Replies: 4 comments 4 replies
-
Interesting observation. Do you have a Windows machine in your network? If so, does it cause the same issue?
Why not? (😉)
From my point of view just block outgoing traffic from your machine to port 8000 and the IP address of your cam. Alternatively you can also block incoming UPD traffic from the camera's IP to your machine's UDP port 3702 |
Beta Was this translation helpful? Give feedback.
-
My ASECAM with Vatilon chipset and firmware has the same behaviour. In fact, I have 2 cameras and they both crash together. |
Beta Was this translation helpful? Give feedback.
-
I'm not aware that the cameras understand wsd at all. I had never heard of
wsd until I found that wsdd generated errors in the journal as the camera
crashed.
Sep 30 08:37:39 myhost gvfsd[8558]: 2024-09-30 08:37:39,640:wsdd
WARNING(pid 8558): no interface given, using all interfaces
Sep 30 08:37:43 myhost gvfsd[8558]: File "/usr/bin/wsdd", line 330, in
read_socket
Sep 30 08:37:43 myhost gvfsd[8558]: File "/usr/bin/wsdd", line 742, in
handle_packet
Sep 30 08:37:43 myhost gvfsd[8558]: File "/usr/bin/wsdd", line 534, in
handle_message
Sep 30 08:37:43 myhost gvfsd[8558]: File "/usr/bin/wsdd", line 802, in
handle_probe_match
Sep 30 08:37:43 myhost gvfsd[8558]: File "/usr/bin/wsdd", line 856, in
perform_metadata_exchange
...
Going by your earlier reply the initial message is on port 8000 with the
response as UDP?
TCP port 8000 is not open on the cameras.
They do send a bit of multicast traffic on startup.
I have a Windows VM and can run wireshark on it. I have no idea how to look
for wsd traffic.
I also have no clue what to send with curl and where (which port on the
target)
I'm happy to assist with getting to the bottom of it.
…On Thu, 3 Oct 2024 at 07:52, Steffen Christgau ***@***.***> wrote:
It's a little hard to test/reproduce/analyze without those devices at
hand. Therefore, I'd like to share the steps that I would do:
1. Although windows does not cause an issue, it would be interesting
to know if and how the WSD message flow looks like, i.e. a PCAP trace of
the WSD traffic between cam and Windows host would be interesting. Btw: Is
the cam somehow detected by Windows using WSD?
2. To figure out the reason for the crashing hardware, it would be
interesting if it's the UDP communication or (like stated in the OP) or
HTTP metadata exchange
3. If the latter is the case, i.e. HTTP is causing the trouble,
confirming the crash with curl and the HTTP workload would be interesting.
4. Finally, comparing the HTTP messages (body and header) of Windows
with the WSD ones may reveal some differences which cause the devices to
crash.
Ubuntu doesn't cause problems either, I assume it doesn't use wsdd.
Maybe not yet...
—
Reply to this email directly, view it on GitHub
<#203 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABTSUVPPDXGNBZT5KVIZTYLZZRTIZAVCNFSM6AAAAABGZQDS5CVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTAOBSGU3DKMY>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
I found the following command will crash the cameras. Attached is the pcap file during the period. |
Beta Was this translation helpful? Give feedback.
-
I just upgraded from Fedora 39 to Fedora 40 ( which included Gnome46 and wsdd
0.7.1-2.fc40
) and have noticed a strange issue. Whenever my desktop is turned on my IP camera (SV3C c18) goes into a reboot loop. Digging through wireshark I discovered thatwsdd
is sending a HTTP POST request to my camera (presumably its discovered the ONVIF advertisement) and promptly crashing the camera. The HTTP request is this..it never receives a response and the camera falls off the network a few seconds later. I have confirmed that killing off wsdd stops the camera from rebooting.
Whilst I dont doubt that this is a bug in my camera's firmware the likelihood of it being fixed is pretty slim. Is there a way to prevent wsdd from querying that device? Or any other suggestions? The
wsdd
package is listed as a dependency ofgnome-shell
so removing it long term isnt an option. I'm looking to see if I can block it via a firewall rule without breaking anything else.Happy to provide more info if needed
Beta Was this translation helpful? Give feedback.
All reactions