RF support in RMIR
Posted: Mon Mar 02, 2020 12:47 pm
There have been UEI remotes with RF (Radio Frequency) as well as IR capability for a long time, but this used to be through a dedicated RF module that was invisible as far as JP1 was concerned. I have recently become aware that newer UEI remotes with RF capability use RF4CE (RF for Consumer Electronics), a standard developed by the ZigBee Alliance. These are remotes in which the E2 (EEPROM) data area has a segment structure and the RF4CE configuration data is held in this area in segments of previously unseen type.
I am indebted to Chris (ckeays) for providing me with a URC2125BC0 from Rogers Telecom in Canada. This is the first, and so far the only, UEI remote of which I am aware that has both RF support and a JP1 connector, which in this case is the external 5-hole connector rather than the more common 6-pin one in the battery compartment. If anyone knows of other remotes with both RF support and JP1 access, I would be very grateful. There are, however, other UEI remotes that use RF4CE but do not have a JP1 connector. Since Chris provided me with the URC2125BC0, our UK cable company Virgin Media has updated my cable box and this comes with a UEI remote with RF support that I now know to be RF4CE.
RF4CE signals can be read with a suitable packet sniffer. One such packet sniffer is the CC2531EMK from Texas Instruments, though I obtained mine from the UK supplier Farnell at this link. They can be found much more cheaply from Chinese sources by doing a web search, but with long delivery times. I have a Chinese one on order too, but expected delivery is not till April. The TI description mentions it can be used as an IEEE 802.15.4 packet sniffer or for other purposes and it speaks of programming it, but it comes configured as a packet sniffer so no programming is required. It is used together with the TI Packet Sniffer software - NOT Packet Sniffer 2, which is at the same link but which does not support the CC2531EMK dongle. It is unclear which Windows versions the Packet Sniffer software will run on. At that link it says Windows 98 through Windows 7 (32 and 64 bit) but the User's Manual in the download package says Windows XP through Windows 8, despite being dated June 2014 which is the same date as that on the TI site. I have played safe and use it with 32-bit Windows XP in an Oracle VirtualBox, but I suppose it is possible it may run on Windows 10 and this is not mentioned as the documentation precedes the issue of Windows 10.
The sniffer captures the RF signals from the remote, and also from the cable box if used during a pairing exchange, and analyzes them according to the RF4CE standard. Unfortunately that does not allow you to see what data the remote is sending to the cable box when you press a key, as the data is encrypted. The encryption algorithm uses data exchanged between the remote and cable box during pairing, and as the sniffer software treats each signal separately it does not have the data needed for decryption. For this reason I am developing RF Tools as a new feature that will appear in RMIR v2.10. This is intended to be an RF equivalent of IRScope for IR signals. The sniffer can save a sniffing session as a .psd (Packet Sniffer Data) file and RF Tools can read this file. You first register the RF Remote with RF Tools, after which it will decrypt the signals from the remote. Registration can be performed in two ways. If the remote has JP1 access and is already paired with a cable box (or other device) then you download it to RMIR and select a new menu item Register as RF Remote. That makes a provisional registration which is completed by loading a .psd file that captures a pairing request from the remote. This method does not require the presence of the paired device as it does not use the response from that device. For remotes without JP1 access you need to capture the pairing exchange between the remote and device. Loading this as a .psd file completes the registration in a single step. I will include sample files in the RMIR v2.10 distribution so that those without such a remote or packet sniffer can see what it can do.
What the .psd file contains is the raw data received by the sniffer, in the form of the MPDU (MAC-layer protocol data unit) of each signal. The MAC layer of RF4CE conforms to IEEE 802.15.4, which is a standard for wireless Personal Area Networks (PANs) and is distinct from the IEEE 802.11 standards for wireless Local Area Networks (LANs). In RF4CE, each device (cable box, and so on) runs its own PAN and a remote joins that PAN when it pairs with the device. RF Tools performs the RF4CE analysis and decryption of the MPDU, so it could easily be extended to any other packet snffer from which the MPDU can be extracted. The IEEE 802.15.4 MAC layer is also used by the main ZigBee standard which is designed for the Internet of Things, so I am sure there are other sniffers around that will capture these packets in raw form even if they do not support RF4CE itself. I would be very interested to hear of any that users may be aware of.
