Sonoff Binding without tasmota

Tags: #<Tag:0x00007efec48fc630>

I know we can flash the Sonoff devices with the tasmota firmware and connect them using MQTT, but is it possible to just have a binding for sonoff devices without having to flash them… My ability to solder, well, let’s just say it does what a vacuum does… Sure would help us newbies if someone could do a binding for the Sonoff devices… :slight_smile: please?

It’s not the answer but you don’t need to solder in order to flash sonoff. Check SonOTA :slight_smile:

I actually found another post like mine, with some interesting link to someone who was able to connect to the sonoff device without flashing, but that is way above my abilities… Hopeful!

As already posted above from @PawelGrzembka, use a bit of software and your are up and running within minutes:

OTA Flash only works on Firmware < 1.60
Maybe you can downgrade the Firmware to a older Version? I dont know…
I always solder pins.

1 Like

I’ll take a look at it, but that looks scary! :open_mouth: Sorry I’m such a noob at this!

Can any of you guys help me out here, so I followed the instructions for the Quick and dirty (and easy): installation from unmodified binaries without needing to compile anything or install SDKs, but having to adjust a temporary wifi with some predefined credentials / SSIDs - see the SonOTA for more information.

well now, the sonoff’s I tried are not responsive at all… no lights, no ssid… I think i bricked them… here’s my output from the screen

chase@chase-Satellite-Pro-L450:~/src/SonOTA$ ./sonota.py --wifi-ssid indebuurt1 --wifi-password VnsqrtnrsddbrN --serving-host 192.168.1.10
Current IPs: [‘192.168.1.10’, ‘192.168.1.10’]

Using the following configuration:
Server IP Address: 192.168.1.10
WiFi SSID: indebuurt1
WiFi Password: **************
Platform: linux
** Now connect via WiFi to your Sonoff device.
** Please change into the ITEAD WiFi network (ITEAD-100001XXXX). The default password is 12345678.
To reset the Sonoff to defaults, press the button for 7 seconds and the light will start flashing rapidly.
** This application should be kept running and will wait until connected to the Sonoff…
…Current IPs: [‘192.168.1.10’]
…Current IPs: [‘192.168.1.10’, ‘192.168.1.10’]
.Current IPs: [‘192.168.1.10’]
.Current IPs: [‘192.168.1.10’, ‘10.10.7.2’]
~~ Connection attempt

HTTP GET /10.10.7.1/device
<< {
“deviceid”: “1000251115”,
“apikey”: “9e34d7da-0d63-4ec6-ad6c-0f7d2293f38a”,
“accept”: “post”
}

HTTP POST /10.10.7.1/ap
{
“version”: 4,
“password”: “**************”,
“serverName”: “192.168.1.10”,
“ssid”: “indebuurt1”,
“port”: 8443
}
<< {
“error”: 0
}
~~ Provisioning completed
Starting stage2…
~~ Starting web server (HTTP port: 8080, HTTPS port 8443)
~~ Waiting for device to connect

*** IMPORTANT! ***
** AFTER the first download is COMPLETE, with in a minute or so you should connect to the new SSID “FinalStage” to finish the process.
** ONLY disconnect when the new “FinalStage” SSID is visible as an available WiFi network.
This server should automatically be allocated the IP address: 192.168.4.2.
If you have successfully connected to “FinalStage” and this is not the IP Address you were allocated, please ensure no other device has connected, and reboot your Sonoff.
…<< HTTP POST /dispatch/device

/dispatch/device
{
“port”: 8443,
“IP”: “192.168.1.10”,
“error”: 0,
“reason”: “ok”
}
200 POST /dispatch/device (192.168.1.11) 3.75ms
101 GET /api/ws (192.168.1.11) 1.07ms
<< WEBSOCKET OPEN
<< WEBSOCKET INPUT
<< {
“deviceid”: “1000251115”,
“version”: 2,
“romVersion”: “2.0.1”,
“apikey”: “9e34d7da-0d63-4ec6-ad6c-0f7d2293f38a”,
“model”: “PSF-B04-GL”,
“action”: “register”,
“userAgent”: “device”,
“ts”: 530
}

