652 # BindingNonceGenSupp :1 2015-10-03 16:22:15 # 1981657 # BindingNonceBlockCnt :1 2015-10-03 16:22:15 # 1981661 # BusEncryptionSupp :0 2015-10-03 16:22:15 # 1981665 # ReadDriveCertificate :0 2015-10-03 16:22:15 # 1981668 # AgidCount :1 2015-10-03 16:22:15 # 1981673 # Get UnitKeys 2015-10-03 16:22:15 # 1981685 # UnitKeyCount >7< 2015-10-03 16:22:15 # 1981691 # >>> UnitKey: 584FDD75AD8BC136BCD829CFD7F0B90C 2015-10-03 16:22:15 # 1981697 # >>> UnitKey: 12B4D0D990284F4D1B94DE7846E8BAA7 2015-10-03 16:22:15 # 1981702 # >>> UnitKey: A828A551C4BCCE2E05B677683C053236 2015-10-03 16:22:15 # 1981708 # >>> UnitKey: 89A4C27DD1FFE6F49A2ECE0C73DB2F5A 2015-10-03 16:22:15 # 1981713 # >>> UnitKey: AE14752A7489779F9AD15152C8C825B9 2015-10-03 16:22:15 # 1981719 # >>> UnitKey: 0E0A2EE4398919D0D544B2D08A6F07F2 2015-10-03 16:22:15 # 1981724 # >>> UnitKey: 9FDA1562148C2A9B5CCB8FC6506EB7CB 2015-10-03 16:22:15 # 1982235 # Decrypted first unit of file >F:\BDMV\STREAM\00011.m2ts< with UnitKey >1< 2015-10-03 16:22:15 # 1982241 # Validation successful! VUK is valid!! 2015-10-03 16:22:15 # 1982252 # ------------------------------------------------------- 2015-10-03 16:22:15 # 1982257 # VolumeName: BARBARELLA 2015-10-03 16:22:15 # 1982262 # DiscID : 6915989258FC4C802F37198172DA6F89E2B9B488 2015-10-03 16:22:15 # 1982266 # VUK : 2C71BCD772B0567DAF39B3BB9F4A2796 2015-10-03 16:22:15 # 1982271 # MKBrev : 31 2015-10-03 16:22:15 # 1982277 # BusEncrEn : 0 2015-10-03 16:22:15 # 1982282 # ------------------------------------------------------- |
![]() |
![]() |
![]() |
#45 | Link |
Registered User
Join Date: Dec 2013
Posts: 471
|
Posted a hopefully bugfree release 0.71 in the first post.
A little bit more details about the changes than in the first post: 1) to detect if a file on the disc is encrypted or not I need to read a byte from this file and check for the encryption flag - before releasing 0.70 I noticed that in my virtual machine this detection didn't work as expected.. so I checked for the reason and found this: basically my bluray-optical-drive that is connected as passthrough device into the virtual machine isn't working any longer - don't know why, but it's not possible to read a file from a bluray in the drive. But FindVUK didn't detect an error when reading from the file - and finally I've found this: purebasic-readbyte command - this command returns '0' in case of an error, and also '0' in case a '0' byte has been successfully read from the file, so finally there's no way to detect if an error occured or the read byte is zero.. strange thing. This was the reason to change the related procedure in FindVUK from the integrated purebasic to a few winapi commands so I can properly detect read errors when reading the disc - unfortunately I introduced a stupid error when changing this: because of the options to detect errors I've changed the return values of the procedure and missed to adopt all related parts accordingly. So finally it always ended in an error in case an encrypted file has been found to validate the vuk... I've no idea why I didn't notice this before releasing... stupid me ![]() 2) because of this false positive malware topic I tried to remove all procedures from the application that are never called by anything. In case you're wondering why there are such procedures in the application: to make things easier I have a couple of include-files that contain different procedures for a certain topic, usually only a fraction of them is really used in the application, but as the purebasic compiler doesn't make a difference if something is really used or not all procedures from those include files are compiled and find their way into the final exe file. In the past I've used this include file here for registry access: Registry_Include.pbi - this has everything you need to get easy access to the registry ![]() Finally the compiled exe is now approx. 7kB smaller than before, but it didn't change anything about the malware topic... still 4 of 43 find something suspicious in my application ![]() ![]() |
![]() |
![]() |
![]() |
#49 | Link |
Registered User
Join Date: Jun 2005
Posts: 257
|
The new browser from some former Opera employees. It's based on Chrome so I assume that will give similar warnings. Not sure how it checks downloads
|
![]() |
![]() |
![]() |
#50 | Link |
Registered User
Join Date: Dec 2013
Posts: 471
|
Just installed vivaldi and tried to download this file - and you're right about this 'malicous' message
![]() But honestly vivaldi isn't scanning the file but simply blacklisting everything from file-upload.net ... (see here: Vivaldi Forum about 'malicicous' message And this was the first time ever I've seen how much advertising is on the file-uploaded page.. wow (usually I'm using an adblocker in firefox so I've never noticed how bad this page really is.... ). I'm currently finishing my final release and will check which other file-hoster is an option with little to none annoying ads on the page... |
![]() |
![]() |
![]() |
#51 | Link |
Registered User
Join Date: Jul 2008
Posts: 525
|
|
![]() |
![]() |
![]() |
#54 | Link |
Registered User
Join Date: Dec 2013
Posts: 471
|
Released 0.80 - this is the 'feature complete' release, at the moment I don't have any ideas what else I could add that would be a benefit for the application (considered that basically it's still a really small app and I never wanted it to get too fancy...).
