<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/28426/ble-4-2-sniffer</link><description>I am hoping to get solid verification that nordic offers a solution for sniffing BLE 4.2 packets. 
 The application I need to sniff is maxing out the MTU (250B payload) so I need support for long packets. 
 The blogs and googling haven&amp;#39;t provided me</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 28 Mar 2018 23:20:08 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/28426/ble-4-2-sniffer" /><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/126359?ContentTypeID=1</link><pubDate>Wed, 28 Mar 2018 23:20:08 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b44f1b61-82ed-49e5-abc2-60be497774df</guid><dc:creator>jeffs</dc:creator><description>&lt;p&gt;Just to keep terms correct, I think you may be looking for a larger PDU.&amp;nbsp; A larger GATT MTU can be supported with 4.0/4.1.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/125503?ContentTypeID=1</link><pubDate>Thu, 22 Mar 2018 10:59:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6ee7ddf4-9a4d-4fa7-bb1f-f8529a46f7d7</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;Are you sure, that it can capture and display larger MTU size traffic?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112217?ContentTypeID=1</link><pubDate>Tue, 19 Dec 2017 09:12:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:39fbae1e-844e-49ee-b621-b7bcc409d51f</guid><dc:creator>viewtool</dc:creator><description>&lt;p&gt;Try Hollong Viewtool sniffer:
&lt;a href="https://www.amazon.com/ViewTool-Professional-Bluetooth-Protocol-Analyzer/dp/B074R9854R/ref=sr_1_fkmr0_2?ie=UTF8&amp;amp;qid=1513654458&amp;amp;sr=8-2-fkmr0&amp;amp;keywords=hollong+ble4.2"&gt;www.amazon.com/.../ref=sr_1_fkmr0_2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Just $99!!!Support BLE4.0/4.1/4.2 protocol analysis and interpret&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112235?ContentTypeID=1</link><pubDate>Mon, 04 Sep 2017 11:38:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:016768d7-f489-49de-88c8-56d91cf3f43b</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;Works like a charm for me. Sorry for the late feedback!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112233?ContentTypeID=1</link><pubDate>Wed, 16 Aug 2017 10:53:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:335a98d8-a3aa-44a4-bc0f-84522a64a1d7</guid><dc:creator>Phil Beeson</dc:creator><description>&lt;p&gt;At the moment I&amp;#39;d settle for support for 4.2 Data Length Extensions.   Longer term I&amp;#39;d want to see support for all the 5.0 features endnode asks for.   Put simply, if you add a feature to the SD, then I want to be able to see the OTA data with the sniffer so that if something is going wrong, I have a chance of understanding it.
It is encouraging to hear that there is an internal push to make this happen.  We&amp;#39;ll all thank you for it when it does!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112230?ContentTypeID=1</link><pubDate>Wed, 09 Aug 2017 12:14:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f331fb51-c192-421c-89b7-ce58ffecc3bc</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;As answered by Hung the answer remains &amp;quot;no to 4.2 support at this point&amp;quot; but we are trying hard to make that a yes. I understand and share your frustration. We are now staffed up for Wireshark support and continue to push internally to get the firmware upgrades in place.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112232?ContentTypeID=1</link><pubDate>Wed, 09 Aug 2017 11:57:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0718b331-3919-4811-8442-cecbe4dc6ce2</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;Well ideally Nordic sniffer should be able to follow connection of two Nordic nRF52840 PDKs using whatever config you have in throughput demo (PDU extension, ATT MTU extension, connection interval extension, long range and 2MBps air speeds, extended broadcasting once it is supported by your stack etc.) I totally understand that it&amp;#39;s extensive work and that some features might be easier to do then others. I guess it&amp;#39;s more strategic decision if Nordic invests to nRF sniffer at all (because correct me if I&amp;#39;m wrong but there was really minimal effort put into it in last 3 years, it hardly changed since 2014). It&amp;#39;s unbelievably useful tool for all BLE developers on the budget today and as more and more will migrate to new 4.2/5.0 features it has potential to be either forgotten in few years or conquer this space;) It&amp;#39;s up to you guys.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112231?ContentTypeID=1</link><pubDate>Wed, 09 Aug 2017 11:50:34 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c93e8cf1-f712-4549-8277-b10e852ae7a0</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;We do have support for Wireshark 2.4.x at this point with &lt;a href="https://devzone.nordicsemi.com/question/67447/wireshark-201-and-nrfsniffer/?answer=90353#post-id-90353"&gt;one manual change needed to attach the DLT 157 to &amp;quot;nordic_ble&amp;quot;&lt;/a&gt;. Yes, 4.2 is a gap.&lt;/p&gt;
&lt;p&gt;Can you comment on which 4.2 features that you are looking at ? some are fairly easy to address but others are a bit harder.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112242?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 21:11:24 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e7868f79-c077-46fe-b5e9-ff36da841b3c</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;My recollection is it puts a handy header in yellow telling you DLT157 isn&amp;#39;t registered and helpfully suggesting you go to Preferences-&amp;gt;Protocols-&amp;gt;DLT_USER. Which &lt;a href="https://devzone.nordicsemi.com/question/67447/wireshark-201-and-nrfsniffer/"&gt;the guy in this thread&lt;/a&gt; followed, worked out the only hard bit, that the decoder is called &amp;#39;nordic_ble&amp;#39; and .. due to wireshark integrating the decoder 2 years ago, it works. And you all the new BLE stuff, and a ton of bug fixes.&lt;/p&gt;
&lt;p&gt;he also gives some handy tips in there for capturing from a pipe which won&amp;#39;t work because the OSX pipes aren&amp;#39;t in the same place, I believe it&amp;#39;s on-screen somewhere in the app and you could probably set it up for a live capture, but I can&amp;#39;t imagine it&amp;#39;s fun.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112241?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 14:31:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a2c2dfcc-9e10-4316-a461-c5ee606125ee</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;Well I tried it and it just shows raw byte packages. Is wireshark going to decode the BLE PDUs on it&amp;#39;s own, or is the wireshark dissector from the nordic sniffer required?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112248?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 13:39:52 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e8f9a3e5-f5b4-43e0-a84c-15802db889be</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;no - where did you get that idea from - I use the latest and greatest and it has much better BTLE decoding. The wire format hasn&amp;#39;t changed.&lt;/p&gt;
&lt;p&gt;Perhaps you should try some things out, you seem hamstrung by things you think you can&amp;#39;t do.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112249?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 12:37:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fe8b2d4a-af59-4a60-874f-36e4eee64af6</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;But then, I still need the old version of wire shark to analyse it?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112237?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 12:06:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:52d514c2-efac-44bc-8df8-e674dff01279</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;it&amp;#39;s on the Capture menu - there&amp;#39;s a save button - that brings up a dialog which asks you where you want it saved.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112236?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 12:04:50 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b435294d-2049-4ea1-a13e-04e104c850e8</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;Well, I thought the project isn&amp;#39;t alive anymore. With sourceforge, it seems that even the password recovery process isn&amp;#39;t working anymore.&lt;/p&gt;
&lt;p&gt;I find the capture to wireshark the most usefull option. I tried to use the capture to PCAP option, but I have to clue, where the resulting output should be found.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112247?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:53:30 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:61959af3-92e8-4b51-9bfd-e37b8ab0d0fd</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;yeah - is there a bug report I missed? I&amp;#39;ve not seen anyone post a question for a year I think. Given that Nordic continues to recommend an older version of wireshark I had no idea anyone was using a newer one. I tend to dump the stuff to pcap files with the code and then look at it in wireshark afterwards anyway, never really found the &amp;#39;live view&amp;#39; that useful (and it got broken by one of the wireshark updates a couple of years back but I think that&amp;#39;s long fixed by now).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112246?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:51:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d3a6c54a-ca51-44ff-a43f-2afa34c60d3f</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;@RK Are you talking about ble-sniffer-osx?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112245?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:50:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:684ed44a-eb6a-41f6-8f57-0bdb9dda7a59</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;@RK Thanks I didn&amp;#39;t saw that on the first spot.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112244?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:49:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3238cc6d-b068-4503-9211-ff2089856489</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;ps if you wanted it to work with a more recent version of wireshark, did you think of perhaps putting a comment or filing a bug on the project. If people don&amp;#39;t ask, I sort of tend to assume they don&amp;#39;t need.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112243?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:46:41 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6dc0a860-62c3-4944-a020-657b37551091</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;OK at some point I&amp;#39;ll upgrade to the latest wireshark for it, I thought I was at least fairly current .. actually it&amp;#39;s easier now as all the drivers are built in.&lt;/p&gt;
