<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>can private address be used to stop connection</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/13659/can-private-address-be-used-to-stop-connection</link><description>Hi, 
 I&amp;#39;ve read the BT specs covering addressing several times and still don&amp;#39;t really understand how private addresses work in real life. 
 Lets say my peripheral starts out with no IRKs stored and has never been bonded. During user setup, a known central</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 05 May 2016 02:22:00 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/13659/can-private-address-be-used-to-stop-connection" /><item><title>RE: can private address be used to stop connection</title><link>https://devzone.nordicsemi.com/thread/52190?ContentTypeID=1</link><pubDate>Thu, 05 May 2016 02:22:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c610c724-b6c4-4ee0-8682-a0e187524f61</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;If you have the additional step that someone has sniffed a whitelisted device getting connected then yes you can replay the address and get as far as connection. That&amp;#39;s true of any address type,  resolvable private addresses aren&amp;#39;t about security, they are about privacy.&lt;/p&gt;
&lt;p&gt;Your second question doesn&amp;#39;t make so much sense. You wouldn&amp;#39;t usually share an IRK, an IRK is an identity and is coupled with all the encryption keys for that identity, you don&amp;#39;t want two things to look like the same thing. You could if you wanted, but it wouldn&amp;#39;t be usual. If you&amp;#39;re asking how, after you bond with one device and move into a whitelist-only connection mode you can bond with a second one; either you drop the whitelisting, bond, then restart it with them both whitelisted, or you write something complicated to pass keys through the bonded device to add a second one.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: can private address be used to stop connection</title><link>https://devzone.nordicsemi.com/thread/52189?ContentTypeID=1</link><pubDate>Thu, 05 May 2016 02:06:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9670f884-b2d0-40ba-ab9f-2edc61adbdff</guid><dc:creator>andrewjfox</dc:creator><description>&lt;p&gt;How does a new, legitimate, central bond with the device, if it&amp;#39;s previously bonded with another central? Is there a way of 2 centrals sharing the IRKs so the new central can also connect to the peripheral?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: can private address be used to stop connection</title><link>https://devzone.nordicsemi.com/thread/52188?ContentTypeID=1</link><pubDate>Thu, 05 May 2016 01:45:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a7b520e3-c7de-4488-a404-88f8c6a98df4</guid><dc:creator>andrewjfox</dc:creator><description>&lt;p&gt;But if someone is eavesdropping and they see what address is trasmitted, when they want to connect can&amp;#39;t they just echo the same address. Even if it&amp;#39;s encrypted, the final result will match the entry in the whitelist, or do I have this wrong&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: can private address be used to stop connection</title><link>https://devzone.nordicsemi.com/thread/52187?ContentTypeID=1</link><pubDate>Thu, 05 May 2016 01:30:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0262d53c-8313-48e1-afea-1339b97d1608</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;If you don&amp;#39;t have the IRK you can&amp;#39;t try to spoof the address, the private resolvable address is made up of a random part plus the same random part encrypted with the IRK.&lt;/p&gt;
&lt;p&gt;If the peripheral is set up only to accept connections from whitelisted peers then it will deny connection from anything not on the list. If that list contains some resolvable private addresses, ie basically IRKs as that&amp;#39;s the important part, it will deny connection to any resolvable private address it sees which was not constructed using an IRK in that list.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>