Date   

Re: I'm stumped....

David - W9DWH
 

Well at least they admitted blocking it now where the first time they told me nothing had changed.on their end recently. 

Roger, yes I'm using the same password. You might want to go into your BM selfcare settings and set your password again and then go through the initial setup on DVS again.


Re: I'm stumped....

Steve N4IRS
 

Yes, The password works. Check your MMDVM_Bridge log in /var/log/mmdvm

On 8/22/21 6:56 PM, Roger Davies wrote:
Thanks Steve. I'll take your advice on posting about DVS on Telegram.
I connected to Parrot, using master 3104 and Parrot works. Still no luck on our state TG 3149.
How do I go about using/setup STFU?

David,
I tried the Mexico master and had no luck there. Do you use the same password as you do for BM?
Thanks


Re: I'm stumped....

Roger Davies
 
Edited

Thanks Steve. I'll take your advice on posting about DVS on Telegram.
I connected to Parrot, using master 3104 and Parrot works. Still no luck on our state TG 3149.
How do I go about using/setup STFU?

David,
I tried the Mexico master and had no luck there. Do you use the same password as you do for a US master?
Thanks


Re: I'm stumped....

David - W9DWH
 

Thank you.  I will have to study that as it's the first I've heard of it.  I'm a relative newcomer to DVS.  In the meantime I've got it working again on Mexico's master.  It wouldn't work with Canada's Master either.  I appreciate you figuring out what was going on and offering us some work arounds. 


Re: I'm stumped....

Steve N4IRS
 

STFU is Simple Terminal Feature Update. It is a alternate method of connecting to BM. It can replace MMDVM_Bridge for connecting to BM.

On 8/22/21 6:16 PM, David - W9DWH via groups.io wrote:
I normally know what STFU is but I don't think that's the way you meant it so would you elaborate please?


Re: I'm stumped....

David - W9DWH
 

I normally know what STFU is but I don't think that's the way you meant it so would you elaborate please?


Re: I'm stumped....

Steve N4IRS
 

I really suggest you stop posting on Telegram. You will get no support.


On 8/22/21 5:52 PM, David - W9DWH via groups.io wrote:
3166, 3167 and parrot all work.  Tried 3118 and 3121 again and they do not.


Re: I'm stumped....

Steve N4IRS
 

BM US is blocking the statewide TGs Use a non US server or swap out MMDVM_Bridge for STFU

On 8/22/21 5:52 PM, David - W9DWH via groups.io wrote:
3166, 3167 and parrot all work.  Tried 3118 and 3121 again and they do not.


Re: I'm stumped....

David - W9DWH
 

3166, 3167 and parrot all work.  Tried 3118 and 3121 again and they do not.


Re: server hacked

Steve Siesel [K4KSA]
 

Your hacked server was on Vultr as well?

On Aug 22, 2021, at 5:46 PM, Kevin Halton <Khalton@...> wrote:



Steve, it is on Vultr. Running deb10, seems like I am missing a step or two?

 

 

From: main@DVSwitch.groups.io [mailto:main@DVSwitch.groups.io] On Behalf Of Steve Siesel [K4KSA]
Sent: Sunday, August 22, 2021 5:10 PM
To: main@dvswitch.groups.io
Subject: Re: [DVSwitch] server hacked

 

What was you pervious host server? I have seen strange activity on Nfoservers..

 

Steve..



On Aug 22, 2021, at 5:06 PM, Kevin Halton <KA1MXL@...> wrote:

Well  what a great day it has been. Woke up this morning and found that my DVS server was hacked over night. I dumped that server and installed a new one on Vultr. I followed the instructions I had used on the prior install and nothing seems to work.

These are the directions I followed 
wget http://dvswitch.org/buster
 sudo chmod +x buster
 sudo ./buster
 sudo apt-get update
 sudo apt-get install dvswitch-server
Once the install is complete, reboot the server.Enter "dvs" (no quotes) in a terminal window to start the dvswitch menu system.

I logged into server and went thru each option. I am using a T320 network radio to connect, which on the surface appears that I do connect. I cannot access dashboard, when I enter commands via radio I get no feedback, I hear no audio.

I have attempted this more times then I can count and end up with the same result. I am 99.99% positive it is "OE" but am stumped.