We are dealing with a PSF-B04-GL model.
~~~~ register
>> {
    "deviceid": "1000251115",
    "error": 0,
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "config": {
        "hb": 1,
        "hbInterval": 145
    }
}
<< WEBSOCKET INPUT
<< {
    "deviceid": "1000251115",
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "date",
    "userAgent": "device"
}
~~~ device sent action request, acknowledging / answering...
~~~~ date
>> {
    "deviceid": "1000251115",
    "date": "2018-02-23T09:21:06.781Z",
    "error": 0,
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db"
}
<< WEBSOCKET INPUT
<< {
    "deviceid": "1000251115",
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "device",
    "params": {
        "configure": [
            {
                "startup": "off",
                "outlet": 0
            },
            {
                "startup": "off",
                "outlet": 1
            },
            {
                "startup": "off",
                "outlet": 2
            },
            {
                "startup": "off",
                "outlet": 3
            }
        ],
        "staMac": "60:01:94:9D:74:35",
        "fwVersion": "2.0.1",
        "rssi": -36,
        "switches": [
            {
                "switch": "off",
                "outlet": 0
            },
            {
                "switch": "off",
                "outlet": 1
            },
            {
                "switch": "off",
                "outlet": 2
            },
            {
                "switch": "off",
                "outlet": 3
            }
        ]
    }
}
~~~ device sent action request, acknowledging / answering...
~~~~ update
>> {
    "deviceid": "1000251115",
    "error": 0,
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db"
}
>> {
    "from": "hackepeter",
    "deviceid": "1000251115",
    "sequence": "1519399266803",
    "params": {
        "switch": "off"
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "app",
    "ts": 0
}
>> {
    "from": "hackepeter",
    "deviceid": "1000251115",
    "sequence": "1519399266805",
    "params": {
        "switch": "on"
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "app",
    "ts": 0
}
>> {
    "from": "hackepeter",
    "deviceid": "1000251115",
    "sequence": "1519399266807",
    "params": {
        "switch": "off"
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "app",
    "ts": 0
}
>> {
    "from": "hackepeter",
    "deviceid": "1000251115",
    "sequence": "1519399266809",
    "params": {
        "switch": "on"
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "app",
    "ts": 0
}
>> {
    "from": "hackepeter",
    "deviceid": "1000251115",
    "sequence": "1519399266810",
    "params": {
        "switch": "off"
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "update",
    "userAgent": "app",
    "ts": 0
}
>> {
    "deviceid": "1000251115",
    "sequence": "1519399266816",
    "params": {
        "version": "23.42.5",
        "model": "PSF-B04-GL",
        "binList": [
            {
                "downloadUrl": "http://192.168.1.10:8080/ota/image_user1-0x01000.bin",
                "digest": "e9b6b18c9905834ec39f88d2ee64362dcc676d13be308460e4a9877f6ddefb0e",
                "name": "user1.bin"
            },
            {
                "downloadUrl": "http://192.168.1.10:8080/ota/image_user2-0x81000.bin",
                "digest": "fb4753bea76a37d8ce83204593d5d91ade05250e70c34b92f82136ad2e946c31",
                "name": "user2.bin"
            }
        ]
    },
    "apikey": "3cd12ded-7146-4395-8480-17bb7b5f51db",
    "action": "upgrade",
    "userAgent": "app",
    "ts": 0
}
~~ websocket close
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=553475508&sign=5f6cf5cf2efcaaea0a93d48d8e3cfc1d8205da38de1dd8d1ef6a45340f9018f0 (192.168.1.11) 48.17ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1889772843&sign=11ec01bce491e0db7083a22d76825062f7c02c487face5675ad92a3c9df60ce9 (192.168.1.11) 3.02ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=686078705&sign=ebf78be8aa2fe85cd2534549e00498f3eeec3357ad2377b07b2437dde01b76c9 (192.168.1.11) 2.83ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2105754108&sign=9db1cd6497512031026b75f734f170d2f9b2b0c54c78e079e476a80f1287afab (192.168.1.11) 2.59ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=182546393&sign=a4b79fc96694ecaf43180ab5a92c2166f55860748658a57e4b5859beaa4b42f4 (192.168.1.11) 2.41ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1949118330&sign=1aff8af4a7ed2f0957c61fd4768b29c04891e0929abfbb9866d95fa19d161d5f (192.168.1.11) 2.78ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=220137366&sign=425103bcd2f52a2f5dc824d3c4956734edee26f1674521ce8bab73b3fc88a5fc (192.168.1.11) 2.99ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1979932169&sign=f98f0be76aa13031c1fe18f689564c51c8293cf2b5add959845facf464ec41d1 (192.168.1.11) 3.05ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1089957932&sign=5e76edc608b653cd7f8624578f6aff5bce79e3edf41efe2f516d64793150a8fe (192.168.1.11) 2.54ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1873226917&sign=ed8485c9c8feebd81276db65a609fa0343e8680f27c9a84ce1dd8c0e6160333b (192.168.1.11) 3.41ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=715669847&sign=14973c068577602e56f82808cd8e57bd6faaee84893247436e2589b0109ec3f6 (192.168.1.11) 2.39ms
.Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1486937972&sign=06d905e7bd0fd48765d7f4f36cdd4870615d6b000a952a068bbe412dba131338 (192.168.1.11) 2.94ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1196032868&sign=2b5465a57c86bfaafc080d1e0a545095975bf3b0a7c0ab4c413398497c8d2619 (192.168.1.11) 2.41ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=777206980&sign=3601b04bd4ab80670eac2bfcc95c35e60634f431f61ef6546c2f250071ecdcf0 (192.168.1.11) 2.93ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=68706223&sign=71c988cf9d4255b016742dc32dd387c3ae8a2ca5a39e7047a82292bf872e2cd1 (192.168.1.11) 2.42ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1843638549&sign=c9ac4a8631595a1efe330d66ccb7ed7c7ffbdc2fb9299667004367140fc4fae5 (192.168.1.11) 2.25ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=212567592&sign=ef0325acd4675be5b820fa085f8fadd8411b89a5ab2e04773412b86880c7c74a (192.168.1.11) 1.75ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1883488164&sign=4adb711a3834c2a3384b5561ccfe067fe36b6b203273924378a0f10d9dfec93e (192.168.1.11) 2.77ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=964776169&sign=76b87d3f59631413f48b9e5f8e0d8cf1a9582aaae86bd0d0cbf8a41856dc78cb (192.168.1.11) 1.74ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=928126551&sign=b06bd12e7e876a7c147370bf357716f48e020be0b6280142f647bdb600f66fda (192.168.1.11) 2.40ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1301950427&sign=7614a72ec83075dc199ae66d56a0ea8cf07e22140aeabc61359e7acfabf0253c (192.168.1.11) 2.34ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1992516190&sign=fe4a7e47917898f6601a0620cbd06db8394ab0e730c29cad077061832ff63b86 (192.168.1.11) 2.78ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1426542624&sign=36a7e9336ba03b9733252d38af79c76dfd23083fc85ac485ea410efd7b03851d (192.168.1.11) 2.98ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=849040635&sign=68cb2a4d3d5dadaa4e59c5f4a982615496a2b7e95e51e5da5c02d234fc1150b6 (192.168.1.11) 2.69ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=941604920&sign=07c4d59f1e0432374b91f0c3779c31dd6a685e991ba434e82f1f66c42aa3722e (192.168.1.11) 1.57ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1400427944&sign=0c28e1f03d3a9ee18837ba18e1599099d032c6c8ff3063d6904f44946af4f27f (192.168.1.11) 2.36ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1994719310&sign=d5a32eaa085e82be9352a58405024fc67bade978fbf3fcfc4f9784113951f3e1 (192.168.1.11) 2.57ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2038269862&sign=0080f69e2ec30eb5065aa29f299083cc7805b82001400f8740188698b0db5eda (192.168.1.11) 2.19ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=659998484&sign=fb9ca589e5aa8bf20c3b344200216a1a276376c19192d2dbe7bcfba8b3ac0908 (192.168.1.11) 1.46ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1280937363&sign=141294f7874320397876f79990532492db8a497adb16be14e16bdcb58d7fed17 (192.168.1.11) 2.17ms
.Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1681643301&sign=9e022bb111d12b449bae19d37e1c2816804e66518e7df8aa24cf3e4cfa5b5172 (192.168.1.11) 2.34ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=725914710&sign=0b7192901d3dfa993f8eab5bf74eaa88bd73aef5f6a31aa5566fc37b4e9870e7 (192.168.1.11) 2.74ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1729267236&sign=57e3814212fcc14888a78c9084cf970a95e1097b862426d4d8e214de4b4e6c4b (192.168.1.11) 2.24ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2023351876&sign=8fc525d5c341a141609770a722e0116db4f2b4d3a873fc0d747c7b17b00dcf26 (192.168.1.11) 1.72ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=142750431&sign=17bf4b6c1856cbb0c8f41d81c78e9f55fbd055196427d5674e50946b31696730 (192.168.1.11) 1.84ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1840579929&sign=ce9ed75cb28aa0de08b9b656a87048698e56a28cca2924b9740fcbb38c9f4f55 (192.168.1.11) 1.73ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2098560397&sign=9967d79ff0ffb59198c913500a772f62eb2a25b60abac10bf83eb8e143bf0735 (192.168.1.11) 1.71ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1910500675&sign=09b49792ac6de34e7aa97c4acf2de39731d85fbe8e4e364153615f7587fda540 (192.168.1.11) 2.71ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1170970491&sign=f1034788cb7188c2b92d9a2b584a2ce9bbd815cf7c5ea631a4f9e4cd665f75bd (192.168.1.11) 2.13ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1856224190&sign=bd150a9bbc41b5bbd9f39341229c125a55fd6c3c1a5d21600dfd957e00a5686e (192.168.1.11) 2.75ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=983059344&sign=838c3203e05e11ef03ae8cd1da46d10e649162efd422a2b018e68aa484e145ca (192.168.1.11) 2.64ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1718458134&sign=8a3b78564f85a7e36f371694eb50e8c8513bc99a23f407a630c6cdf9a375a93b (192.168.1.11) 2.69ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1876268425&sign=4c93f86bd6b57dbed394fc5e2860cb67cc1bff03bcf6a2e5b58e7c1bbd6c1801 (192.168.1.11) 2.93ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1764841629&sign=2c84932b771d21cc5edf1629c1d435ea1f8c6165b093cb5d87215c9f5d507280 (192.168.1.11) 2.77ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=398844030&sign=8f5627a09fb29cae3b1fc7669f4060ed53785acaf0037f9e9656b3995db8a880 (192.168.1.11) 2.49ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=185252727&sign=1be2ad1e578b130736aa67dbcc600d5862cc9a2db359ed26ee533fefb507c3df (192.168.1.11) 2.30ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1370429126&sign=a08c8fdf8c398077daaf977c60ff509376d3e9f81e302c9edd26d986e6c03ece (192.168.1.11) 2.77ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=502141743&sign=fc7b426ee3defa99227af7e6bc37943552384c7b0fa69744f91b0446747cfc9e (192.168.1.11) 2.35ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=993687334&sign=60c1b51d214df8e97c24613b41cfb7faa9d2c254dd96544b9539e1d76cdb9335 (192.168.1.11) 2.77ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=15934104&sign=1e4ef420c381e34a9ee0f76fdcdac6863e6fc78701c69c4d74d1fb2a4d44b83d (192.168.1.11) 2.80ms
.Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1363674760&sign=a21c28c36563957fa3f07a32bcd3d0779e1da9cae825320040bde00d891288c7 (192.168.1.11) 2.94ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=904629749&sign=db4cfbcb76cac9a74653a0704d7347074660660e810b259fcc89f136d298452f (192.168.1.11) 2.44ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2047965620&sign=2844c2a1af9ece6c3f9b981b8ab935d808ba0aea895a440a4ac5659efdca0e00 (192.168.1.11) 2.20ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=451230256&sign=b2972f0dbf2f0d6a792cc5e027018887fcc0c9c9b585cc420857d57d791043f8 (192.168.1.11) 1.76ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=2084670932&sign=d043efbcd45cab4d065a2baec7a7d3e316c6264d30e522c92c235aa166721c02 (192.168.1.11) 1.73ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=561035572&sign=e0e89dc4aae7dcbd7eeba36e351c9ab6851b8fb5d38495fa1765fc14e3903aaf (192.168.1.11) 2.22ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1840531613&sign=fb685e8f297a3f79dc2e211de84008af2d0bc2a48d059ca6450598965db8f9ed (192.168.1.11) 2.74ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1248402490&sign=667be6205355e750c4ed1b1e85280fd126d7dd6add95a080cc5cd12918a1006b (192.168.1.11) 2.46ms
