Page 33 of 55

Re: Python plugin: Presence detection from wireless router

Posted: Saturday 01 February 2020 17:50
by vamp
EscApe wrote: Friday 17 January 2020 17:39 @vamp
it would be great that this feature will be build in to the next release. (like "routeros-capsman")
It has been added to the newest version. Please let me know if there are any issues.
Hello, seems to OK :)

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 15:13
by bvansteyn
@EscApe

Today I installed the iDetect plugin and the presence detection is working, but somehow I get regulary the following error in my log file:

Code: Select all

2020-02-02 15:02:45.260 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:45.618 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
I use two Unifi access points as tracker devices. My polling is set on 10 seconds and grace period is 60 seconds. Every 10 seconds I get this error. I am able to login by ssh on both AP's as following log file shows:

Code: Select all

2020-02-02 15:02:13.936 Status: (iDetect) Started.
2020-02-02 15:02:14.096 Status: (iDetect) Initialized version 2.0, author 'ESCape'
2020-02-02 15:02:14.095 Status: (iDetect) Entering work loop.
2020-02-02 15:02:15.138 (iDetect) Debug logging mask set to: PYTHON
2020-02-02 15:02:15.138 (iDetect) Operation system is: linux
2020-02-02 15:02:15.152 (iDetect) The OS user profile running domoticz is: root
2020-02-02 15:02:15.152 (iDetect) Parsing user and optional keyfile from:admin
2020-02-02 15:02:15.153 (iDetect) start get or create wireless device
2020-02-02 15:02:15.153 (iDetect) phone1 monitor tag_id:78:4F:43:0F:27:FB, domoticz unit:2
2020-02-02 15:02:15.153 (iDetect) start get or create wireless device
2020-02-02 15:02:15.153 (iDetect) phone2 monitor tag_id:C4:93:D9:A3:FD:DE, domoticz unit:3
2020-02-02 15:02:15.153 (iDetect) Monitoring {'78:4F:43:0F:27:FB': <plugin.tag_device object at 0x675e67d0>, 'C4:93:D9:A3:FD:DE': <plugin.tag_device object at 0x675ef7b0>} for presence.
2020-02-02 15:02:15.153 (iDetect) Tracker configuration:192.168.1.19, 192.168.1.31
2020-02-02 15:02:15.153 (iDetect) tracker:192.168.1.19
2020-02-02 15:02:15.153 (iDetect) options:
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 Tracker is of the ssh kind
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH Fetching data using:
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH not connected ... connecting
2020-02-02 15:02:15.155 (iDetect) 192.168.1.19 ====> SSH start connect
2020-02-02 15:02:15.438 (iDetect) 192.168.1.19 ====> SSH returned (decoded):wl: not found
2020-02-02 15:02:15.438 (iDetect) 192.168.1.19 ====> SSH session took 282 milliseconds.
2020-02-02 15:02:15.439 (iDetect) Available commands on 192.168.1.19:{'wlanconfig': '/usr/sbin/wlanconfig', 'ip': '/usr/sbin/ip', 'brctl': '/usr/sbin/brctl', 'arp': '/sbin/arp', 'cat': '/bin/cat'}
2020-02-02 15:02:15.439 (iDetect) 192.168.1.19 ====> SSH Fetching data using:
2020-02-02 15:02:15.521 (iDetect) 192.168.1.19 ====> SSH returned (decoded):~ath0~ath2~eth0
2020-02-02 15:02:15.521 (iDetect) 192.168.1.19 ====> SSH session took 81 milliseconds.
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Available interfaces for wlanconfig: ['ath0', 'ath2', 'eth0']
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Prepared to poll using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 tracker will autodetect ssh cli
2020-02-02 15:02:15.522 (iDetect) 192.168.1.19 Data will be received and interpreted by <bound method BasePlugin.onDataReceive of <plugin.BasePlugin object at 0x66e2f1f0>>
2020-02-02 15:02:15.523 (iDetect) tracker: 192.168.1.31
2020-02-02 15:02:15.523 (iDetect) options:
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 Tracker is of the ssh kind
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH Fetching data using:
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH not connected ... connecting
2020-02-02 15:02:15.524 (iDetect) 192.168.1.31 ====> SSH start connect
2020-02-02 15:02:15.811 (iDetect) 192.168.1.31 ====> SSH returned (decoded):wl: not found
2020-02-02 15:02:15.811 (iDetect) 192.168.1.31 ====> SSH session took 286 milliseconds.
2020-02-02 15:02:15.812 (iDetect) Available commands on 192.168.1.31:{'wlanconfig': '/usr/sbin/wlanconfig', 'ip': '/usr/sbin/ip', 'brctl': '/usr/sbin/brctl', 'arp': '/sbin/arp', 'cat': '/bin/cat'}
2020-02-02 15:02:15.812 (iDetect) 192.168.1.31 ====> SSH Fetching data using:
2020-02-02 15:02:15.895 (iDetect) 192.168.1.31 ====> SSH returned (decoded):~ath0~ath2~eth0
2020-02-02 15:02:15.895 (iDetect) 192.168.1.31 ====> SSH session took 82 milliseconds.
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Available interfaces for wlanconfig: ['ath0', 'ath2', 'eth0']
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Prepared to poll using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 tracker will autodetect ssh cli
2020-02-02 15:02:15.898 (iDetect) 192.168.1.31 Data will be received and interpreted by <bound method BasePlugin.onDataReceive of <plugin.BasePlugin object at 0x66e2f1f0>>
2020-02-02 15:02:15.898 (iDetect) Trackers initialized as:{'192.168.1.19': <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>, '192.168.1.31': <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>}
2020-02-02 15:02:15.898 (iDetect) Plugin initialization done.
2020-02-02 15:02:15.420 Status: (iDetect) 192.168.1.19 ====> SSH connection established
2020-02-02 15:02:15.523 Status: (iDetect) Tracker activated:192.168.1.19 port 22, user: admin, type: default and options: {}
2020-02-02 15:02:15.793 Status: (iDetect) 192.168.1.31 ====> SSH connection established
2020-02-02 15:02:15.898 Status: (iDetect) Tracker activated:192.168.1.31 port 22, user: admin, type: default and options: {}
2020-02-02 15:02:25.155 (iDetect) 192.168.1.19 Timed poll starting like clockwork
2020-02-02 15:02:25.156 (iDetect) 192.168.1.19 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>>
2020-02-02 15:02:25.156 (iDetect) 192.168.1.19 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:25.186 (iDetect) 192.168.1.19 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:25.187 (iDetect) 192.168.1.19 ====> SSH session took 30 milliseconds.
2020-02-02 15:02:25.196 (iDetect) Inbound data from: 192.168.1.19 containing ['5C:CF:7F:AC:90:B6', '78:11:DC:B7:CC:75', '34:EA:34:6F:9C:2E', '5C:CF:7F:7C:9F:A0', 'C4:93:D9:A3:FD:DE', 'A4:F1:E8:9F:08:70', '48:D6:D5:1A:67:2A', 'F0:18:98:B1:8D:51', '78:4F:43:0F:27:FB']
2020-02-02 15:02:25.197 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.418 (iDetect) onHeartbeat called
2020-02-02 15:02:25.419 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.524 (iDetect) 192.168.1.31 Timed poll starting like clockwork
2020-02-02 15:02:25.525 (iDetect) 192.168.1.31 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>>
2020-02-02 15:02:25.525 (iDetect) 192.168.1.31 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:25.551 (iDetect) 192.168.1.31 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:25.551 (iDetect) 192.168.1.31 ====> SSH session took 26 milliseconds.
2020-02-02 15:02:25.554 (iDetect) Inbound data from: 192.168.1.31 containing ['B8:27:EB:7F:BE:F9', 'C4:93:D9:A3:FD:DE']
2020-02-02 15:02:25.554 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:25.186 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:25.551 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 Timed poll starting like clockwork
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efdd0>>
2020-02-02 15:02:45.232 (iDetect) 192.168.1.19 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:45.260 (iDetect) 192.168.1.19 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:45.260 (iDetect) 192.168.1.19 ====> SSH session took 28 milliseconds.
2020-02-02 15:02:45.263 (iDetect) Inbound data from: 192.168.1.19 containing ['5C:CF:7F:AC:90:B6', '78:11:DC:B7:CC:75', '34:EA:34:6F:9C:2E', '5C:CF:7F:7C:9F:A0', 'C4:93:D9:A3:FD:DE', 'A4:F1:E8:9F:08:70', '48:D6:D5:1A:67:2A', 'F0:18:98:B1:8D:51', '78:4F:43:0F:27:FB']
2020-02-02 15:02:45.264 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.406 (iDetect) onHeartbeat called
2020-02-02 15:02:45.407 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 Timed poll starting like clockwork
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x675efe10>>
2020-02-02 15:02:45.589 (iDetect) 192.168.1.31 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-02 15:02:45.618 (iDetect) 192.168.1.31 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-02 15:02:45.618 (iDetect) 192.168.1.31 ====> SSH session took 28 milliseconds.
2020-02-02 15:02:45.621 (iDetect) Inbound data from: 192.168.1.31 containing ['B8:27:EB:7F:BE:F9', 'C4:93:D9:A3:FD:DE']
2020-02-02 15:02:45.621 (iDetect) 2 devices are present (excluding ignored devices)
2020-02-02 15:02:45.260 Error: (iDetect) 192.168.1.19 ====> SSH returned error:Not supported
2020-02-02 15:02:45.618 Error: (iDetect) 192.168.1.31 ====> SSH returned error:Not supported
What is going wrong here?

