This commit includes: - SSL Manager implementation for certificate operations - Configuration file with UniFi device parameters - Test files for various components - Documentation for UniFi verification - Project guidelines
3.7 KiB
3.7 KiB
UniFi Connection Test Results
Summary
We attempted to verify the UniFi device connection parameters in config.json by creating a test script that uses the unifiControl Python library to connect to the UniFi device. The test was able to establish a connection to the device, but authentication failed with a 401 Unauthorized error.
Test Details
Connection Parameters Used
- Host: udm-se.mgeppert.com
- Port: 443
- Username: SSLCertificate
- Password: cYu2E1OWt0XseVf9j5ML
Test Process
- Installed the unifiControl Python library
- Created a test script that loads the UniFi connection parameters from config.json
- Configured the test to disable SSL certificate verification
- Attempted to connect to the UniFi device and authenticate
- Received a 401 Unauthorized response from the server
HTTP Request/Response Details
POST /api/login HTTP/1.1
Host: udm-se.mgeppert.com
User-Agent: python-requests/2.32.4
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Length: 66
Content-Type: application/json
{"username": "SSLCertificate", "password": "cYu2E1OWt0XseVf9j5ML"}
HTTP/1.1 401 Unauthorized
Server: nginx
Date: Mon, 21 Jul 2025 01:28:25 GMT
Content-Type: application/json
Content-Length: 47
Connection: keep-alive
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=15552000; includeSubDomains
X-Content-Type-Options: nosniff
X-DNS-Prefetch-Control: off
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Robots-Tag: noindex
Set-Cookie: TOKEN=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT; samesite=none; secure; httponly; partitioned
Set-Cookie: TOKEN=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT; samesite=none; secure; httponly
Findings
- The UniFi device at udm-se.mgeppert.com is reachable and responding to HTTPS requests on port 443
- The SSL certificate verification was successfully disabled in our test
- The authentication attempt with the provided credentials failed with a 401 Unauthorized error
- The server is running nginx and appears to be a UniFi device based on the API endpoint (/api/login)
Possible Issues
- Incorrect Credentials: The username or password in config.json may be incorrect
- Account Locked or Disabled: The account "SSLCertificate" may be locked or disabled on the UniFi device
- Different Authentication Method: The UniFi device may require a different authentication method or endpoint
- API Version Mismatch: The unifiControl library may be using an API version that's incompatible with the device
Recommendations
- Verify Credentials: Double-check the username and password in config.json
- Check Account Status: Log in to the UniFi device's web interface and verify that the "SSLCertificate" account exists and is enabled
- Try Different Authentication Method: The UniFi device may require a different authentication method or endpoint. Check the device's documentation for the correct API endpoints
- Check API Version Compatibility: Verify that the unifiControl library is compatible with the UniFi device's firmware version
- Try Manual Authentication: Use a tool like curl or Postman to manually attempt authentication with the UniFi device to verify the correct API endpoints and authentication method
- Check Logs: Check the UniFi device's logs for any authentication failure messages that might provide more information
Next Steps
- Update the credentials in config.json if they are incorrect
- If the credentials are correct, check the UniFi device's configuration and logs for more information
- Consider using a different authentication method or API library if the unifiControl library is incompatible with the device