<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/34162/does-static-passkey-provide-mitm-protection-after-ble4-2</link><description>BLUETOOTH SPECIFICATION Version 5.0 | Vol 3, Part H page 2321 Figure 2.4 
 
 According to the figure, if an eavesdrop device exists in the pairing process, it is easy to obtain Cai, Nai, PKA, and PKb. It should not be difficult to obtain rai, and thus</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Mon, 14 May 2018 14:37:54 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/34162/does-static-passkey-provide-mitm-protection-after-ble4-2" /><item><title>RE: does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/thread/131914?ContentTypeID=1</link><pubDate>Mon, 14 May 2018 14:37:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0218b559-665f-4b65-b9bc-4fad43fa193a</guid><dc:creator>Stayhungry</dc:creator><description>&lt;p&gt;Thanks, Mttrinh.&amp;nbsp;Great answer&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/thread/131911?ContentTypeID=1</link><pubDate>Mon, 14 May 2018 14:30:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:249d5670-5f48-4eb4-b070-b23267d66615</guid><dc:creator>Mttrinh</dc:creator><description>&lt;p&gt;Sorry, what I meant was that it is a low probabilty to guess the passkey,&amp;nbsp;so for brute-force guesser it will take some time to connect to a device. For eavesdroppers, who can sniff the static passkey pairing transmission between two devices, it won&amp;#39;t be difficult to get a hold of the passkey. So it is&amp;nbsp;like you said once the static passkey is known it won&amp;#39;t be secure at all.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Static passkey&amp;nbsp;will only help you avoid that users connect to the wrong device in a multi-device environment.&amp;nbsp;If you need protection against MITM-attacks, you should use a random passkey with a display.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/thread/131893?ContentTypeID=1</link><pubDate>Mon, 14 May 2018 13:28:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0d2a8199-5b10-4b3f-8568-8166b4ca24d2</guid><dc:creator>Stayhungry</dc:creator><description>&lt;p&gt;Just like Turbo J said, the MitM has all that is needed to perfectly fake the device once the static password is known.&lt;/p&gt;
&lt;p&gt;As I said in&amp;nbsp;the question, getting a static passkey doesn&amp;#39;t seem to be difficult, just need a sniffer ?&lt;/p&gt;
&lt;p&gt;So I think the static passkey cannot provide MITM protection. But there are many static passkey usages in the community, but I don&amp;#39;t understand what the purpose of doing so is.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/thread/131888?ContentTypeID=1</link><pubDate>Mon, 14 May 2018 13:16:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c09b00fe-fea0-4745-8a32-73af8a345e9c</guid><dc:creator>Turbo J</dc:creator><description>&lt;p&gt;Why the &amp;quot;low probability&amp;quot;? The MitM has all that is needed to perfectly fake the device once the static password is known.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;This is the&amp;nbsp;&lt;strong&gt;worst case&lt;/strong&gt; - software allows setting mitm bit but is actually &lt;strong&gt;not&lt;/strong&gt; mitm- safe.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: does static passkey provide MITM protection after BLE4.2 ?</title><link>https://devzone.nordicsemi.com/thread/131882?ContentTypeID=1</link><pubDate>Mon, 14 May 2018 12:55:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4e8ec90a-0c90-43c8-b89a-fed5b44d11b6</guid><dc:creator>Mttrinh</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;You will be able to get &amp;quot;MITM protection&amp;quot; when using static passkey, it&amp;#39;s just that it isn&amp;#39;t totally secure from MITM attacks. It&amp;nbsp;is a relatively low probability for success.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>