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 15:54
by EscApe
@bvansteyn
What is going wrong here?
The detection seems to be working, but you already knew that.
Note that the log entries are not shown in the correct order by Domoticz. According to the timestamp these "errors" occur during the ssh session not at the end of the entire detection. The "Not supported" bit is returned by paramiko in stderr, but the expected detection results are also returned.

Maybe this is not even a real error. The plugin just prints everything that is returned to stderr to the log as an error. I suspect that there might be something in the autodetected command that is not in the 100% correct syntax for a unify access point. I don't have acces to a unify acces point to troubleshoot this, but maybe a unifi owner can shed some light in this?

@other users:
Do other accespoints that are queried by "wlanconfig" also throw this error? The command syntax is based on user supplied info and what I could find on the internet. My own router uses other commands, so I can not confirm this syntax.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 19:28
by mcmikev
HI,

Just discoverd this plugin, and I run a detection now in bash and cron.

I have a unifi controller running and multiple AC-Pro ap's from unifi.

How must I setup the tracker to use the controller?
I have tried this tracker line:
192.168.150.2#port=8443&type=http_unifi&interval=30&user=username&password=password ( I have removed the real username and password)

but I keep getting this error:
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) 'onStart' failed 'KeyError'.
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 427 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 350 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart

and the status is then:
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing

This keeps building up line after line.

Any pointers what to do to get this working or fix it?

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 19:36
by bvansteyn
EscApe wrote: Sunday 02 February 2020 15:54 @bvansteyn
What is going wrong here?
The detection seems to be working, but you already knew that.
Note that the log entries are not shown in the correct order by Domoticz. According to the timestamp these "errors" occur during the ssh session not at the end of the entire detection. The "Not supported" bit is returned by paramiko in stderr, but the expected detection results are also returned.

Maybe this is not even a real error. The plugin just prints everything that is returned to stderr to the log as an error. I suspect that there might be something in the autodetected command that is not in the 100% correct syntax for a unify access point. I don't have acces to a unify acces point to troubleshoot this, but maybe a unifi owner can shed some light in this?

