THANKS for WeeWX and interceptor!!!

I have Interceptor working with a WS-1400-IP(WS2600) in listen mode.
When I change to sniff mode it fails to run.
Low priority, I have something that works! (but I want to use sniff mode 
because yaddayaddayadda)

A snippet from working weewx.conf below shows an example suggesting I have 
the config correct.
-------------------------------------------------
    # The driver to use:
    driver = user.interceptor

    # Specify the hardware device to capture.  Options include:
    #   acurite-bridge - acurite internet bridge
    #   observer - fine offset WH2600/HP1000/HP1003, aka 'observer'
    #   lw30x - oregon scientific LW301/LW302
    #   lacrosse-bridge - lacrosse GW1000U/C84612 internet bridge
    device_type = observer

###    mode = sniff
###    iface = eth0
###    pcap_filter = src 10.10.100.72 and dst port 80 
    #    .72 is the WS-1400-IP
    #   the above intended to work with iptables '-tee'

###    mode = sniff
###    iface = eth0
###    pcap_filter = src 10.10.100.3 and dst port 8099
    #    .3 is DD-WRT router
    #    the above is intended to work with iptables '-mangle' and that 
should work with sniff or listen mode
---END of snippet---------------------------

Output from nekkid run of interceptor.py
-----------------------------------------------------
root@H370:/home/weewx# PYTHONPATH=bin python bin/user/interceptor.py 
--device=observer --mode=sniff --iface=tap1 --filter="src 10.10.100.3 and 
dst port 8099"   
Traceback (most recent call last):
  File "bin/user/interceptor.py", line 2124, in <module>
    address=options.addr, port=options.port)
  File "bin/user/interceptor.py", line 932, in __init__
    Observer.Parser(), handler=Observer.Handler, **stn_dict)
  File "bin/user/interceptor.py", line 278, in __init__
    iface, pcap_filter, promiscuous)
  File "bin/user/interceptor.py", line 307, in __init__
    self.packet_sniffer = pcap.pcapObject()
AttributeError: 'module' object has no attribute 'pcapObject'
---END of output from interceptor.py---

I gaggled and ducked for solutions without much luck.
Found a few results involving 'pcapObject', I applied some suggestions with 
hammer and did not change results in positive way.
I'm running Slackware 14.2-->upgraded to current as of OCT 1st
I'm running linux-4.19 kernel
Python 2.7 installed
weewx-3.8.2

I tried many combinations of --iface(eth0,br0,tap[x]) and --filter.
I tried many flavors of iptables rules. (nat -mangle and/or -tee)

I obviously 'think' I know what I'm doing with everything except the python 
troubleshooting.
My kernel is configured by me, in support of that tidbit, everything else 
network related works 'as advertised' :)
I verified firewall(DD-WRT) rules by running wireshark on host running 
weewx.
I verified firewall(DD-WRT) rules by running wireshark on host running 
weewx.
I can produce the expected layer 2 and/or 3 packets to the host running 
WeeWX.
It may have nothing to do with WeeWX, I have discovered other "features" 
running Slackware (since '95).
(I'm not a py newb but brain query returns "that data is stale and the 
buffer got flushed, reloading")
I'm willing to run tests and post results.
I don't lack direction but I lack the direction for quick sucessful self 
help in this instance.
I'm open to suggestions for things to try including upgrading or 
downgrading modules and/or patching interceptor.py
I 1/2 suspect a dumb attack on my part.
:)

-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to