Sending file: /ota/image_user2-0x81000.bin
206 GET /ota/image_user2-0x81000.bin?deviceid=1000251115&ts=1518954509&sign=88a47fe2c11c4b39b04e84d37eacde74ee51881460389be970ffabf9f7c818ec (192.168.1.11) 2.70ms
...Current IPs: ['192.168.1.10']
.Current IPs: ['192.168.1.10', '192.168.1.10']
................Current IPs: ['192.168.1.10']
...
*** IMPORTANT! ***
** AFTER the first download is COMPLETE, with in a minute or so you should connect to the new SSID "FinalStage" to finish the process.
** ONLY disconnect when the new "FinalStage" SSID is visible as an available WiFi network.
This server should automatically be allocated the IP address: 192.168.4.2.
If you have successfully connected to "FinalStage" and this is not the IP Address you were allocated, please ensure no other device has connected, and reboot your Sonoff.
.Current IPs: ['192.168.1.10', '192.168.1.10']
.............................
*** IMPORTANT! ***
** AFTER the first download is COMPLETE, with in a minute or so you should connect to the new SSID "FinalStage" to finish the process.
** ONLY disconnect when the new "FinalStage" SSID is visible as an available WiFi network.
This server should automatically be allocated the IP address: 192.168.4.2.
If you have successfully connected to "FinalStage" and this is not the IP Address you were allocated, please ensure no other device has connected, and reboot your Sonoff.
..............................


here's what the sonoff's did, they blinked a few times, then started blinking very fast till the light almost looked solid on. then off never to return... :frowning:

Just in case any of you would like to flash sonoff’s over the air, instead of connecting them… here you go!

5 Likes

I have an issue with the wireless flashing method and I’m hoping someone can explain why it’s not working as advertised:
Equipment: Sonoff 433RF Bridge R2 V1.0 2017.11.23
Laptop running Windows 10 - current patch level
Android phone

Method with comments:

  1. Download and install Python3
  2. Update Python3: ‘python3 -m pip install –upgrade pip’
  3. Download SonOtA: https://github.com/mirko/SonOTA - ensure that you download the zip file not just the sonota.py file
  4. Win10 install C++ tools – http://landinghub.visualstudio.com/visual-cpp-build-tools - this link is broken, I downloaded Visual Studio 2019 Community version from the Microsoft site
  5. Navigate to SonOtA directory and get all the requirements
    Run: ‘pip3 install –user -r requirements.txt’ - multiple runtime errors if you skip this step!
  6. Disable any firewalls and Windows Defender
  7. Press and hold the onboard button for around 6 seconds until the blue LED goes solid then flashes in a 3 flash, pause, 3 flash pattern - hold the button again for around 6 seconds and the LED will flash rapidly.
  8. Run SonOtA: ‘python.exe sonota.py’
  9. Choose the IP address for the computer you’re running Sonota.py on
  10. Input your Wifi name and password when asked
    Note: if you get the password wrong you will receive no warning
  11. Watch for iTead Wifi SSID and select it when it’s available password 12345678 – if it does not appear try setting the computer to use only 2.4GHz wireless
  12. Reconnect to your home wifi when the iTead SSID disappears.
  13. Select Final Stage Wifi SSID when it appears – This is where I go wrong, FinalStage does not appear - I used the Android phone with a WiFi scanner app to confirm this - I also hot-spotted the Android phone to ensure a good WiFi signal close to the bridge

The instructions carry on, I did not get this far:
14. Connect to ‘sonoff-###” Wifi SSID
15. Configure Tasmota with your Wifi name and PW
16. Reconnect to your home Wifi SSID
17. Find the IP address for your new sonoff from your router, or something like Fing
18. Finish configuring Tasmota

After several tries with the hotspot running, I got this:

Traceback (most recent call last): 
