<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/39439/nrf-sniffer-unable-to-track-packet-data-length-changes</link><description>Hi, 
 I am trying to test an application running on the nRF52840 using your nRF Sniffer (actual version 2.0.0.2.beta). 
 My application should be able to request a change of the Bluetooth packet data length (DLE feature available since BLE 4.2) and it</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 30 Nov 2018 14:17:35 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/39439/nrf-sniffer-unable-to-track-packet-data-length-changes" /><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/159730?ContentTypeID=1</link><pubDate>Fri, 30 Nov 2018 14:17:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6254663a-ed9a-45ed-a487-31638266b47e</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;Hmm, PC load should not be an issue as we are decrypting on the nRF IC, but the serial traffic may be helped by having the PC load reduced. However MIC failure is coming from the firmware.This will need more testing to re-produce as I am not able to re-produce this yet.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/159442?ContentTypeID=1</link><pubDate>Wed, 28 Nov 2018 15:00:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:623d0847-ae77-4a3e-93f8-fe9c6ac151e2</guid><dc:creator>Magoo</dc:creator><description>&lt;p&gt;&lt;span&gt;Dear David Edwin,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;I was finally able to run a test with nRF Sniffer up to the point where I can exchange data packets with a DLE of 71 bytes.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;It turns out (at least in the few tests that I could run) that as expected, your fix with&amp;nbsp;nRF Sniffer v2 Beta 3-1 solves the problem with garbage data shown in the data packet payload (see problem reported above with&amp;nbsp;nrf_sniffer_2.0.0-beta-2-1_12oct2018_1c2a221 version).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regarding the frequent issue with &amp;quot;Encrypted packet decrypted incorrectly (bad MIC)&amp;quot; messages shown by the nRF Sniffer, I am wondering if it can be somewhat related to the CPU load of the PC running the sniffer?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;In fact, in my most recent tests, I have&amp;nbsp;tried&amp;nbsp;to keep the CPU load of the PC running nRF Sniffer very low (no software development environment, debugger, web browser, Java console and the like running) and this may have helped.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Can you confirm? Would it be worth to suggest this in the operating instructions of nRF Sniffer? Could it be improved?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Thank you, best regards.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/158728?ContentTypeID=1</link><pubDate>Thu, 22 Nov 2018 19:19:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9c5bf727-4168-4715-bad6-3c137ab7b5fc</guid><dc:creator>Magoo</dc:creator><description>&lt;p&gt;Dear David Edwin,&lt;/p&gt;
&lt;p&gt;thank you for the new nRF Sniffer v2 Beta 3-1.&lt;/p&gt;
&lt;p&gt;I tried it but unfortunately I was never able to arrive to the point where I change DLE to 71 bytes and try sending data. The sniffer looses track of encryption before that.&lt;/p&gt;
&lt;p&gt;I get plenty of:&lt;/p&gt;
&lt;pre&gt;&amp;quot;Encrypted packet decrypted incorrectly (bad MIC)&amp;quot;&lt;/pre&gt;
&lt;p&gt;messages.&lt;/p&gt;
&lt;p&gt;Very often they start arriving already during the Bluetooth pairing/connecting process.&lt;br /&gt;I attach a Wireshark log.&lt;/p&gt;
&lt;p&gt;In this sense (i.e. in decrypting the messages), the earlier nRF Sniffer Beta was more stable!&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/Wireshark-log.pcapng"&gt;devzone.nordicsemi.com/.../Wireshark-log.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/158159?ContentTypeID=1</link><pubDate>Tue, 20 Nov 2018 12:17:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1e7517cc-97c7-4456-920b-c2940d385db8</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;Fix posted with &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/40647/nrf-sniffer-decryption-is-not-working-after-entering-passkey/158153#158153"&gt;nRF Sniffer v2 Beta 3-1&lt;/a&gt;&amp;nbsp;, I tested successfully for encrypted DLE for 71 bytes&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/158119?ContentTypeID=1</link><pubDate>Tue, 20 Nov 2018 08:47:33 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ab8610fe-5df5-4604-9639-4c468446a021</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;Replicated the issue and testing a fix for this.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/158024?ContentTypeID=1</link><pubDate>Mon, 19 Nov 2018 15:07:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8345f24c-a321-456a-bee2-e9fa630eee69</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;Can you show the nRF Sniffer log file for this issue, whenever I see that the length is unexpectedly small, I see that there is a lot of packet losses on the UART.&lt;/p&gt;
