Hello, seems to OK
Python plugin: Presence detection from wireless router
Moderator: leecollings
-
- Posts: 18
- Joined: Wednesday 07 March 2018 18:22
- Target OS: Raspberry Pi / ODroid
- Domoticz version:
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
@EscApe
Today I installed the iDetect plugin and the presence detection is working, but somehow I get regulary the following error in my log file:
I use two Unifi access points as tracker devices. My polling is set on 10 seconds and grace period is 60 seconds. Every 10 seconds I get this error. I am able to login by ssh on both AP's as following log file shows:
What is going wrong here?
Today I installed the iDetect plugin and the presence detection is working, but somehow I get regulary the following error in my log file:
Code: Select all
2020-02-02 15:02:45.260 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:45.618 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
Code: Select all
2020-02-02 15:02:13.936 Status: (iDetect) Started.
2020-02-02 15:02:14.096 Status: (iDetect) Initialized version 2.0, author 'ESCape'
2020-02-02 15:02:14.095 Status: (iDetect) Entering work loop.
2020-02-02 15:02:15.138 (iDetect) Debug logging mask set to: PYTHON
2020-02-02 15:02:15.138 (iDetect) Operation system is: linux
2020-02-02 15:02:15.152 (iDetect) The OS user profile running domoticz is: root
2020-02-02 15:02:15.152 (iDetect) Parsing user and optional keyfile from:admin
2020-02-02 15:02:15.153 (iDetect) start get or create wireless device
2020-02-02 15:02:15.153 (iDetect) phone1 monitor tag_id:78:4F:43:0F:27:FB, domoticz unit:2
2020-02-02 15:02:15.153 (iDetect) start get or create wireless device
2020-02-02 15:02:15.153 (iDetect) phone2 monitor tag_id:C4:93:D9:A3:FD:DE, domoticz unit:3
2020-02-02 15:02:15.153 (iDetect) Monitoring {'78:4F:43:0F:27:FB': <plugin.tag_device object at 0x675e67d0>, 'C4:93:D9:A3:FD:DE': <plugin.tag_device object at 0x675ef7b0>} for presence.
2020-02-02 15:02:15.153 (iDetect) Tracker configuration:192.168.1.19, 192.168.1.31
2020-02-02 15:02:15.153 (iDetect) tracker:192.168.1.19
2020-02-02 15:02:15.153 (iDetect) options:
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 Tracker is of the ssh kind
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH Fetching data using:
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH not connected ... connecting
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH start connect
2020-02-02 15:02:15.438 (iDetect) 192.168.1.19 ====> SSH returned (decoded):wl: not found
2020-02-02 15:02:15.438 (iDetect) 192.168.1.19 ====> SSH session took 282 milliseconds.
2020-02-02 15:02:15.439 (iDetect) Available commands on 192.168.1.19:{'wlanconfig': '/usr/sbin/wlanconfig', 'ip': '/usr/sbin/ip', 'brctl': '/usr/sbin/brctl', 'arp': '/sbin/arp', 'cat': '/bin/cat'}
2020-02-02 15:02:15.439 (iDetect) 192.168.1.19 ====> SSH Fetching data using:
2020-02-02 15:02:15.521 (iDetect) 192.168.1.19 ====> SSH returned (decoded):~ath0~ath2~eth0
2020-02-02 15:02:15.521 (iDetect) 192.168.1.19 ====> SSH session took 81 milliseconds.
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Available interfaces for wlanconfig: ['ath0', 'ath2', 'eth0']
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Prepared to poll using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 tracker will autodetect ssh cli
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Data will be received and interpreted by <bound method BasePlugin.onDataReceive of <plugin.BasePlugin object at 0x66e2f1f0>>
2020-02-02 15:02:15.523 (iDetect) tracker: 192.168.1.31
2020-02-02 15:02:15.523 (iDetect) options:
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 Tracker is of the ssh kind
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH Fetching data using:
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH not connected ... connecting
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH start connect
2020-02-02 15:02:15.811 (iDetect) 192.168.1.31 ====> SSH returned (decoded):wl: not found
2020-02-02 15:02:15.811 (iDetect) 192.168.1.31 ====> SSH session took 286 milliseconds.
2020-02-02 15:02:15.812 (iDetect) Available commands on 192.168.1.31:{'wlanconfig': '/usr/sbin/wlanconfig', 'ip': '/usr/sbin/ip', 'brctl': '/usr/sbin/brctl', 'arp': '/sbin/arp', 'cat': '/bin/cat'}
2020-02-02 15:02:15.812 (iDetect) 192.168.1.31 ====> SSH Fetching data using:
2020-02-02 15:02:15.895 (iDetect) 192.168.1.31 ====> SSH returned (decoded):~ath0~ath2~eth0
2020-02-02 15:02:15.895 (iDetect) 192.168.1.31 ====> SSH session took 82 milliseconds.
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Available interfaces for wlanconfig: ['ath0', 'ath2', 'eth0']
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Prepared to poll using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 tracker will autodetect ssh cli
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Data will be received and interpreted by <bound method BasePlugin.onDataReceive of <plugin.BasePlugin object at 0x66e2f1f0>>
2020-02-02 15:02:15.898 (iDetect) Trackers initialized as:{'192.168.1.19': <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>, '192.168.1.31': <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>}
2020-02-02 15:02:15.898 (iDetect) Plugin initialization done.
