Hello everyone,
I'm working on a mesh application based on the light switch example. For this purpose, I'm using one nRF52DK (PCA10400) as the server, another one as the client, the nRF Mesh app for iPad as the provisioner and one more nRF52DK (PCA10400) as a Sniffer (running on the Sniffer v2 software). I was aiming to use the sniffer with Wireshark in order to capture and visualize the data sent by the client to the server, but I got stucked since every mesh package I eavesdrop on Wireshark is encrypted, which raised me two questions: Does anybody know if the nRF52DK Sniffer is actually able to capture mesh data packages? Or it's only able to capture advertising packages? And If it's able to capture mesh data packages, How Can I decrypt the payload to visualize the original message sent by the client? I found this solution developed by an Nordic Engineer on GitHub, but it requires three different keys to proper decrypt: An Application Key, a Network Key and a device key, but although the nRF Mesh app for iOS does show the application key and the network key on the Network Settings tab, it does not provides an device key neither on Network Settings tab nor in the provisioning logs.
Thanks in advance!
Best Regards,
Pedro