Open dki-os opened 2 years ago
As it's not possible to debug this without the account details, and probably the Comcast connection, it would be helpful if you could operate the controls.
I suppose these headers don't always have the same values or even predictable values? Are they sent on the 'Retrieving Session' step? (What happened to -e
and -g
...-y
?)
Presumably the 401 is on https://sp.auth.adobe.com/adobe-services/session after the form in the page whose content is in provider_login_page_res
(ie, the page eventually redirected from https://sp.auth.adobe.com/adobe-services/session/authenticate/saml) has been posted.
We may need to analyze the JS.
I suppose these headers don't always have the same values or even predictable values? Are they sent on the 'Retrieving Session' step? (What happened to
-e
and-g
...-y
?)
The headers actually do always have those names and in that order, it's predicable in that sense. They only seem to be sent on the form being posted to xfinity's website.
Presumably the 401 is on https://sp.auth.adobe.com/adobe-services/session after the form in the page whose content is in provider_login_page_res (ie, the page eventually redirected from https://sp.auth.adobe.com/adobe-services/session/authenticate/saml) has been posted.
Yes, it is occurring on that step. I added a line to my install of youtube-dl to log the site where the error occurred, and it returned https://sp.auth.adobe.com/adobe-services/session as the site.
We may need to analyze the JS.
This is probably the solution but even "deobfuscated" the js is still very convoluted, with variables referring to other variables referring to another variable referring to an array somewhere. I wonder how to analyse how the file is being executed in the browser debugger.
Checklist
Verbose log
Description
I recently tried to extract a cable protected stream, in this case a regional nbc sports network, though I was able to repeat this problem on other sites as well. It is unable to authorize the session. The login works perfectly from inside my browser, so I decided to poke around that. It seems that the browser is inserting tokens from obfuscated javascript, which don't seem to be present in what is sent by youtube-dl, that being the following items on form submission: