From 0adc70d3c9d834bc648e42327c2590b4b3d6be36 Mon Sep 17 00:00:00 2001 From: Luca Beltrame Date: Wed, 24 Jan 2018 00:29:39 +0100 Subject: [PATCH] =?UTF-8?q?New=20post:=20Hack=20of=20the=20day:=20download?= =?UTF-8?q?ing=20VOICEROID=E5=AE=9F=E6=B3=81=20from=20Nicovideo?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...ownloading-jikkyou-from-nicovideo.markdown | 301 ++++++++++++++++++ 1 file changed, 301 insertions(+) create mode 100644 _posts/2018-01-23-hack-of-the-day-downloading-jikkyou-from-nicovideo.markdown diff --git a/_posts/2018-01-23-hack-of-the-day-downloading-jikkyou-from-nicovideo.markdown b/_posts/2018-01-23-hack-of-the-day-downloading-jikkyou-from-nicovideo.markdown new file mode 100644 index 0000000..1722b9d --- /dev/null +++ b/_posts/2018-01-23-hack-of-the-day-downloading-jikkyou-from-nicovideo.markdown @@ -0,0 +1,301 @@ +--- +categories: +- General +- Anime +comments: true +date: 2018-01-23 23:15:48+0100 +layout: page +tags: +- Linux +- anime +- hacks +title: "Hack of the day: downloading VOICEROID実況 from Nicovideo" +--- + +## 実況? Is it something edible? + +In recent times, I've been watching a lot of VOICEROID実況 (じっきょう, jikkyou, literally "commentary") videos from the rather famous (in Japan) video service [ニコニコ動画](https://www.nicovideo.jp), better known as "Nicovideo". In this case, the commentary actually refers to games: they're basically a Japanese version of the Let's Play videos that are all around other places like YouTube. + +The difference from "regular" videos lies in the "VOICEROID" term: this is a name of a [TTS](https://en.wikipedia.org/wiki/Speech_synthesis) software developed by AH Software using an engine devised by a company called AI Inc. The name is derived from the very famous [VOCALOID](https://en.wikipedia.org/wiki/Vocaloid) singing software. Like in VOCALOID, many different voices have been created, each associated to a specific character. +This software is used to have these characters talk and provide commentary to the game being shown. Depending on the video and the uploader, these comments may range from comedy to more serious themes, and some authors even created stories featuring them in the game they are playing. + +This in turns shapes the characters beyond the original designs by AHS into the realm of "secondary creations", to use a term borrowed from [Re:CREATORS](https://en.wikipedia.org/wiki/Re:Creators). That's what makes thse videos interesting for me (and in addition, it's still a good way to keep my Japanese up to speed). + +## The problem + +The video interface of Nicovideo sucks. Seriously. Up to recent times, it didn't even offer 1080p, and most of the features (including advanced seeking, etc.) are locked beyond their premium account (which, however, grants access also to other bits like live events). In addition, when the website is under heavy traffic watching videos can be a true pain. Luckily, [youtube-dl](https://rg3.github.io/youtube-dl/) supports downloading from Nicovideo, barring [some bugs](https://github.com/rg3/youtube-dl/issues/14582). + +This situation complicated recently, because Nicovideo became the target of a dDoS from outside Japan. Their response was to shut off access from outside Japan for a number of days. I could've just waited it out, but I wanted to work around the problem. So I started to what to think about it. + +## The implementation + +The first ingredient in the recipe was getting a cheap VPS located in Japan. [Linode](https://linode.com) did in their Tokyo 2 datacenter, so I signed up for their $5 offering. I didn't need either processing power or storage: it would just exist as a "hop" to Nico. For the image, I chose openSUSE Leap 42.3, as I'm mostly familiar with the distribution. I installed a stock minimal install, but I used the distro-supplied kernel instead of Linode's (there's a reason, which I'll show afterwards). + +Then, I need some form of VPN to allow access from my home network. I thought about openVPN, but since I've been testing and using [WireGuard](https://wireguard.com) with great satisfaction, I settled for that. WireGuard is much simpler to configure than openVPN, doesn't require daemons, and routing uses the stock Linux tools like `iproute2`. It has also support for LEDE and OpenWRT, which meant I could hook it up in my Turris Omnia. + +First of all, I added the relevant repositories: + +``` +# zypper ar -f obs://network:vpn vpn +# zypper in wireguard wireguard-tools +``` + +This installed both the tools (`wg` and `wg-quick`) and the kernel module required by WireGuard (that's why I needed a stock distro kernel). + +Then, I needed a firewall: + +``` +# zypper in firewalld +# systemctl start firewalld +# firewall-cmd --add-service=ssh +# firewall-cmd --zone=public --change-interface=eth0 +# firewall-cmd --zone=public --change-interface=eth0 --permanent +# firewall-cmd --add-service=ssh --permanent +# firewall-cmd --zone=internal --add-masquerade +# firewall-cmd --zone=internal --add-masquerade --permanent +``` + +Afterwards, I had to configure WireGuard: + +``` +# mkdir /etc/wireguard +# chmod 0700 /etc/wireguard +# umask 002 # Don't make files group accessible +# wg genkey > /etc/wireguard/wg0.key # this generates a private key +# cat /etc/wireguard/wg0.key | wg pubkey > /etc/wireguard/wg0.pub +``` + +Then I edited `/etc/wireguard/wg0.conf` with the details of the interface: + +```ini +[Interface] +PreUp = firewall-cmd --add-port=51820/udp +PostDown = firewall-cmd --remove-port=51820/udp +ListenPort = 51820 +PrivateKey = +Address = 10.67.53.10/32 +MTU = 1500 # Different from default, see below + +[Peer] +PublicKey = +AllowedIPs = 10.67.53.0/24,192.168.35.0/24 +Endpoint = :51820 +``` + +"Allowed IPs" in WireGuard mean the destination IPs that are allowed through the tunnel (note that routing must be set separately, although `wg-quick` handles that for you). + +Afterwards I had to tweak the firewall to ensure that: + +1. The `wg0` interface was masqueraded (for packets coming from my own LAN) +2. Packets could go from `wg0` to `eth0` and vice versa +3. Apply [MSS clamping](https://en.wikipedia.org/wiki/Path_MTU_Discovery#Problems_with_PMTUD) + +Some of the commands below may be redundant, but firewalld wasn't really meant to be used like this (I removed the ``--permanent`` lines for brevity). + +``` +# firewall-cmd --zone=internal --change-interface=wg0 +# firewall-cmd --direct --passthrough ipv4 -t nat -A POSTROUTING -s 10.67.35.0/24 -o eth0 -j MASQUERADE +# firewall-cmd --direct --add-rule ipv4 filter FORWARD 0 -i wg0 -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT +# firewall-cmd --direct --add-rule ipv4 filter FORWARD 0 -i eth0 -o wg0 -m state --state RELATED,ESTABLISHED -j ACCEPT +# firewall-cmd --direct --passthrough ipv4 -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu +``` + +Then, I brought the interface up: + +``` +# systemctl start wg-quick@wg0 +# systemctl senable wg-quick@wg0 +``` + +I set the MTU specifically to 1500, because lower values set by `wg-quick` would cause packet fragmentation and packets would go nowhere (I spent a lot of time with `tcpdump` before figuring it out). + +On the Turris Omnia side, I had already WireGuard configured. It was just a matter of adding a few lines in `/etc/config/network` and restarting the network itself: + +``` +config wireguard_wg0 + option public_key '' + list allowed_ips '10.67.53.10/32' + list allowed_ips '' + option endpoint_host '' + option endpoint_port '51820' + option persistent_keepalive '60' + option route_allowed_ips '1' +``` + +While the dDoS was in effect, I routed data for Nicovideo through the VPN, thus bypassing the block. Now that it works so well, I might consider it expanding it to work around some programs (games) that reply on Japanese IPs, like Girls Trinary. + +Admittedly, it wasn't enough, even after the dDoS was over. Given that the VPS has a higher speed link than my own connection when it comes to Japan, why not leverage that? + +To do so, I installed a couple more packages: + +``` +# zypper in rsync python3 python3-pip youtube-dl +``` + +The last package required enabling the Packman repository through YaST beforehand. + +Then, I installed [sarge](https://sarge.readthedocs.io/), which wasn't available in the distro, through `pip`: + +``` +# pip3 install sarge --prefix /usr/local +``` + +And then it was a matter of hacking around a "simple" script. This would fetch one or multiple video URLs (including Nicovideo's "mylist", similar to YT's playlists), pass them through youtube-dl, then `rsync` them to the NAS I have at home (and deleting them afterwards). It makes use of youtube-dl's "hooks" which are executed when a video has been downloaded. + +The script is provided at the bottom of the post (BSD licensed). Note the total absence of error checking: it was a "hack" as the title of the post implies. It worked for me: it may or not may work for you. It might even kill every kitten in the world or bring the Great Old Ones to this planet. Exercise caution. + +Afterwards, there was just the matter of filling in the Nicovideo download credentials, as login is required to view. To do I created a `.netrc` in the home directory of the download user: + +```netrc +machine niconico login password