Interface with Texecom Alarm panels over UDL protocol in python
Reason this release was yanked:
missing templates
Project description
pytexalarm
This repository contains pyhton code to speak to (and impersonate) a Texecom alarm panel UDL protocol over either UART serial or TCP ports. The project implements some of the functionality of Wintex, the Texecom windows-based configuration tool. It can dump the configuration from a panel, decode it and expose through a web browser.
Quickstart - Reading config from panel over IP
You will need the UDL Password for the alarm system, and either a IPCom or SmartCom installed (or some 3rd party ser2net compatible device).
$ pip install pytexalarm
$ python -m pytexalarm.udlclient --password MYPASSWORD --host 192.168.1.243 --mem home.panel
$ python -m pytexalarm.webapp --mem home.panel
Then open up a web browser to http://localhost:8080 to view the panel config
If you have a SmartCom, however the panel is configured in monitor mode, then the UDL protocol is turned off on the local network. You need the 'engineers code' to change the Communications settings to the historic configuation of Com1:IPCom and Com2:Smartcom to fix this. See this thread for details.
Advanced - Running a virtual panel
-
Install Wintex (on linux works well with playonlinux wrapper)
-
Setup a new 'Account' with these settings:
Panel type: Elite 24 Software version: 4.x UDL password: 1234 Network details: 127.0.0.1 port 10001 -
start
udl-server.pyrunning:$ git clone https://github.com/shuckc/pytexalarm.git $ cd pialarm $ python3 -m venv venv $ . venv/bin/activate $ pip install -r requirements.txt $ python udl-server.py Panel type 'Elite 24 V4.02.01' with UDL password 1234 backed by file /home/chris/alarmpanel.cfg Serving UDL on ('::', 10001, 0, 0), ('0.0.0.0', 10001) Serving web interface on 10002 (eval) > -
In wintex hit
Connect->Connect via. Network (127.0.0.1 on Port 10001). Wintex will prompt to reset the fake panel. You will see some output like:udl_server 0: connected Sending login prompt Recieved UDL login [49, 50, 51, 52]. Sending panel identification Configuration read addr=00649b sz=10 data=0x2f,0xfc,0x56,0x50,0x85,0x90,0x48,0x44,0x76,0x11,0x43,0x39,0xce,0xc4,0x19,0x76 Configuration read addr=005d04 sz=10 data=0x57,0x1,0x7,0x94,0x71,0x49,0x45,0x5,0x9f,0xea,0x6c,0xe7,0xe7,0x1b,0xa8,0x64 Configuration read addr=001678 sz=1 data=0x0 Configuration read addr=001fca sz=7 data=0x0,0x0,0x0,0x0,0x0,0x0,0x0 Configuration read addr=00167e sz=1 data=0x0 Configuration read addr=005c55 sz=2 data=0x0,0x0 (eval) > -
Open up a web browser to
http://localhost:10002to see the decoded panel configuration
Serial connection
To interface a raspberry Pi to the alarm panel requires only a couple of resistors, plus a 12-15V DC to 5V DC power adapter. In the hardware directory you can see how to connect it to the Texecom main board. It it not necessary to buy any IP-communicator or Com300 board to do this.
Protocol
See captured examples and dissections of the "simple" protocol and the Wintex protocol.
Panel configuration
Configure via. the keypad as follows:
COM1 configure as 'Not connected'
COM2 configure as 'Crestron System'
COM2 Speed 19200 baud
COM3 configure as 'Communicator 300'
UDL Password -> 12345678 set this in ~/.pialarm
Preparing the pi
Install a blank rasbian install to an SD Card (ideally skipping NOOBS). Boot using a keyboard and screen, then use sudo raspi-config to enable ssh (5 Interfacing Options -> P2 SSH -> Yes) then change the password for the pi user using passwd.
It is necessary to disable the serial tty that raspian attaches to /dev/ttyACM0 in order to access the hardware UART. With recent rasbian releases it is a simple matter of running sudo raspi-config and disabling the serial tty under 5 Interfacing Options -> P6 Serial -> No -> Yes -> OK, giving this summary:
The serial login shell is disabled
The serial interface is enabled
Now install the contents of this repository to ~/pialarm as follows:
$ sudo apt-get install git
$ git clone https://github.com/shuckc/pialarm.git
$ cd pialarm
$ pip3.6 install -r requirements.txt
$ python
You may also update the Pi kernel and firmware with $ sudo rpi-update - didn't cause any problems for me.