I have included log files in hope maybe someone sees what I am missing. Any help is greatly appreciated.


<Analog_Bridge.log>

<MMDVM_Bridge-2021-08-22.log>


Re: I'm stumped....

Steve N4IRS
 

Try 3166, 3167 or parrot

On 8/22/21 5:22 PM, David - W9DWH via groups.io wrote:
Mine will work on 31211 but that's the only one I've found so far. 


Re: server hacked

Kevin Halton
 

Steve, it is on Vultr. Running deb10, seems like I am missing a step or two?

 

 

From: main@DVSwitch.groups.io [mailto:main@DVSwitch.groups.io] On Behalf Of Steve Siesel [K4KSA]
Sent: Sunday, August 22, 2021 5:10 PM
To: main@dvswitch.groups.io
Subject: Re: [DVSwitch] server hacked

 

What was you pervious host server? I have seen strange activity on Nfoservers..

 

Steve..



On Aug 22, 2021, at 5:06 PM, Kevin Halton <KA1MXL@...> wrote:

Well  what a great day it has been. Woke up this morning and found that my DVS server was hacked over night. I dumped that server and installed a new one on Vultr. I followed the instructions I had used on the prior install and nothing seems to work.

These are the directions I followed 
wget http://dvswitch.org/buster
 sudo chmod +x buster
 sudo ./buster
 sudo apt-get update
 sudo apt-get install dvswitch-server
Once the install is complete, reboot the server.Enter "dvs" (no quotes) in a terminal window to start the dvswitch menu system.

I logged into server and went thru each option. I am using a T320 network radio to connect, which on the surface appears that I do connect. I cannot access dashboard, when I enter commands via radio I get no feedback, I hear no audio.

I have attempted this more times then I can count and end up with the same result. I am 99.99% positive it is "OE" but am stumped.

I have included log files in hope maybe someone sees what I am missing. Any help is greatly appreciated.


<Analog_Bridge.log>

<MMDVM_Bridge-2021-08-22.log>


Re: I'm stumped....

David - W9DWH
 

Found the log:

21:06:30.000 DMR, Logged into the master successfully: 3104.master.brandmeister.network:62031
M: 2021-08-22 21:21:05.512 DMR, Remote CMD: menu=adv_main.txt
M: 2021-08-22 21:21:05.517 DMR, Remote CMD: codec=slin
I: 2021-08-22 21:21:17.543 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=9 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:21:17.543 DMR, Remote CMD: txTg=3121
M: 2021-08-22 21:21:17.543 DMR, Tune: id=3118983, tg=3121, mode=Group
M: 2021-08-22 21:21:28.644 DMR, TX state = ON
I: 2021-08-22 21:21:28.644 DMR, Begin TX: src=3118983 rpt=311898302 dst=3121 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:21:31.160 DMR, TX state = OFF, DMR frame count was 44 frames
I: 2021-08-22 21:21:39.574 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=3121 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:21:39.574 DMR, Remote CMD: txTg=3121
M: 2021-08-22 21:21:39.574 DMR, Tune: id=3118983, tg=3121, mode=Group
M: 2021-08-22 21:21:43.280 DMR, TX state = ON
I: 2021-08-22 21:21:43.280 DMR, Begin TX: src=3118983 rpt=311898302 dst=3121 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:21:45.801 DMR, TX state = OFF, DMR frame count was 44 frames
I: 2021-08-22 21:21:49.328 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=3121 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:21:49.328 DMR, Remote CMD: txTg=31211
M: 2021-08-22 21:21:49.328 DMR, Tune: id=3118983, tg=31211, mode=Group
M: 2021-08-22 21:22:02.678 DMR, TX state = ON
I: 2021-08-22 21:22:02.678 DMR, Begin TX: src=3118983 rpt=311898302 dst=31211 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:22:05.201 DMR, TX state = OFF, DMR frame count was 45 frames
I: 2021-08-22 21:22:14.891 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=31211 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:22:14.891 DMR, Remote CMD: txTg=31183
M: 2021-08-22 21:22:14.891 DMR, Tune: id=3118983, tg=31183, mode=Group
M: 2021-08-22 21:22:18.556 DMR, TX state = ON
I: 2021-08-22 21:22:18.556 DMR, Begin TX: src=3118983 rpt=311898302 dst=31183 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:22:21.069 DMR, TX state = OFF, DMR frame count was 44 frames
I: 2021-08-22 21:22:42.852 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=31183 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:22:42.852 DMR, Remote CMD: txTg=3118983
M: 2021-08-22 21:22:42.852 DMR, Tune: id=3118983, tg=3118983, mode=Group
M: 2021-08-22 21:22:46.735 DMR, TX state = ON
I: 2021-08-22 21:22:46.735 DMR, Begin TX: src=3118983 rpt=311898302 dst=3118983 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:22:49.274 DMR, TX state = OFF, DMR frame count was 44 frames
I: 2021-08-22 21:32:23.873 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=3118983 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:32:23.873 DMR, Remote CMD: txTg=3181
M: 2021-08-22 21:32:23.873 DMR, Tune: id=3118983, tg=3181, mode=Group
I: 2021-08-22 21:32:27.967 DMR, TAG_SET_INFO: src=3118983 rpt=311898302 dst=3118983 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:32:27.967 DMR, Remote CMD: txTg=3118
M: 2021-08-22 21:32:27.967 DMR, Tune: id=3118983, tg=3118, mode=Group
M: 2021-08-22 21:32:29.640 DMR, TX state = ON
I: 2021-08-22 21:32:29.641 DMR, Begin TX: src=3118983 rpt=311898302 dst=3118 slot=2 cc=1 metadata=W9DWH
M: 2021-08-22 21:32:32.268 DMR, TX state = OFF, DMR frame count was 46 frames


Re: I'm stumped....

David - W9DWH
 
Edited

Mine will work on 31211 but that's the only one I've found so far. I can't find an MMDVM log anywhere at the moment. 


Re: server hacked

Steve Siesel [K4KSA]
 

What was you pervious host server? I have seen strange activity on Nfoservers..

Steve..

On Aug 22, 2021, at 5:06 PM, Kevin Halton <KA1MXL@...> wrote:

Well  what a great day it has been. Woke up this morning and found that my DVS server was hacked over night. I dumped that server and installed a new one on Vultr. I followed the instructions I had used on the prior install and nothing seems to work.

These are the directions I followed 
wget http://dvswitch.org/buster
 sudo chmod +x buster
 sudo ./buster
 sudo apt-get update
 sudo apt-get install dvswitch-server
Once the install is complete, reboot the server.Enter "dvs" (no quotes) in a terminal window to start the dvswitch menu system.

I logged into server and went thru each option. I am using a T320 network radio to connect, which on the surface appears that I do connect. I cannot access dashboard, when I enter commands via radio I get no feedback, I hear no audio.

I have attempted this more times then I can count and end up with the same result. I am 99.99% positive it is "OE" but am stumped.

I have included log files in hope maybe someone sees what I am missing. Any help is greatly appreciated.



<Analog_Bridge.log>
<MMDVM_Bridge-2021-08-22.log>


Re: I'm stumped....

Steve N4IRS
 

What TG?
Post MMDVM_Bridge log when transmitting


On 8/22/21 4:52 PM, David - W9DWH via groups.io wrote:
I'm having the same problem.  Were there any updates, that were pushed to DVS, that could have broken something?  I can hear BM talkgroups on DVS but I cannot transmit.  My passwords are correct and BM says it's not an issue on their end.  


server hacked

Kevin Halton
 

Well  what a great day it has been. Woke up this morning and found that my DVS server was hacked over night. I dumped that server and installed a new one on Vultr. I followed the instructions I had used on the prior install and nothing seems to work.

These are the directions I followed 
wget http://dvswitch.org/buster
 sudo chmod +x buster
 sudo ./buster
 sudo apt-get update
 sudo apt-get install dvswitch-server
Once the install is complete, reboot the server.Enter "dvs" (no quotes) in a terminal window to start the dvswitch menu system.

I logged into server and went thru each option. I am using a T320 network radio to connect, which on the surface appears that I do connect. I cannot access dashboard, when I enter commands via radio I get no feedback, I hear no audio.

I have attempted this more times then I can count and end up with the same result. I am 99.99% positive it is "OE" but am stumped.

I have included log files in hope maybe someone sees what I am missing. Any help is greatly appreciated.




Re: I'm stumped....