The main last feature I've added is that it now reads the main-keydb file and the backup-keydb file and checks if there's already an entry for the current disc before adding a new entry to the file. At the moment 5 values are compared:
Finally I've the hope that the comparison logic of the AACSupdater will also be improved so that in case a new entry is more complete than an existing entry the new information will be used and the old one deleted.... Additionally I've corrected/changed a lot of additional details (e.g. improved the way the meta-title is read from the disc, important lines are displayed in colours now in the console window, ...) There are also 3 new ini entries available:
Personally I'm using FindVUK in a virtual Windows7x64 environment (with Virtualbox 5.0.6) and use DVDfab9 as tool of my choice (running in Test-Mode that will never expire, because in usage with FindVUK the trial period is never activated) - it takes about 30-40 seconds per disc to get the VUK, that basically this means you can insert one disc after the other with nearly no waiting time in between. And just to inform everybody: on metascan-online there are still 4 of 43 engines that detect a threat in the application, no idea why but believe me: those are still false positives... and I continue my effort to get this engines corrected. Last edited by nalor; 13th October 2015 at 19:48. |
![]() |
![]() |
![]() |
#55 | Link |
Registered User
Join Date: Dec 2013
Posts: 471
|
Wrote an email to cyren/f-prot yesterday and got an answer today that they verified my release 0.80 and noticed that it's not doing anything bad - so currently you can scan here and only 2 of 43 engines report a possible threat in the application:
metascan-online - findvuk 0.80 But I noticed that even a simple recompile with zero functional changes (but e.g. the internal build number is changed - so the generated exe file is not 100% identical) is enough to get it detected as possible threat again. Honestly I don't have any plans to put more time in this neverending story at this point - in case you don't trust me or the application just stop using it. |
![]() |
![]() |
![]() |
#56 | Link |
Registered User
Join Date: Sep 2015
Posts: 20
|
Hello nalor,
Nice application, was able to get a few blu-ray vuks myself. I have switched over from using passkey to dvdfab blu-ray copy. However the application is now stating that it cannot find the dvdfab logfile. Attached is the log, I think it might be how my hard drive is partitioned because its looking for F:/My Documents/DVDFab9/Log/dvdfab_internal.log like its trying to follow a Linux/Unix path with the forward slashes. |
![]() |
![]() |
![]() |
#57 | Link |
Registered User
Join Date: Dec 2013
Posts: 471
|
Hi - I know the forward slashes are quite confusing - but I get the path from the registry this way and I never had any problems with it... so I don't think this is the problem.
Unfortunately I cannot access your logfile, can you send it as pm to me? Thanks! |
![]() |
![]() |
![]() |
#60 | Link | |
Registered User
Join Date: Dec 2013
Posts: 471
|
@HaloSlayer255 - thanks for finding this bug!
![]() Will create a new release this evening - already found the source of the problem, it's a small detail I didn't notice until now: The DVDfab settings are stored in a xml-file and FindVUK reads the log-folder from this file - and for some strange reason all space-characters are encoded as _nbsp; in this xml-file. This is what I can find in my xml after changing to a folder that includes spaces: Quote:
![]() Workaround: simply select a logfolder without a space in the path in DVDfab9 ![]() |
|
![]() |
![]() |
![]() |
Thread Tools | Search this Thread |
Display Modes | |
|
|