<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Simulation of insecure legacy pairing using nRF52840 dongles and nrf Connect for Desktop</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/121208/simulation-of-insecure-legacy-pairing-using-nrf52840-dongles-and-nrf-connect-for-desktop</link><description>Greetings, everyone, I have encountered a configuration(?) problem while trying to setup a lab for a BLE course I am teaching. 
 
 The idea is to showcase the vulnerability of legacy connections and pairing. I seek to do that via pairing 2 dongles with</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Sun, 11 May 2025 20:31:46 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/121208/simulation-of-insecure-legacy-pairing-using-nrf52840-dongles-and-nrf-connect-for-desktop" /><item><title>RE: Simulation of insecure legacy pairing using nRF52840 dongles and nrf Connect for Desktop</title><link>https://devzone.nordicsemi.com/thread/534771?ContentTypeID=1</link><pubDate>Sun, 11 May 2025 20:31:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2cca6553-43b9-4462-a3b3-feaa2d75f02b</guid><dc:creator>Nikita Kokhan</dc:creator><description>&lt;p&gt;Thank you very much, it worked!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Simulation of insecure legacy pairing using nRF52840 dongles and nrf Connect for Desktop</title><link>https://devzone.nordicsemi.com/thread/534188?ContentTypeID=1</link><pubDate>Wed, 07 May 2025 06:10:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2696a2c3-37d1-4221-87d7-e627a59a230c</guid><dc:creator>Vidar Berg</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Please check if&amp;nbsp;&lt;a href="https://github.com/zephyrproject-rtos/zephyr/blob/3dcc1d2dd6e1c0a29f6b1c772777d00f46377de8/subsys/bluetooth/host/Kconfig#L562"&gt;CONFIG_SMP_SC_ONLY&lt;/a&gt;&amp;nbsp;is selected in your build (build/&amp;lt;prj name&amp;gt;/zephyr/.conf). This config setting enforces security level 4 which cannot be reached with legacy pairing and would explain the authentication failure.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Vidar&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>