2020-02-02 15:02:15.420 Status: (iDetect) 192.168.1.19 ====> SSH connection established
2020-02-02 15:02:15.523 Status: (iDetect) Tracker activated:192.168.1.19 port 22, user: admin, type: default and options: {}
2020-02-02 15:02:15.793 Status: (iDetect) 192.168.1.31 ====> SSH connection established
2020-02-02 15:02:15.898 Status: (iDetect) Tracker activated:192.168.1.31 port 22, user: admin, type: default and options: {}
2020-02-02 15:02:25.155 (iDetect) 192.168.1.19 Timed poll starting like clockwork
2020-02-02 15:02:25.156 (iDetect) 192.168.1.19 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>>
2020-02-02 15:02:25.156 (iDetect) 192.168.1.19 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:25.186 (iDetect) 192.168.1.19 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:25.187 (iDetect) 192.168.1.19 ====> SSH session took 30 milliseconds.
2020-02-02 15:02:25.196 (iDetect) Inbound data from: 192.168.1.19 containing ['5C:CF:7F:AC:90:B6', '78:11:DC:B7:CC:75', '34:EA:34:6F:9C:2E', '5C:CF:7F:7C:9F:A0', 'C4:93:D9:A3:FD:DE', 'A4:F1:E8:9F:08:70', '48:D6:D5:1A:67:2A', 'F0:18:98:B1:8D:51', '78:4F:43:0F:27:FB']
2020-02-02 15:02:25.197 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.418 (iDetect) onHeartbeat called
2020-02-02 15:02:25.419 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.524 (iDetect) 192.168.1.31 Timed poll starting like clockwork
2020-02-02 15:02:25.525 (iDetect) 192.168.1.31 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>>
2020-02-02 15:02:25.525 (iDetect) 192.168.1.31 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:25.551 (iDetect) 192.168.1.31 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:25.551 (iDetect) 192.168.1.31 ====> SSH session took 26 milliseconds.
2020-02-02 15:02:25.554 (iDetect) Inbound data from: 192.168.1.31 containing ['B8:27:EB:7F:BE:F9', 'C4:93:D9:A3:FD:DE']
2020-02-02 15:02:25.554 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.186 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:25.551 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 Timed poll starting like clockwork
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>>
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:45.260 (iDetect) 192.168.1.19 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:45.260 (iDetect) 192.168.1.19 ====> SSH session took 28 milliseconds.
2020-02-02 15:02:45.263 (iDetect) Inbound data from: 192.168.1.19 containing ['5C:CF:7F:AC:90:B6', '78:11:DC:B7:CC:75', '34:EA:34:6F:9C:2E', '5C:CF:7F:7C:9F:A0', 'C4:93:D9:A3:FD:DE', 'A4:F1:E8:9F:08:70', '48:D6:D5:1A:67:2A', 'F0:18:98:B1:8D:51', '78:4F:43:0F:27:FB']
2020-02-02 15:02:45.264 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.406 (iDetect) onHeartbeat called
2020-02-02 15:02:45.407 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 Timed poll starting like clockwork
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>>
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:45.618 (iDetect) 192.168.1.31 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:45.618 (iDetect) 192.168.1.31 ====> SSH session took 28 milliseconds.
2020-02-02 15:02:45.621 (iDetect) Inbound data from: 192.168.1.31 containing ['B8:27:EB:7F:BE:F9', 'C4:93:D9:A3:FD:DE']
2020-02-02 15:02:45.621 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.260 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:45.618 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
@bvansteyn
Note that the log entries are not shown in the correct order by Domoticz. According to the timestamp these "errors" occur during the ssh session not at the end of the entire detection. The "Not supported" bit is returned by paramiko in stderr, but the expected detection results are also returned.
Maybe this is not even a real error. The plugin just prints everything that is returned to stderr to the log as an error. I suspect that there might be something in the autodetected command that is not in the 100% correct syntax for a unify access point. I don't have acces to a unify acces point to troubleshoot this, but maybe a unifi owner can shed some light in this?
@other users:
Do other accespoints that are queried by "wlanconfig" also throw this error? The command syntax is based on user supplied info and what I could find on the internet. My own router uses other commands, so I can not confirm this syntax.
The detection seems to be working, but you already knew that.What is going wrong here?
Note that the log entries are not shown in the correct order by Domoticz. According to the timestamp these "errors" occur during the ssh session not at the end of the entire detection. The "Not supported" bit is returned by paramiko in stderr, but the expected detection results are also returned.
Maybe this is not even a real error. The plugin just prints everything that is returned to stderr to the log as an error. I suspect that there might be something in the autodetected command that is not in the 100% correct syntax for a unify access point. I don't have acces to a unify acces point to troubleshoot this, but maybe a unifi owner can shed some light in this?
@other users:
Do other accespoints that are queried by "wlanconfig" also throw this error? The command syntax is based on user supplied info and what I could find on the internet. My own router uses other commands, so I can not confirm this syntax.
-
- Posts: 146
- Joined: Tuesday 26 May 2015 8:11
- Target OS: Raspberry Pi / ODroid
- Domoticz version: beta
- Location: right here
- Contact:
Re: Python plugin: Presence detection from wireless router
HI,
Just discoverd this plugin, and I run a detection now in bash and cron.
I have a unifi controller running and multiple AC-Pro ap's from unifi.
How must I setup the tracker to use the controller?
I have tried this tracker line:
192.168.150.2#port=8443&type=http_unifi&interval=30&user=username&password=password ( I have removed the real username and password)
but I keep getting this error:
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) 'onStart' failed 'KeyError'.
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 427 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 350 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
and the status is then:
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
This keeps building up line after line.
Any pointers what to do to get this working or fix it?
Just discoverd this plugin, and I run a detection now in bash and cron.
I have a unifi controller running and multiple AC-Pro ap's from unifi.
How must I setup the tracker to use the controller?
I have tried this tracker line:
192.168.150.2#port=8443&type=http_unifi&interval=30&user=username&password=password ( I have removed the real username and password)
but I keep getting this error:
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) 'onStart' failed 'KeyError'.
