<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/45448/ssp-debug-mode-for-ble-legacy-pairing</link><description>SDK14.0.0/S132 5.0.0 
 The SDK provides an example of turning on SSP Debug mode for LE Secure connections 
 Is there a way to enable SSP Debug Mode for BLE Legacy Paired connections?</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 24 Apr 2019 13:41:37 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/45448/ssp-debug-mode-for-ble-legacy-pairing" /><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/183516?ContentTypeID=1</link><pubDate>Wed, 24 Apr 2019 13:41:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:88d4d01e-6b90-4afd-816b-aece0810d4b1</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/members/mpm_4000_mendeltron.com"&gt;Mark P. Mendelsohn&lt;/a&gt;: It appears that the BAD MIC failure originates from the firmware running on the nRF52 device and that it is a known issue even with the latest firmware, see&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/39439/nrf-sniffer-unable-to-track-packet-data-length-changes"&gt;https://devzone.nordicsemi.com/f/nordic-q-a/39439/nrf-sniffer-unable-to-track-packet-data-length-changes&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/180123?ContentTypeID=1</link><pubDate>Wed, 03 Apr 2019 23:44:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ac3d533e-9d53-413a-be59-e0140b551e5a</guid><dc:creator>Mark P. Mendelsohn</dc:creator><description>&lt;p&gt;Updated nrfSniffer hex file to Beta 3. Attached is the latest Wireshark capture. Each packet has the same &amp;quot;Encrypted packet decrypted incorrectly (bad MIC).&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/badMIC.pcapng"&gt;devzone.nordicsemi.com/.../badMIC.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/179847?ContentTypeID=1</link><pubDate>Tue, 02 Apr 2019 18:12:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fe357dd2-39f4-4e29-9224-6811f66b4322</guid><dc:creator>Mark P. Mendelsohn</dc:creator><description>&lt;p&gt;Here is another screen shot and trace that captured from the CONN_REQ packet.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/with-conn_5F00_req.pcapng"&gt;devzone.nordicsemi.com/.../with-conn_5F00_req.pcapng&lt;/a&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/Screen-Shot-2019_2D00_04_2D00_02-at-11.09.21-AM.png" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/179844?ContentTypeID=1</link><pubDate>Tue, 02 Apr 2019 17:52:20 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:25d9db36-30b4-4ea2-9133-357041fcb777</guid><dc:creator>Mark P. Mendelsohn</dc:creator><description>&lt;p&gt;Attached Wireshark screen shot and trace taken with all protocols enabled and pairing occurring while the scope is on. Still unable to see into encrypted data packets shown as &amp;quot;Unknown&amp;quot;.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/Screen-Shot-2019_2D00_04_2D00_02-at-10.47.12-AM.png" /&gt;&lt;a href="https://devzone.nordicsemi.com/cfs-file/__key/communityserver-discussions-components-files/4/ssp-trace.pcapng"&gt;devzone.nordicsemi.com/.../ssp-trace.pcapng&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/179293?ContentTypeID=1</link><pubDate>Fri, 29 Mar 2019 15:45:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:7a83d9be-3093-4d11-bdb0-0f40292f4868</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;As David Edwin stated in the question you referred to, you need to enable t&lt;span&gt;he protocol for the nordic ble sniffer, which is&amp;nbsp; NORDIC_BLE and that needs to be enabled. Could you try to click enable all in the &amp;quot;Enabled Protocols&amp;quot; in Wireshark&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;img src="https://devzone.nordicsemi.com/resized-image/__size/320x240/__key/support-attachments/beef5d1b77644c448dabff31668f3a47-073cedef66234113ab41708e7867a3a6/pastedimage1553874340070v1.png" alt=" " /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/179027?ContentTypeID=1</link><pubDate>Thu, 28 Mar 2019 16:25:04 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ba06e029-efdd-4f31-95f0-fc6c0ce22828</guid><dc:creator>Mark P. Mendelsohn</dc:creator><description>&lt;p&gt;I just want to view the encrypted data using the nRF&amp;nbsp;Sniffer. It is a Just Works connection but the nRF&amp;nbsp;Sniffer can&amp;#39;t seem to decode the data even when it was present during the pairing process. I reported this issue some time ago here &lt;a href="https://devzone.nordicsemi.com/support/206896"&gt;https://devzone.nordicsemi.com/support/206896&lt;/a&gt;. Since we are in&amp;nbsp;production now on this product it is important to have some kind of solution. Both ways I have tried have not worked. Thanks.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: SSP Debug Mode for BLE Legacy Pairing</title><link>https://devzone.nordicsemi.com/thread/178942?ContentTypeID=1</link><pubDate>Thu, 28 Mar 2019 13:07:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:301c61dd-21c8-4ebf-bebf-e1766bb22078</guid><dc:creator>bjorn-spockeli</dc:creator><description>&lt;p&gt;HI Mark,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I assume that you&amp;#39;re referring to the ble_app_multirole_lesc example in SDK v14.0.0.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As far as I know we do not have any example that has this feature. Do you want to use a static encryption key in legacy pairing&amp;nbsp; or is this only to be able to see the encrypted data with a Bluetooth Protocol sniffer? If its the latter, then you can use the Just Works pairing as the keys are sent in plain text. So as long as you capture the pariing procedure, then you should still be able to see all the data as the sniffer sees the encryption key.&lt;/p&gt;
&lt;p&gt;Best regards&lt;/p&gt;
&lt;p&gt;Bjørn&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>