I am indebted to Chris (ckeays) for providing me with a URC2125BC0 from Rogers Telecom in Canada. This is the first, and so far the only, UEI remote of which I am aware that has both RF support and a JP1 connector, which in this case is the external 5-hole connector rather than the more common 6-pin one in the battery compartment. If anyone knows of other remotes with both RF support and JP1 access, I would be very grateful. There are, however, other UEI remotes that use RF4CE but do not have a JP1 connector. Since Chris provided me with the URC2125BC0, our UK cable company Virgin Media has updated my cable box and this comes with a UEI remote with RF support that I now know to be RF4CE.
RF4CE signals can be read with a suitable packet sniffer. One such packet sniffer is the CC2531EMK from Texas Instruments, though I obtained mine from the UK supplier Farnell at this link. They can be found much more cheaply from Chinese sources by doing a web search, but with long delivery times. I have a Chinese one on order too, but expected delivery is not till April. The TI description mentions it can be used as an IEEE 802.15.4 packet sniffer or for other purposes and it speaks of programming it, but it comes configured as a packet sniffer so no programming is required. It is used together with the TI Packet Sniffer software - NOT Packet Sniffer 2, which is at the same link but which does not support the CC2531EMK dongle. It is unclear which Windows versions the Packet Sniffer software will run on. At that link it says Windows 98 through Windows 7 (32 and 64 bit) but the User's Manual in the download package says Windows XP through Windows 8, despite being dated June 2014 which is the same date as that on the TI site. I have played safe and use it with 32-bit Windows XP in an Oracle VirtualBox, but I suppose it is possible it may run on Windows 10 and this is not mentioned as the documentation precedes the issue of Windows 10.
The sniffer captures the RF signals from the remote, and also from the cable box if used during a pairing exchange, and analyzes them according to the RF4CE standard. Unfortunately that does not allow you to see what data the remote is sending to the cable box when you press a key, as the data is encrypted. The encryption algorithm uses data exchanged between the remote and cable box during pairing, and as the sniffer software treats each signal separately it does not have the data needed for decryption. For this reason I am developing RF Tools as a new feature that will appear in RMIR v2.10. This is intended to be an RF equivalent of IRScope for IR signals. The sniffer can save a sniffing session as a .psd (Packet Sniffer Data) file and RF Tools can read this file. You first register the RF Remote with RF Tools, after which it will decrypt the signals from the remote. Registration can be performed in two ways. If the remote has JP1 access and is already paired with a cable box (or other device) then you download it to RMIR and select a new menu item Register as RF Remote. That makes a provisional registration which is completed by loading a .psd file that captures a pairing request from the remote. This method does not require the presence of the paired device as it does not use the response from that device. For remotes without JP1 access you need to capture the pairing exchange between the remote and device. Loading this as a .psd file completes the registration in a single step. I will include sample files in the RMIR v2.10 distribution so that those without such a remote or packet sniffer can see what it can do.
What the .psd file contains is the raw data received by the sniffer, in the form of the MPDU (MAC-layer protocol data unit) of each signal. The MAC layer of RF4CE conforms to IEEE 802.15.4, which is a standard for wireless Personal Area Networks (PANs) and is distinct from the IEEE 802.11 standards for wireless Local Area Networks (LANs). In RF4CE, each device (cable box, and so on) runs its own PAN and a remote joins that PAN when it pairs with the device. RF Tools performs the RF4CE analysis and decryption of the MPDU, so it could easily be extended to any other packet snffer from which the MPDU can be extracted. The IEEE 802.15.4 MAC layer is also used by the main ZigBee standard which is designed for the Internet of Things, so I am sure there are other sniffers around that will capture these packets in raw form even if they do not support RF4CE itself. I would be very interested to hear of any that users may be aware of.