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 427 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 350 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
and the status is then:
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
This keeps building up line after line.
Any pointers what to do to get this working or fix it?
-
- Posts: 18
- Joined: Wednesday 07 March 2018 18:22
- Target OS: Raspberry Pi / ODroid
- Domoticz version:
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
Ok thnx. If I can provide you with extra info or some testing let me know.EscApe wrote: ↑Sunday 02 February 2020 15:54 @bvansteyn
The detection seems to be working, but you already knew that.What is going wrong here?
Note that the log entries are not shown in the correct order by Domoticz. According to the timestamp these "errors" occur during the ssh session not at the end of the entire detection. The "Not supported" bit is returned by paramiko in stderr, but the expected detection results are also returned.
Maybe this is not even a real error. The plugin just prints everything that is returned to stderr to the log as an error. I suspect that there might be something in the autodetected command that is not in the 100% correct syntax for a unify access point. I don't have acces to a unify acces point to troubleshoot this, but maybe a unifi owner can shed some light in this?
@other users:
Do other accespoints that are queried by "wlanconfig" also throw this error? The command syntax is based on user supplied info and what I could find on the internet. My own router uses other commands, so I can not confirm this syntax.
-
- Posts: 18
- Joined: Wednesday 07 March 2018 18:22
- Target OS: Raspberry Pi / ODroid
- Domoticz version:
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
What happens if you use the plain ip adress of the controller? Also in your line you use http_unifi instead of unifi-http.mcmikev wrote: ↑Sunday 02 February 2020 19:28 HI,
Just discoverd this plugin, and I run a detection now in bash and cron.
I have a unifi controller running and multiple AC-Pro ap's from unifi.
How must I setup the tracker to use the controller?
I have tried this tracker line:
192.168.150.2#port=8443&type=http_unifi&interval=30&user=username&password=password ( I have removed the real username and password)
but I keep getting this error:
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) 'onStart' failed 'KeyError'.
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 427 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 350 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
and the status is then:
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
This keeps building up line after line.
Any pointers what to do to get this working or fix it?
-
- Posts: 146
- Joined: Tuesday 26 May 2015 8:11
- Target OS: Raspberry Pi / ODroid
- Domoticz version: beta
- Location: right here
- Contact:
Re: Python plugin: Presence detection from wireless router
Hi thanks for responding
I use plain ip and type unifi-http , but in the forum I saw http_unifi as type before..
Anyhow, I get no error now, but this
192.168.150.2 Timed poll starting like clockwork
2020-02-02 19:53:58.302 (iDetect-Unifi) 192.168.150.2 Returned: {"data":[],"meta":{"rc":"error","msg":"api.err.LoginRequired"}}
I have filled the right credentials in the fields username and password
I use plain ip and type unifi-http , but in the forum I saw http_unifi as type before..
Anyhow, I get no error now, but this
192.168.150.2 Timed poll starting like clockwork
2020-02-02 19:53:58.302 (iDetect-Unifi) 192.168.150.2 Returned: {"data":[],"meta":{"rc":"error","msg":"api.err.LoginRequired"}}
I have filled the right credentials in the fields username and password
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):
Code: Select all
/usr/sbin/wlanconfig ath0 list
-
- Posts: 146
- Joined: Tuesday 26 May 2015 8:11
- Target OS: Raspberry Pi / ODroid
- Domoticz version: beta
- Location: right here
- Contact:
Re: Python plugin: Presence detection from wireless router
Hi, Just got it working. Playing a bit with the tracker line and finaly result
Line I use for my unifi cloudkey controller:
192.168.150.2#port=8443&type=unifi-http
that works!!!
Line I use for my unifi cloudkey controller:
192.168.150.2#port=8443&type=unifi-http
that works!!!
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
Are there any special characters in your credentials? I don't know if they will cause a problem, but am not sure they won't either. The plugin will misinterpret ampersand, comma and equal sign for sure. Since they have a purpose in the configuration syntax.mcmikev wrote: ↑Sunday 02 February 2020 19:55 Hi thanks for responding
I use plain ip and type unifi-http , but in the forum I saw http_unifi as type before..
Anyhow, I get no error now, but this
192.168.150.2 Timed poll starting like clockwork
2020-02-02 19:53:58.302 (iDetect-Unifi) 192.168.150.2 Returned: {"data":[],"meta":{"rc":"error","msg":"api.err.LoginRequired"}}
I have filled the right credentials in the fields username and password
EDIT: You already got it fixed. Great!
-
- Posts: 18
- Joined: Wednesday 07 March 2018 18:22
- Target OS: Raspberry Pi / ODroid
- Domoticz version:
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
No problem! This is the output:EscApe wrote: ↑Sunday 02 February 2020 19:57You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):Code: Select all
/usr/sbin/wlanconfig ath0 list
Code: Select all
BusyBox v1.25.1 () built-in shell (ash)
___ ___ .__________.__
| | |____ |__\_ ____/__|
| | / \| || __) | | (c) 2010-2019
| | | | \ || \ | | Ubiquiti Networks, Inc.
|______|___| /__||__/ |__|
|_/ https://www.ui.com/
Welcome to UniFi UAP-AC-Lite!
