2013-11-24 23:01:20 -05:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
2013-10-29 09:17:50 -04:00
|
|
|
# Copyright (c) 2013 Cortney T. Buffington, N0MJS and the K0USY Group. n0mjs@me.com
|
2013-10-29 08:09:18 -04:00
|
|
|
#
|
|
|
|
# This work is licensed under the Creative Commons Attribution-ShareAlike
|
|
|
|
# 3.0 Unported License.To view a copy of this license, visit
|
|
|
|
# http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to
|
|
|
|
# Creative Commons, 444 Castro Street, Suite 900, Mountain View,
|
|
|
|
# California, 94041, USA.
|
|
|
|
|
2013-11-24 23:01:20 -05:00
|
|
|
# This is a sample application that snoops voice traffic to log calls
|
|
|
|
|
2013-10-29 08:09:18 -04:00
|
|
|
from __future__ import print_function
|
|
|
|
from twisted.internet.protocol import DatagramProtocol
|
|
|
|
from twisted.internet import reactor
|
|
|
|
from twisted.internet import task
|
2013-11-13 20:07:20 -05:00
|
|
|
from binascii import b2a_hex as h
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2013-10-29 17:36:04 -04:00
|
|
|
import struct
|
2013-10-29 08:09:18 -04:00
|
|
|
import time
|
|
|
|
import binascii
|
|
|
|
import dmrlink
|
2013-11-09 12:33:52 -05:00
|
|
|
from dmrlink import IPSC, UnauthIPSC, NETWORK, networks, get_info, int_id, subscriber_ids, peer_ids, talkgroup_ids, logger
|
2013-10-29 08:09:18 -04:00
|
|
|
|
|
|
|
class logIPSC(IPSC):
|
2013-10-29 16:16:48 -04:00
|
|
|
|
2013-10-29 08:09:18 -04:00
|
|
|
def __init__(self, *args, **kwargs):
|
|
|
|
IPSC.__init__(self, *args, **kwargs)
|
|
|
|
self.ACTIVE_CALLS = []
|
|
|
|
|
|
|
|
#************************************************
|
|
|
|
# CALLBACK FUNCTIONS FOR USER PACKET TYPES
|
|
|
|
#************************************************
|
|
|
|
|
2013-11-23 18:30:12 -05:00
|
|
|
def call_mon_origin(self, _network, _data):
|
|
|
|
print('({}) Repeater Call Monitor Origin Packet Received From: {}' .format(_network, _src_sub))
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2013-11-23 18:30:12 -05:00
|
|
|
def call_mon_rpt(self, _network, _data):
|
|
|
|
print('({}) Repeater Call Monitor Repeating Packet Received' .format(_network))
|
2013-10-29 08:09:18 -04:00
|
|
|
|
2013-11-23 18:30:12 -05:00
|
|
|
def call_mon_nack(self, _network, _data):
|
|
|
|
print('({}) Repeater Call Monitor NACK Packet Received' .format(_network))
|
2013-10-29 08:09:18 -04:00
|
|
|
|
|
|
|
def xcmp_xnl(self, _network, _data):
|
2013-11-13 20:07:20 -05:00
|
|
|
print('({}) XCMP/XNL Packet Received From: {}' .format(_network, h(_data)))
|
2013-10-29 08:09:18 -04:00
|
|
|
|
|
|
|
def group_voice(self, _network, _src_sub, _dst_sub, _ts, _end, _peerid, _data):
|
2013-10-29 16:16:48 -04:00
|
|
|
# _log = logger.debug
|
2013-11-08 14:47:35 -05:00
|
|
|
''' RSSI STUFF IS LIKELY NOT CORRECT!!!
