The work from this repository has been continued here: https://github.com/Jutta-Proto/protocol-cpp
This project aims to control newer JURA coffee maker models with an ESP32 and a new XMPP-IoT extension as reference implementation. Therefore we need to understand how the protocol for controlling JURA coffee makers works.
This work is based on the excellent work done by the people over at Protocol JURA. They were able to figure out the basic protocol used for communication with older JURA coffee makers.
Since newer models do not use this old V1Protocol any more I started this project to understand the new one.
There are several steps of obfuscation being done by the JURA coffee maker to prevent others from reading the bare protocol.
To connect to an JURA coffee maker we are using a 5V UART signal with the following configuration:
- Baud Rate: 9600
- Data Bits: 8
- Parity: Disabled
- Stop Bits: 1
- Flow Control: Hardware flow control disabled
- RX Flow Control Threshold: 0
Once a connection has been established we can start sending and receiving data.
But all data send and received is obfuscated.
The following description shows how to deobfuscate data received from the coffee maker.
To obfuscate data just follow the steps in reverse.
Step 0 The coffee maker always sends 4 "raw" byte per one byte of data with a break of 8ms in between each "raw" byte. This looks something like this:
01011011 <8ms break> 01011111 <8ms break> 01011111 <8ms break> 01011111 <8ms break>
01011111 <8ms break> 01111011 <8ms break> 01011111 <8ms break> 01011111 <8ms break>
01111011 <8ms break> 01111011 <8ms break> 01111111 <8ms break> 01011011 <8ms break>
01011111 <8ms break> 01111111 <8ms break> 01011011 <8ms break> 01011011 <8ms break>
01111011 <8ms break> 01111011 <8ms break> 01011011 <8ms break> 01011011 <8ms break>
Each line corresponds to one actual data byte.
Step 1
Each of our 4 "raw" bytes (each line) contains only 2 bits of our resulting data bit.
Bit 2 and 5.
All other bits (except 0) are set to 1.
0b01011011
^ ^
DB1 DB2
DB1
and DB2
are our actual data bits here.
We have to combine alle 8 (of our 4 "raw" bytes) into a single data byte.
Examples:
const std::array<uint8_t, 4> encData{0b01011011, 0b01011111, 0b01011111, 0b01011111};
// Bit mask for the 2. bit from the left:
constexpr uint8_t B2_MASK = (0b10000000 >> 2);
// Bit mask for the 5. bit from the left:
constexpr uint8_t B5_MASK = (0b10000000 >> 5);
uint8_t decData = 0;
decData |= (encData[0] & B2_MASK) << 2;
decData |= (encData[0] & B5_MASK) << 4;
decData |= (encData[1] & B2_MASK);
decData |= (encData[1] & B5_MASK) << 2;
decData |= (encData[2] & B2_MASK) >> 2;
decData |= (encData[2] & B5_MASK);
decData |= (encData[3] & B2_MASK) >> 4;
decData |= (encData[3] & B5_MASK) >> 2; // 0b00010101
Input -> Output
0 0 0 1 0 1 0 1 -> 0 1 0 1 0 0 0 1
0 1 1 0 0 1 0 1 -> 0 1 0 1 0 1 1 0
1 0 1 0 1 1 0 0 -> 1 1 0 0 1 0 1 0
0 1 1 1 0 0 0 0 -> 0 0 0 0 0 1 1 1
1 0 1 0 0 0 0 0 -> 0 0 0 0 1 0 1 0
Step 2
In this step we switch both nibbles (4 bit) of each byte.
Examples:
1100 1100 -> 0011 0011
uint8_t in = 0b00010101;
uint8_t out = ((in & 0xF0) >> 4) | ((in & 0x0F) << 4); // 0b01010001
Input -> Output
01011011 <8ms break> 01011111 <8ms break> 01011111 <8ms break> 01011111 <8ms break> -> 0 1 0 1 0 0 0 1
01011111 <8ms break> 01111011 <8ms break> 01011111 <8ms break> 01011111 <8ms break> -> 0 1 0 1 0 1 1 0
01111011 <8ms break> 01111011 <8ms break> 01111111 <8ms break> 01011011 <8ms break> -> 1 1 0 0 1 0 1 0
01011111 <8ms break> 01111111 <8ms break> 01011011 <8ms break> 01011011 <8ms break> -> 0 0 0 0 0 1 1 1
01111011 <8ms break> 01111011 <8ms break> 01011011 <8ms break> 01011011 <8ms break> -> 0 0 0 0 1 0 1 0
Step 3
A last time we have to shift all bits in our byte around.
Here we have to split up our byte into two nibbles (4 bit) and switch two bits each.