UBNT-BZ.v4.0.80# /usr/sbin/wlanconfig ath0 list
ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
5c:cf:7f:ac:90:b6 4 6 19M 6M 16 0 351 65535 EPS 4001f 0 ACK 230 P 06:57:27 IEEE80211_MODE_11NG_HT20 1 RSN WME
78:11:dc:b7:cc:75 5 6 65M 58M 40 0 3293 4010 EPSs f 0 ACK 200 P 06:57:26 IEEE80211_MODE_11NG_HT20 0 RSN WME
34:ea:34:6f:9c:2e 7 6 65M 65M 64 15 1540 1350 EPS f 0 ACK 190 P 06:57:23 IEEE80211_MODE_11NG_HT20 0 RSN WME
5c:cf:7f:7c:9f:a0 6 6 58M 6M 22 0 3090 65535 EPS 4001f 0 ACK 220 P 06:57:20 IEEE80211_MODE_11NG_HT20 1 RSN WME
UBNT-BZ.v4.0.80#
Re: Python plugin: Presence detection from wireless router
Hello!
I use Proxmox Virtualization and run on it a Firewall VM. The Firewall VM not support any method that you use it, but the Proxmox is possible to use "brctl showmacs" but in Proxmox, the bridge interface name is normally "vmbrX"
so i change the file ssh_brctl.py to "brctl showmacs vmbr0" now i able to check all machines that connect to Proxmox (and firewall VM, of course)
It possible to add a new method, name like proxmox_brctl?
But need to do handle a little trick, before add it...
the bridge name is "vmbr" but the end of the number (0,1,...) mean that what bridge interface use it with the specific LAN port.
So it need to somehow manage it that a user use different LAN with vmbr0, vmbr1, etc... (it only affect that the Proxmox machines include multiple network ports)
I use Proxmox Virtualization and run on it a Firewall VM. The Firewall VM not support any method that you use it, but the Proxmox is possible to use "brctl showmacs" but in Proxmox, the bridge interface name is normally "vmbrX"
so i change the file ssh_brctl.py to "brctl showmacs vmbr0" now i able to check all machines that connect to Proxmox (and firewall VM, of course)
It possible to add a new method, name like proxmox_brctl?
But need to do handle a little trick, before add it...
the bridge name is "vmbr" but the end of the number (0,1,...) mean that what bridge interface use it with the specific LAN port.
So it need to somehow manage it that a user use different LAN with vmbr0, vmbr1, etc... (it only affect that the Proxmox machines include multiple network ports)
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
You do not need to edit ssh_brctl.py (or any other file) to modify a ssh command. The plugin has an option to specify your very own ssh command on the plugins configuration page. Instructions are in the readme.vamp wrote: ↑Tuesday 04 February 2020 16:52 Hello!
I use Proxmox Virtualization and run on it a Firewall VM. The Firewall VM not support any method that you use it, but the Proxmox is possible to use "brctl showmacs" but in Proxmox, the bridge interface name is normally "vmbrX"
so i change the file ssh_brctl.py to "brctl showmacs vmbr0" now i able to check all machines that connect to Proxmox (and firewall VM, of course)
It possible to add a new method, name like proxmox_brctl?
But need to do handle a little trick, before add it...
the bridge name is "vmbr" but the end of the number (0,1,...) mean that what bridge interface use it with the specific LAN port.
So it need to somehow manage it that a user use different LAN with vmbr0, vmbr1, etc... (it only affect that the Proxmox machines include multiple network ports)
Code: Select all
<routerip>#ssh=brctl showmacs vmbr0
I understand you would like a brctl command to automatically detect the vmbr<number> to use. This should be possible in a way similar to the ssh_autodetect tracker. If anyone wants to submit a pull request with a tested tracker script, then I can add it to the plugin.
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
So far I can think of two reasons for the error message:bvansteyn wrote: ↑Sunday 02 February 2020 20:49No problem! This is the output:EscApe wrote: ↑Sunday 02 February 2020 19:57You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):Code: Select all
/usr/sbin/wlanconfig ath0 list
Code: Select all
BusyBox v1.25.1 () built-in shell (ash) ___ ___ .__________.__ | | |____ |__\_ ____/__| | | / \| || __) | | (c) 2010-2019 | | | | \ || \ | | Ubiquiti Networks, Inc. |______|___| /__||__/ |__| |_/ https://www.ui.com/ Welcome to UniFi UAP-AC-Lite! UBNT-BZ.v4.0.80# /usr/sbin/wlanconfig ath0 list ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 5c:cf:7f:ac:90:b6 4 6 19M 6M 16 0 351 65535 EPS 4001f 0 ACK 230 P 06:57:27 IEEE80211_MODE_11NG_HT20 1 RSN WME 78:11:dc:b7:cc:75 5 6 65M 58M 40 0 3293 4010 EPSs f 0 ACK 200 P 06:57:26 IEEE80211_MODE_11NG_HT20 0 RSN WME 34:ea:34:6f:9c:2e 7 6 65M 65M 64 15 1540 1350 EPS f 0 ACK 190 P 06:57:23 IEEE80211_MODE_11NG_HT20 0 RSN WME 5c:cf:7f:7c:9f:a0 6 6 58M 6M 22 0 3090 65535 EPS 4001f 0 ACK 220 P 06:57:20 IEEE80211_MODE_11NG_HT20 1 RSN WME UBNT-BZ.v4.0.80#
- Paramiko does something the unifi doesn't like: Seems not te be the case, because then the same error should appear during the auto detection (startup)
- There is something in the polling command the unifi doesn't like: Seems not te be the case because your test of the same command shows no error.
Unfortunately I have no advice to offer, other than ignoring the error.
-
- Posts: 110
- Joined: Sunday 22 March 2015 7:35
- Target OS: Raspberry Pi / ODroid
- Domoticz version: Beta
- Location: Holland
- Contact:
Re: Python plugin: Presence detection from wireless router
I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.
Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.
First restart Raspberry and all Unify AP just to be sure.
Same problem
I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.
I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute .
After upgrade all was working fine and now problems.
Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.
