> On Apr 8, 2025, at 10:37, Steve Shuff <[email protected]> wrote:
> 
> Hi Matthew ,
> Thanks for the reply.
> 
> The CR1000 based station is on the home local network , the Raspberry pi 
> running Weewx is on the same network.
>  Assuming the interceptor is expecting  to use two network interfaces I would 
> have to remove the CR1000 from the home network and plug it into the 
> Raspberry pi 
> Alternatively, would the interceptor accept using one interface somehow, or 
> is that not doable ?

there are two modes for intercepting wu traffic: (1) listen and (2) sniff.

when you listen, you make your station send data to weewx directly, either by:
- making the station think that the weewx host is weather underground by 
spoofing dns
- mirroring network traffic from the station using firewall or network switch 
settings

when you sniff, you must ensure that the station and weewx are on the same 
network segment, and that any network hardware is not isolating devices.  you 
can test this using tcpdump on the machine on which weewx is running.  just do 
something like this: 

sudo tcpdump src X.X.X.X and dst port 80

then you should see data from the station.  there is no point messing with the 
weewx configuration until you can see something using tcpdump.

the example assumes the computer on which weewx is running is a network bridge 
- bridging the wifi and wired interfaces.  if you are not bridging, and you are 
using a wired interface, then it is quite probable that you will not see 
anything - most network switches isolate traffic to client nodes, so any client 
device will see only the traffic bound for it.  some 'smart' switches have an 
option to mirror traffic from one port to another.  if you are using a wifi 
interface, then you might be able to see traffic bound for other devices.

when you sniff, you will probably run into permissions issues.  typically root 
permissions are required to sniff network traffic.  you can see this when you 
run tcpdump - if you run as an unprivileged user, you won't see anything, but 
if you run as root, you might.  so in order to sniff traffic using the pcap 
bindings, the weewxd process will probably need escalated permissions.  the 
simplest and least secure way to do this is to run weewxd as root.  that was 
the default for v4 installations.  v5 installations default to running as a 
non-root user, so if you sniff traffic you'll probably need to give the weewx 
user permissions to do that.


-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/weewx-user/B4F4B36B-83E9-4596-9B1F-352537201A95%40gmail.com.

Reply via email to