Examples:
1100 1100 -> 0011 0011
uint8_t in = 0b01010001;
uint8_t out = ((in & 0xC0) >> 2) | ((in & 0x30) << 2) | ((in & 0x0C) >> 2) | ((in & 0x03) << 2); // 0b01010100
Input -> Output -> Output_Hex Output_Dec Output_Char
0 1 0 1 0 0 0 1 -> 0 1 0 1 0 1 0 0 -> 54 84 T
0 1 0 1 0 1 1 0 -> 0 1 0 1 1 0 0 1 -> 59 89 Y
1 1 0 0 1 0 1 0 -> 0 0 1 1 1 0 1 0 -> 3A 58 :
0 0 0 0 0 1 1 1 -> 0 0 0 0 1 1 0 1 -> 0d 13 '\r'
0 0 0 0 1 0 1 0 -> 0 0 0 0 1 0 1 0 -> 0a 10 '\n'
Which results in the message TY:\r\n
.
Every message/command send from or to the coffee maker has to end with \r\n
to be valid.
For simplicity reasons we omit the \r\n
from all of the following messages and examples.
In general for every valid command a response will be send from the coffee maker.
The actual command is always uppercase (e.g. TY:
) and the response send back is lowercase (ty:EF532M V02.03
).
The following list of commands has been tested on an Jura E6 2019 platin (15326)
.
Name | Command | Response | Description |
---|---|---|---|
UNKNOWN | AN:01 |
ok: |
- |
Turn off | AN:02 |
ok: |
Turns off the coffee maker. |
Erase EPROM | AN:0A |
UNKNOWN | Untested! Erases the EPROM. Do not use. |
Test UCHI | AN:0C |
ok: |
Test the UCHI steam plate. |
Test Mode on | AN:20 |
ok: |
Turns on the test mode. |
Test Mode off | AN:21 |
ok: |
Turns off the test mode. |
UNKNOWN | AN:40 |
an:40 |
- |
UNKNOWN | AN:AA |
ok: |
- |
Get Type of Machine | TY: |
ty: (e.g. ty:EF532M V02.03 ) |
Returns the type of the machine. |
UNKNOWN | FA:01 |
ok: |
- |
(Button 1) | FA:04 |
ok: |
Simulates the button 1 press (left top). |
(Button 2) | FA:05 |
ok: |
Simulates the button 2 press (left center). |
(Button 3) | FA:06 |
ok: |
Simulates the button 3 press (left bottom). |
(Button 4) | FA:07 |
ok: |
Simulates the button 4 press (right top). |
(Button 5) | FA:08 |
ok: |
Simulates the button 5 press (right center). |
(Button 6) | FA:09 |
ok: |
Simulates the button 6 press (right bottom). |
Coffee Pump on | FN:01 |
ok: |
Turns on the coffee pump. |
Coffee Pump off | FN:02 |
ok: |
Turns off the coffee pump. |
Coffee Heater on | FN:03 |
ok: |
Turns on the coffee heater. |
Coffee Heater off | FN:04 |
ok: |
Turns off the coffee heater. |
Grinder on | FN:07 |
ok: |
Turns on the coffee grinder. |
Grinder off | FN:08 |
ok: |
Turns off the coffee grinder. |
Brew Group Something on | FN:09 |
ok: |
Turns something in relation to the brew group on. |
Brew Group Something off | FN:0A |
ok: |
Turns something in relation to the brew group off. |
Coffee press on | FN:0B |
ok: |
Turns on the coffee press. |
Coffee press off | FN:0C |
ok: |
Turns off the coffee press. |
Init Brew Group | FN:0D |
ok: |
Initializes the brew group. |
Brew Group to open Postion | FN:0E |
ok: |
Moves the brew group into the "open" position. |
Brew Group to grinding Postion | FN:0F |
ok: |
Moves the brew group into the grinding position. |
Brew Group to unknown Postion XYZ | FN:13 |
ok: |
Moves the brew group into an currently unknown position. |
Brew Group to unknown Postion XYZ | FN:1B |
ok: |
Moves the brew group into an currently unknown position. |
Brew Group to throw out position?! Postion XYZ | FN:1C |
ok: |
Moves the brew group into the throw out position. |
Brew Group to brewing Position | FN:22 |
ok: |
Moves the brew group into the brewing position. |
UNKNOWN | FN:24 |
ok: |
- |
UNKNOWN | FN:25 |
ok: |
- |
UNKNOWN | FN:26 |
ok: |
- |
UNKNOWN | FN:27 |
ok: |
- |
UNKNOWN | FN:44 |
ok: |
- |
UNKNOWN | FN:45 |
ok: |
- |
UNKNOWN | FN:50 |
ok: |
- |
Turn off | FN:51 |
ok: |
Turns off the coffee maker. |
UNKNOWN | FN:54 |
ok: |
- |
UNKNOWN | FN:55 |
ok: |
- |
UNKNOWN | FN:60 |
ok: |
- |
UNKNOWN | FN:61 |
ok: |
- |
UNKNOWN | FN:62 |
ok: |
- |
UNKNOWN | FN:63 |
ok: |
- |
UNKNOWN | FN:64 |
ok: |
- |
UNKNOWN | FN:65 |
ok: |
- |
UNKNOWN | FN:66 |
