<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/117069/coded-phy-on-ble-sniffer-not-working</link><description>I&amp;#39;m trying to use nordic&amp;#39;s BLE sniffer on a nRF52833-DK. I have programmed it with the firmware &amp;quot;sniffer_nrf52833dk_nrf52833_4.1.1.hex&amp;quot;. 
 I&amp;#39;ve then tried both the command &amp;quot; nrfutil ble-sniffer sniff --port /dev/ttyACM4 --coded&amp;quot; as well as &amp;quot;nrfutil ble</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 17 Jan 2025 21:49:44 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/117069/coded-phy-on-ble-sniffer-not-working" /><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/518922?ContentTypeID=1</link><pubDate>Fri, 17 Jan 2025 21:49:44 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:436db231-ff44-4c5e-86e8-29025d39d477</guid><dc:creator>matt.nickels</dc:creator><description>&lt;p&gt;Any update on this issue?&amp;nbsp; Latest ble-sniffer in nrfutil from what I am garnering doesn&amp;#39;t work with Wireshark, and can&amp;#39;t capture LE Coded PHY packets in the nrfutil command line.&amp;nbsp; My primary purpose for using NRF device is the LE Coded PHY support, so I am pretty hamstrung by these bugs.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/516229?ContentTypeID=1</link><pubDate>Tue, 24 Dec 2024 17:37:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:42793479-804c-4add-a9e6-cc8b6b76bf74</guid><dc:creator>Emil Lenngren</dc:creator><description>&lt;p&gt;After reading&amp;nbsp;&lt;a id="" href="https://www.adam-thomas.co.uk/blog/nrfutil-bluetooth-sniffer-with-tshark/"&gt;https://www.adam-thomas.co.uk/blog/nrfutil-bluetooth-sniffer-with-tshark/&lt;/a&gt;&amp;nbsp;I now understand that there are two variants of the host part of the nrf ble sniffer, one &amp;quot;old&amp;quot; in Python and one &amp;quot;new&amp;quot; in Rust.&lt;/p&gt;
&lt;p&gt;The Python one works for me with Wireshark:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;$ nrf_sniffer_for_bluetooth_le_4.1.1/extcap/nrf_sniffer_ble.sh --extcap-interfaces --extcap-version=4.2
extcap {version=4.1.1}{display=nRF Sniffer for Bluetooth LE}{help=https://www.nordicsemi.com/Software-and-Tools/Development-Tools/nRF-Sniffer-for-Bluetooth-LE}
interface {value=/dev/ttyACM0-4.2}{display=nRF Sniffer for Bluetooth LE}
control {number=0}{type=selector}{display=Device}{tooltip=Device list}
control {number=1}{type=selector}{display=Key}{tooltip=}
control {number=2}{type=string}{display=Value}{tooltip=6 digit passkey or 16 or 32 bytes encryption key in hexadecimal starting with &amp;#39;0x&amp;#39;, big endian format.If the entered key is shorter than 16 or 32 bytes, it will be zero-padded in front&amp;#39;}{validation=\b^(([0-9]{6})|(0x[0-9a-fA-F]{1,64})|([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2}) (public|random))$\b}
control {number=3}{type=string}{display=Adv Hop}{default=37,38,39}{tooltip=Advertising channel hop sequence. Change the order in which the sniffer switches advertising channels. Valid channels are 37, 38 and 39 separated by comma.}{validation=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}
control {number=7}{type=button}{display=Clear}{tooltop=Clear or remove device from Device list}
control {number=4}{type=button}{role=help}{display=Help}{tooltip=Access user guide (launches browser)}
control {number=5}{type=button}{role=restore}{display=Defaults}{tooltip=Resets the user interface and clears the log file}
control {number=6}{type=button}{role=logger}{display=Log}{tooltip=Log per interface}
value {control=0}{value= }{display=All advertising devices}{default=true}
value {control=0}{value=[00,00,00,00,00,00,0]}{display=Follow IRK}
value {control=1}{value=0}{display=Legacy Passkey}{default=true}
value {control=1}{value=1}{display=Legacy OOB data}
value {control=1}{value=2}{display=Legacy LTK}
value {control=1}{value=3}{display=SC LTK}
value {control=1}{value=4}{display=SC Private Key}
value {control=1}{value=5}{display=IRK}
value {control=1}{value=6}{display=Add LE address}
value {control=1}{value=7}{display=Follow LE address}&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;but the new one in Rust doesn&amp;#39;t work with Wireshark:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;$ ~/.local/lib/wireshark/extcap/nrfutil-ble-sniffer-shim --extcap-interfaces --extcap-version=4.2
extcap {version=0.14.1}{display=nRF Sniffer for Bluetooth LE}{help=https://www.nordicsemi.com/Software-and-Tools/Development-Tools/nRF-Sniffer-for-Bluetooth-LE}
control {number=0}{type=selector}{display=Device}{tooltip=Device list}
control {number=1}{type=selector}{display=Key}{tooltip=}