Code: Select all
2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1419 EPSs f 0 ACK 10 QG 00:43:25 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 e8:ab:fa:71:97:91 4 1 5M 2M 14 0 10913 2502 EPS f 0 0 P 00:28:38 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 28:6c:07:85:e7:60 8 1 19M 1M 28 0 292 572 EPS f 0 ACK 0 P 00:28:32 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 383 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:43 10 1 65M 6M 60 0 107 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 dc:4f:22:37:5d:17 11 1 52M 6M 46 0 111 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:af:bd:a8 12 1 72M 1M 31 0 107 65535 EPS f 0 ACK 10 P 00:28:31 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 80:7d:3a:72:55:72 13 1 39M 6M 40 0 121 65535 EPS f 0 ACK 0 P 00:28:30 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 84:0d:8e:5d:5a:c9 2 1 72M 6M 32 0 78 65535 EPS d 0 ACK 0 P 00:28:23 IEEE80211_MODE_11NG_HT20 0 RSN
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:6d 3 1 65M 6M 43 0 68 65535 EPS 4001f 0 ACK 0 P 00:14:45 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:02 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367 c0:ee:fb:e1:4f:cb 2 52 780M 866M 33 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:37 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367
2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH session took 32 milliseconds.
2020-02-09 08:08:25.369 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:25.369 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.452 (iDetect) onHeartbeat called
2020-02-09 08:08:25.452 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:25.707 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:25.707 exit
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 3387 3307 EPSs 4001f 0 0 AP 00:27:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.742 6c:ad:f8:d3:3c:db 2 11 19M 72M 36 0 346 950 EPSs f 0 ACK 0 P 00:05:43 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:2e:34:c8 1 56 390M 351M 29 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:20:55 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.742
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH session took 35 milliseconds.
2020-02-09 08:08:25.745 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:25.746 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.048 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:25.048
2020-02-09 08:08:25.367 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:25.367
2020-02-09 08:08:25.742 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:25.742
2020-02-09 08:08:29.617 (RFXCOM) Temp + Humidity (Buitentemperatuur)
2020-02-09 08:08:30.057 InfluxLink: value Temperature,idx=4715,name=Buitentemperatuur value=7.7
2020-02-09 08:08:32.727 (Xiaomi Gateway) General/Voltage (Xiaomi Voltage)
2020-02-09 08:08:32.726 Status: {"cmd":"heartbeat","model":"switch","sid":"158d000186d85f","short_id":43118,"data":"{\"voltage\":3022}"}
2020-02-09 08:08:35.051 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.052 exit
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 5c:cf:7f:f9:09:7a 1 6 72M 54M 32 0 323 65535 EPS f 0 ACK 0 P 00:28:00 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.084 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:33 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.085 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:35.085 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.370 exit
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ac:cf:23:6d:3e:58 1 1 72M 65M 43 0 8 1424 EPSs f 0 ACK 10 QG 00:43:35 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 e8:ab:fa:71:97:91 4 1 5M 2M 16 0 10977 3125 EPS f 0 0 P 00:28:48 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 28:6c:07:85:e7:60 8 1 39M 1M 28 0 296 578 EPS f 0 ACK 0 P 00:28:42 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:4c:52:27 9 1 72M 48M 47 0 388 65535 EPS f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:af:bd:a8 12 1 72M 6M 32 0 108 65535 EPS 4001f 0 ACK 10 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 78 65535 EPS 4001d 0 ACK 0 P 00:28:33 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:6d 3 1 52M 6M 45 0 69 65535 EPS 4001f 0 ACK 0 P 00:14:55 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:12 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:47 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.403 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:35.403 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.471 (iDetect) onHeartbeat called
2020-02-09 08:08:35.472 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.748 exit
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:4c:07:00 1 11 72M 1M 52 0 5107 3893 EPSs 4001f 0 0 AP 00:27:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.778 6c:ad:f8:d3:3c:db 2 11 39M 65M 37 0 350 954 EPSs f 0 ACK 0 P 00:05:53 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:05 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.778
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH session took 30 milliseconds.
2020-02-09 08:08:35.780 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:35.780 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.084 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:35.084
2020-02-09 08:08:35.401 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:35.401
2020-02-09 08:08:35.778 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:35.778
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.086 exit
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 5c:cf:7f:f9:09:7a 1 6 72M 6M 34 0 324 65535 EPS 4001f 0 ACK 0 P 00:28:10 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:43 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH session took 28 milliseconds.
2020-02-09 08:08:45.116 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:45.116 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.404 exit
2020-02-09 08:08:45.431 MQTT: Topic: domoticz/in, Message: {"idx":3417,"nvalue":0,"svalue":"34.9"}
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1429 EPSs f 0 ACK 10 QG 00:43:45 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 e8:ab:fa:71:97:91 4 1 5M 2M 15 0 11041 3744 EPS f 0 0 P 00:28:58 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 28:6c:07:85:e7:60 8 1 39M 1M 28 0 297 580 EPS f 0 ACK 0 P 00:28:52 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 389 65535 EPS f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:af:bd:a8 12 1 72M 6M 31 0 110 65535 EPS 4001f 0 ACK 10 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 80 65535 EPS 4001d 0 ACK 0 P 00:28:43 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:6d 3 1 65M 2M 46 0 70 65535 EPS 4001f 0 ACK 0 P 00:15:05 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:22 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:57 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH session took 37 milliseconds.
2020-02-09 08:08:45.443 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:45.443 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.491 (iDetect) onHeartbeat called
2020-02-09 08:08:45.491 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.564 InfluxLink: value Temperature,idx=3417,name=CV---Aanvoer value=34.9
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.781 exit
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 5110 3895 EPSs 4001f 0 0 AP 00:28:01 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.816 6c:ad:f8:d3:3c:db 2 11 39M 72M 37 0 361 980 EPSs f 0 ACK 0 P 00:06:03 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:15 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.816
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH session took 34 milliseconds.
2020-02-09 08:08:45.818 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:45.818 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.115 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:45.115
2020-02-09 08:08:45.442 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:45.442
2020-02-09 08:08:45.816 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:45.816
Same problem
I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.
I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute .
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
Hi mikeoo,mikeoo wrote: ↑Sunday 09 February 2020 8:07 I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.
Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.
First restart Raspberry and all Unify AP just to be sure.Code: Select all
2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.367 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1419 EPSs f 0 ACK 10 QG 00:43:25 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.367 e8:ab:fa:71:97:91 4 1 5M 2M 14 0 10913 2502 EPS f 0 0 P 00:28:38 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.367 28:6c:07:85:e7:60 8 1 19M 1M 28 0 292 572 EPS f 0 ACK 0 P 00:28:32 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.367 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 383 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:25.367 2c:3a:e8:2e:89:43 10 1 65M 6M 60 0 107 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:25.367 dc:4f:22:37:5d:17 11 1 52M 6M 46 0 111 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:25.367 5c:cf:7f:af:bd:a8 12 1 72M 1M 31 0 107 65535 EPS f 0 ACK 10 P 00:28:31 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.367 80:7d:3a:72:55:72 13 1 39M 6M 40 0 121 65535 EPS f 0 ACK 0 P 00:28:30 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.367 84:0d:8e:5d:5a:c9 2 1 72M 6M 32 0 78 65535 EPS d 0 ACK 0 P 00:28:23 IEEE80211_MODE_11NG_HT20 0 RSN 2020-02-09 08:08:25.367 2c:3a:e8:2e:89:6d 3 1 65M 6M 43 0 68 65535 EPS 4001f 0 ACK 0 P 00:14:45 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.367 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:02 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:25.367 c0:ee:fb:e1:4f:cb 2 52 780M 866M 33 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:37 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:25.367 2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH session took 32 milliseconds. 2020-02-09 08:08:25.369 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB'] 2020-02-09 08:08:25.369 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:25.452 (iDetect) onHeartbeat called 2020-02-09 08:08:25.452 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Timed poll starting like clockwork 2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>> 2020-02-09 08:08:25.707 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:25.707 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:25.707 exit 2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.742 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 3387 3307 EPSs 4001f 0 0 AP 00:27:40 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:25.742 6c:ad:f8:d3:3c:db 2 11 19M 72M 36 0 346 950 EPSs f 0 ACK 0 P 00:05:43 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:25.742 d8:0b:9a:2e:34:c8 1 56 390M 351M 29 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:20:55 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:25.742 2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH session took 35 milliseconds. 2020-02-09 08:08:25.745 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8'] 2020-02-09 08:08:25.746 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:25.048 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported 2020-02-09 08:08:25.048 2020-02-09 08:08:25.367 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported 2020-02-09 08:08:25.367 2020-02-09 08:08:25.742 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported 2020-02-09 08:08:25.742 2020-02-09 08:08:29.617 (RFXCOM) Temp + Humidity (Buitentemperatuur) 2020-02-09 08:08:30.057 InfluxLink: value Temperature,idx=4715,name=Buitentemperatuur value=7.7 2020-02-09 08:08:32.727 (Xiaomi Gateway) General/Voltage (Xiaomi Voltage) 2020-02-09 08:08:32.726 Status: {"cmd":"heartbeat","model":"switch","sid":"158d000186d85f","short_id":43118,"data":"{\"voltage\":3022}"} 2020-02-09 08:08:35.051 (iDetect) 192.168.0.201 Timed poll starting like clockwork 2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>> 2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:35.052 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:35.052 exit 2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.084 5c:cf:7f:f9:09:7a 1 6 72M 54M 32 0 323 65535 EPS f 0 ACK 0 P 00:28:00 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.084 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:33 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.084 2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH session took 31 milliseconds. 2020-02-09 08:08:35.085 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03'] 2020-02-09 08:08:35.085 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Timed poll starting like clockwork 2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>> 2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:35.370 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:35.370 exit 2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.402 ac:cf:23:6d:3e:58 1 1 72M 65M 43 0 8 1424 EPSs f 0 ACK 10 QG 00:43:35 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.402 e8:ab:fa:71:97:91 4 1 5M 2M 16 0 10977 3125 EPS f 0 0 P 00:28:48 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.402 28:6c:07:85:e7:60 8 1 39M 1M 28 0 296 578 EPS f 0 ACK 0 P 00:28:42 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.402 5c:cf:7f:4c:52:27 9 1 72M 48M 47 0 388 65535 EPS f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.402 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.402 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.402 5c:cf:7f:af:bd:a8 12 1 72M 6M 32 0 108 65535 EPS 4001f 0 ACK 10 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.402 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:40 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.402 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 78 65535 EPS 4001d 0 ACK 0 P 00:28:33 IEEE80211_MODE_11NG_HT20 1 RSN 2020-02-09 08:08:35.402 2c:3a:e8:2e:89:6d 3 1 52M 6M 45 0 69 65535 EPS 4001f 0 ACK 0 P 00:14:55 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.402 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:12 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:35.402 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:47 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:35.402 2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH session took 31 milliseconds. 2020-02-09 08:08:35.403 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB'] 2020-02-09 08:08:35.403 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:35.471 (iDetect) onHeartbeat called 2020-02-09 08:08:35.472 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Timed poll starting like clockwork 2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>> 2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:35.748 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:35.748 exit 2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.778 d8:0b:9a:4c:07:00 1 11 72M 1M 52 0 5107 3893 EPSs 4001f 0 0 AP 00:27:50 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:35.778 6c:ad:f8:d3:3c:db 2 11 39M 65M 37 0 350 954 EPSs f 0 ACK 0 P 00:05:53 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:35.778 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:05 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:35.778 2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH session took 30 milliseconds. 