@other users:
Do other accespoints that are queried by "wlanconfig" also throw this error? The command syntax is based on user supplied info and what I could find on the internet. My own router uses other commands, so I can not confirm this syntax.
Ok thnx. If I can provide you with extra info or some testing let me know.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 19:50
by bvansteyn
mcmikev wrote: Sunday 02 February 2020 19:28 HI,

Just discoverd this plugin, and I run a detection now in bash and cron.

I have a unifi controller running and multiple AC-Pro ap's from unifi.

How must I setup the tracker to use the controller?
I have tried this tracker line:
192.168.150.2#port=8443&type=http_unifi&interval=30&user=username&password=password ( I have removed the real username and password)

but I keep getting this error:
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) 'onStart' failed 'KeyError'.
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 427 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart
2020-02-02 19:23:19.836 Error: (iDetect-Unifi) ----> Line 350 in '/home/pi/domoticz/plugins/iDetect/plugin.py', function onStart

and the status is then:
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing
2020-02-02 19:26:08.023 Status: (iDetect-Unifi) Skip this hearbeat ... system is still preparing

This keeps building up line after line.

Any pointers what to do to get this working or fix it?
What happens if you use the plain ip adress of the controller? Also in your line you use http_unifi instead of unifi-http.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 19:55
by mcmikev
Hi thanks for responding

I use plain ip and type unifi-http , but in the forum I saw http_unifi as type before..

Anyhow, I get no error now, but this

192.168.150.2 Timed poll starting like clockwork
2020-02-02 19:53:58.302 (iDetect-Unifi) 192.168.150.2 Returned: {"data":[],"meta":{"rc":"error","msg":"api.err.LoginRequired"}}

I have filled the right credentials in the fields username and password

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 19:57
by EscApe
bvansteyn wrote: Sunday 02 February 2020 19:36 Ok thnx. If I can provide you with extra info or some testing let me know.
You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):

Code: Select all

/usr/sbin/wlanconfig ath0 list

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 20:02
by mcmikev
Hi, Just got it working. Playing a bit with the tracker line and finaly result

Line I use for my unifi cloudkey controller:
192.168.150.2#port=8443&type=unifi-http

that works!!!

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 20:03
by EscApe
mcmikev wrote: Sunday 02 February 2020 19:55 Hi thanks for responding

I use plain ip and type unifi-http , but in the forum I saw http_unifi as type before..

Anyhow, I get no error now, but this

192.168.150.2 Timed poll starting like clockwork
2020-02-02 19:53:58.302 (iDetect-Unifi) 192.168.150.2 Returned: {"data":[],"meta":{"rc":"error","msg":"api.err.LoginRequired"}}

I have filled the right credentials in the fields username and password
Are there any special characters in your credentials? I don't know if they will cause a problem, but am not sure they won't either. The plugin will misinterpret ampersand, comma and equal sign for sure. Since they have a purpose in the configuration syntax.

EDIT: You already got it fixed. Great!

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 02 February 2020 20:49
by bvansteyn
EscApe wrote: Sunday 02 February 2020 19:57
bvansteyn wrote: Sunday 02 February 2020 19:36 Ok thnx. If I can provide you with extra info or some testing let me know.
You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):

Code: Select all

/usr/sbin/wlanconfig ath0 list
No problem! This is the output:

Code: Select all

BusyBox v1.25.1 () built-in shell (ash)


  ___ ___      .__________.__
 |   |   |____ |__\_  ____/__|
 |   |   /    \|  ||  __) |  |   (c) 2010-2019
 |   |  |   |  \  ||  \   |  |   Ubiquiti Networks, Inc.
 |______|___|  /__||__/   |__|
            |_/                  https://www.ui.com/

      Welcome to UniFi UAP-AC-Lite!

UBNT-BZ.v4.0.80# /usr/sbin/wlanconfig ath0 list
ADDR               AID CHAN TXRATE RXRATE RSSI IDLE  TXSEQ  RXSEQ  CAPS        STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS   MODE PSMODE ASSOCTIME    IEs
5c:cf:7f:ac:90:b6    4    6  19M      6M   16    0    351   65535   EPS      4001f              0  ACK        230              P 06:57:27 IEEE80211_MODE_11NG_HT20  1  RSN WME
78:11:dc:b7:cc:75    5    6  65M     58M   40    0   3293    4010  EPSs          f              0  ACK        200              P 06:57:26 IEEE80211_MODE_11NG_HT20  0  RSN WME
34:ea:34:6f:9c:2e    7    6  65M     65M   64   15   1540    1350   EPS          f              0  ACK        190              P 06:57:23 IEEE80211_MODE_11NG_HT20  0  RSN WME
5c:cf:7f:7c:9f:a0    6    6  58M      6M   22    0   3090   65535   EPS      4001f              0  ACK        220              P 06:57:20 IEEE80211_MODE_11NG_HT20  1  RSN WME
UBNT-BZ.v4.0.80# 

Re: Python plugin: Presence detection from wireless router

Posted: Tuesday 04 February 2020 16:52
by vamp
Hello!

I use Proxmox Virtualization and run on it a Firewall VM. The Firewall VM not support any method that you use it, but the Proxmox is possible to use "brctl showmacs" but in Proxmox, the bridge interface name is normally "vmbrX"

so i change the file ssh_brctl.py to "brctl showmacs vmbr0" now i able to check all machines that connect to Proxmox (and firewall VM, of course)

It possible to add a new method, name like proxmox_brctl?

But need to do handle a little trick, before add it...

the bridge name is "vmbr" but the end of the number (0,1,...) mean that what bridge interface use it with the specific LAN port.

So it need to somehow manage it that a user use different LAN with vmbr0, vmbr1, etc... (it only affect that the Proxmox machines include multiple network ports)

Re: Python plugin: Presence detection from wireless router

Posted: Wednesday 05 February 2020 11:53
by EscApe
vamp wrote: Tuesday 04 February 2020 16:52 Hello!