control {number=2}{type=string}{display=Value}{tooltip=6 digit passkey or 16 or 32 bytes encryption key in hexadecimal starting with &amp;#39;0x&amp;#39;, big endian format. If the entered key is shorter than 16 or 32 bytes, it will be zero-padded in front}{validation=\b^(([0-9]{2,6})|(0x[0-9a-fA-F]{1,64})|([0-9A-Fa-f]{2}[:-]){5}([0-9A-Fa-f]{2}) (public|random))$\b}
control {number=3}{type=string}{display=Adv Hop}{default=37,38,39}{tooltip=Advertising channel hop sequence. Change the order in which the sniffer switches advertising channels. Valid channels are 37, 38 and 39 separated by comma.}{validation=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}
control {number=7}{type=button}{display=Clear}{tooltip=Clear or remove device from Device list}
control {number=4}{type=button}{role=help}{display=Help}{tooltip=Access user guide (launches browser)}
control {number=5}{type=button}{role=restore}{display=Defaults}{tooltip=Resets the user interface and clears the log file}
control {number=6}{type=button}{role=logger}{display=Log}{tooltip=Log per interface}
value {control=0}{value= }{display=All advertising devices}{default=true}
value {control=0}{value=00:00:00:00:00:00 public}{display=Follow IRK}
value {control=1}{value=0}{display=Legacy Passkey}{default=true}
value {control=1}{value=1}{display=Legacy OOB data}
value {control=1}{value=2}{display=Legacy LTK}
value {control=1}{value=3}{display=SC LTK}
value {control=1}{value=4}{display=SC Private Key}
value {control=1}{value=5}{display=IRK}
value {control=1}{value=6}{display=Add LE address}
value {control=1}{value=7}{display=Follow LE address}
value {control=1}{value=8}{display=Sniffer Drift}&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;As you can see, no &amp;quot;interface&amp;quot; is listed. Running Ubuntu 24.04. As mentioned earlier, running it from the command line using &amp;quot;&lt;span&gt;nrfutil ble-sniffer sniff&amp;quot; works though.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/515304?ContentTypeID=1</link><pubDate>Tue, 17 Dec 2024 14:49:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:493fab77-1a47-4eed-84d5-8fc03e0214d4</guid><dc:creator>matt.nickels</dc:creator><description>&lt;ul&gt;
&lt;li class="attribute-item close"&gt;Case ID: 337828&lt;/li&gt;
&lt;/ul&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/515258?ContentTypeID=1</link><pubDate>Tue, 17 Dec 2024 11:57:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9ce1da2d-4f1e-4ba0-aebf-a80538044b4c</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Matt,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Please create a new ticket for your issue.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/515201?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2024 22:18:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fdb75bc2-51b0-4899-ac3f-adece6a84878</guid><dc:creator>matt.nickels</dc:creator><description>&lt;p&gt;System info.&amp;nbsp; Ubuntu Server 22.04&lt;/p&gt;
&lt;p&gt;Sniffer Firmware is 4.1.1.hex&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;$ nrfutil --version&lt;br /&gt;nrfutil 7.13.0 (8289424 2024-07-01)&lt;br /&gt;commit-hash: 82894242d19ff24a1541712312b3ea3af0ca8f85&lt;br /&gt;commit-date: 2024-07-01&lt;br /&gt;host: x86_64-unknown-linux-gnu&lt;br /&gt;build-timestamp: 2024-07-01T07:32:31.582129656Z&lt;br /&gt;classification: nrf-external&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;$ nrfutil ble-sniffer --version&lt;br /&gt;nrfutil-ble-sniffer 0.14.1 (0cf4b58 2024-10-28)&lt;br /&gt;commit-hash: 0cf4b584c0645a208dc6e7f562596318d6414f5f&lt;br /&gt;commit-date: 2024-10-28&lt;br /&gt;host: x86_64-unknown-linux-gnu&lt;br /&gt;build-timestamp: 2024-10-28T14:50:49.379067757Z&lt;br /&gt;classification: nrf-external&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;$ nrfutil device list&lt;/p&gt;
&lt;p&gt;D4DF85770DA5CEA9&lt;br /&gt;product nRF Sniffer for Bluetooth LE&lt;br /&gt;ports /dev/ttyACM0&lt;br /&gt;traits nordicUsb, serialPorts, usb&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;$ uname -r&lt;br /&gt;5.15.0-125-generic&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/515200?ContentTypeID=1</link><pubDate>Mon, 16 Dec 2024 22:10:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f9450023-a917-45bd-b6ac-7442e9ca8c14</guid><dc:creator>matt.nickels</dc:creator><description>&lt;p&gt;I would like to second this issue.&amp;nbsp; I am unable to get any LE Coded packets using this in command line.&amp;nbsp; I need to run this on Ubuntu Server so I don&amp;#39;t have the Wireshark GUI as an option, need command line to work.&amp;nbsp; I have similarly tried various combinations of the --scan-follow flags, --only-advertising, and --coded flag without any success.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514533?ContentTypeID=1</link><pubDate>Wed, 11 Dec 2024 13:42:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:07435595-bda0-4c76-b057-240f1db23ac4</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Thanks Emil, I will report to the team.