&lt;p&gt;To view the nRF Sniffer log : Click on the log button on the nRF Sniffer toolbar in Wireshark&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/158002?ContentTypeID=1</link><pubDate>Mon, 19 Nov 2018 14:27:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:11872678-19df-4357-bd88-5896e17f13b4</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;Apologies. I did not get notifications on your updates to the case. The nRF Sniffer v2 beta-3 should have fixed this issue but let me attempt to replicate the issue.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/157105?ContentTypeID=1</link><pubDate>Tue, 13 Nov 2018 13:55:26 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e34af8a0-6ecb-4189-a52e-d1dd4d80021a</guid><dc:creator>Magoo</dc:creator><description>&lt;p&gt;Dear David Edvin,&lt;/p&gt;
&lt;p&gt;I&amp;#39;m wondering if you could replicate the issue that I reported in my reply of October 25 ?&lt;/p&gt;
&lt;p&gt;In that post I reported that&amp;nbsp;&lt;span&gt;nrf_sniffer_2.0.0-beta-2-1_12oct2018_1c2a221 is now capable to decode packets with length&amp;nbsp;greater&amp;nbsp;than 27 bytes, however, some of the payload bytes appear to display a wrong value.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;To my best knowledge, it must be an error with nrf_sniffer (showing wrong data) or with the SoftDevice (sending wrong data). My application sends exactly the same payload (all bytes zero) before and after switching from 27 to 71 bytes of on-air packet length. Before switching packet length, nrf_sniffer shows the data correctly (all bytes zero) as you can see in the log file attached to my previous post. The log includes some sniffed traffic before and after switching packet length from 27 to 71 bytes.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Thank you for your kind answer.&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Ricardo&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/154571?ContentTypeID=1</link><pubDate>Thu, 25 Oct 2018 18:21:01 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:49e8883f-e949-45b3-8cb6-3506e59dbec5</guid><dc:creator>Magoo</dc:creator><description>&lt;p&gt;Dear David,&lt;/p&gt;
&lt;p&gt;thank you for letting me test the nrf_sniffer_2.0.0-beta-2-1_12oct2018_1c2a221 version.&lt;/p&gt;
&lt;p&gt;It is an improvement over the earlier beta, but there are still problems.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;packet length is now reported correctly also after changing data packet length&lt;/li&gt;
&lt;li&gt;packets with a length of &amp;le;27 bytes are now&amp;nbsp;decrypted correctly (for example the battery service packets) after the change of data length&lt;/li&gt;
&lt;li&gt;however, packets with a length of 71 bytes (the size I use to accomodate 64 bytes of data payload + header) (and probably all packets with a length greater than 27 bytes) are still not decrypted correctly and are flagged as &amp;quot;Encrypted packet decrypted incorrectly (bad MIC)&amp;quot;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the following, I show you two screenshots: in the first one, you see my 64 bytes of data (which I intentionally set to be all zero, except the second byte which can be either 0x04 or 0x00) received correctly using the default&amp;nbsp;on-air packet length&amp;nbsp;of 27 bytes. The 64 bytes are split and transmitted in 3 packets (with a length of 27, 27 and&amp;nbsp;17 bytes respectively)&amp;nbsp;and reassembled correctly (at packet #5278). You can see the 64 bytes of payload&amp;nbsp;- all zeros - shown correctly in the lower part of the screenshot:&lt;/p&gt;
&lt;p&gt;&lt;img alt="OK with 27byte on-air packets" src="https://devzone.nordicsemi.com/resized-image/__size/1024x768/__key/communityserver-discussions-components-files/4/8244.Wireshark-screenshot2-before-changing-packet-length.png" /&gt;&lt;/p&gt;
&lt;p&gt;Then, at packet 7064&amp;nbsp;my device requests to increase the&amp;nbsp;on-air data packet length to 71 bytes and this request is acknoledged by the peer in packet 7065.&lt;/p&gt;
&lt;p&gt;Then, at packet 8020 you can see again a data packet with 64 bytes of payload which are&amp;nbsp;supposed to be all zeros.&lt;/p&gt;
