<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nrf sniffer does not decode packets on bonded reconnect after encryption</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/114985/nrf-sniffer-does-not-decode-packets-on-bonded-reconnect-after-encryption</link><description>There is a similar post but it is very old and none of the GUI elements jive with today&amp;#39;s Wireshark. 
 I have a device that does just works (not secure connection but what is now classed as legacy I think). 
 The pairing procedure works fine. I can see</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 25 Sep 2024 10:28:22 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/114985/nrf-sniffer-does-not-decode-packets-on-bonded-reconnect-after-encryption" /><item><title>RE: nrf sniffer does not decode packets on bonded reconnect after encryption</title><link>https://devzone.nordicsemi.com/thread/503723?ContentTypeID=1</link><pubDate>Wed, 25 Sep 2024 10:28:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2e9d2a82-53f5-491c-b2f7-b4d83136c9fb</guid><dc:creator>brianreinhold</dc:creator><description>&lt;p&gt;I did restart the capture on every attempt to repair, but I did not restart the capture between the pairing connection and the measurement connection. I will repeat. I only did one capture sequence this morning and it worked.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf sniffer does not decode packets on bonded reconnect after encryption</title><link>https://devzone.nordicsemi.com/thread/503722?ContentTypeID=1</link><pubDate>Wed, 25 Sep 2024 10:19:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:03ef5a50-c4a9-41e1-8a0f-03920c9bfeb3</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;The sniffer will automatically store the LTK and reuse it for subsequent connections, provided&amp;nbsp;you do this in the same session. Wireshark will not remember the key if you start a new capture after the key exchange.&lt;/p&gt;
[quote userid="83646" url="~/f/nordic-q-a/114985/nrf-sniffer-does-not-decode-packets-on-bonded-reconnect-after-encryption/503717"]I am wondering if the keys are remembered the first time for a given device and not refreshed if one does a re-pairing?[/quote]
&lt;p&gt;The key should be updated if you re-pair, but it is important that the sniffer observes the second pairing. Otherwise, it won&amp;#39;t receive the new key.&lt;/p&gt;
[quote userid="83646" url="~/f/nordic-q-a/114985/nrf-sniffer-does-not-decode-packets-on-bonded-reconnect-after-encryption/503717"]&lt;p&gt;Does it make a difference of which &amp;#39;key&amp;#39; option is displayed? There is&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legacy Passkey&lt;/li&gt;
&lt;li&gt;Legacy OOB data&lt;/li&gt;
&lt;li&gt;Legacy LTK&lt;/li&gt;
&lt;li&gt;etc.&lt;/li&gt;&lt;/ul&gt;[/quote]
&lt;p&gt;No, this is only relevant if you need to manually input the key yourself.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf sniffer does not decode packets on bonded reconnect after encryption</title><link>https://devzone.nordicsemi.com/thread/503717?ContentTypeID=1</link><pubDate>Wed, 25 Sep 2024 10:02:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:08cbea76-18d1-4c12-b6fe-33a60e0b29c5</guid><dc:creator>brianreinhold</dc:creator><description>&lt;p&gt;Does it make a difference of which &amp;#39;key&amp;#39; option is displayed? There is&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legacy Passkey&lt;/li&gt;
&lt;li&gt;Legacy OOB data&lt;/li&gt;
&lt;li&gt;Legacy LTK&lt;/li&gt;
&lt;li&gt;etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you unpair the device and peer and redo the bonding (so new keys are generated) will this cause a problem on the reconnect? Yesterday the pairing worked but all reconnects failed. This AM I did the same procedure on a fresh restart of the system and both the pairing and reconnect succeeded. I have not tried a repair. I had it on Legacy Passkey with no entry. Yesterday I tried various options of the keys (no entries) and they all gave the same MIC errors on reconnect but succeeded on pairing. I even tried the &amp;#39;clear&amp;#39; option with the same result.&lt;/p&gt;
&lt;p&gt;I am wondering if the keys are remembered the first time for a given device and not refreshed if one does a re-pairing?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nrf sniffer does not decode packets on bonded reconnect after encryption</title><link>https://devzone.nordicsemi.com/thread/503715?ContentTypeID=1</link><pubDate>Wed, 25 Sep 2024 09:57:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:108ec3f4-f4bd-427d-9e74-38914fdfe35d</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Please post the sniffer capture that contains the initial key exchange and the subsequent connection where you&amp;nbsp;see the MIC failures so I can review it.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Vidar&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>