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514456?ContentTypeID=1</link><pubDate>Wed, 11 Dec 2024 10:03:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5af8986a-76bf-4ebd-9f97-6f3268b7e393</guid><dc:creator>Emil Lenngren</dc:creator><description>&lt;p&gt;Correct. &amp;quot;nrfutil install ble-sniffer&amp;quot;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514454?ContentTypeID=1</link><pubDate>Wed, 11 Dec 2024 10:01:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6a47b126-9aa8-4801-84ad-10a91d6adba1</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Emil,&amp;nbsp;&lt;br /&gt;Good to know you find a way to fix it. I think the main problem is the incompatibility with Python v3.12 and later.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;How did you install nRF Sniffer ? Have you tried to install nrf Sniffer from nrfutil ?&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514373?ContentTypeID=1</link><pubDate>Tue, 10 Dec 2024 19:28:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4afa9739-6e8f-43fa-b108-b7dff99ac07f</guid><dc:creator>Emil Lenngren</dc:creator><description>&lt;p&gt;Thanks, prepending each problematic line with &amp;quot;r&amp;quot; fixed that error. Maybe consider&amp;nbsp;release an update which fixes that?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514372?ContentTypeID=1</link><pubDate>Tue, 10 Dec 2024 19:24:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4531307d-951b-4399-9e00-2160d7f5cd72</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Emil,&amp;nbsp;&lt;br /&gt;Could you check this ticket ?&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/107828/invalid-escape-sequence-s"&gt;invalid escape sequence \s&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514369?ContentTypeID=1</link><pubDate>Tue, 10 Dec 2024 19:11:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:65efefa0-c8f3-4796-a818-caca266a189e</guid><dc:creator>Emil Lenngren</dc:creator><description>&lt;p&gt;Sniffer version is 4.1.1. &amp;quot;nrfutil ble-sniffer&amp;quot; version is&amp;nbsp;&lt;span&gt;0.14.1.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Python version is 3.12.3.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Wireshark version is whatever comes with Ubunut 24.04, i.e. 4.2.2.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I managed to get the Wireshark plugin working by running &amp;quot;/usr/bin/python3 -m pip install -r requirements.txt --break-system-packages&amp;quot; in the extcap folder. I don&amp;#39;t know why the &amp;quot;break system packages&amp;quot; was necessary. The system package python3-pyserial does not exist.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;The coded phy options on the command line seem broken but it works with the settings in the Wireshark GUI. However, whenever I press the stop button I get a popup with this error:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;pre class="ui-code" data-mode="text"&gt;Error from extcap pipe: /home/emil/.local/lib/wireshark/extcap/nrf_sniffer_ble.py:187: SyntaxWarning: invalid escape sequence &amp;#39;\s&amp;#39;
  &amp;quot;{validation=^\s*((37|38|39)\s*,\s*){0,2}(37|38|39){1}\s*$}{required=true}&amp;quot; % CTRL_ARG_ADVHOP)
/home/emil/.local/lib/wireshark/extcap/nrf_sniffer_ble.py:716: SyntaxWarning: invalid escape sequence &amp;#39;\s&amp;#39;
  m = re.search(&amp;quot;^\s*rssi\s*(&amp;gt;=?)\s*(-?[0-9]+)\s*$&amp;quot;, capture_filter, re.IGNORECASE)&lt;/pre&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Coded PHY on BLE sniffer not working?</title><link>https://devzone.nordicsemi.com/thread/514125?ContentTypeID=1</link><pubDate>Mon, 09 Dec 2024 20:24:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4d409241-7347-443a-9ea1-28a49e032671</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Emil,&lt;/p&gt;
&lt;p&gt;Could you let me know which&amp;nbsp;nRF Sniffer version you are using ?&amp;nbsp;&lt;br /&gt;Also please let me know the wireshark version.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I&amp;#39;m not so familiar with the installation on Linux but could you try to do step 3 at section 2.2 in this document ?&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/nrfutil_ble_sniffer_pdf/resource/nRF_Sniffer_BLE_UG_v4.0.0.pdf"&gt;https://docs.nordicsemi.com/bundle/nrfutil_ble_sniffer_pdf/resource/nRF_Sniffer_BLE_UG_v4.0.0.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It&amp;#39;s the best if you can run in it with Wireshark.&amp;nbsp;&amp;nbsp;&lt;br /&gt;I assume you can capture BLE advertising packet at 1Mbps and only having trouble with CODED PHY ?&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>