I use Proxmox Virtualization and run on it a Firewall VM. The Firewall VM not support any method that you use it, but the Proxmox is possible to use "brctl showmacs" but in Proxmox, the bridge interface name is normally "vmbrX"

so i change the file ssh_brctl.py to "brctl showmacs vmbr0" now i able to check all machines that connect to Proxmox (and firewall VM, of course)

It possible to add a new method, name like proxmox_brctl?

But need to do handle a little trick, before add it...

the bridge name is "vmbr" but the end of the number (0,1,...) mean that what bridge interface use it with the specific LAN port.

So it need to somehow manage it that a user use different LAN with vmbr0, vmbr1, etc... (it only affect that the Proxmox machines include multiple network ports)
You do not need to edit ssh_brctl.py (or any other file) to modify a ssh command. The plugin has an option to specify your very own ssh command on the plugins configuration page. Instructions are in the readme.

Code: Select all

<routerip>#ssh=brctl showmacs vmbr0
should work (add other options as required.

I understand you would like a brctl command to automatically detect the vmbr<number> to use. This should be possible in a way similar to the ssh_autodetect tracker. If anyone wants to submit a pull request with a tested tracker script, then I can add it to the plugin.

Re: Python plugin: Presence detection from wireless router

Posted: Wednesday 05 February 2020 12:03
by EscApe
bvansteyn wrote: Sunday 02 February 2020 20:49
EscApe wrote: Sunday 02 February 2020 19:57
bvansteyn wrote: Sunday 02 February 2020 19:36 Ok thnx. If I can provide you with extra info or some testing let me know.
You could try the command directly on the cli of the acces point to see if it returns an error and experiment to find the right syntax if it does.
The command constructed by the plugin is (in your case):

Code: Select all

/usr/sbin/wlanconfig ath0 list
No problem! This is the output:

Code: Select all

BusyBox v1.25.1 () built-in shell (ash)


  ___ ___      .__________.__
 |   |   |____ |__\_  ____/__|
 |   |   /    \|  ||  __) |  |   (c) 2010-2019
 |   |  |   |  \  ||  \   |  |   Ubiquiti Networks, Inc.
 |______|___|  /__||__/   |__|
            |_/                  https://www.ui.com/

      Welcome to UniFi UAP-AC-Lite!

UBNT-BZ.v4.0.80# /usr/sbin/wlanconfig ath0 list
ADDR               AID CHAN TXRATE RXRATE RSSI IDLE  TXSEQ  RXSEQ  CAPS        STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS   MODE PSMODE ASSOCTIME    IEs
5c:cf:7f:ac:90:b6    4    6  19M      6M   16    0    351   65535   EPS      4001f              0  ACK        230              P 06:57:27 IEEE80211_MODE_11NG_HT20  1  RSN WME
78:11:dc:b7:cc:75    5    6  65M     58M   40    0   3293    4010  EPSs          f              0  ACK        200              P 06:57:26 IEEE80211_MODE_11NG_HT20  0  RSN WME
34:ea:34:6f:9c:2e    7    6  65M     65M   64   15   1540    1350   EPS          f              0  ACK        190              P 06:57:23 IEEE80211_MODE_11NG_HT20  0  RSN WME
5c:cf:7f:7c:9f:a0    6    6  58M      6M   22    0   3090   65535   EPS      4001f              0  ACK        220              P 06:57:20 IEEE80211_MODE_11NG_HT20  1  RSN WME
UBNT-BZ.v4.0.80# 
So far I can think of two reasons for the error message:
- Paramiko does something the unifi doesn't like: Seems not te be the case, because then the same error should appear during the auto detection (startup)
- There is something in the polling command the unifi doesn't like: Seems not te be the case because your test of the same command shows no error.

Unfortunately I have no advice to offer, other than ignoring the error.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 8:07
by mikeoo
I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.

Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.

