|Federico Bonelli c10039811a guide edit||3 years ago|
|Nodered||3 years ago|
|OSC||3 years ago|
|docs||3 years ago|
|image||3 years ago|
|guide.md||3 years ago|
|howtoburnSDcards.md||3 years ago|
|logo_full.png||3 years ago|
|logo_small.png||3 years ago|
|readme.md||3 years ago|
the Dowse image file from http://www.dowse.eu/ (until the new file is up you can take it from here. This is the image that Jaromil gave out at the workshop on September 27: https://www.khm.de/~sievers/devuan_dowse_raspi2.img )
use your computer to clone the image onto the SD card (https://duckduckgo.com/?q=clone+raspberry+sd+card)
put the SD card into your Raspberry Pi
connect it to your access point/router via an Ethernet cable
optional: you can connect a monitor via HDMI and keyboard and mouse, but you'll have to do it before powering it up. This might be useful at the beginning because you can log in to it right away, get its IP address and change settings, etc.
connect it to power to boot it up
Dowse should now be running!
Log in to your home router/access point
disable DHCP (also for IPv6 if that is on, as apparently Windows 10 uses IPv6 for DNS)
The router will give you the Dowse box's IP address. With the default SD card image Dowse takes its IP via DHCP
Use that to SSH into your Dowse box, i.e. with ssh firstname.lastname@example.org
optional but probably a good idea: set up a static IP address for your dowse box (edit /etc/network/interfaces)
There are two users set up, root and dowse. The default password for root is toor, for the user dowse it is dowse. Log in as dowse to go straight to the interactive Dowse console.
find out its IP address. Your router might tell you if you log in to its web interface, or try an app like https://github.com/adafruit/Adafruit-Pi-Finder/releases/tag/3.0.0
Let's assume it's 10.0.1.10. Open a Terminal and type
or open http://dowse.it in your browser. You should see the captive portal. Enter yourself as the administrator.
another way to check that the captive portal works: dig 10.0.1.10 dowse.it
ssh into the dowse box (See 'Putty' further down if you are on Windows)
to make it start at every boot, put this line inside the file /etc/rc.local (edit as root)
A graphical editor to edit node patches/flows. Such flows allow reacting to input (like Dowse MQTT data). Not required to use Dowse. You can write your own programms or create gadgets that recieve MQTT or OSC data and do things with it.
after installing node red you can follow a great tutorial :
(it's also already installed on the dowse box, right? How do I start it on there?)
sudo npm install -g --unsafe-perm node-red
install via homebrew https://brew.sh/ First install brew if it isn't already, then follow instructions here: http://flnkr.com/2016/03/node-red-install-on-mac-os-x/
once installed run: /usr/local/bin/node-red -v
then open http://127.0.0.1:1880 in your browser follow instructions on node-red documentation
go to node.js website and install node.js https://nodejs.org/en/
open node terminal
sudo npm install -g --unsafe-perm node-red
Gource allows to visualize the data using a colorful, dynamic and animated graph. It's processor-intensive so it should be run on a client machine.
<full_path_to_putty>\plink.exe -pw dowse -l dowse dowse.it /usr/local/dowse/bin/dowse-to-gource | <full_path_to_gource>\gource.exe --log-format custom -
install via homebrew https://brew.sh/
First install brew if it isn't already, then just do brew install gource
Once installed, start gource on your own laptop with
ssh -l dowse dowse.it /usr/local/dowse/bin/dowse-to-gource | gource --log-format custom -
my favourite gource command:
ssh -l dowse dowse.it /usr/local/dowse/bin/dowse-to-gource | gource --log-format custom -e 0.5 --bloom-multiplier 2.0 --bloom-intensity 0.1 --background F7EFDB --font-size 18 --font-colour 000000 --logo ~/devel/dowse-workshops/logo_small.png -
password is dowse
you can also get dns queries listed directly in your shell i.e. with ssh -l dowse 10.0.1.10 /usr/local/dowse/bin/dowse-to-gource
2014 25 devices in 45 minutes at defcon https://www.youtube.com/watch?v=h5PRvBpLuJs
Every now and then a funny (or a scary) IoT hack comes available. I have been twitting them for a wile with the #dowse hashtag. A small selection of stories is here below.