2020-02-09 08:08:35.780 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8'] 2020-02-09 08:08:35.780 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:35.084 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported 2020-02-09 08:08:35.084 2020-02-09 08:08:35.401 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported 2020-02-09 08:08:35.401 2020-02-09 08:08:35.778 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported 2020-02-09 08:08:35.778 2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Timed poll starting like clockwork 2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>> 2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:45.086 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:45.086 exit 2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.115 5c:cf:7f:f9:09:7a 1 6 72M 6M 34 0 324 65535 EPS 4001f 0 ACK 0 P 00:28:10 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.115 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:43 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.115 2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH session took 28 milliseconds. 2020-02-09 08:08:45.116 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03'] 2020-02-09 08:08:45.116 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Timed poll starting like clockwork 2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>> 2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:45.404 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:45.404 exit 2020-02-09 08:08:45.431 MQTT: Topic: domoticz/in, Message: {"idx":3417,"nvalue":0,"svalue":"34.9"} 2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.442 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1429 EPSs f 0 ACK 10 QG 00:43:45 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:45.442 e8:ab:fa:71:97:91 4 1 5M 2M 15 0 11041 3744 EPS f 0 0 P 00:28:58 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:45.442 28:6c:07:85:e7:60 8 1 39M 1M 28 0 297 580 EPS f 0 ACK 0 P 00:28:52 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:45.442 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 389 65535 EPS f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:45.442 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.442 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.442 5c:cf:7f:af:bd:a8 12 1 72M 6M 31 0 110 65535 EPS 4001f 0 ACK 10 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.442 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:50 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.442 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 80 65535 EPS 4001d 0 ACK 0 P 00:28:43 IEEE80211_MODE_11NG_HT20 1 RSN 2020-02-09 08:08:45.442 2c:3a:e8:2e:89:6d 3 1 65M 2M 46 0 70 65535 EPS 4001f 0 ACK 0 P 00:15:05 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.442 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:22 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:45.442 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:57 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:45.442 2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH session took 37 milliseconds. 2020-02-09 08:08:45.443 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB'] 2020-02-09 08:08:45.443 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:45.491 (iDetect) onHeartbeat called 2020-02-09 08:08:45.491 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:45.564 InfluxLink: value Temperature,idx=3417,name=CV---Aanvoer value=34.9 2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Timed poll starting like clockwork 2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>> 2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list 2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath1 list 2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath2 list 2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath3 list 2020-02-09 08:08:45.781 /usr/sbin/wlanconfig eth0 list 2020-02-09 08:08:45.781 exit 2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.816 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 5110 3895 EPSs 4001f 0 0 AP 00:28:01 IEEE80211_MODE_11NG_HT20 1 RSN WME 2020-02-09 08:08:45.816 6c:ad:f8:d3:3c:db 2 11 39M 72M 37 0 361 980 EPSs f 0 ACK 0 P 00:06:03 IEEE80211_MODE_11NG_HT20 0 RSN WME 2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs 2020-02-09 08:08:45.816 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:15 IEEE80211_MODE_11AC_VHT80 0 RSN WME 2020-02-09 08:08:45.816 2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH session took 34 milliseconds. 2020-02-09 08:08:45.818 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8'] 2020-02-09 08:08:45.818 (iDetect) 3 devices are present (excluding ignored devices) 2020-02-09 08:08:45.115 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported 2020-02-09 08:08:45.115 2020-02-09 08:08:45.442 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported 2020-02-09 08:08:45.442 2020-02-09 08:08:45.816 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported 2020-02-09 08:08:45.816
Same problem
I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.
I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute .
The same error was reported by bvansteyn (see messages above). It looks like the detection still works fine.
It would be interesting to find out what has changed and what is causing these “errors”. For more info please read the previous messages.
-
- Posts: 110
- Joined: Sunday 22 March 2015 7:35
- Target OS: Raspberry Pi / ODroid
- Domoticz version: Beta
- Location: Holland
- Contact:
Re: Python plugin: Presence detection from wireless router
Yes i read that and was more that more people getting this error now without upgrading anything to the system.EscApe wrote: ↑Sunday 09 February 2020 9:21Hi mikeoo,mikeoo wrote: ↑Sunday 09 February 2020 8:07 I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.
Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.
First restart Raspberry and all Unify AP just to be sure.
Same problem
I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.
I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute .
The same error was reported by bvansteyn (see messages above). It looks like the detection still works fine.
It would be interesting to find out what has changed and what is causing these “errors”. For more info please read the previous messages.
Just tried
Code: Select all
sudo apt-get update
sudo apt-get upgrade
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
@mikeoo and bvansteyn
I noticed in both your logs that eth0 is also queried although it is probably not a wireless interface. There might be something weird going on with the autodetection of interfaces for the wlanconfig command.
Edited:
Could one of you try this on the unifi cli directly and share the results:
and
I noticed in both your logs that eth0 is also queried although it is probably not a wireless interface. There might be something weird going on with the autodetection of interfaces for the wlanconfig command.
Edited:
Could one of you try this on the unifi cli directly and share the results:
Code: Select all
/usr/sbin/wlanconfig eth0 list; echo $?
Code: Select all
/usr/sbin/wlanconfig ath1 list; echo $?