Code: Select all

  2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1419 EPSs f 0 ACK 10 QG 00:43:25 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 e8:ab:fa:71:97:91 4 1 5M 2M 14 0 10913 2502 EPS f 0 0 P 00:28:38 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 28:6c:07:85:e7:60 8 1 19M 1M 28 0 292 572 EPS f 0 ACK 0 P 00:28:32 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 383 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:43 10 1 65M 6M 60 0 107 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 dc:4f:22:37:5d:17 11 1 52M 6M 46 0 111 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:af:bd:a8 12 1 72M 1M 31 0 107 65535 EPS f 0 ACK 10 P 00:28:31 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 80:7d:3a:72:55:72 13 1 39M 6M 40 0 121 65535 EPS f 0 ACK 0 P 00:28:30 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 84:0d:8e:5d:5a:c9 2 1 72M 6M 32 0 78 65535 EPS d 0 ACK 0 P 00:28:23 IEEE80211_MODE_11NG_HT20 0 RSN
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:6d 3 1 65M 6M 43 0 68 65535 EPS 4001f 0 ACK 0 P 00:14:45 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:02 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367 c0:ee:fb:e1:4f:cb 2 52 780M 866M 33 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:37 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367
2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH session took 32 milliseconds.
2020-02-09 08:08:25.369 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:25.369 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.452 (iDetect) onHeartbeat called
2020-02-09 08:08:25.452 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:25.707 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:25.707 exit
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 3387 3307 EPSs 4001f 0 0 AP 00:27:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.742 6c:ad:f8:d3:3c:db 2 11 19M 72M 36 0 346 950 EPSs f 0 ACK 0 P 00:05:43 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:2e:34:c8 1 56 390M 351M 29 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:20:55 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.742
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH session took 35 milliseconds.
2020-02-09 08:08:25.745 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:25.746 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.048 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:25.048
2020-02-09 08:08:25.367 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:25.367
2020-02-09 08:08:25.742 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:25.742
2020-02-09 08:08:29.617 (RFXCOM) Temp + Humidity (Buitentemperatuur)
2020-02-09 08:08:30.057 InfluxLink: value Temperature,idx=4715,name=Buitentemperatuur value=7.7
2020-02-09 08:08:32.727 (Xiaomi Gateway) General/Voltage (Xiaomi Voltage)
2020-02-09 08:08:32.726 Status: {"cmd":"heartbeat","model":"switch","sid":"158d000186d85f","short_id":43118,"data":"{\"voltage\":3022}"}
2020-02-09 08:08:35.051 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.052 exit
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 5c:cf:7f:f9:09:7a 1 6 72M 54M 32 0 323 65535 EPS f 0 ACK 0 P 00:28:00 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.084 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:33 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.085 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:35.085 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.370 exit
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ac:cf:23:6d:3e:58 1 1 72M 65M 43 0 8 1424 EPSs f 0 ACK 10 QG 00:43:35 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 e8:ab:fa:71:97:91 4 1 5M 2M 16 0 10977 3125 EPS f 0 0 P 00:28:48 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 28:6c:07:85:e7:60 8 1 39M 1M 28 0 296 578 EPS f 0 ACK 0 P 00:28:42 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:4c:52:27 9 1 72M 48M 47 0 388 65535 EPS f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:af:bd:a8 12 1 72M 6M 32 0 108 65535 EPS 4001f 0 ACK 10 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 78 65535 EPS 4001d 0 ACK 0 P 00:28:33 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:6d 3 1 52M 6M 45 0 69 65535 EPS 4001f 0 ACK 0 P 00:14:55 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:12 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:47 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.403 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:35.403 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.471 (iDetect) onHeartbeat called
2020-02-09 08:08:35.472 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.748 exit
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:4c:07:00 1 11 72M 1M 52 0 5107 3893 EPSs 4001f 0 0 AP 00:27:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.778 6c:ad:f8:d3:3c:db 2 11 39M 65M 37 0 350 954 EPSs f 0 ACK 0 P 00:05:53 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:05 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.778
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH session took 30 milliseconds.
2020-02-09 08:08:35.780 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:35.780 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.084 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:35.084
2020-02-09 08:08:35.401 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:35.401
2020-02-09 08:08:35.778 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:35.778
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.086 exit
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 5c:cf:7f:f9:09:7a 1 6 72M 6M 34 0 324 65535 EPS 4001f 0 ACK 0 P 00:28:10 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:43 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH session took 28 milliseconds.
2020-02-09 08:08:45.116 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:45.116 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.404 exit
2020-02-09 08:08:45.431 MQTT: Topic: domoticz/in, Message: {"idx":3417,"nvalue":0,"svalue":"34.9"}
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1429 EPSs f 0 ACK 10 QG 00:43:45 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 e8:ab:fa:71:97:91 4 1 5M 2M 15 0 11041 3744 EPS f 0 0 P 00:28:58 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 28:6c:07:85:e7:60 8 1 39M 1M 28 0 297 580 EPS f 0 ACK 0 P 00:28:52 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 389 65535 EPS f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:af:bd:a8 12 1 72M 6M 31 0 110 65535 EPS 4001f 0 ACK 10 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 80 65535 EPS 4001d 0 ACK 0 P 00:28:43 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:6d 3 1 65M 2M 46 0 70 65535 EPS 4001f 0 ACK 0 P 00:15:05 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:22 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:57 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH session took 37 milliseconds.
2020-02-09 08:08:45.443 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:45.443 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.491 (iDetect) onHeartbeat called
2020-02-09 08:08:45.491 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.564 InfluxLink: value Temperature,idx=3417,name=CV---Aanvoer value=34.9
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.781 exit
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 5110 3895 EPSs 4001f 0 0 AP 00:28:01 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.816 6c:ad:f8:d3:3c:db 2 11 39M 72M 37 0 361 980 EPSs f 0 ACK 0 P 00:06:03 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:15 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.816
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH session took 34 milliseconds.
2020-02-09 08:08:45.818 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:45.818 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.115 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:45.115
2020-02-09 08:08:45.442 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:45.442
2020-02-09 08:08:45.816 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:45.816 
First restart Raspberry and all Unify AP just to be sure.
Same problem

I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.

I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute ;) .

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 9:21
by EscApe
mikeoo wrote: Sunday 09 February 2020 8:07 I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.

Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.

Code: Select all

  2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1419 EPSs f 0 ACK 10 QG 00:43:25 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 e8:ab:fa:71:97:91 4 1 5M 2M 14 0 10913 2502 EPS f 0 0 P 00:28:38 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 28:6c:07:85:e7:60 8 1 19M 1M 28 0 292 572 EPS f 0 ACK 0 P 00:28:32 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 383 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:43 10 1 65M 6M 60 0 107 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 dc:4f:22:37:5d:17 11 1 52M 6M 46 0 111 65535 EPS 4001f 0 ACK 0 P 00:28:31 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 5c:cf:7f:af:bd:a8 12 1 72M 1M 31 0 107 65535 EPS f 0 ACK 10 P 00:28:31 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 80:7d:3a:72:55:72 13 1 39M 6M 40 0 121 65535 EPS f 0 ACK 0 P 00:28:30 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.367 84:0d:8e:5d:5a:c9 2 1 72M 6M 32 0 78 65535 EPS d 0 ACK 0 P 00:28:23 IEEE80211_MODE_11NG_HT20 0 RSN
2020-02-09 08:08:25.367 2c:3a:e8:2e:89:6d 3 1 65M 6M 43 0 68 65535 EPS 4001f 0 ACK 0 P 00:14:45 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.367 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:02 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367 c0:ee:fb:e1:4f:cb 2 52 780M 866M 33 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:37 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.367
2020-02-09 08:08:25.367 (iDetect) 192.168.0.202 ====> SSH session took 32 milliseconds.
2020-02-09 08:08:25.369 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:25.369 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.452 (iDetect) onHeartbeat called
2020-02-09 08:08:25.452 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:25.706 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:25.707 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:25.707 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:25.707 exit
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 3387 3307 EPSs 4001f 0 0 AP 00:27:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:25.742 6c:ad:f8:d3:3c:db 2 11 19M 72M 36 0 346 950 EPSs f 0 ACK 0 P 00:05:43 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:25.742 d8:0b:9a:2e:34:c8 1 56 390M 351M 29 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:20:55 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:25.742
2020-02-09 08:08:25.742 (iDetect) 192.168.0.203 ====> SSH session took 35 milliseconds.
2020-02-09 08:08:25.745 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:25.746 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:25.048 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:25.048
2020-02-09 08:08:25.367 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:25.367
2020-02-09 08:08:25.742 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:25.742
2020-02-09 08:08:29.617 (RFXCOM) Temp + Humidity (Buitentemperatuur)
2020-02-09 08:08:30.057 InfluxLink: value Temperature,idx=4715,name=Buitentemperatuur value=7.7
2020-02-09 08:08:32.727 (Xiaomi Gateway) General/Voltage (Xiaomi Voltage)
2020-02-09 08:08:32.726 Status: {"cmd":"heartbeat","model":"switch","sid":"158d000186d85f","short_id":43118,"data":"{\"voltage\":3022}"}
2020-02-09 08:08:35.051 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:35.052 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.052 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.052 exit
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 5c:cf:7f:f9:09:7a 1 6 72M 54M 32 0 323 65535 EPS f 0 ACK 0 P 00:28:00 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.084 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:33 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.084
2020-02-09 08:08:35.084 (iDetect) 192.168.0.201 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.085 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:35.085 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:35.370 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.370 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.370 exit
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ac:cf:23:6d:3e:58 1 1 72M 65M 43 0 8 1424 EPSs f 0 ACK 10 QG 00:43:35 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 e8:ab:fa:71:97:91 4 1 5M 2M 16 0 10977 3125 EPS f 0 0 P 00:28:48 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 28:6c:07:85:e7:60 8 1 39M 1M 28 0 296 578 EPS f 0 ACK 0 P 00:28:42 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:4c:52:27 9 1 72M 48M 47 0 388 65535 EPS f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 5c:cf:7f:af:bd:a8 12 1 72M 6M 32 0 108 65535 EPS 4001f 0 ACK 10 P 00:28:41 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:40 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 78 65535 EPS 4001d 0 ACK 0 P 00:28:33 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:35.402 2c:3a:e8:2e:89:6d 3 1 52M 6M 45 0 69 65535 EPS 4001f 0 ACK 0 P 00:14:55 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.402 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:12 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:47 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.402
2020-02-09 08:08:35.402 (iDetect) 192.168.0.202 ====> SSH session took 31 milliseconds.
2020-02-09 08:08:35.403 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:35.403 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.471 (iDetect) onHeartbeat called
2020-02-09 08:08:35.472 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:35.748 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:35.748 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:35.748 exit
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:4c:07:00 1 11 72M 1M 52 0 5107 3893 EPSs 4001f 0 0 AP 00:27:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:35.778 6c:ad:f8:d3:3c:db 2 11 39M 65M 37 0 350 954 EPSs f 0 ACK 0 P 00:05:53 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:35.778 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:05 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:35.778
2020-02-09 08:08:35.778 (iDetect) 192.168.0.203 ====> SSH session took 30 milliseconds.
2020-02-09 08:08:35.780 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:35.780 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:35.084 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:35.084
2020-02-09 08:08:35.401 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:35.401
2020-02-09 08:08:35.778 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:35.778
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Timed poll starting like clockwork
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x676516b0>>
2020-02-09 08:08:45.086 (iDetect) 192.168.0.201 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.086 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.086 exit
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 5c:cf:7f:f9:09:7a 1 6 72M 6M 34 0 324 65535 EPS 4001f 0 ACK 0 P 00:28:10 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 60:01:94:29:df:03 2 6 72M 6M 65 0 114 65535 EPS 4001f 0 ACK 0 P 00:27:43 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.115
2020-02-09 08:08:45.115 (iDetect) 192.168.0.201 ====> SSH session took 28 milliseconds.
2020-02-09 08:08:45.116 (iDetect) Inbound data from: 192.168.0.201 containing ['5C:CF:7F:F9:09:7A', '60:01:94:29:DF:03']
2020-02-09 08:08:45.116 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Timed poll starting like clockwork
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651990>>
2020-02-09 08:08:45.404 (iDetect) 192.168.0.202 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.404 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.404 exit
2020-02-09 08:08:45.431 MQTT: Topic: domoticz/in, Message: {"idx":3417,"nvalue":0,"svalue":"34.9"}
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ac:cf:23:6d:3e:58 1 1 72M 65M 42 0 8 1429 EPSs f 0 ACK 10 QG 00:43:45 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 e8:ab:fa:71:97:91 4 1 5M 2M 15 0 11041 3744 EPS f 0 0 P 00:28:58 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 28:6c:07:85:e7:60 8 1 39M 1M 28 0 297 580 EPS f 0 ACK 0 P 00:28:52 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:4c:52:27 9 1 72M 6M 48 0 389 65535 EPS f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:43 10 1 72M 6M 60 0 108 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 dc:4f:22:37:5d:17 11 1 58M 6M 46 0 112 65535 EPS 4001f 0 ACK 0 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 5c:cf:7f:af:bd:a8 12 1 72M 6M 31 0 110 65535 EPS 4001f 0 ACK 10 P 00:28:51 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 80:7d:3a:72:55:72 13 1 39M 6M 42 0 121 65535 EPS 4001f 0 ACK 0 P 00:28:50 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 84:0d:8e:5d:5a:c9 2 1 72M 6M 31 0 80 65535 EPS 4001d 0 ACK 0 P 00:28:43 IEEE80211_MODE_11NG_HT20 1 RSN
2020-02-09 08:08:45.442 2c:3a:e8:2e:89:6d 3 1 65M 2M 46 0 70 65535 EPS 4001f 0 ACK 0 P 00:15:05 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.442 4c:32:75:35:5e:6f 1 52 866M 866M 45 4320 0 65535 EP 1000001b 0 0 AWPS 00:34:22 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442 c0:ee:fb:e1:4f:cb 2 52 866M 866M 37 0 0 65535 EP 1000000b 0 ACK 0 AWPS 00:28:57 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.442
2020-02-09 08:08:45.442 (iDetect) 192.168.0.202 ====> SSH session took 37 milliseconds.
2020-02-09 08:08:45.443 (iDetect) Inbound data from: 192.168.0.202 containing ['AC:CF:23:6D:3E:58', 'E8:AB:FA:71:97:91', '28:6C:07:85:E7:60', '5C:CF:7F:4C:52:27', '2C:3A:E8:2E:89:43', 'DC:4F:22:37:5D:17', '5C:CF:7F:AF:BD:A8', '80:7D:3A:72:55:72', '84:0D:8E:5D:5A:C9', '2C:3A:E8:2E:89:6D', '4C:32:75:35:5E:6F', 'C0:EE:FB:E1:4F:CB']
2020-02-09 08:08:45.443 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.491 (iDetect) onHeartbeat called
2020-02-09 08:08:45.491 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.564 InfluxLink: value Temperature,idx=3417,name=CV---Aanvoer value=34.9
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Timed poll starting like clockwork
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 Start poll and return results to <bound method tracker.receiver_callback of <trackers.ssh_autodetect.ssh_autodetect object at 0x67651cb0>>
2020-02-09 08:08:45.781 (iDetect) 192.168.0.203 ====> SSH Fetching data using: /usr/sbin/wlanconfig ath0 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath1 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath2 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig ath3 list
2020-02-09 08:08:45.781 /usr/sbin/wlanconfig eth0 list
2020-02-09 08:08:45.781 exit
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH returned (decoded):ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:4c:07:00 1 11 72M 1M 51 0 5110 3895 EPSs 4001f 0 0 AP 00:28:01 IEEE80211_MODE_11NG_HT20 1 RSN WME
2020-02-09 08:08:45.816 6c:ad:f8:d3:3c:db 2 11 39M 72M 37 0 361 980 EPSs f 0 ACK 0 P 00:06:03 IEEE80211_MODE_11NG_HT20 0 RSN WME
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 ADDR AID CHAN TXRATE RXRATE RSSI IDLE TXSEQ RXSEQ CAPS STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS MODE PSMODE ASSOCTIME IEs
2020-02-09 08:08:45.816 d8:0b:9a:2e:34:c8 1 56 390M 6M 30 4320 0 65535 EPSs 1000000b 0 0 AWPS 00:21:15 IEEE80211_MODE_11AC_VHT80 0 RSN WME
2020-02-09 08:08:45.816
2020-02-09 08:08:45.816 (iDetect) 192.168.0.203 ====> SSH session took 34 milliseconds.
2020-02-09 08:08:45.818 (iDetect) Inbound data from: 192.168.0.203 containing ['D8:0B:9A:4C:07:00', '6C:AD:F8:D3:3C:DB', 'D8:0B:9A:2E:34:C8']
2020-02-09 08:08:45.818 (iDetect) 3 devices are present (excluding ignored devices)
2020-02-09 08:08:45.115 Error: (iDetect) 192.168.0.201 ====> SSH returned error:Not supported
2020-02-09 08:08:45.115
2020-02-09 08:08:45.442 Error: (iDetect) 192.168.0.202 ====> SSH returned error:Not supported
2020-02-09 08:08:45.442
2020-02-09 08:08:45.816 Error: (iDetect) 192.168.0.203 ====> SSH returned error:Not supported
2020-02-09 08:08:45.816 
First restart Raspberry and all Unify AP just to be sure.
Same problem