  File "sonota.py", line 736, in <module> 
    main() 
  File "sonota.py", line 731, in main 
    stage1() 
  File "sonota.py", line 613, in stage1 
    "http://10.10.7.1/ap", "POST", json.dumps(data)) 
  File "C:\Python\Python37\lib\site-packages\httplib2\__init__.py", line 1953, in request 
    cachekey, 
  File "C:\Python\Python37\lib\site-packages\httplib2\__init__.py", line 1618, in _request 
    conn, request_uri, method, body, headers 
  File "C:\Python\Python37\lib\site-packages\httplib2\__init__.py", line 1556, in _conn_request 
    response = conn.getresponse() 
  File "C:\Python\Python37\lib\http\client.py", line 1336, in getresponse 
    response.begin() 
  File "C:\Python\Python37\lib\http\client.py", line 306, in begin 
    version, status, reason = self._read_status() 
  File "C:\Python\Python37\lib\http\client.py", line 267, in _read_status 
    line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1") 
  File "C:\Python\Python37\lib\socket.py", line 589, in readinto 
    return self._sock.recv_into(b) 
socket.timeout: timed out 
 

I downloaded the eWeLink app and used it to pair the bridge - this worked right off so the bridge is okay.
Anyone able to assist with this?

IMHO the “newer” firmware editions did not allow the update over the air, that was already the case when I gone my Sonoff Basics nearly two years ago!

I flashed mine without soldering! Just holding the pins onto the board.

Thanks, trust the manufacturers to ruin a good thing!

I bought couple of sonoffs and just flashed without solder. I got the male pin cables and inserted in the respective header holes on sonoff and just laid the sonoff board on the pins from the side they were coming giving a good temporary contact due to lateral pressure of the weight of board itself. held the switch and plugged the usb to pc. then flashed without issues.

I did the same thing a week ago. I flashed four Sonoff TH16s without soldering and it was pretty easy. I thought there were more hoops going the OTA route
Here is all I used

  1. One CH340G adapter ( WINGONEER 3.3V / 5V USB to TTL converter CH340G UART Serial Adapter Module Golden):
  2. Jumper wires
  3. Tasmota software (tasmota.bin).
  4. I followed the instructions from here

As dadd said, I also did not solder anything. The jumper pins fit pretty tight into the “holes”.
Good luck

1 Like

Looks like the newer firmware of the sonoffs mean you can access them locally via local commands - I am not a programmer but anyone fancy trying to figure out how AlexxIT did it for Home Assisstant ?

2 Likes

Just flash tasmota and use MQTT much easier.

1 Like

Not really an answer for the general consumer which wants to jump on the smart home path.

@swampdogmash I’ll be taking a look a little further down the line (just started using my pow r2 I bought for testing) and A: I don’t use MQTT, B: don’t wanna have to mess about every time I buy a new device, just want to wire in, discover and away we go

I don’t think from what I’ve found the POW R2 works atm, although I have got LAN mode enabled in the eWeLink app so maybe it does. Haven’t got time to look right now but it’s on the horizon

All the info on how to make a openhab binding is publicly avalable and I have all the info needed to write one for the sonoff lan mode on my github except for the mdns. You can make it plug and play in a binding to make it easy for beginners if you like.

I have already written a binding for lightwaverf so it’s just the Mdns I need to look into. Not got time right this minute tho

2 Likes

Hi @delid4ve
I have a pow R2 as well for heavy loads.
Were you able to look into how to connect / integrate this with openhab? Right now I am doing a round about by exposing it via alexa binding as a smarthome device and controlling it from openhab. I would love to control it directly without internet from local lan via http/mqtt etc.
Any suggestions?

Thanks

I haven’t yet what with a new baby and Xmas around the corner.

I should hopefully get some time to have a look over the coming days.

It shouldn’t take me too long to create either looking at the api.

2 Likes