Wiring
First I used a couple of FTDI USB external COM ports (5V tolerant) as a proof of concept. However it is much neater to omit these and use the GPIO pins on the pi directly. The COM ports on the alarm mainboard all drive Tx to 5V logic levels, with a series protection resistor of 9.1kOhm, which needs to be accounted for in the voltage divider to reduce to 3.3V logic for the raspberry pi GPIO pins. Since the protection resistor is quite large, I used this as the top resister in the divider chain, with a bottom resistor of 15kOhm. For Rpi -> Panel, I drove the panel's Rx pin directory with no problems.
For more details see hardware.
Legal
This project is not affiliated with Texecom. The protocols were reversed engineered using a Salae Logic8 logic probe, and later by capturing traffic using the ser2net tool, and custom scripts to convert trace files to memory maps. See the protocol directory for these. For the fine details, a panel was emulated with udl-server.py and WinTex used to change settings individually. No author or contributor has signed the Texecom NDA agreement.
If you use the configuration system to change panel settings, this is done at your own risk. It is not beyond the realm of possibility that a panel might need NVM reset to recover or the use of a firmware flasher.
See also
- Mike Stirling's @mikestir implementation of an Alarm Receiving Centre ARC, expecting messages over TCP, so requires e.g. ComIP communicator module
- @kieranmjones who first freely documented the Cestron protocol
- @stuartyio who runs the Selfmon site for Honeywell panels
- Nexmo text-to-speech a very reliable and low cost way to send calls and SMS messages over IP
- Telegram bot API for sending events to a chat group that can be setup on mobile phones.
- Gw0udm's blog which details serial port connectivity information as well as COM3 and various communicator systems.
- Leo Crawford's brute forcing of the UDL login.
- RoganDawes' ESPHome_Wintex which can bridge Zone status to Home Assistant.
- RoganDawes' Java WintexProtocol decoder
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pytexalarm-0.1b0.tar.gz.
File metadata
- Download URL: pytexalarm-0.1b0.tar.gz
- Upload date:
- Size: 647.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
67f917faa291dd82ff51b6a1f14099c916ce6ab29466208341a4b5e16f81a7b3
|
|
| MD5 |
8e9618c48036cbbd77bcd5665f3e4e13
|
|
| BLAKE2b-256 |
57f9157970e50f338d9b07cefa61e8ab7debb015e60a951735e22bbc85e98d19
|
Provenance
The following attestation bundles were made for pytexalarm-0.1b0.tar.gz:
Publisher:
publish.yml on shuckc/pytexalarm
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pytexalarm-0.1b0.tar.gz -
Subject digest:
67f917faa291dd82ff51b6a1f14099c916ce6ab29466208341a4b5e16f81a7b3 - Sigstore transparency entry: 217814362
- Sigstore integration time:
-
Permalink:
shuckc/pytexalarm@5a7413fda47655808d97d394c1133dc6ec1f09d2 -
Branch / Tag:
refs/tags/0.1b0 - Owner: https://github.com/shuckc
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@5a7413fda47655808d97d394c1133dc6ec1f09d2 -
Trigger Event:
release
-
Statement type:
File details
Details for the file pytexalarm-0.1b0-py3-none-any.whl.
File metadata
- Download URL: pytexalarm-0.1b0-py3-none-any.whl
- Upload date:
- Size: 22.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.12.9
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e9d3cd6a448223d267a654fb04ea21c58bc991b0a063378eb8874e70d5b032ec
|
|
| MD5 |
da84ceae7901aee7b6b634f8bd4ab69f
|
|
| BLAKE2b-256 |
53decb4a21a902a46efa3e3c6d15e55f62e8c1bda5d36dddd030f0a6c624d9d9
|
Provenance
The following attestation bundles were made for pytexalarm-0.1b0-py3-none-any.whl:
Publisher:
publish.yml on shuckc/pytexalarm
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
pytexalarm-0.1b0-py3-none-any.whl -
Subject digest:
e9d3cd6a448223d267a654fb04ea21c58bc991b0a063378eb8874e70d5b032ec - Sigstore transparency entry: 217814368
- Sigstore integration time:
-
Permalink:
shuckc/pytexalarm@5a7413fda47655808d97d394c1133dc6ec1f09d2 -
Branch / Tag:
refs/tags/0.1b0 - Owner: https://github.com/shuckc
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@5a7413fda47655808d97d394c1133dc6ec1f09d2 -
Trigger Event:
release
-
Statement type: