[GH-ISSUE #925] [Bug]: Bambuddy stops being able to connect to X1C's Camera after a couple hours. #638

Closed
opened 2026-05-06 12:31:33 +02:00 by BreizhHardware · 7 comments

Originally created by @lightmaster on GitHub (Apr 9, 2026).
Original GitHub issue: https://github.com/maziggy/bambuddy/issues/925

Originally assigned to: @maziggy on GitHub.

Bug Description

After a day or so of both the printer and Bambuddy being online, Bambuddy loses the ability to connect to the X1C's camera. It will go through connection attempts 6 out of 5 attempts (possible bug/bad numbering there too?) then give up trying. If I reboot the printer, Bambuddy will then be able to reconnect to the printer. This also prevents Bambuddy from being able to take a snapshot at the end of the print.

When Bambuddy is unable to connect to the printer's camera, OrcaSlicer is still able to connect without any issue.

Expected Behavior

Bambuddy should be able to connect to the camera at any point, regardless of how long the printer's been online. At the very least, it should be able to connect to the camera if another piece of software is able to connect to the camera.

Steps to Reproduce

  1. Turn on both printer and bambuddy and wait a day or so (not sure exactly how long)
  2. Press the camera button on the Printers tab
  3. Notice that Bambuddy fails to connect to the camera and eventually gives up trying.

Printer Model

X1 Carbon

Bambuddy Version

dev pulled April 8th

Printer Firmware Version

99.00.00.00

Installation Method

Manual (git clone)

Operating System

Linux (Ubuntu/Debian)

Relevant Logs / Support Package

bambuddy-support-20260409-040946.zip

Screenshots

No response

Additional Context

While the debug logs were being collected, I attempted to connect to the camera, waited for it to stop trying, then rebooted just the printer over SSH. Once the printer showed as online again in Bambuddy, I clicked the camera icon and it showed up almost right away.

Checklist

  • I have searched existing issues to ensure this bug hasn't already been reported
  • I am using the latest version of Bambuddy
  • My printer is set to LAN Only mode
  • My printer has Developer Mode enabled
Originally created by @lightmaster on GitHub (Apr 9, 2026). Original GitHub issue: https://github.com/maziggy/bambuddy/issues/925 Originally assigned to: @maziggy on GitHub. ### Bug Description After a day or so of both the printer and Bambuddy being online, Bambuddy loses the ability to connect to the X1C's camera. It will go through connection attempts 6 out of 5 attempts (possible bug/bad numbering there too?) then give up trying. If I reboot the printer, Bambuddy will then be able to reconnect to the printer. This also prevents Bambuddy from being able to take a snapshot at the end of the print. When Bambuddy is unable to connect to the printer's camera, OrcaSlicer is still able to connect without any issue. ### Expected Behavior Bambuddy should be able to connect to the camera at any point, regardless of how long the printer's been online. At the very least, it should be able to connect to the camera if another piece of software is able to connect to the camera. ### Steps to Reproduce 1. Turn on both printer and bambuddy and wait a day or so (not sure exactly how long) 2. Press the camera button on the Printers tab 3. Notice that Bambuddy fails to connect to the camera and eventually gives up trying. ### Printer Model X1 Carbon ### Bambuddy Version dev pulled April 8th ### Printer Firmware Version 99.00.00.00 ### Installation Method Manual (git clone) ### Operating System Linux (Ubuntu/Debian) ### Relevant Logs / Support Package [bambuddy-support-20260409-040946.zip](https://github.com/user-attachments/files/26596736/bambuddy-support-20260409-040946.zip) ### Screenshots _No response_ ### Additional Context While the debug logs were being collected, I attempted to connect to the camera, waited for it to stop trying, then rebooted just the printer over SSH. Once the printer showed as online again in Bambuddy, I clicked the camera icon and it showed up almost right away. ### Checklist - [x] I have searched existing issues to ensure this bug hasn't already been reported - [x] I am using the latest version of Bambuddy - [x] My printer is set to LAN Only mode - [x] My printer has Developer Mode enabled
BreizhHardware 2026-05-06 12:31:33 +02:00
  • closed this issue
  • added the
    bug
    label
Author
Owner

@maziggy commented on GitHub (Apr 9, 2026):

I've traced through the logs and I want to share what I found plus ask for one more round of diagnostics before I'm confident about the root cause.

What the logs show

Looking at bambuddy.log around the failure at 04:08:38–04:08:53:

  1. First failure (04:08:38.662) — ffmpeg connected to the camera port fine, but got Invalid data found when processing input. So the TCP handshake succeeded, the TLS layer came up, but the RTSP payload from the printer was garbage. The camera service was still alive but responding incorrectly.
  2. ~6 seconds later (04:08:44.060), the picture changes: the port starts returning Connection refused (errno 111 — kernel-level RST, nothing is listening or a firewall is injecting resets). Every retry after that hits the same refusal.
  3. Rebooting the printer restores it.

About the "6 of 5" counter

Good catch — that's a real off-by-one bug in CameraPage.tsx. When the 5th retry fires, the state briefly shows reconnectAttempts=5 before the bail-out check runs, so the banner displays "6 of 5" for a moment. I'll fix that separately from this issue.

Bambuddy-side issues I'm going to fix regardless

Even if the root cause turns out to be the printer, the logs surfaced two things that make the experience much worse than it needs to be:

  • Backend retries too aggressively. When the TCP connect itself fails, bambuddy spams 30 reconnect attempts in ~10 seconds (0.2s delay × immediate failures). If the printer is in a half-stuck state, this actively stops it from recovering. I'm going to add exponential backoff for the "can't connect at all" case.
  • Frontend gives up too fast. 5 attempts with a ~60s total budget before you have to manually click retry. I'll look at raising that or adding a "keep trying" mode.
  • ffmpeg banner spam. Every retry dumps ~30 lines of ffmpeg configuration flags into the log. I'll trim stderr output to the last few meaningful lines.

What I'd like to confirm before blaming the printer

The logs are consistent with a printer-side failure, but I can't fully rule out:

  • A stateful router/firewall between bambuddy and the printer that drops the conntrack entry and starts RST-ing
  • Our own retry storm tripping a defensive rate-limit on the printer
  • A resource leak on the printer (file descriptors, TLS sessions) triggered by something specific to bambuddy's connection pattern

Next time you hit the failure state, before rebooting the printer, could you run these? They take about 30 seconds:

  1. From the bambuddy host — does it see the camera port as refused?
    nc -zv <printer_ip> 322

  2. From a DIFFERENT machine on the same LAN (laptop, phone via termux, another Pi…)
    nc -zv <printer_ip> 322
    Refused from both → printer-side, firmware/resource issue (case closed)
    Refused from bambuddy only → something path- or host-specific

  3. Is MQTT still alive on the printer?
    nc -zv <printer_ip> 8883
    Still open → only the camera subsystem is dead — strong firmware/resource signal
    Also closed → whole network stack is degraded

  4. Does OrcaSlicer work at that exact moment (not just "in general")?
    Open it, connect to the same printer, try to view the camera.

  5. (Optional, most informative) Run this on the bambuddy host
    while clicking the camera button in the UI:
    sudo tcpdump -ni any host <printer_ip> and port 322
    SYN → RST (instant) = port actively refused
    SYN → (silence) = stealth-dropped
    SYN → SYN/ACK → TLS error = daemon half-alive

If 2) also fails from another host and #3 MQTT is still up, that's strong evidence the camera daemon on the printer crashed and we can't fix it in software — only mitigate with better retry/backoff and surface a clearer error. If #4 succeeds while bambuddy is refused at the same moment, then the path between bambuddy and the printer is the suspect, not the printer firmware, and I have more work to do.

<!-- gh-comment-id:4212986011 --> @maziggy commented on GitHub (Apr 9, 2026): I've traced through the logs and I want to share what I found plus ask for one more round of diagnostics before I'm confident about the root cause. What the logs show Looking at bambuddy.log around the failure at 04:08:38–04:08:53: 1. First failure (04:08:38.662) — ffmpeg connected to the camera port fine, but got Invalid data found when processing input. So the TCP handshake succeeded, the TLS layer came up, but the RTSP payload from the printer was garbage. The camera service was still alive but responding incorrectly. 2. ~6 seconds later (04:08:44.060), the picture changes: the port starts returning Connection refused (errno 111 — kernel-level RST, nothing is listening or a firewall is injecting resets). Every retry after that hits the same refusal. 3. Rebooting the printer restores it. About the "6 of 5" counter Good catch — that's a real off-by-one bug in CameraPage.tsx. When the 5th retry fires, the state briefly shows reconnectAttempts=5 before the bail-out check runs, so the banner displays "6 of 5" for a moment. I'll fix that separately from this issue. Bambuddy-side issues I'm going to fix regardless Even if the root cause turns out to be the printer, the logs surfaced two things that make the experience much worse than it needs to be: - Backend retries too aggressively. When the TCP connect itself fails, bambuddy spams 30 reconnect attempts in ~10 seconds (0.2s delay × immediate failures). If the printer is in a half-stuck state, this actively stops it from recovering. I'm going to add exponential backoff for the "can't connect at all" case. - Frontend gives up too fast. 5 attempts with a ~60s total budget before you have to manually click retry. I'll look at raising that or adding a "keep trying" mode. - ffmpeg banner spam. Every retry dumps ~30 lines of ffmpeg configuration flags into the log. I'll trim stderr output to the last few meaningful lines. What I'd like to confirm before blaming the printer The logs are consistent with a printer-side failure, but I can't fully rule out: - A stateful router/firewall between bambuddy and the printer that drops the conntrack entry and starts RST-ing - Our own retry storm tripping a defensive rate-limit on the printer - A resource leak on the printer (file descriptors, TLS sessions) triggered by something specific to bambuddy's connection pattern Next time you hit the failure state, before rebooting the printer, could you run these? They take about 30 seconds: 1. From the bambuddy host — does it see the camera port as refused? **nc -zv <printer_ip> 322** 2. From a DIFFERENT machine on the same LAN (laptop, phone via termux, another Pi…) **nc -zv <printer_ip> 322** Refused from both → printer-side, firmware/resource issue (case closed) Refused from bambuddy only → something path- or host-specific 3. Is MQTT still alive on the printer? **nc -zv <printer_ip> 8883** Still open → only the camera subsystem is dead — strong firmware/resource signal Also closed → whole network stack is degraded 4. Does OrcaSlicer work *at that exact moment* (not just "in general")? Open it, connect to the same printer, try to view the camera. 5. (Optional, most informative) Run this on the bambuddy host while clicking the camera button in the UI: **sudo tcpdump -ni any host <printer_ip> and port 322** SYN → RST (instant) = port actively refused SYN → (silence) = stealth-dropped SYN → SYN/ACK → TLS error = daemon half-alive If 2) also fails from another host and #3 MQTT is still up, that's strong evidence the camera daemon on the printer crashed and we can't fix it in software — only mitigate with better retry/backoff and surface a clearer error. If #4 succeeds while bambuddy is refused at the same moment, then the path between bambuddy and the printer is the suspect, not the printer firmware, and I have more work to do.
Author
Owner

@lightmaster commented on GitHub (Apr 9, 2026):

Will do.

<!-- gh-comment-id:4213110803 --> @lightmaster commented on GitHub (Apr 9, 2026): Will do.
Author
Owner

@lightmaster commented on GitHub (Apr 9, 2026):

Just a follow up, camera still working as of right now.

<!-- gh-comment-id:4217815371 --> @lightmaster commented on GitHub (Apr 9, 2026): Just a follow up, camera still working as of right now.
Author
Owner

@lightmaster commented on GitHub (Apr 10, 2026):

Bambuddy can't connect to the camera right now. It ran for well over a day without issue, but stopped connecting to the camera during a 10 hour print and didn't get the picture at the end of the print. About to restart the printer to get it working again and will do a 5 hour print with debug on to see if that shows anything about the moment that it stops connecting. Doubt it matters, but the printer and bambuddy are on different VLANs, but allow full connection between them with no filtering. In the following commands, bambuddy is on IP 10.14.166.201, bamboozle (printer) is on 10.0.0.227. Orcaslicer can see the camera this entire time, and doesn't seem to make a difference if OrcaSlicer is connected to the camera or not, Bambuddy can't connect to camera.

Side note, I just updated to the current dev branch and still see reconnect attempt 6/5.

root@bambuddy [07:11:55 PM] [~] 
-> # nc -zv 10.0.0.227 322 
bamboozle.dad [10.0.0.227] 322 (?) open
root@proxima-alpha [07:07:58 PM] [~] 
-> # nc -zv 10.0.0.227 322
bamboozle.dad [10.0.0.227] 322 (?) open
root@bambuddy [07:12:17 PM] [~] 
-> # nc -zv 10.0.0.227 8883
bamboozle.dad [10.0.0.227] 8883 (?) open
  1. OrcaSlicer can currently see the camera while Bambuddy can't. Also homed the printhead to make sure that the camera feed is live and not a frozen image.

  2. 10.14.166.201 is bambuddy, 10.0.0.227 is printer.

root@bambuddy [07:16:13 PM] [~] 
-> # tcpdump -ni any host 10.0.0.227 and port 322
tcpdump: WARNING: any: That device doesn't support promiscuous mode
(Promiscuous mode not supported on the "any" device)
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
19:16:25.103098 eth0  Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [S], seq 215195784, win 64240, options [mss 1460,sackOK,TS val 1535352438 ecr 0,nop,wscale 7], length 0
19:16:25.105497 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [S.], seq 853431693, ack 215195785, win 43440, options [mss 1460,sackOK,TS val 2690794743 ecr 1535352438,nop,wscale 8], length 0
19:16:25.105508 eth0  Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535352441 ecr 2690794743], length 0
19:16:25.105985 eth0  Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535352441 ecr 2690794743], length 1555
19:16:25.109791 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690794747 ecr 1535352441], length 0
19:16:25.110155 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690794747 ecr 1535352441], length 0
19:16:27.126894 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51580: Flags [.], ack 3760338359, win 165, options [nop,nop,TS val 2690796761 ecr 1535174199], length 0
19:16:27.126909 eth0  Out IP 10.14.166.201.51580 > 10.0.0.227.322: Flags [R], seq 3760338359, win 0, length 0
19:16:30.414842 eth0  Out IP 10.14.166.201.48738 > 10.0.0.227.322: Flags [F.], seq 3208878707, ack 2672148591, win 502, options [nop,nop,TS val 1535357750 ecr 2690790066], length 0
19:16:30.459500 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.48738: Flags [.], ack 1, win 165, options [nop,nop,TS val 2690800096 ecr 1535357750], length 0
19:16:35.101589 eth0  Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535362437 ecr 2690794747], length 0
19:16:35.150987 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690804785 ecr 1535362437], length 0
19:16:35.352083 eth0  Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [S], seq 1706476983, win 64240, options [mss 1460,sackOK,TS val 1535362687 ecr 0,nop,wscale 7], length 0
19:16:35.365498 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [S.], seq 4108734180, ack 1706476984, win 43440, options [mss 1460,sackOK,TS val 2690805003 ecr 1535362687,nop,wscale 8], length 0
19:16:35.365513 eth0  Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535362701 ecr 2690805003], length 0
19:16:35.366049 eth0  Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535362701 ecr 2690805003], length 1555
19:16:35.368615 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690805006 ecr 1535362701], length 0
19:16:35.369056 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690805006 ecr 1535362701], length 0
19:16:37.364209 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.45592: Flags [.], ack 341776112, win 165, options [nop,nop,TS val 2690807001 ecr 1535184484], length 0
19:16:37.364222 eth0  Out IP 10.14.166.201.45592 > 10.0.0.227.322: Flags [R], seq 341776112, win 0, length 0
19:16:37.373725 eth0  Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [S], seq 3725102437, win 64240, options [mss 1460,sackOK,TS val 1535364709 ecr 0,nop,wscale 7], length 0
19:16:37.376624 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [S.], seq 3987959858, ack 3725102438, win 43440, options [mss 1460,sackOK,TS val 2690807014 ecr 1535364709,nop,wscale 8], length 0
19:16:37.376635 eth0  Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535364712 ecr 2690807014], length 0
19:16:37.377097 eth0  Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535364712 ecr 2690807014], length 1555
19:16:37.381225 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690807018 ecr 1535364712], length 0
19:16:41.381511 eth0  Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [S], seq 987504955, win 64240, options [mss 1460,sackOK,TS val 1535368717 ecr 0,nop,wscale 7], length 0
19:16:41.388278 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [S.], seq 1742506618, ack 987504956, win 43440, options [mss 1460,sackOK,TS val 2690811025 ecr 1535368717,nop,wscale 8], length 0
19:16:41.388292 eth0  Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535368723 ecr 2690811025], length 0
19:16:41.388966 eth0  Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535368724 ecr 2690811025], length 1555
19:16:41.392213 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690811030 ecr 1535368724], length 0
19:16:45.351100 eth0  Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535372686 ecr 2690805006], length 0
19:16:45.395000 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690815031 ecr 1535372686], length 0
19:16:47.373106 eth0  Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535374708 ecr 2690807018], length 0
19:16:47.420994 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690817054 ecr 1535374708], length 0
19:16:47.604614 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.38060: Flags [.], ack 1022464765, win 165, options [nop,nop,TS val 2690817241 ecr 1535194777], length 0
19:16:47.604627 eth0  Out IP 10.14.166.201.38060 > 10.0.0.227.322: Flags [R], seq 1022464765, win 0, length 0
19:16:49.393983 eth0  Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [S], seq 256953989, win 64240, options [mss 1460,sackOK,TS val 1535376729 ecr 0,nop,wscale 7], length 0
19:16:49.408240 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [S.], seq 619007358, ack 256953990, win 43440, options [mss 1460,sackOK,TS val 2690819045 ecr 1535376729,nop,wscale 8], length 0
19:16:49.408254 eth0  Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535376743 ecr 2690819045], length 0
19:16:49.408837 eth0  Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535376744 ecr 2690819045], length 1555
19:16:49.411110 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690819048 ecr 1535376744], length 0
19:16:49.411556 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690819049 ecr 1535376744], length 0
19:16:51.377845 eth0  Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535378713 ecr 2690811030], length 0
19:16:51.423411 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690821057 ecr 1535378713], length 0
19:16:55.796383 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.38070: Flags [.], ack 3646742345, win 165, options [nop,nop,TS val 2690825433 ecr 1535202793], length 0
19:16:55.796395 eth0  Out IP 10.14.166.201.38070 > 10.0.0.227.322: Flags [R], seq 3646742345, win 0, length 0
19:16:59.392881 eth0  Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535386728 ecr 2690819049], length 0
19:16:59.435279 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690829072 ecr 1535386728], length 0
19:16:59.680290 eth0  Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [S], seq 1858987257, win 64240, options [mss 1460,sackOK,TS val 1535387015 ecr 0,nop,wscale 7], length 0
19:16:59.687639 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [S.], seq 2101707377, ack 1858987258, win 43440, options [mss 1460,sackOK,TS val 2690829322 ecr 1535387015,nop,wscale 8], length 0
19:16:59.687650 eth0  Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535387023 ecr 2690829322], length 0
19:16:59.688186 eth0  Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535387023 ecr 2690829322], length 1555
19:16:59.691846 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690829329 ecr 1535387023], length 0
19:16:59.692248 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690829329 ecr 1535387023], length 0
19:17:05.409331 eth0  Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [S], seq 1881478404, win 64240, options [mss 1460,sackOK,TS val 1535392744 ecr 0,nop,wscale 7], length 0
19:17:05.412515 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [S.], seq 2322296117, ack 1881478405, win 43440, options [mss 1460,sackOK,TS val 2690835050 ecr 1535392744,nop,wscale 8], length 0
19:17:05.412527 eth0  Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535392748 ecr 2690835050], length 0
19:17:05.413034 eth0  Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535392748 ecr 2690835050], length 1555
19:17:05.417417 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690835054 ecr 1535392748], length 0
19:17:05.417764 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690835054 ecr 1535392748], length 0
19:17:06.036456 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46120: Flags [.], ack 2915898964, win 165, options [nop,nop,TS val 2690835673 ecr 1535213082], length 0
19:17:06.036471 eth0  Out IP 10.14.166.201.46120 > 10.0.0.227.322: Flags [R], seq 2915898964, win 0, length 0
19:17:09.680814 eth0  Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535397016 ecr 2690829329], length 0
19:17:09.723552 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690839360 ecr 1535397016], length 0
19:17:15.408791 eth0  Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535402744 ecr 2690835054], length 0
19:17:15.452446 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690845090 ecr 1535402744], length 0
19:17:15.699146 eth0  Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [S], seq 3111251703, win 64240, options [mss 1460,sackOK,TS val 1535403034 ecr 0,nop,wscale 7], length 0
19:17:15.703081 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [S.], seq 3517027008, ack 3111251704, win 43440, options [mss 1460,sackOK,TS val 2690845339 ecr 1535403034,nop,wscale 8], length 0
19:17:15.703093 eth0  Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535403038 ecr 2690845339], length 0
19:17:15.703621 eth0  Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535403039 ecr 2690845339], length 1555
19:17:15.706586 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690845344 ecr 1535403039], length 0
19:17:15.706998 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690845344 ecr 1535403039], length 0
19:17:16.276490 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.56492: Flags [.], ack 1442098359, win 165, options [nop,nop,TS val 2690845914 ecr 1535223371], length 0
19:17:16.276502 eth0  Out IP 10.14.166.201.56492 > 10.0.0.227.322: Flags [R], seq 1442098359, win 0, length 0
19:17:25.698550 eth0  Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535413034 ecr 2690845344], length 0
19:17:25.744351 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690855380 ecr 1535413034], length 0
19:17:25.987904 eth0  Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [S], seq 1578430202, win 64240, options [mss 1460,sackOK,TS val 1535413323 ecr 0,nop,wscale 7], length 0
19:17:25.990415 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [S.], seq 3225388618, ack 1578430203, win 43440, options [mss 1460,sackOK,TS val 2690855628 ecr 1535413323,nop,wscale 8], length 0
19:17:25.990425 eth0  Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535413326 ecr 2690855628], length 0
19:17:25.990910 eth0  Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535413326 ecr 2690855628], length 1555
19:17:25.996387 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690855633 ecr 1535413326], length 0
19:17:25.996778 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690855634 ecr 1535413326], length 0
19:17:26.516639 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.44028: Flags [.], ack 1849576861, win 165, options [nop,nop,TS val 2690856154 ecr 1535233658], length 0
19:17:26.516652 eth0  Out IP 10.14.166.201.44028 > 10.0.0.227.322: Flags [R], seq 1849576861, win 0, length 0
19:17:35.482330 eth0  Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [S], seq 75875118, win 64240, options [mss 1460,sackOK,TS val 1535422817 ecr 0,nop,wscale 7], length 0
19:17:35.505790 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [S.], seq 4037449958, ack 75875119, win 43440, options [mss 1460,sackOK,TS val 2690865143 ecr 1535422817,nop,wscale 8], length 0
19:17:35.505803 eth0  Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535422841 ecr 2690865143], length 0
19:17:35.506272 eth0  Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535422841 ecr 2690865143], length 1555
19:17:35.514886 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690865151 ecr 1535422841], length 0
19:17:35.514887 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690865151 ecr 1535422841], length 0
19:17:35.986848 eth0  Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535423322 ecr 2690855634], length 0
19:17:36.029778 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690865667 ecr 1535423322], length 0
19:17:36.759938 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.46636: Flags [.], ack 848880661, win 165, options [nop,nop,TS val 2690866394 ecr 1535243952], length 0
19:17:36.759948 eth0  Out IP 10.14.166.201.46636 > 10.0.0.227.322: Flags [R], seq 848880661, win 0, length 0
^C
94 packets captured
96 packets received by filter
0 packets dropped by kernel
<!-- gh-comment-id:4227304727 --> @lightmaster commented on GitHub (Apr 10, 2026): Bambuddy can't connect to the camera right now. It ran for well over a day without issue, but stopped connecting to the camera during a 10 hour print and didn't get the picture at the end of the print. About to restart the printer to get it working again and will do a 5 hour print with debug on to see if that shows anything about the moment that it stops connecting. Doubt it matters, but the printer and bambuddy are on different VLANs, but allow full connection between them with no filtering. In the following commands, bambuddy is on IP 10.14.166.201, bamboozle (printer) is on 10.0.0.227. Orcaslicer can see the camera this entire time, and doesn't seem to make a difference if OrcaSlicer is connected to the camera or not, Bambuddy can't connect to camera. Side note, I just updated to the current dev branch and still see reconnect attempt 6/5. 1. ```zsh root@bambuddy [07:11:55 PM] [~] -> # nc -zv 10.0.0.227 322 bamboozle.dad [10.0.0.227] 322 (?) open ``` 2. ```zsh root@proxima-alpha [07:07:58 PM] [~] -> # nc -zv 10.0.0.227 322 bamboozle.dad [10.0.0.227] 322 (?) open ``` 3. ```zsh root@bambuddy [07:12:17 PM] [~] -> # nc -zv 10.0.0.227 8883 bamboozle.dad [10.0.0.227] 8883 (?) open ``` 4. OrcaSlicer can currently see the camera while Bambuddy can't. Also homed the printhead to make sure that the camera feed is live and not a frozen image. 5. 10.14.166.201 is bambuddy, 10.0.0.227 is printer. ```zsh root@bambuddy [07:16:13 PM] [~] -> # tcpdump -ni any host 10.0.0.227 and port 322 tcpdump: WARNING: any: That device doesn't support promiscuous mode (Promiscuous mode not supported on the "any" device) tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes 19:16:25.103098 eth0 Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [S], seq 215195784, win 64240, options [mss 1460,sackOK,TS val 1535352438 ecr 0,nop,wscale 7], length 0 19:16:25.105497 eth0 In IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [S.], seq 853431693, ack 215195785, win 43440, options [mss 1460,sackOK,TS val 2690794743 ecr 1535352438,nop,wscale 8], length 0 19:16:25.105508 eth0 Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535352441 ecr 2690794743], length 0 19:16:25.105985 eth0 Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535352441 ecr 2690794743], length 1555 19:16:25.109791 eth0 In IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690794747 ecr 1535352441], length 0 19:16:25.110155 eth0 In IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690794747 ecr 1535352441], length 0 19:16:27.126894 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51580: Flags [.], ack 3760338359, win 165, options [nop,nop,TS val 2690796761 ecr 1535174199], length 0 19:16:27.126909 eth0 Out IP 10.14.166.201.51580 > 10.0.0.227.322: Flags [R], seq 3760338359, win 0, length 0 19:16:30.414842 eth0 Out IP 10.14.166.201.48738 > 10.0.0.227.322: Flags [F.], seq 3208878707, ack 2672148591, win 502, options [nop,nop,TS val 1535357750 ecr 2690790066], length 0 19:16:30.459500 eth0 In IP 10.0.0.227.322 > 10.14.166.201.48738: Flags [.], ack 1, win 165, options [nop,nop,TS val 2690800096 ecr 1535357750], length 0 19:16:35.101589 eth0 Out IP 10.14.166.201.48746 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535362437 ecr 2690794747], length 0 19:16:35.150987 eth0 In IP 10.0.0.227.322 > 10.14.166.201.48746: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690804785 ecr 1535362437], length 0 19:16:35.352083 eth0 Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [S], seq 1706476983, win 64240, options [mss 1460,sackOK,TS val 1535362687 ecr 0,nop,wscale 7], length 0 19:16:35.365498 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [S.], seq 4108734180, ack 1706476984, win 43440, options [mss 1460,sackOK,TS val 2690805003 ecr 1535362687,nop,wscale 8], length 0 19:16:35.365513 eth0 Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535362701 ecr 2690805003], length 0 19:16:35.366049 eth0 Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535362701 ecr 2690805003], length 1555 19:16:35.368615 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690805006 ecr 1535362701], length 0 19:16:35.369056 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690805006 ecr 1535362701], length 0 19:16:37.364209 eth0 In IP 10.0.0.227.322 > 10.14.166.201.45592: Flags [.], ack 341776112, win 165, options [nop,nop,TS val 2690807001 ecr 1535184484], length 0 19:16:37.364222 eth0 Out IP 10.14.166.201.45592 > 10.0.0.227.322: Flags [R], seq 341776112, win 0, length 0 19:16:37.373725 eth0 Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [S], seq 3725102437, win 64240, options [mss 1460,sackOK,TS val 1535364709 ecr 0,nop,wscale 7], length 0 19:16:37.376624 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [S.], seq 3987959858, ack 3725102438, win 43440, options [mss 1460,sackOK,TS val 2690807014 ecr 1535364709,nop,wscale 8], length 0 19:16:37.376635 eth0 Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535364712 ecr 2690807014], length 0 19:16:37.377097 eth0 Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535364712 ecr 2690807014], length 1555 19:16:37.381225 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690807018 ecr 1535364712], length 0 19:16:41.381511 eth0 Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [S], seq 987504955, win 64240, options [mss 1460,sackOK,TS val 1535368717 ecr 0,nop,wscale 7], length 0 19:16:41.388278 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [S.], seq 1742506618, ack 987504956, win 43440, options [mss 1460,sackOK,TS val 2690811025 ecr 1535368717,nop,wscale 8], length 0 19:16:41.388292 eth0 Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535368723 ecr 2690811025], length 0 19:16:41.388966 eth0 Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535368724 ecr 2690811025], length 1555 19:16:41.392213 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690811030 ecr 1535368724], length 0 19:16:45.351100 eth0 Out IP 10.14.166.201.41852 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535372686 ecr 2690805006], length 0 19:16:45.395000 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41852: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690815031 ecr 1535372686], length 0 19:16:47.373106 eth0 Out IP 10.14.166.201.51290 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535374708 ecr 2690807018], length 0 19:16:47.420994 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51290: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690817054 ecr 1535374708], length 0 19:16:47.604614 eth0 In IP 10.0.0.227.322 > 10.14.166.201.38060: Flags [.], ack 1022464765, win 165, options [nop,nop,TS val 2690817241 ecr 1535194777], length 0 19:16:47.604627 eth0 Out IP 10.14.166.201.38060 > 10.0.0.227.322: Flags [R], seq 1022464765, win 0, length 0 19:16:49.393983 eth0 Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [S], seq 256953989, win 64240, options [mss 1460,sackOK,TS val 1535376729 ecr 0,nop,wscale 7], length 0 19:16:49.408240 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [S.], seq 619007358, ack 256953990, win 43440, options [mss 1460,sackOK,TS val 2690819045 ecr 1535376729,nop,wscale 8], length 0 19:16:49.408254 eth0 Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535376743 ecr 2690819045], length 0 19:16:49.408837 eth0 Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535376744 ecr 2690819045], length 1555 19:16:49.411110 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690819048 ecr 1535376744], length 0 19:16:49.411556 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690819049 ecr 1535376744], length 0 19:16:51.377845 eth0 Out IP 10.14.166.201.51302 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535378713 ecr 2690811030], length 0 19:16:51.423411 eth0 In IP 10.0.0.227.322 > 10.14.166.201.51302: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690821057 ecr 1535378713], length 0 19:16:55.796383 eth0 In IP 10.0.0.227.322 > 10.14.166.201.38070: Flags [.], ack 3646742345, win 165, options [nop,nop,TS val 2690825433 ecr 1535202793], length 0 19:16:55.796395 eth0 Out IP 10.14.166.201.38070 > 10.0.0.227.322: Flags [R], seq 3646742345, win 0, length 0 19:16:59.392881 eth0 Out IP 10.14.166.201.46826 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535386728 ecr 2690819049], length 0 19:16:59.435279 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46826: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690829072 ecr 1535386728], length 0 19:16:59.680290 eth0 Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [S], seq 1858987257, win 64240, options [mss 1460,sackOK,TS val 1535387015 ecr 0,nop,wscale 7], length 0 19:16:59.687639 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [S.], seq 2101707377, ack 1858987258, win 43440, options [mss 1460,sackOK,TS val 2690829322 ecr 1535387015,nop,wscale 8], length 0 19:16:59.687650 eth0 Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535387023 ecr 2690829322], length 0 19:16:59.688186 eth0 Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535387023 ecr 2690829322], length 1555 19:16:59.691846 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690829329 ecr 1535387023], length 0 19:16:59.692248 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690829329 ecr 1535387023], length 0 19:17:05.409331 eth0 Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [S], seq 1881478404, win 64240, options [mss 1460,sackOK,TS val 1535392744 ecr 0,nop,wscale 7], length 0 19:17:05.412515 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [S.], seq 2322296117, ack 1881478405, win 43440, options [mss 1460,sackOK,TS val 2690835050 ecr 1535392744,nop,wscale 8], length 0 19:17:05.412527 eth0 Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535392748 ecr 2690835050], length 0 19:17:05.413034 eth0 Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535392748 ecr 2690835050], length 1555 19:17:05.417417 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690835054 ecr 1535392748], length 0 19:17:05.417764 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690835054 ecr 1535392748], length 0 19:17:06.036456 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46120: Flags [.], ack 2915898964, win 165, options [nop,nop,TS val 2690835673 ecr 1535213082], length 0 19:17:06.036471 eth0 Out IP 10.14.166.201.46120 > 10.0.0.227.322: Flags [R], seq 2915898964, win 0, length 0 19:17:09.680814 eth0 Out IP 10.14.166.201.59844 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535397016 ecr 2690829329], length 0 19:17:09.723552 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59844: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690839360 ecr 1535397016], length 0 19:17:15.408791 eth0 Out IP 10.14.166.201.59850 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535402744 ecr 2690835054], length 0 19:17:15.452446 eth0 In IP 10.0.0.227.322 > 10.14.166.201.59850: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690845090 ecr 1535402744], length 0 19:17:15.699146 eth0 Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [S], seq 3111251703, win 64240, options [mss 1460,sackOK,TS val 1535403034 ecr 0,nop,wscale 7], length 0 19:17:15.703081 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [S.], seq 3517027008, ack 3111251704, win 43440, options [mss 1460,sackOK,TS val 2690845339 ecr 1535403034,nop,wscale 8], length 0 19:17:15.703093 eth0 Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535403038 ecr 2690845339], length 0 19:17:15.703621 eth0 Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535403039 ecr 2690845339], length 1555 19:17:15.706586 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690845344 ecr 1535403039], length 0 19:17:15.706998 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690845344 ecr 1535403039], length 0 19:17:16.276490 eth0 In IP 10.0.0.227.322 > 10.14.166.201.56492: Flags [.], ack 1442098359, win 165, options [nop,nop,TS val 2690845914 ecr 1535223371], length 0 19:17:16.276502 eth0 Out IP 10.14.166.201.56492 > 10.0.0.227.322: Flags [R], seq 1442098359, win 0, length 0 19:17:25.698550 eth0 Out IP 10.14.166.201.47028 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535413034 ecr 2690845344], length 0 19:17:25.744351 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47028: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690855380 ecr 1535413034], length 0 19:17:25.987904 eth0 Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [S], seq 1578430202, win 64240, options [mss 1460,sackOK,TS val 1535413323 ecr 0,nop,wscale 7], length 0 19:17:25.990415 eth0 In IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [S.], seq 3225388618, ack 1578430203, win 43440, options [mss 1460,sackOK,TS val 2690855628 ecr 1535413323,nop,wscale 8], length 0 19:17:25.990425 eth0 Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535413326 ecr 2690855628], length 0 19:17:25.990910 eth0 Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535413326 ecr 2690855628], length 1555 19:17:25.996387 eth0 In IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690855633 ecr 1535413326], length 0 19:17:25.996778 eth0 In IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690855634 ecr 1535413326], length 0 19:17:26.516639 eth0 In IP 10.0.0.227.322 > 10.14.166.201.44028: Flags [.], ack 1849576861, win 165, options [nop,nop,TS val 2690856154 ecr 1535233658], length 0 19:17:26.516652 eth0 Out IP 10.14.166.201.44028 > 10.0.0.227.322: Flags [R], seq 1849576861, win 0, length 0 19:17:35.482330 eth0 Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [S], seq 75875118, win 64240, options [mss 1460,sackOK,TS val 1535422817 ecr 0,nop,wscale 7], length 0 19:17:35.505790 eth0 In IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [S.], seq 4037449958, ack 75875119, win 43440, options [mss 1460,sackOK,TS val 2690865143 ecr 1535422817,nop,wscale 8], length 0 19:17:35.505803 eth0 Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1535422841 ecr 2690865143], length 0 19:17:35.506272 eth0 Out IP 10.14.166.201.35236 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1535422841 ecr 2690865143], length 1555 19:17:35.514886 eth0 In IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [.], ack 1449, win 165, options [nop,nop,TS val 2690865151 ecr 1535422841], length 0 19:17:35.514887 eth0 In IP 10.0.0.227.322 > 10.14.166.201.35236: Flags [.], ack 1556, win 165, options [nop,nop,TS val 2690865151 ecr 1535422841], length 0 19:17:35.986848 eth0 Out IP 10.14.166.201.53360 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1535423322 ecr 2690855634], length 0 19:17:36.029778 eth0 In IP 10.0.0.227.322 > 10.14.166.201.53360: Flags [.], ack 1557, win 165, options [nop,nop,TS val 2690865667 ecr 1535423322], length 0 19:17:36.759938 eth0 In IP 10.0.0.227.322 > 10.14.166.201.46636: Flags [.], ack 848880661, win 165, options [nop,nop,TS val 2690866394 ecr 1535243952], length 0 19:17:36.759948 eth0 Out IP 10.14.166.201.46636 > 10.0.0.227.322: Flags [R], seq 848880661, win 0, length 0 ^C 94 packets captured 96 packets received by filter 0 packets dropped by kernel ```
Author
Owner

@lightmaster commented on GitHub (Apr 11, 2026):

Camera shut off right after the 35 minute mark of the debug timer and won't reconnect. Bambuddy still sees the print is going and print time/progress are still going. OrcaSlicer can connect to the camera.

bambuddy-support-20260410-202439.zip

root@bambuddy [08:24:19 PM] [~] 
-> # nc -zv 10.0.0.227 322                       
bamboozle.dad [10.0.0.227] 322 (?) open
root@bambuddy [08:26:11 PM] [~] 
-> # nc -zv 10.0.0.227 8883                      
bamboozle.dad [10.0.0.227] 8883 (?) open
root@bambuddy [08:23:25 PM] [~] 
-> # tcpdump -ni any host 10.0.0.227 and port 322
tcpdump: WARNING: any: That device doesn't support promiscuous mode
(Promiscuous mode not supported on the "any" device)
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
20:23:30.814761 eth0  Out IP 10.14.166.201.39030 > 10.0.0.227.322: Flags [F.], seq 1260944876, ack 4219583960, win 502, options [nop,nop,TS val 1539378150 ecr 4279516970], length 0
20:23:30.864545 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.39030: Flags [.], ack 1, win 165, options [nop,nop,TS val 4279526995 ecr 1539378150], length 0
20:23:30.873235 eth0  Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [S], seq 1321102410, win 64240, options [mss 1460,sackOK,TS val 1539378208 ecr 0,nop,wscale 7], length 0
20:23:30.875737 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [S.], seq 1210605737, ack 1321102411, win 43440, options [mss 1460,sackOK,TS val 4279527009 ecr 1539378208,nop,wscale 8], length 0
20:23:30.875753 eth0  Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539378211 ecr 4279527009], length 0
20:23:30.876265 eth0  Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539378211 ecr 4279527009], length 1555
20:23:30.879098 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279527013 ecr 1539378211], length 0
20:23:30.879354 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279527013 ecr 1539378211], length 0
20:23:32.880326 eth0  Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [S], seq 4074383136, win 64240, options [mss 1460,sackOK,TS val 1539380215 ecr 0,nop,wscale 7], length 0
20:23:32.885648 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [S.], seq 1333817328, ack 4074383137, win 43440, options [mss 1460,sackOK,TS val 4279529019 ecr 1539380215,nop,wscale 8], length 0
20:23:32.885657 eth0  Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539380221 ecr 4279529019], length 0
20:23:32.886174 eth0  Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539380221 ecr 4279529019], length 1555
20:23:32.888989 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279529023 ecr 1539380221], length 0
20:23:32.889367 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279529023 ecr 1539380221], length 0
20:23:34.928870 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.38698: Flags [.], ack 1178917605, win 165, options [nop,nop,TS val 4279531059 ecr 1539202053], length 0
20:23:34.928886 eth0  Out IP 10.14.166.201.38698 > 10.0.0.227.322: Flags [R], seq 1178917605, win 0, length 0
20:23:37.101796 eth0  Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [S], seq 1059088942, win 64240, options [mss 1460,sackOK,TS val 1539384437 ecr 0,nop,wscale 7], length 0
20:23:37.108350 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [S.], seq 2387663428, ack 1059088943, win 43440, options [mss 1460,sackOK,TS val 4279533242 ecr 1539384437,nop,wscale 8], length 0
20:23:37.108361 eth0  Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539384444 ecr 4279533242], length 0
20:23:37.108876 eth0  Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539384444 ecr 4279533242], length 1555
20:23:37.112417 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279533246 ecr 1539384444], length 0
20:23:37.112441 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279533246 ecr 1539384444], length 0
20:23:40.871934 eth0  Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539388207 ecr 4279527013], length 0
20:23:40.932885 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279537063 ecr 1539388207], length 0
20:23:42.878958 eth0  Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539390214 ecr 4279529023], length 0
20:23:42.940019 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279539070 ecr 1539390214], length 0
20:23:44.892873 eth0  Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [S], seq 2278818559, win 64240, options [mss 1460,sackOK,TS val 1539392228 ecr 0,nop,wscale 7], length 0
20:23:44.901101 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [S.], seq 2500561837, ack 2278818560, win 43440, options [mss 1460,sackOK,TS val 4279541035 ecr 1539392228,nop,wscale 8], length 0
20:23:44.901129 eth0  Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539392236 ecr 4279541035], length 0
20:23:44.901754 eth0  Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539392237 ecr 4279541035], length 1555
20:23:44.903877 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279541038 ecr 1539392237], length 0
20:23:45.168495 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.53012: Flags [.], ack 888287978, win 165, options [nop,nop,TS val 4279541299 ecr 1539212341], length 0
20:23:45.168511 eth0  Out IP 10.14.166.201.53012 > 10.0.0.227.322: Flags [R], seq 888287978, win 0, length 0
20:23:47.101019 eth0  Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539394436 ecr 4279533246], length 0
20:23:47.150606 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279543281 ecr 1539394436], length 0
20:23:54.891130 eth0  Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539402226 ecr 4279541038], length 0
20:23:54.938317 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279551071 ecr 1539402226], length 0
20:23:55.180291 eth0  Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [S], seq 3137610013, win 64240, options [mss 1460,sackOK,TS val 1539402515 ecr 0,nop,wscale 7], length 0
20:23:55.186553 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [S.], seq 346214212, ack 3137610014, win 43440, options [mss 1460,sackOK,TS val 4279551320 ecr 1539402515,nop,wscale 8], length 0
20:23:55.186567 eth0  Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539402522 ecr 4279551320], length 0
20:23:55.187110 eth0  Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539402522 ecr 4279551320], length 1555
20:23:55.191190 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279551324 ecr 1539402522], length 0
20:23:55.191570 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279551325 ecr 1539402522], length 0
20:23:55.408561 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.44802: Flags [.], ack 1788119857, win 165, options [nop,nop,TS val 4279551539 ecr 1539222629], length 0
20:23:55.408574 eth0  Out IP 10.14.166.201.44802 > 10.0.0.227.322: Flags [R], seq 1788119857, win 0, length 0
20:24:00.918939 eth0  Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [S], seq 2884746582, win 64240, options [mss 1460,sackOK,TS val 1539408254 ecr 0,nop,wscale 7], length 0
20:24:00.924749 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [S.], seq 3743655587, ack 2884746583, win 43440, options [mss 1460,sackOK,TS val 4279557058 ecr 1539408254,nop,wscale 8], length 0
20:24:00.924761 eth0  Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539408260 ecr 4279557058], length 0
20:24:00.925251 eth0  Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539408260 ecr 4279557058], length 1555
20:24:00.930193 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279557063 ecr 1539408260], length 0
20:24:00.930518 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279557064 ecr 1539408260], length 0
20:24:05.180886 eth0  Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539412516 ecr 4279551325], length 0
20:24:05.227563 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279561358 ecr 1539412516], length 0
20:24:05.648579 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.54384: Flags [.], ack 2287138624, win 165, options [nop,nop,TS val 4279561779 ecr 1539232918], length 0
20:24:05.648598 eth0  Out IP 10.14.166.201.54384 > 10.0.0.227.322: Flags [R], seq 2287138624, win 0, length 0
20:24:10.918220 eth0  Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539418253 ecr 4279557064], length 0
20:24:10.967975 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279567097 ecr 1539418253], length 0
20:24:11.248552 eth0  Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [S], seq 1702848317, win 64240, options [mss 1460,sackOK,TS val 1539418584 ecr 0,nop,wscale 7], length 0
20:24:11.253466 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [S.], seq 1214185415, ack 1702848318, win 43440, options [mss 1460,sackOK,TS val 4279567387 ecr 1539418584,nop,wscale 8], length 0
20:24:11.253487 eth0  Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539418589 ecr 4279567387], length 0
20:24:11.254529 eth0  Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539418590 ecr 4279567387], length 1555
20:24:11.259320 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279567393 ecr 1539418590], length 0
20:24:11.259645 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279567393 ecr 1539418590], length 0
20:24:13.840580 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.45134: Flags [.], ack 831461443, win 165, options [nop,nop,TS val 4279569971 ecr 1539240801], length 0
20:24:13.840598 eth0  Out IP 10.14.166.201.45134 > 10.0.0.227.322: Flags [R], seq 831461443, win 0, length 0
20:24:15.377557 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.45140: Flags [.], ack 821956702, win 165, options [nop,nop,TS val 4279571508 ecr 1539242638], length 0
20:24:15.377572 eth0  Out IP 10.14.166.201.45140 > 10.0.0.227.322: Flags [R], seq 821956702, win 0, length 0
20:24:17.425498 eth0  In  IP 10.0.0.227.322 > 10.14.166.201.40390: Flags [.], ack 769375607, win 165, options [nop,nop,TS val 4279573556 ecr 1539244648], length 0
20:24:17.425513 eth0  Out IP 10.14.166.201.40390 > 10.0.0.227.322: Flags [R], seq 769375607, win 0, length 0
^C
69 packets captured
71 packets received by filter
0 packets dropped by kernel
