MiBoxer WL-433 Gateway DPs questions and some info #623
Replies: 2 comments 1 reply
-
I'm glad my PCAP parser is getting some use :) Fortunately it does not appear to be encrypted or anything, it's just base64 encoded. Unfortunately without knowing *exactly* what you were changing I have no way of figuring out how it packs the data. Whole thing:
Only commands to the device:
Only responses from the device:
The only thing I can say for sure is that last byte is an 8-bit sum of the message. |
Beta Was this translation helpful? Give feedback.
-
Awesome, thank you! I guess I wouldn't come up with base64. Is that common for tuya devices? I wanted to do some systematic captures as soon as I could make some sense out of the data, but I wanted to capture something first in case I could "just read it". I'll report back. I might need some pointing again... |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I have two MiBoxer PW01 underwater (pool) lights which are controlled by a proprietary 433 MHz LoRa protocol.
There is one remote available as well as a gateway, WL-433, which features a DMX input as well as app control through the MiBoxer app, which uses tuya under the hood. However, as MiBoxer states, this device cannot be used with the tuya cloud platform, so I did not try that, but used their provided app.
Fortunately, the app freely tells me the device id and local key and some DP data when logging its debug output 😁 (with LogFox on android)
The gateway and remote support different zones, so I put one lamp into zone 1 and the other in 2, and I can control them individually or all together. Also, they support different modes / effects.
Now I was able to add it with local tuya as well as tuya local to home-assistant and I can control the lamps, but only all at once, not the individual zones and not the scenes / modes.
While digging deeper I found the packet capture parser here, which I fed with the pcap I obtained with pcapdroid.
As I can't use the tuya cloud, I had to figure out how to create the devices.json myself, sadly I found no example here and the snapshot.json is not in the same format. Here is my example for others to find:
[ { "name": "wl433", "id": "bf...xyz", "ip": "192.168.x.yz", "key": "xyz", "version": "3.3" } ]
There I found that the app sends some strings to a DP 101, which I could already see in the debug log, but I can't make any sense of it.
I hope someone here can point me in the right direction how to decrypt these data to enable me (and others having that device) to make full use of it.
parser_output_stripped.txt
I removed the device id and stripped it of duplicate and empty lines and just took a part of the whole log. I was opening the app, switching the lamps off and on and selecting different modes in different or all zones.
Can you help me decipher that?
Thank you in advance!
Beta Was this translation helpful? Give feedback.
All reactions