I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.

I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute ;) .
Hi mikeoo,

The same error was reported by bvansteyn (see messages above). It looks like the detection still works fine.
It would be interesting to find out what has changed and what is causing these “errors”. For more info please read the previous messages.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 9:30
by mikeoo
EscApe wrote: Sunday 09 February 2020 9:21
mikeoo wrote: Sunday 09 February 2020 8:07 I upgraded 2 weeks ago the the new V2 version after using V1 from the beginning with 3 Unify AP without problems.
After upgrade all was working fine and now problems.

Last night it just start giving the same SSH errors and iDetect is not working anymore. If a phone leaves the house now of Wifi is disable on phone it keeps the status ON now.


First restart Raspberry and all Unify AP just to be sure.
Same problem

I did not upgrade anything on Raspberry / Domoticz or Unify AP. All are the same for a few weeks.
So it is strange it suddenly giving the errors.

I can SSH fine from Raspberry to all 3 UniFy AP's.
Ignoring is difficult because log it filling up with this error and also a log of emails with this error every minute ;) .
Hi mikeoo,

The same error was reported by bvansteyn (see messages above). It looks like the detection still works fine.
It would be interesting to find out what has changed and what is causing these “errors”. For more info please read the previous messages.
Yes i read that and was more that more people getting this error now without upgrading anything to the system. :D
Just tried

Code: Select all

sudo apt-get update
sudo apt-get upgrade
Lot of upgrades for Buster but sadly problem still there. It is difficult to test because don't know where it goes wrong.

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 10:01
by EscApe
@mikeoo and bvansteyn

I noticed in both your logs that eth0 is also queried although it is probably not a wireless interface. There might be something weird going on with the autodetection of interfaces for the wlanconfig command.

Edited:
Could one of you try this on the unifi cli directly and share the results:

Code: Select all

/usr/sbin/wlanconfig eth0 list; echo $?
and

Code: Select all

/usr/sbin/wlanconfig ath1 list; echo $?

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 10:59
by mikeoo
EscApe wrote: Sunday 09 February 2020 10:01 @mikeoo and bvansteyn

I noticed in both your logs that eth0 is also queried although it is probably not a wireless interface. There might be something weird going on with the autodetection of interfaces for the wlanconfig command.

