<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>pairing key passing</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/58253/pairing-key-passing</link><description>For pairing key passing in ble_app_hrs, i have used the ble_app_gls example but it did not worked. 
 can anyone help me in how to pass pairing key issuse. 
 i have a question on this pairing keys if we use the legacy secure pairing mechanisim, will the</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 25 Feb 2020 14:16:23 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/58253/pairing-key-passing" /><item><title>RE: pairing key passing</title><link>https://devzone.nordicsemi.com/thread/236280?ContentTypeID=1</link><pubDate>Tue, 25 Feb 2020 14:16:23 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c9f39a58-57a7-492e-b1fd-a40c9c216e89</guid><dc:creator>Simon</dc:creator><description>&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/53455/peer_manager_handler-connection-security-failed-role-peripheral-conn_handle-0x0-procedure-bonding-error-132"&gt;Here&lt;/a&gt; I have&amp;nbsp;uploaded a project where I have modified the ble_app_uart project to support bonding using legacy pairing with passkey entry. In the project, I have provided comments on how to implement it and you should be able to easily implement it in any of the Nordic BLE examples (including &lt;em&gt;ble_app_hrs&lt;/em&gt;). If you&amp;nbsp;want the ble_app_uart central part as well, just ask me and I will provide it to you.&lt;/p&gt;
&lt;p&gt;Be aware that this approach is not really safe against MITM attacks, as&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/members/emil"&gt;Emil Lenngren&lt;/a&gt;&amp;nbsp;explains in &lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/35856/questions-about-lesc-mitm-and-passkey"&gt;this ticket&lt;/a&gt;:&lt;/p&gt;
&lt;p style="padding-left:30px;"&gt;&lt;em&gt;&amp;quot;The Passkey method in Legacy Pairing is also vulnerable to passive eavesdropping. ..... &lt;span&gt;the Legacy Passkey is highly vulnerable to MITM attacks, with a success probability of 100%&lt;/span&gt;&amp;quot;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;LESC paring is a safer option.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
[quote user=""]i have a question on this pairing keys if we use the legacy secure pairing mechanisim, will the initiator ask the responder for pairing key when it bond on second time&amp;nbsp; ?[/quote]
&lt;p&gt;&amp;nbsp;No, you only have to enter the passkey during the pairing process. When two devices are bonded, they have exchanged keys and don&amp;#39;t need to do any pairing in order to acquire a secure connection. Check out&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/27564/what-is-different-between-pairing-vs-bonding-stk-vs-ltk"&gt;this answer&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>