<!-- gh-comment-id:4227454568 --> @lightmaster commented on GitHub (Apr 11, 2026): Camera shut off right after the 35 minute mark of the debug timer and won't reconnect. Bambuddy still sees the print is going and print time/progress are still going. OrcaSlicer can connect to the camera. [bambuddy-support-20260410-202439.zip](https://github.com/user-attachments/files/26641745/bambuddy-support-20260410-202439.zip) ```zsh root@bambuddy [08:24:19 PM] [~] -> # nc -zv 10.0.0.227 322 bamboozle.dad [10.0.0.227] 322 (?) open root@bambuddy [08:26:11 PM] [~] -> # nc -zv 10.0.0.227 8883 bamboozle.dad [10.0.0.227] 8883 (?) open ``` ```zsh root@bambuddy [08:23:25 PM] [~] -> # tcpdump -ni any host 10.0.0.227 and port 322 tcpdump: WARNING: any: That device doesn't support promiscuous mode (Promiscuous mode not supported on the "any" device) tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes 20:23:30.814761 eth0 Out IP 10.14.166.201.39030 > 10.0.0.227.322: Flags [F.], seq 1260944876, ack 4219583960, win 502, options [nop,nop,TS val 1539378150 ecr 4279516970], length 0 20:23:30.864545 eth0 In IP 10.0.0.227.322 > 10.14.166.201.39030: Flags [.], ack 1, win 165, options [nop,nop,TS val 4279526995 ecr 1539378150], length 0 20:23:30.873235 eth0 Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [S], seq 1321102410, win 64240, options [mss 1460,sackOK,TS val 1539378208 ecr 0,nop,wscale 7], length 0 20:23:30.875737 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [S.], seq 1210605737, ack 1321102411, win 43440, options [mss 1460,sackOK,TS val 4279527009 ecr 1539378208,nop,wscale 8], length 0 20:23:30.875753 eth0 Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539378211 ecr 4279527009], length 0 20:23:30.876265 eth0 Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539378211 ecr 4279527009], length 1555 20:23:30.879098 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279527013 ecr 1539378211], length 0 20:23:30.879354 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279527013 ecr 1539378211], length 0 20:23:32.880326 eth0 Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [S], seq 4074383136, win 64240, options [mss 1460,sackOK,TS val 1539380215 ecr 0,nop,wscale 7], length 0 20:23:32.885648 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [S.], seq 1333817328, ack 4074383137, win 43440, options [mss 1460,sackOK,TS val 4279529019 ecr 1539380215,nop,wscale 8], length 0 20:23:32.885657 eth0 Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539380221 ecr 4279529019], length 0 20:23:32.886174 eth0 Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539380221 ecr 4279529019], length 1555 20:23:32.888989 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279529023 ecr 1539380221], length 0 20:23:32.889367 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279529023 ecr 1539380221], length 0 20:23:34.928870 eth0 In IP 10.0.0.227.322 > 10.14.166.201.38698: Flags [.], ack 1178917605, win 165, options [nop,nop,TS val 4279531059 ecr 1539202053], length 0 20:23:34.928886 eth0 Out IP 10.14.166.201.38698 > 10.0.0.227.322: Flags [R], seq 1178917605, win 0, length 0 20:23:37.101796 eth0 Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [S], seq 1059088942, win 64240, options [mss 1460,sackOK,TS val 1539384437 ecr 0,nop,wscale 7], length 0 20:23:37.108350 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [S.], seq 2387663428, ack 1059088943, win 43440, options [mss 1460,sackOK,TS val 4279533242 ecr 1539384437,nop,wscale 8], length 0 20:23:37.108361 eth0 Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539384444 ecr 4279533242], length 0 20:23:37.108876 eth0 Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539384444 ecr 4279533242], length 1555 20:23:37.112417 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279533246 ecr 1539384444], length 0 20:23:37.112441 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279533246 ecr 1539384444], length 0 20:23:40.871934 eth0 Out IP 10.14.166.201.37004 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539388207 ecr 4279527013], length 0 20:23:40.932885 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37004: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279537063 ecr 1539388207], length 0 20:23:42.878958 eth0 Out IP 10.14.166.201.37020 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539390214 ecr 4279529023], length 0 20:23:42.940019 eth0 In IP 10.0.0.227.322 > 10.14.166.201.37020: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279539070 ecr 1539390214], length 0 20:23:44.892873 eth0 Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [S], seq 2278818559, win 64240, options [mss 1460,sackOK,TS val 1539392228 ecr 0,nop,wscale 7], length 0 20:23:44.901101 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [S.], seq 2500561837, ack 2278818560, win 43440, options [mss 1460,sackOK,TS val 4279541035 ecr 1539392228,nop,wscale 8], length 0 20:23:44.901129 eth0 Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539392236 ecr 4279541035], length 0 20:23:44.901754 eth0 Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539392237 ecr 4279541035], length 1555 20:23:44.903877 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279541038 ecr 1539392237], length 0 20:23:45.168495 eth0 In IP 10.0.0.227.322 > 10.14.166.201.53012: Flags [.], ack 888287978, win 165, options [nop,nop,TS val 4279541299 ecr 1539212341], length 0 20:23:45.168511 eth0 Out IP 10.14.166.201.53012 > 10.0.0.227.322: Flags [R], seq 888287978, win 0, length 0 20:23:47.101019 eth0 Out IP 10.14.166.201.47352 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539394436 ecr 4279533246], length 0 20:23:47.150606 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47352: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279543281 ecr 1539394436], length 0 20:23:54.891130 eth0 Out IP 10.14.166.201.47366 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539402226 ecr 4279541038], length 0 20:23:54.938317 eth0 In IP 10.0.0.227.322 > 10.14.166.201.47366: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279551071 ecr 1539402226], length 0 20:23:55.180291 eth0 Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [S], seq 3137610013, win 64240, options [mss 1460,sackOK,TS val 1539402515 ecr 0,nop,wscale 7], length 0 20:23:55.186553 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [S.], seq 346214212, ack 3137610014, win 43440, options [mss 1460,sackOK,TS val 4279551320 ecr 1539402515,nop,wscale 8], length 0 20:23:55.186567 eth0 Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539402522 ecr 4279551320], length 0 20:23:55.187110 eth0 Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539402522 ecr 4279551320], length 1555 20:23:55.191190 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279551324 ecr 1539402522], length 0 20:23:55.191570 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279551325 ecr 1539402522], length 0 20:23:55.408561 eth0 In IP 10.0.0.227.322 > 10.14.166.201.44802: Flags [.], ack 1788119857, win 165, options [nop,nop,TS val 4279551539 ecr 1539222629], length 0 20:23:55.408574 eth0 Out IP 10.14.166.201.44802 > 10.0.0.227.322: Flags [R], seq 1788119857, win 0, length 0 20:24:00.918939 eth0 Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [S], seq 2884746582, win 64240, options [mss 1460,sackOK,TS val 1539408254 ecr 0,nop,wscale 7], length 0 20:24:00.924749 eth0 In IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [S.], seq 3743655587, ack 2884746583, win 43440, options [mss 1460,sackOK,TS val 4279557058 ecr 1539408254,nop,wscale 8], length 0 20:24:00.924761 eth0 Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539408260 ecr 4279557058], length 0 20:24:00.925251 eth0 Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539408260 ecr 4279557058], length 1555 20:24:00.930193 eth0 In IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279557063 ecr 1539408260], length 0 20:24:00.930518 eth0 In IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279557064 ecr 1539408260], length 0 20:24:05.180886 eth0 Out IP 10.14.166.201.41542 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539412516 ecr 4279551325], length 0 20:24:05.227563 eth0 In IP 10.0.0.227.322 > 10.14.166.201.41542: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279561358 ecr 1539412516], length 0 20:24:05.648579 eth0 In IP 10.0.0.227.322 > 10.14.166.201.54384: Flags [.], ack 2287138624, win 165, options [nop,nop,TS val 4279561779 ecr 1539232918], length 0 20:24:05.648598 eth0 Out IP 10.14.166.201.54384 > 10.0.0.227.322: Flags [R], seq 2287138624, win 0, length 0 20:24:10.918220 eth0 Out IP 10.14.166.201.55256 > 10.0.0.227.322: Flags [F.], seq 1556, ack 1, win 502, options [nop,nop,TS val 1539418253 ecr 4279557064], length 0 20:24:10.967975 eth0 In IP 10.0.0.227.322 > 10.14.166.201.55256: Flags [.], ack 1557, win 165, options [nop,nop,TS val 4279567097 ecr 1539418253], length 0 20:24:11.248552 eth0 Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [S], seq 1702848317, win 64240, options [mss 1460,sackOK,TS val 1539418584 ecr 0,nop,wscale 7], length 0 20:24:11.253466 eth0 In IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [S.], seq 1214185415, ack 1702848318, win 43440, options [mss 1460,sackOK,TS val 4279567387 ecr 1539418584,nop,wscale 8], length 0 20:24:11.253487 eth0 Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [.], ack 1, win 502, options [nop,nop,TS val 1539418589 ecr 4279567387], length 0 20:24:11.254529 eth0 Out IP 10.14.166.201.57902 > 10.0.0.227.322: Flags [P.], seq 1:1556, ack 1, win 502, options [nop,nop,TS val 1539418590 ecr 4279567387], length 1555 20:24:11.259320 eth0 In IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [.], ack 1449, win 165, options [nop,nop,TS val 4279567393 ecr 1539418590], length 0 20:24:11.259645 eth0 In IP 10.0.0.227.322 > 10.14.166.201.57902: Flags [.], ack 1556, win 165, options [nop,nop,TS val 4279567393 ecr 1539418590], length 0 20:24:13.840580 eth0 In IP 10.0.0.227.322 > 10.14.166.201.45134: Flags [.], ack 831461443, win 165, options [nop,nop,TS val 4279569971 ecr 1539240801], length 0 20:24:13.840598 eth0 Out IP 10.14.166.201.45134 > 10.0.0.227.322: Flags [R], seq 831461443, win 0, length 0 20:24:15.377557 eth0 In IP 10.0.0.227.322 > 10.14.166.201.45140: Flags [.], ack 821956702, win 165, options [nop,nop,TS val 4279571508 ecr 1539242638], length 0 20:24:15.377572 eth0 Out IP 10.14.166.201.45140 > 10.0.0.227.322: Flags [R], seq 821956702, win 0, length 0 20:24:17.425498 eth0 In IP 10.0.0.227.322 > 10.14.166.201.40390: Flags [.], ack 769375607, win 165, options [nop,nop,TS val 4279573556 ecr 1539244648], length 0 20:24:17.425513 eth0 Out IP 10.14.166.201.40390 > 10.0.0.227.322: Flags [R], seq 769375607, win 0, length 0 ^C 69 packets captured 71 packets received by filter 0 packets dropped by kernel
Author
Owner