Edited:
Could one of you try this on the unifi cli directly and share the results:

Code: Select all

/usr/sbin/wlanconfig eth0 list; echo $?
and

Code: Select all

/usr/sbin/wlanconfig ath1 list; echo $?
For your info: I connect directly to the 3 AP and not the router. Router have no Wifi.

Result /usr/sbin/wlanconfig eth0 list; echo $?

Code: Select all


Schuur-BZ.v4.0.80# /usr/sbin/wlanconfig eth0 list; echo $?
Not supported
0
Result /usr/sbin/wlanconfig ath1 list; echo $?

Code: Select all

ADDR               AID CHAN TXRATE RXRATE RSSI IDLE  TXSEQ  RXSEQ  CAPS        STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS   MODE PSMODE ASSOCTIME    IEs
5c:cf:7f:f9:09:7a    1    6  72M      6M   35    0   3481   65535   EPS      4001f              0  ACK          0              P 03:15:19 IEEE80211_MODE_11NG_HT20  1  RSN WME
60:01:94:29:df:03    2    6  72M      6M   66    0    947   65535   EPS      4001f              0  ACK          0              P 03:14:52 IEEE80211_MODE_11NG_HT20  1  RSN WME
0
Second One

Code: Select all

Slaapkamer-BZ.v4.0.80# /usr/sbin/wlanconfig ath1 list; echo $?
ADDR               AID CHAN TXRATE RXRATE RSSI IDLE  TXSEQ  RXSEQ  CAPS        STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS   MODE PSMODE ASSOCTIME    IEs
ac:cf:23:6d:3e:58    1    1  52M     65M   46    0     43    2914  EPSs          f              0  ACK         10             QG 03:34:20 IEEE80211_MODE_11NG_HT20  0  RSN WME
e8:ab:fa:71:97:91    4    1  26M     39M   23    0   8548    2654   EPS          f              0               0              P 03:19:33 IEEE80211_MODE_11NG_HT20  0  RSN WME
28:6c:07:85:e7:60    8    1  52M     72M   27   15   1924    3617   EPS          f              0  ACK          0              P 03:19:27 IEEE80211_MODE_11NG_HT20  0  RSN WME
5c:cf:7f:4c:52:27    9    1  72M      2M   48    0   4217   65535   EPS      4001f              0  ACK          0              P 03:19:25 IEEE80211_MODE_11NG_HT20  1  RSN WME
2c:3a:e8:2e:89:43   10    1  72M      6M   61    0    905   65535   EPS      4001f              0  ACK          0              P 03:19:25 IEEE80211_MODE_11NG_HT20  1  RSN WME
dc:4f:22:37:5d:17   11    1  72M      1M   46    0    922   65535   EPS      4001f              0  ACK          0              P 03:19:25 IEEE80211_MODE_11NG_HT20  1  RSN WME
5c:cf:7f:af:bd:a8   12    1  72M      6M   36    0    906   65535   EPS          f              0  ACK         10              P 03:19:25 IEEE80211_MODE_11NG_HT20  0  RSN WME
80:7d:3a:72:55:72   13    1  39M      6M   42    0   1326   65535   EPS      4001f              0  ACK          0              P 03:19:24 IEEE80211_MODE_11NG_HT20  1  RSN WME
84:0d:8e:5d:5a:c9    2    1  72M      6M   30    0    719   65535   EPS          d              0  ACK          0              P 03:19:18 IEEE80211_MODE_11NG_HT20  0  RSN
2c:3a:e8:2e:89:6d    3    1  72M      6M   43    0    233   65535   EPS      4001f              0  ACK          0              P 00:50:06 IEEE80211_MODE_11NG_HT20  1  RSN WME
0
Third One

Code: Select all


Gang-BZ.v4.0.80# /usr/sbin/wlanconfig ath1 list; echo $?
ADDR               AID CHAN TXRATE RXRATE RSSI IDLE  TXSEQ  RXSEQ  CAPS        STATE MAXRATE(DOT11) DHCP TIME_TO_IP HTCAPS   MODE PSMODE ASSOCTIME    IEs
d8:0b:9a:4c:07:00    1   11  72M      1M   51    0  35796     554  EPSs      4001f              0               0             AP 03:20:52 IEEE80211_MODE_11NG_HT20  1  RSN WME
d8:0b:9a:2e:34:c8    2   11  72M      1M   52    0   8346    4074  EPSs      4001f              0               0             AP 00:18:43 IEEE80211_MODE_11NG_HT20  1  RSN WME
88:53:2e:04:25:22    3   11  78M    129M   45    0  14205    3401  EPSs          f              0  ACK          0            PGM 00:09:04 IEEE80211_MODE_11NG_HT20  0  RSN WME
6c:ad:f8:d3:3c:db    4   11  58M     72M   39   15    644    1788  EPSs          f              0  ACK         10              P 00:05:50 IEEE80211_MODE_11NG_HT20  0  RSN WME
0

Re: Python plugin: Presence detection from wireless router

Posted: Sunday 09 February 2020 11:20
by EscApe
Result /usr/sbin/wlanconfig eth0 list; echo $?
CODE: SELECT ALL

Schuur-BZ.v4.0.80# /usr/sbin/wlanconfig eth0 list; echo $?
Not supported
0
Thanks!
So we found the culprit. Running wlanconfig on eth0 returns an error message, but not an errorlevel (still returning 0). So the plugin assumes it is a usable interface, when in fact it isn’t. The presence detection will still work without any issues. You can ignore the error message.

I don’t know if this is specific to the unifi or a generic issue for all routers using the wlanconfig command. Since I don’t know every make and model router that uses the atheros chipset I can not simply exclude eth0 from the detection script. A specific tracker for the unifi is an option but I would still prefer auto detection over this approach. Even when it throws an ignorable error.

The auto detection could be enhanced to not only check the errorlevel but also the string returned. I will look into that,but since functionality is not affected in any way it is not a top priority.