I my set up is an acurite smarthub, a raspberry pi 1 running weewx and
weewx-interceptor in sniff mode, port mirroring using netgear GS105Ev2.
I can't seem to get data into weewx.
I can run tcpdump on my router and see the packets. I can run tcpdump on
the raspberry pi and see packets.
but I am not getting any data into weewx:
from weewx.conf:
[Interceptor]
# This section is for the network traffic interceptor driver.
# The driver to use:
driver = user.interceptor
# Specify the hardware device to capture. Options include:
# acurite-bridge - acurite internet bridge
# observer - fine offset WH2600/HP1000/HP1003, aka 'observer'
# lw30x - oregon scientific LW301/LW302
# lacrosse-bridge - lacrosse GW1000U/C84612 internet bridge
device_type = acurite-bridge
mode = sniff
iface = eth0
pcap_filter = src 192.168.5.230 and dst port 80
pi@raspberrypiFB:~ $ tcpdump --version
tcpdump version 4.9.0
libpcap version 1.6.2
OpenSSL 1.0.1t 3 May 2016
If I run this line while I watch tcpdump on my router to ensure acurite
packets have been sent, I get nothing.
pi@raspberrypiFB:~ $ sudo PYTHONPATH=/usr/share/weewx python
/usr/share/weewx/user/interceptor.py --device=acurite-bridge --mode=sniff
--iface=eth0 --filter="dst port 80"
^CTraceback (most recent call last):
File "/usr/share/weewx/user/interceptor.py", line 2060, in <module>
_data = device.get_queue().get(True, 10)
File "/usr/lib/python2.7/Queue.py", line 177, in get
self.not_empty.wait(remaining)
File "/usr/lib/python2.7/threading.py", line 359, in wait
_sleep(delay)
KeyboardInterrupt
Exception in thread ServerThread (most likely raised during interpreter
shutdown):
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 810, in __bootstrap_inner
File "/usr/lib/python2.7/threading.py", line 763, in run
File "/usr/share/weewx/user/interceptor.py", line 285, in run_server
File "/usr/share/weewx/user/interceptor.py", line 320, in run
File "/usr/lib/python2.7/dist-packages/pcap.py", line 116, in dispatch
<type 'exceptions.AttributeError'>: 'NoneType' object has no attribute
'pcapObject_dispatch'
Here is a tcpdump run:
pi@raspberrypiFB:~ $ sudo tcpdump -U -i eth0 src 192.168.5.230 and port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:12:28.859374 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [S], seq 241058131,
win 400, options [mss 536], length 0
14:12:28.887870 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [.], ack 912225648,
win 400, length 0
14:12:28.889708 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 0:80, ack
1, win 400, length 80: HTTP: GET
/weatherstation/updateweatherstation?dateutc=now&action=updateraw&realtime=1[!http]
14:12:28.920267 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 80:122, ack
1, win 400, length 42: HTTP
14:12:28.922539 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 122:149,
ack 1, win 400, length 27: HTTP
14:12:28.924796 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 149:160,
ack 1, win 400, length 11: HTTP
14:12:28.931672 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 160:196,
ack 1, win 400, length 36: HTTP
14:12:28.957005 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 80:196, ack
1, win 400, length 116: HTTP
14:12:28.961918 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 196:213,
ack 1, win 400, length 17: HTTP
14:12:28.963793 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 213:254,
ack 1, win 400, length 41: HTTP
14:12:28.965296 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [P.], seq 254:277,
ack 1, win 400, length 23: HTTP
14:12:29.006661 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [.], ack 401, win
400, length 0
14:12:29.032033 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [.], ack 413, win
389, length 0
14:12:29.033168 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [.], ack 413, win
400, length 0
14:12:29.034156 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [F.], seq 277, ack
413, win 400, length 0
14:12:29.034827 IP Acurite.1978 >
ec2-52-22-110-201.compute-1.amazonaws.com.http: Flags [R.], seq 277, ack
413, win 400, length 0
^C
16 packets captured
17 packets received by filter
0 packets dropped by kernel
nothing is coming out of combine-lines.pl when I try it:
sudo tcpdump -A -U -w - -i eth0 src 192.168.5.230 and port 80 |
/etc/weewx/weewx-interceptor-master/util/combine/combine-lines.pl
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size
262144 bytes
^C1922 packets captured
1922 packets received by filter
0 packets dropped by kernel
Is tcpdump getting all the packet? It seems like only part of the line is
there.
I assume I am missing something obvious, but I am quite frustrated and
don't know what to try next.
Thanks!
--
You received this message because you are subscribed to the Google Groups
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.