ok: |
- |
UNKNOWN | FN:67 |
ok: |
- |
UNKNOWN | FN:70 |
ok: |
- |
UNKNOWN | FN:71 |
ok: |
- |
UNKNOWN | FN:72 |
ok: |
- |
UNKNOWN | FN:73 |
ok: |
- |
UNKNOWN | FN:80 |
ok: |
- |
UNKNOWN | FN:81 |
ok: |
- |
UNKNOWN | FN:88 |
ok: |
- |
UNKNOWN | FN:89 |
ok: |
- |
Debug mode on | FN:8A |
ku: , Ku: pause ku: , Ku: , ... |
Enables the debug mode. Sends continuously ku: , Ku: , ... Once an action like opening the hot water valve accrues, outputs information like percentage done. To disable it again disconnect the coffee maker from power. |
UNKNOWN | FN:90 |
ok: |
- |
UNKNOWN | FN:99 |
ok: |
- |
FN:07
# Grind on- Sleep 3 seconds # Determines how strong the coffee will be
FN:08
# Grind offFN:22
# Brew group to brewing positionFN:0B
# Coffee press on- Sleep 0.5 seconds # Compress the coffee
FN:0C
# Coffee press offFN:03
# Turn on the coffee water heaterFN:01
# Coffee water pump on- Sleep 2 seconds # Initial amount of water
FN:02
# Coffee water pump offFN:04
# Turn off the coffee water heater- Sleep 2 seconds # Allow the water to run everywhere
FN:03
# Turn on the coffee water heaterFN:01
# Coffee water pump on- Sleep 40 seconds # 40 seconds of water result in 200 ml of coffee
FN:02
# Coffee water pump offFN:04
# Turn off the coffee water heaterFN:0D
# Reset the brew group and throw out the old coffee grain
This project builds on top the excellent Espressif IoT Development Framework. Follow this installation guide and install version 4.0.1 of the framework on your computer.
# Clone the repository:
git clone https://github.com/COM8/esp32-jura.git
# Switch into the newly cloned repository:
cd esp32-jura
# Initialize the repository.
# This call will download further repositories and moves them to their appropriate place.
./init.sh
To be able to build the project you have to create the following file: ``
Paste the following content in this newly created file:
#pragma once
#include <string>
//---------------------------------------------------------------------------
namespace esp32jura {
//---------------------------------------------------------------------------
/**
* This file contains credentials for debugging the XMPP and WIFI connection,
* without having to go through the usual setup procedure.
* To apply these settings uncomment the "initWithDummyValues()" call in the "Esp32Jura.cpp" file.
*
* !!NEVER COMMIT THIS FILE!!
**/
const std::string SSID = "Your WIFI SSID";
const std::string PASSWORD = "Your WIFI Password";
const std::string JID = "JID of this device";
const std::string JID_PASSWORD = "Password for the JID of this device";
const std::string JID_SENDER = "The owner JID of this device";
//---------------------------------------------------------------------------
} // namespace esp32jura
//---------------------------------------------------------------------------
This file contains debug and testing credentials for deploying the application on an esp32 without having to go through the usual setup procedure.
You can build the project with the following command:
cd esp32
idf.py build
To flash the application on an ESP32 run the following commands:
cd esp32
idf.py -p /dev/ttyUSB0 flash
Replace /dev/ttyUSB0
with the port, where you plugged your ESP32 in to.
It might be required, that you add your current user to the dialout
group.
For this run the following command and reboot your pc afterwards.
sudo adduser "$USER" dialout
.
├── esp32 # ESP IDF project
│ ├── ...
│ ├── CMakeLists.txt # Root CMake file
│ └── main # Source Code
│ ├── ...
│ ├── Esp32Jura.cpp # Main entry point
│ └── CMakeLists.txt
├── ...
├── init.sh # Initializes the project
├── LICENSE
├── protocol # Snoops of the JURA communication with a Smart Connect [1]
│ └── ...
└── README.md
[1]
: https://uk.jura.com/en/homeproducts/accessories/SmartConnect-Main-72167