|
|
|
|
WILL BE REMOVED IN FUTURE RELEASES
|
|
|
|
|
2013-10-29 17:36:04 -04:00
|
|
|
if _data[30:31] == '\x01':
|
2013-10-30 08:57:17 -04:00
|
|
|
rssi1 = struct.unpack('B', _data[-1])[0]
|
|
|
|
rssi2 = struct.unpack('B', _data[-2:-1])[0]
|
|
|
|
rssi = (rssi1 + (((rssi2*1000)+128)/256000))
|
|
|
|
print('RSSI (not quite correct yet): ', rssi)
|
2013-11-08 14:47:35 -05:00
|
|
|
'''
|
|
|
|
|
2013-10-29 08:09:18 -04:00
|
|
|
if (_ts not in self.ACTIVE_CALLS) or _end:
|
|
|
|
_time = time.strftime('%m/%d/%y %H:%M:%S')
|
2013-10-30 12:47:30 -04:00
|
|
|
_dst_sub = get_info(int_id(_dst_sub), talkgroup_ids)
|
|
|
|
_peerid = get_info(int_id(_peerid), peer_ids)
|
|
|
|
_src_sub = get_info(int_id(_src_sub), subscriber_ids)
|
2013-10-29 08:09:18 -04:00
|
|
|
if not _end: self.ACTIVE_CALLS.append(_ts)
|
|
|
|
if _end: self.ACTIVE_CALLS.remove(_ts)
|
|
|
|
|
|
|
|
if _ts: _ts = 2
|
|
|
|
else: _ts = 1
|
|
|
|
if _end: _end = 'END'
|
|
|
|
else: _end = 'START'
|
|
|
|
|
|
|
|
print('{} ({}) Call {} Group Voice: \n\tIPSC Source:\t{}\n\tSubscriber:\t{}\n\tDestination:\t{}\n\tTimeslot\t{}' .format(_time, _network, _end, _peerid, _src_sub, _dst_sub, _ts))
|
|
|
|
|
|
|
|
def private_voice(self, _network, _src_sub, _dst_sub, _ts, _end, _peerid, _data):
|
|
|
|
# _log = logger.debug
|
|
|
|
if (_ts not in self.ACTIVE_CALLS) or _end:
|
|
|
|
_time = time.strftime('%m/%d/%y %H:%M:%S')
|
2013-10-30 12:47:30 -04:00
|
|
|
_dst_sub = get_info(int_id(_dst_sub), subscriber_ids)
|
|
|
|
_peerid = get_info(int_id(_peerid), peer_ids)
|
|
|
|
_src_sub = get_info(int_id(_src_sub), subscriber_ids)
|
2013-10-29 08:09:18 -04:00
|
|
|
if not _end: self.ACTIVE_CALLS.append(_ts)
|
|
|
|
if _end: self.ACTIVE_CALLS.remove(_ts)
|
|
|
|
|
|
|
|
if _ts: _ts = 2
|
|
|
|
else: _ts = 1
|
|
|
|
if _end: _end = 'END'
|
|
|
|
else: _end = 'START'
|
|
|
|
|
|
|
|
print('{} ({}) Call {} Private Voice: \n\tIPSC Source:\t{}\n\tSubscriber:\t{}\n\tDestination:\t{}\n\tTimeslot\t{}' .format(_time, _network, _end, _peerid, _src_sub, _dst_sub, _ts))
|
|
|
|
|
|
|
|
def group_data(self, _network, _src_sub, _dst_sub, _ts, _end, _peerid, _data):
|
2013-10-30 12:47:30 -04:00
|
|
|
_dst_sub = get_info(int_id(_dst_sub), talkgroup_ids)
|
|
|
|
_peerid = get_info(int_id(_peerid), peer_ids)
|
|
|
|
_src_sub = get_info(int_id(_src_sub), subscriber_ids)
|
2013-10-29 08:09:18 -04:00
|
|
|
print('({}) Group Data Packet Received From: {}' .format(_network, _src_sub))
|
|
|
|
|
|
|
|
def private_data(self, _network, _src_sub, _dst_sub, _ts, _end, _peerid, _data):
|
2013-10-30 12:47:30 -04:00
|
|
|
_dst_sub = get_info(int_id(_dst_sub), subscriber_ids)
|
|
|
|
_peerid = get_info(int_id(_peerid), peer_ids)
|
|
|
|
_src_sub = get_info(int_id(_src_sub), subscriber_ids)
|
2013-10-29 08:09:18 -04:00
|
|
|
print('({}) Private Data Packet Received From: {} To: {}' .format(_network, _src_sub, _dst_sub))
|
|
|
|
|
2013-10-29 22:19:43 -04:00
|
|
|
class logUnauthIPSC(logIPSC):
|
|
|
|
|
|
|
|
# There isn't a hash to build, so just return the data
|
|
|
|
#
|
|
|
|
def hashed_packet(self, _key, _data):
|
2013-10-30 14:36:45 -04:00
|
|
|
return _data
|
|
|
|
|
2013-11-13 20:07:20 -05:00
|
|
|
# Remove the hash from a packet and return the payload... except don't
|
2013-10-30 14:36:45 -04:00
|
|
|
#
|
|
|
|
def strip_hash(self, _data):
|
|
|
|
return _data
|
2013-10-29 22:19:43 -04:00
|
|
|
|
|
|
|
# Everything is validated, so just return True
|
|
|
|
#
|
|
|
|
def validate_auth(self, _key, _data):
|
|
|
|
return True
|
2013-11-09 12:33:52 -05:00
|
|
|
if __name__ == '__main__':
|
|
|
|
logger.info('DMRlink \'log.py\' (c) 2013 N0MJS & the K0USY Group - SYSTEM STARTING...')
|
|
|
|
for ipsc_network in NETWORK:
|
|
|
|
if (NETWORK[ipsc_network]['LOCAL']['ENABLED']):
|
|
|
|
if NETWORK[ipsc_network]['LOCAL']['AUTH_ENABLED'] == True:
|
|
|
|
networks[ipsc_network] = logIPSC(ipsc_network)
|
|
|
|
else:
|
|
|
|
networks[ipsc_network] = logUnauthIPSC(ipsc_network)
|
|
|
|
reactor.listenUDP(NETWORK[ipsc_network]['LOCAL']['PORT'], networks[ipsc_network])
|
|
|
|
reactor.run()
|