@maziggy commented on GitHub (Apr 11, 2026):

Thanks for the detailed tcpdump and support bundle, that made this much easier to pin down.

The capture is very clear: on every new camera attempt the TCP three-way handshake to port 322 succeeds, bambuddy pushes ~1555 bytes (the TLS ClientHello), and the printer ACKs it at the TCP layer but never sends a TLS ServerHello back. That's the camera service on the printer being hung at the TLS layer — not a network issue and not something bambuddy can fix from the outside. It also explains why nc -zv keeps passing (it only tests the SYN) and why OrcaSlicer keeps working (it's holding an already-established session from before the hang). You can also see a bunch of old bambuddy source ports still getting stale ACKs from the printer long after bambuddy closed them, which looks like server-side sockets not being reaped. That's consistent with the camera daemon slowly running out of TLS session slots and then refusing new handshakes until the printer reboots — which matches your 35-minute / 10-hour failure windows and the "reboot the printer and it works again" remedy.

The relevant bit here is that you're running X1Plus (firmware 99.00.00.00 is the X1Plus marker). X1Plus is a third-party firmware that reimplements big parts of the X1C's Linux userspace, including the camera service, and bambuddy has no X1Plus-specific code paths on the camera side — it's talking to port 322 over TLS exactly the same way it does to stock firmware, and stock firmware doesn't exhibit this hang. So the bug is almost certainly in X1Plus's camera daemon, not in bambuddy.

What you can do:

  1. Report it upstream to X1Plus with the same tcpdump and support bundle — they're the only ones who can actually fix the TLS hang / session leak in the camera service. The X1Plus project lives at https://github.com/X1Plus/X1Plus.
  2. In the meantime, rebooting the printer is the only known workaround, as you've already found.
  3. If you want bambuddy to reliably get an end-of-print snapshot on this setup, one option is to schedule a short printer reboot between long prints so the camera daemon starts fresh.

I'm going to leave the bambuddy camera client alone for now since it's working correctly against stock firmware and the fix has to happen on the printer side. If X1Plus confirms this is a known issue or fixes it, please do link the upstream ticket here so anyone else on X1Plus who hits this can find it.

<!-- gh-comment-id:4229321871 --> @maziggy commented on GitHub (Apr 11, 2026): Thanks for the detailed tcpdump and support bundle, that made this much easier to pin down. The capture is very clear: on every new camera attempt the TCP three-way handshake to port 322 succeeds, bambuddy pushes ~1555 bytes (the TLS ClientHello), and the printer ACKs it at the TCP layer but never sends a TLS ServerHello back. That's the camera service on the printer being hung at the TLS layer — not a network issue and not something bambuddy can fix from the outside. It also explains why nc -zv keeps passing (it only tests the SYN) and why OrcaSlicer keeps working (it's holding an already-established session from before the hang). You can also see a bunch of old bambuddy source ports still getting stale ACKs from the printer long after bambuddy closed them, which looks like server-side sockets not being reaped. That's consistent with the camera daemon slowly running out of TLS session slots and then refusing new handshakes until the printer reboots — which matches your 35-minute / 10-hour failure windows and the "reboot the printer and it works again" remedy. The relevant bit here is that you're running X1Plus (firmware 99.00.00.00 is the X1Plus marker). X1Plus is a third-party firmware that reimplements big parts of the X1C's Linux userspace, including the camera service, and bambuddy has no X1Plus-specific code paths on the camera side — it's talking to port 322 over TLS exactly the same way it does to stock firmware, and stock firmware doesn't exhibit this hang. So the bug is almost certainly in X1Plus's camera daemon, not in bambuddy. What you can do: 1. Report it upstream to X1Plus with the same tcpdump and support bundle — they're the only ones who can actually fix the TLS hang / session leak in the camera service. The X1Plus project lives at https://github.com/X1Plus/X1Plus. 2. In the meantime, rebooting the printer is the only known workaround, as you've already found. 3. If you want bambuddy to reliably get an end-of-print snapshot on this setup, one option is to schedule a short printer reboot between long prints so the camera daemon starts fresh. I'm going to leave the bambuddy camera client alone for now since it's working correctly against stock firmware and the fix has to happen on the printer side. If X1Plus confirms this is a known issue or fixes it, please do link the upstream ticket here so anyone else on X1Plus who hits this can find it.
Author
Owner

@mikefromdot commented on GitHub (Apr 14, 2026):

An attempt is being made to fix this and is currently being tested.

Issue stems from BBL's ipcam implementation in base firmware version locking up after a bit which is a known issue. An attempt is being made to remediate this by implementing a watchdog on the service and forcing a refresh which should fix this on the x1p side.

<!-- gh-comment-id:4242280276 --> @mikefromdot commented on GitHub (Apr 14, 2026): An attempt is being made to fix this and is currently being tested. Issue stems from BBL's ipcam implementation in base firmware version locking up after a bit which is a known issue. An attempt is being made to remediate this by implementing a watchdog on the service and forcing a refresh which should fix this on the x1p side.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/bambuddy#638
No description provided.