THANKS for WeeWX and interceptor!!!
I have Interceptor working with a WS-1400-IP(WS2600) in listen mode.
When I change to sniff mode it fails to run.
Low priority, I have something that works! (but I want to use sniff mode
because yaddayaddayadda)
A snippet from working weewx.conf below shows an example suggesting I have
the config correct.
-------------------------------------------------
# The driver to use:
driver = user.interceptor
# Specify the hardware device to capture. Options include:
# acurite-bridge - acurite internet bridge
# observer - fine offset WH2600/HP1000/HP1003, aka 'observer'
# lw30x - oregon scientific LW301/LW302
# lacrosse-bridge - lacrosse GW1000U/C84612 internet bridge
device_type = observer
### mode = sniff
### iface = eth0
### pcap_filter = src 10.10.100.72 and dst port 80
# .72 is the WS-1400-IP
# the above intended to work with iptables '-tee'
### mode = sniff
### iface = eth0
### pcap_filter = src 10.10.100.3 and dst port 8099
# .3 is DD-WRT router
# the above is intended to work with iptables '-mangle' and that
should work with sniff or listen mode
---END of snippet---------------------------
Output from nekkid run of interceptor.py
-----------------------------------------------------
root@H370:/home/weewx# PYTHONPATH=bin python bin/user/interceptor.py
--device=observer --mode=sniff --iface=tap1 --filter="src 10.10.100.3 and
dst port 8099"
Traceback (most recent call last):
File "bin/user/interceptor.py", line 2124, in <module>
address=options.addr, port=options.port)
File "bin/user/interceptor.py", line 932, in __init__
Observer.Parser(), handler=Observer.Handler, **stn_dict)
File "bin/user/interceptor.py", line 278, in __init__
iface, pcap_filter, promiscuous)
File "bin/user/interceptor.py", line 307, in __init__
self.packet_sniffer = pcap.pcapObject()
AttributeError: 'module' object has no attribute 'pcapObject'
---END of output from interceptor.py---
I gaggled and ducked for solutions without much luck.
Found a few results involving 'pcapObject', I applied some suggestions with
hammer and did not change results in positive way.
I'm running Slackware 14.2-->upgraded to current as of OCT 1st
I'm running linux-4.19 kernel
Python 2.7 installed
weewx-3.8.2
I tried many combinations of --iface(eth0,br0,tap[x]) and --filter.
I tried many flavors of iptables rules. (nat -mangle and/or -tee)
I obviously 'think' I know what I'm doing with everything except the python
troubleshooting.
My kernel is configured by me, in support of that tidbit, everything else
network related works 'as advertised' :)
I verified firewall(DD-WRT) rules by running wireshark on host running
weewx.
I verified firewall(DD-WRT) rules by running wireshark on host running
weewx.
I can produce the expected layer 2 and/or 3 packets to the host running
WeeWX.
It may have nothing to do with WeeWX, I have discovered other "features"
running Slackware (since '95).
(I'm not a py newb but brain query returns "that data is stale and the
buffer got flushed, reloading")
I'm willing to run tests and post results.
I don't lack direction but I lack the direction for quick sucessful self
help in this instance.
I'm open to suggestions for things to try including upgrading or
downgrading modules and/or patching interceptor.py
I 1/2 suspect a dumb attack on my part.
:)
--
You received this message because you are subscribed to the Google Groups
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.