David - W9DWH
 

I'm having the same problem.  Were there any updates, that were pushed to DVS, that could have broken something?  I can hear BM talkgroups on DVS but I cannot transmit.  My passwords are correct and BM says it's not an issue on their end.  


Re: All-star to dmr bridge #analog_bridge

 

This is from the MMDVM Side when I transmit from Analog to DMR.

M: 2021-08-22 20:46:55.943 DMR, Logged into the master successfully: 3108.repeater.net:62031
M: 2021-08-22 20:46:58.322 DMR, TX state = ON
I: 2021-08-22 20:46:58.323 DMR, Begin TX: src=3141898 rpt=314189802 dst=3154 slot=2 cc=1 metadata=KE8LCM
M: 2021-08-22 20:47:00.879 DMR, TX state = OFF, DMR frame count was 45 frames

This is from Analog Bridge

I: 2021-08-22 20:46:55.943 EVENT: {"topic":"dvswitch/MMDVM_Bridge/DMR","message":"login success"}
M: 2021-08-22 20:46:58.320 PTT on
M: 2021-08-22 20:46:59.976 Short transmission, extend hang time by 844 ms
M: 2021-08-22 20:47:00.878 PTT off (keyed for 2558 ms)
M: 2021-08-22 20:48:09.140 PTT on
M: 2021-08-22 20:48:12.079 PTT off (keyed for 2939 ms)

MMDVM_Bridge.ini

[General]
Callsign=KE8LCM
Id=314189802
Timeout=180
Duplex=0
 
[Info]
RXFrequency=222340000
TXFrequency=224940000
Power=1
Latitude=39.24655
Longitude=-81.58580
Height=0
Location=Parkersburg, West Virginia
Description=MMDVM_Bridge
URL=https://groups.io/g/DVSwitch
 
[Log]
# Logging levels, 0=No logging, 1=Debug, 2=Message, 3=Info, 4=Warning, 5=Error, 6=Fatal
DisplayLevel=1
FileLevel=2
FilePath=/var/log/mmdvm
FileRoot=MMDVM_Bridge
 
[DMR Id Lookup]
File=/var/lib/mmdvm/DMRIds.dat
Time=24
 
[NXDN Id Lookup]
File=/var/lib/mmdvm/NXDN.csv
Time=24
 
[Modem]
Port=/dev/null
RSSIMappingFile=/dev/null
Trace=0
Debug=0
 
[D-Star]
Enable=0
Module=B
 
[DMR]
Enable=1
ColorCode=1
EmbeddedLCOnly=1
DumpTAData=0
 
[System Fusion]
Enable=0
 
[P25]
Enable=0
NAC=293
 
[NXDN]
Enable=0
RAN=1
Id=12345
 
[D-Star Network]
Enable=0
GatewayAddress=127.0.0.1
GatewayPort=20010
LocalPort=20011
Debug=0
 
[DMR Network]
Enable=1
Address=3108.repeater.net
Port=62031
Jitter=360
Local=62032
Password=*********
# for DMR+ see https://github.com/DVSwitch/MMDVM_Bridge/blob/master/DOC/DMRplus_startup_options.md
# for XLX the syntax is: Options=XLX:4009
# Options=
Slot1=0
Slot2=1
Debug=0
 
[System Fusion Network]
Enable=0
LocalAddress=0
LocalPort=3200
GatewayAddress=127.0.0.1
GatewayPort=4200
Debug=0
 
[P25 Network]
Enable=0
GatewayAddress=127.0.0.1
GatewayPort=42020
LocalPort=32010
Debug=0

[NXDN Network]
Enable=0
#LocalAddress=127.0.0.1
Debug=0
LocalPort=14021
GatewayAddress=127.0.0.1
GatewayPort=14020
 


I'm stumped....

Roger Davies
 

I'm using DVS Mobile. I can hear all traffic from TGs, but no one can hear me. I can go to Hoseline and hear myself. I checked to see if I could hear myself using hotspot, but no luck their either. DVS dashboard shows me keying up. I tried the TGIF network and all works perfect, I can hear and be heard. It's like I can get to the BM server, when I key up, but that's about it. Signal doesn't come out on any TG. I did a DVS server upgrade and no help there either. Checked BM Hotspot password and that's good. Any ideas? TIA. Roger N6DVZ

881 - 900 of 10556