-
- Posts: 110
- Joined: Sunday 22 March 2015 7:35
- Target OS: Raspberry Pi / ODroid
- Domoticz version: Beta
- Location: Holland
- Contact:
Re: Python plugin: Presence detection from wireless router
For your info: I connect directly to the 3 AP and not the router. Router have no Wifi.EscApe wrote: ↑Sunday 09 February 2020 10:01 @mikeoo and bvansteyn
I noticed in both your logs that eth0 is also queried although it is probably not a wireless interface. There might be something weird going on with the autodetection of interfaces for the wlanconfig command.
Edited:
Could one of you try this on the unifi cli directly and share the results:andCode: Select all
/usr/sbin/wlanconfig eth0 list; echo $?
Code: Select all
/usr/sbin/wlanconfig ath1 list; echo $?
Result /usr/sbin/wlanconfig eth0 list; echo $?
Code: Select all
Schuur-BZ.v4.0.80# /usr/sbin/wlanconfig eth0 list; echo $?
Not supported
0
Code: Select all
ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
5c:cf:7f:f9:09:7a 1 6 72M 6M 35 0 3481 65535 EPS 4001f 0 ACK 0 P 03:15:19 IEEE80211_MODE_11NG_HT20 1 RSN WME
60:01:94:29:df:03 2 6 72M 6M 66 0 947 65535 EPS 4001f 0 ACK 0 P 03:14:52 IEEE80211_MODE_11NG_HT20 1 RSN WME
0
Code: Select all
Slaapkamer-BZ.v4.0.80# /usr/sbin/wlanconfig ath1 list; echo $?
ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
ac:cf:23:6d:3e:58 1 1 52M 65M 46 0 43 2914 EPSs f 0 ACK 10 QG 03:34:20 IEEE80211_MODE_11NG_HT20 0 RSN WME
e8:ab:fa:71:97:91 4 1 26M 39M 23 0 8548 2654 EPS f 0 0 P 03:19:33 IEEE80211_MODE_11NG_HT20 0 RSN WME
28:6c:07:85:e7:60 8 1 52M 72M 27 15 1924 3617 EPS f 0 ACK 0 P 03:19:27 IEEE80211_MODE_11NG_HT20 0 RSN WME
5c:cf:7f:4c:52:27 9 1 72M 2M 48 0 4217 65535 EPS 4001f 0 ACK 0 P 03:19:25 IEEE80211_MODE_11NG_HT20 1 RSN WME
2c:3a:e8:2e:89:43 10 1 72M 6M 61 0 905 65535 EPS 4001f 0 ACK 0 P 03:19:25 IEEE80211_MODE_11NG_HT20 1 RSN WME
dc:4f:22:37:5d:17 11 1 72M 1M 46 0 922 65535 EPS 4001f 0 ACK 0 P 03:19:25 IEEE80211_MODE_11NG_HT20 1 RSN WME
5c:cf:7f:af:bd:a8 12 1 72M 6M 36 0 906 65535 EPS f 0 ACK 10 P 03:19:25 IEEE80211_MODE_11NG_HT20 0 RSN WME
80:7d:3a:72:55:72 13 1 39M 6M 42 0 1326 65535 EPS 4001f 0 ACK 0 P 03:19:24 IEEE80211_MODE_11NG_HT20 1 RSN WME
84:0d:8e:5d:5a:c9 2 1 72M 6M 30 0 719 65535 EPS d 0 ACK 0 P 03:19:18 IEEE80211_MODE_11NG_HT20 0 RSN
2c:3a:e8:2e:89:6d 3 1 72M 6M 43 0 233 65535 EPS 4001f 0 ACK 0 P 00:50:06 IEEE80211_MODE_11NG_HT20 1 RSN WME
0
Code: Select all
Gang-BZ.v4.0.80# /usr/sbin/wlanconfig ath1 list; echo $?
ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 35796 554 EPSs 4001f 0 0 AP 03:20:52 IEEE80211_MODE_11NG_HT20 1 RSN WME
d8:0b:9a:2e:34:c8 2 11 72M 1M 52 0 8346 4074 EPSs 4001f 0 0 AP 00:18:43 IEEE80211_MODE_11NG_HT20 1 RSN WME
88:53:2e:04:25:22 3 11 78M 129M 45 0 14205 3401 EPSs f 0 ACK 0 PGM 00:09:04 IEEE80211_MODE_11NG_HT20 0 RSN WME
6c:ad:f8:d3:3c:db 4 11 58M 72M 39 15 644 1788 EPSs f 0 ACK 10 P 00:05:50 IEEE80211_MODE_11NG_HT20 0 RSN WME
0
-
- Posts: 528
- Joined: Thursday 02 April 2015 8:46
- Target OS: Linux
- Domoticz version: 2020+
- Location: The Netherlands
- Contact:
Re: Python plugin: Presence detection from wireless router
Thanks!Result /usr/sbin/wlanconfig eth0 list; echo $?
CODE: SELECT ALL
Schuur-BZ.v4.0.80# /usr/sbin/wlanconfig eth0 list; echo $?
Not supported
0
So we found the culprit. Running wlanconfig on eth0 returns an error message, but not an errorlevel (still returning 0). So the plugin assumes it is a usable interface, when in fact it isn’t. The presence detection will still work without any issues. You can ignore the error message.
I don’t know if this is specific to the unifi or a generic issue for all routers using the wlanconfig command. Since I don’t know every make and model router that uses the atheros chipset I can not simply exclude eth0 from the detection script. A specific tracker for the unifi is an option but I would still prefer auto detection over this approach. Even when it throws an ignorable error.
The auto detection could be enhanced to not only check the errorlevel but also the string returned. I will look into that,but since functionality is not affected in any way it is not a top priority.
Who is online
Users browsing this forum: No registered users and 1 guest