Skip to main content

How to Play DVDs on Fedora Linux [Quick Tip]

 

You’ve probably tried to watch a DVD after installing Fedora, only to run into an error.

You are not alone. I faced this issue recently and I am pretty sure plenty of Fedora users like you and me who still use DVDs would like to overcome this petty issue.

libdvdcss error
libdvdcss error

Fixing DVD issue on Fedora

Why do you see this error? Because the manufacturers of DVDs encrypt their disks using a Digital Rights Management system named Content Scramble System.

You can get around it by installing the required software library. Videolan, creators of the VLC player, introduced a project named libdvdcss to get around this issue. According to its page, libdvdcss is a “simple library designed for accessing DVDs like a block device without having to bother about the decryption”.

As an individual, you may use this software library and no company or FBI should be coming after you as an individual but Fedora or other distribution would avoid including it by default to avoid possible legal troubles at an organization level.

Due to this legal reason, this library is not available in the Fedora repos. However, it is available on RPMFusion. You can only install it via the command line, but the instructions are simple.

Step 1

First, you need to install RPMFusion’s free tainted repo. The tainted repos contain “FLOSS packages where some usages might be restricted in some countries”.

To install the required repo, enter the following command in the terminal:

sudo dnf install rpmfusion-free-release-tainted

Enter your password and press Y when prompted to approve the installation.

Step 2

Next, install the required package with the following command:

sudo dnf install libdvdcss
Install libdvdcss on Fedora

Again, enter your password and press Y when prompted to approve the installation.

Once the installation is complete, you should be able to play your DVD. It’s that easy, at least it was for me. I hope this helps you too.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...