&lt;p&gt;And I don&amp;#39;t need to share the protocol documentation, nordic provides it in the package you download, they made that available about .. well 3 years ago. You just have to read it.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112240?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:43:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:615937da-c6fc-4a0a-bb96-406af7d8064d</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;@RK Well, if you are talking about ble-sniffer-osx, I&amp;#39;m using that. But unfortunately, this isn&amp;#39;t working with recent versions of wire share. Do you have protocol documentations, that you can share with us. Starting with a UART &amp;lt;-&amp;gt; Wireshark adapter, using the existing eval board firmware could speedup development.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112239?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:41:31 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:2e767602-5261-44d7-b799-259eeb1f35b3</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;I&amp;#39;m afraid you are right but anyway I would very much recommend Nordic to invest to their Sniffer, it could be again great tool on nRF52 or nRF52840 DK and marketing impact on the community (= people who are not using nRF chips yet but would use Sniffer and potentially migrate to Nordic HW completely) could easily bring the investment back... but probably just my view.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112238?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:37:45 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:684c3231-9cb7-4f07-98c3-015479f7c8e5</guid><dc:creator>RK</dc:creator><description>&lt;p&gt;I did the OSX port of the receiving software 3-4 years ago. That&amp;#39;s been available ever since, I still use it. I don&amp;#39;t think Nordic has any plans to rewrite the sniffer software itself, so you&amp;#39;re never going to get the kind of BTLE5 information you want that way.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112234?ContentTypeID=1</link><pubDate>Tue, 08 Aug 2017 11:32:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5d5ec5ae-b7de-442f-a753-612f52abad70</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;I&amp;#39;m in the very same situation. I have MTU sizes &amp;gt; 200 bytes and I&amp;#39;m blind to what happens over the air. In addition, I have the problem, that I&amp;#39;m using a Mac to work with. If I got the NRF Sniffer architecture right: There is a firmware on an evaluation board, sending the received data via a serial connection, which is then reformated by some python scripts, which send sends the data to wireshark for interpretation.&lt;/p&gt;
&lt;p&gt;I would be happy to help to port the windows-only part to OS/X and to help to improve the eval board firmware, if Nordic want&amp;#39;s to release this as open source.&lt;/p&gt;
&lt;p&gt;I mean, yes, I could write a firmware for an eval board that does the same and write an adapter for wireshark, but this would likely take me some weeks and the NRF Sniffer is already there.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112229?ContentTypeID=1</link><pubDate>Tue, 25 Jul 2017 14:50:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6ee77b4c-bade-44a5-afb9-b47b5ca353ee</guid><dc:creator>endnode</dc:creator><description>&lt;p&gt;I do agree Phil, missing radio sniffer FW support with BT LE 4.2 and 5 features is probably one of the biggest lack in Nordic support portfolio today. Hopefully they will invest into this again (soon).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: BLE 4.2 sniffer</title><link>https://devzone.nordicsemi.com/thread/112228?ContentTypeID=1</link><pubDate>Tue, 25 Jul 2017 14:47:22 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a5969aa3-76f9-4993-ad33-0ec76d317750</guid><dc:creator>Phil Beeson</dc:creator><description>&lt;p&gt;It&amp;#39;s a real shame Nordic haven&amp;#39;t updated their sniffer for nRF52,  trying to work with BLE 4.2 data length extensions, or even recent versions of Wireshark just isn&amp;#39;t supported.   It&amp;#39;s just frustrating as they are normally really good at supporting developers, but I feel they&amp;#39;ve really dropped the ball on this.&lt;/p&gt;
&lt;p&gt;However, I&amp;#39;ve been searching for a solution that doesn&amp;#39;t cost the same as a small car and came across the USB-KW41Z from NXP.    NXP support tell me that it will sniff BLE4.2 with long packets (&lt;a href="https://community.nxp.com/thread/453948)"&gt;community.nxp.com/.../453948)&lt;/a&gt; complete with wireshark screen capture.   It&amp;#39;s a relatively cheap device at around £70.&lt;/p&gt;
&lt;p&gt;However, It&amp;#39;s only fair to say, that so far I can&amp;#39;t even follow BLE 4.1 unencrypted connections with it.  Other people seem to be having some success (see NXP screenshot) but I&amp;#39;m not, so I can&amp;#39;t wholeheartedly recommend it,  but if you feel lucky, it might be worth a try.&lt;/p&gt;
&lt;p&gt;Sorry Nordic,  I wouldn&amp;#39;t normally highlight competitor&amp;#39;s offerings, but while you were developing the glowing thingy on my desk in front of me, others were developing tools that people in the devloper zone are actually asking for.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>