&lt;p&gt;However, nRF Sniffer shows some garbage data inside (see bottom part of the following screenshot) and flags the packet as &amp;quot;Encrypted packet decrypted incorrectly (bad MIC)&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1024x768/__key/communityserver-discussions-components-files/4/7242.Wireshark-screenshot2-after-changing-packet-length.png" /&gt;&lt;/p&gt;
&lt;p&gt;I enclose you the full Wireshark log corresponding to above screenshots.&lt;/p&gt;
&lt;p&gt;Since in my application running on&amp;nbsp;the nRF52840 nothing changes&amp;nbsp;in the two situations (with on-air packet data length of 27 bytes or 71 bytes), as this is handled by the SoftDevice, I assume that it must still&amp;nbsp;be a bug in nRF Sniffer.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Or&amp;nbsp;it could be a bug&amp;nbsp;in the SoftDevice which sends wrong data (??)&amp;nbsp;- at this point of my development I am not yet able to tell if all 64 bytes of data are received correctly by the peer &amp;nbsp;- but this seems very unlikely to me. I can&amp;nbsp;however confirm that&amp;nbsp;at least&amp;nbsp;the first 15 bytes of data&amp;nbsp;are received&amp;nbsp;free of error.&lt;/p&gt;
&lt;p&gt;Best regards.&lt;/p&gt;
&lt;p&gt;Ricardo&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/8540.6_5F00_nRF-Sniffer-log_2D00_change-of-packet-data-length-_2800_DLE_2900_-w-beta2_2D00_1.pcapng"&gt;devzone.nordicsemi.com/.../8540.6_5F00_nRF-Sniffer-log_2D00_change-of-packet-data-length-_2800_DLE_2900_-w-beta2_2D00_1.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/154189?ContentTypeID=1</link><pubDate>Tue, 23 Oct 2018 22:42:47 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:5c67a4e4-bb3c-4e6f-93c9-18ed2c26277f</guid><dc:creator>Austin</dc:creator><description>&lt;p&gt;I was also seeing this issue with nRF Sniffer &lt;span&gt;2.0.0.2.beta.&amp;nbsp; After reinstalling with the attached 2.0.0-beta-2-1 I am able to successfully sniff encrypted packets using a nRF52840-DK v0.9.2.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/154011?ContentTypeID=1</link><pubDate>Tue, 23 Oct 2018 09:01:40 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:26ba7f57-2116-40c5-a7bd-1d4d3c5ce169</guid><dc:creator>David Edwin</dc:creator><description>&lt;p&gt;This is a bug in the beta 2. Please check using the attached version. You need to use a nRF52-DK or an nRF52840-DK&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/support-attachments/beef5d1b77644c448dabff31668f3a47-be52a403525144ac86f0dd34244f2fba/nrf_5F00_sniffer_5F00_2.0.0_2D00_beta_2D00_2_2D00_1_5F00_12oct2018_5F00_1c2a221.zip"&gt;devzone.nordicsemi.com/.../nrf_5F00_sniffer_5F00_2.0.0_2D00_beta_2D00_2_2D00_1_5F00_12oct2018_5F00_1c2a221.zip&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/153898?ContentTypeID=1</link><pubDate>Mon, 22 Oct 2018 17:06:44 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b336bb9b-ba04-427b-9de2-6c778d075cd0</guid><dc:creator>Magoo</dc:creator><description>&lt;p&gt;Hi Hung Bui,&lt;/p&gt;
&lt;p&gt;I can assure you that nRF Sniffer has been capturing well before the device has bonded to the computer, therefore the keys have been correctly sniffed.&lt;/p&gt;
&lt;p&gt;This&amp;nbsp;can&amp;nbsp;be easily verified&amp;nbsp;in the following screenshot:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/1024x768/__key/communityserver-discussions-components-files/4/6837.Wireshark-screenshot1.png" /&gt;&lt;/p&gt;
&lt;p&gt;In my application (a Generic HID BLE device), the data payload for input reports consists of 64 bytes.&lt;/p&gt;
&lt;p&gt;In the screenshot, you can se the correct transmission of such a payload in packets 5309+5311+5313, split in 3 segments when&amp;nbsp;using the default packet data length of 27 bytes.&lt;br /&gt;Data are received correctly and this occurs well after the device has bonded and exchanged the encryption keys.&lt;/p&gt;
&lt;p&gt;Another successful data transmission occurs in packets 5345+5347+5349.&lt;br /&gt;Therefore, nRF Sniffer has been able to catch the encryption keys correctly.&lt;/p&gt;
&lt;p&gt;Then, at packet n. 6973, my device requests a packet data length increase from 27&amp;nbsp;to 71 bytes. It does so by calling the function&amp;nbsp;&lt;a href="http://infocenter.nordicsemi.com/topic/com.nordic.infocenter.sdk5.v15.0.0/group__nrf__ble__gatt.html?cp=4_0_1_6_2_13_11#ga857b95d31c1b2454eb3ac70b96e096fd" rel="noopener noreferrer" target="_blank"&gt;nrf_ble_gatt_data_length_set()&lt;/a&gt; . This is to accomodate the 64 bytes of data payload in a single on-air data packet.&lt;/p&gt;
&lt;p&gt;Packet data length change is confirmed by the peer at packet&amp;nbsp;6974 and also confirmed by the following messages sent to the nRF Logger console:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;&amp;lt;info&amp;gt; app: USBD BLE Composite HID device started.
&amp;lt;info&amp;gt; app: USBD HID Composite device started.
&amp;lt;info&amp;gt; app: Erase bonds!
&amp;lt;debug&amp;gt; app: pm_whitelist_get returns 0 addr in whitelist and 0 irk whitelist
&amp;lt;info&amp;gt; app: Fast advertising.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Requesting to update ATT MTU to 67 bytes on connection 0x0.
&amp;lt;info&amp;gt; app: Connected
&amp;lt;debug&amp;gt; nrf_ble_gatt: Peer on connection 0x0 requested a data length of 251 bytes.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Updating data length to 27 on connection 0x0.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Peer on connection 0x0 requested an ATT MTU of 515 bytes.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Updating ATT MTU to 67 bytes (desired: 67) on connection 0x0.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Data length updated to 27 on connection 0x0.
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_rx_octets: 27
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_tx_octets: 27
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_rx_time: 2120
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_tx_time: 2120
&amp;lt;debug&amp;gt; nrf_ble_gatt: ATT MTU updated to 67 bytes on connection 0x0 (response).
&amp;lt;info&amp;gt; app: Connection secured: role: 1, conn_handle: 0x0, procedure: 1.
&amp;lt;info&amp;gt; app: New Bond, add the peer to the whitelist if possible
&amp;lt;info&amp;gt; app:     m_whitelist_peer_cnt 1, MAX_PEERS_WLIST 8
.....
.....
&amp;lt;info&amp;gt; app: we are going to request change of packet data length ...
&amp;lt;debug&amp;gt; nrf_ble_gatt: Updating data length to 71 on connection 0x0.
&amp;lt;debug&amp;gt; nrf_ble_gatt: Data length updated to 71 on connection 0x0.
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_rx_octets: 71
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_tx_octets: 71
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_rx_time: 2120
&amp;lt;debug&amp;gt; nrf_ble_gatt: max_tx_time: 2120
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;The problem is that shortly after, nRF Sniffer looses track of data encryption and all data packets are flagged as:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;Encrypted packet decrypted incorrectly (bad MIC)&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;For example, packet 8683 was a transmission of the usual 64 bytes of data (but only a length of 7 bytes is reported).&lt;/p&gt;
&lt;p&gt;And packets 9662, 9928, 10196 are standard &amp;quot;Battery Service&amp;quot; packets (8 bytes long), but are not decrypted anymore by nRF Sniffer. The problem persists for all subsequent data packets until the device is reset and a new bonding established.&lt;/p&gt;
&lt;p&gt;I can confirm that the data arrive correctly at the peer (a Macbook Pro) after the packet data length increase to 71 bytes, regardless of the fact that nRF Sniffer reports decryption errors. (fortunately at least this works&amp;nbsp;&lt;span class="emoticon" data-url="https://devzone.nordicsemi.com/cfs-file/__key/system/emoji/1f605.svg" title="Sweat smile"&gt;&amp;#x1f605;&lt;/span&gt; !)&lt;/p&gt;
&lt;p&gt;I enclose the full Wireshark log.&lt;/p&gt;
&lt;p&gt;In my opinion&amp;nbsp;it must be a nRF Sniffer bug.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/4377.5_5F00_nRF-Sniffer-log_2D00_unsuccessful-change-of-packet-data-length-_2800_DLE_2900_-commented.pcapng"&gt;devzone.nordicsemi.com/.../4377.5_5F00_nRF-Sniffer-log_2D00_unsuccessful-change-of-packet-data-length-_2800_DLE_2900_-commented.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: nRF Sniffer unable to track packet data length changes</title><link>https://devzone.nordicsemi.com/thread/152843?ContentTypeID=1</link><pubDate>Mon, 15 Oct 2018 10:30:10 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a9509e51-f0c2-4d41-ba56-ede1ed63df41</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Ricardo,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Could you send the sniffer trace ?&lt;br /&gt;Please be aware that if there is bond between the two devices that you are sniffing, you would need to capture bonding process so that the sniffer catch the keys,&amp;nbsp;and try to avoid bonding using LE Secure connection.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>