<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MITM attacks</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/8465/mitm-attacks</link><description>Hello, 
 We avoid MITM attacks by using a static passkey. Does it mean that the attacker can decrypt the connection if attacker get the passkey? What I transfer or receive data will be captured by the attacker?</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 06 Aug 2015 07:56:59 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/8465/mitm-attacks" /><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30872?ContentTypeID=1</link><pubDate>Thu, 06 Aug 2015 07:56:59 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ffa08c17-496c-458e-aa77-0d087dbe0e4d</guid><dc:creator>Alex</dc:creator><description>&lt;p&gt;Can I return to Bill&amp;#39;s question (2)? If we put aside problem of delivering key to host and device (by NFC,USB...), is it correct that current nRF51 SD, Android, iOS and Windows 8/10 support setting up connection by using key provided?
Update: Interesting information about OOB in Android is &lt;a href="http://stackoverflow.com/questions/6918262/bluetooth-out-of-band-oob-pairing-on-android"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30871?ContentTypeID=1</link><pubDate>Thu, 06 Aug 2015 01:40:54 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:df1d8d17-6ac0-4aab-bf7a-2030ac199274</guid><dc:creator>sara</dc:creator><description>&lt;p&gt;Thanks for your kindly repply~&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30870?ContentTypeID=1</link><pubDate>Tue, 04 Aug 2015 12:02:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9e402c2b-1b7a-4288-a7b2-e200fc4035a5</guid><dc:creator>Bill Siever</dc:creator><description>&lt;p&gt;sara: Encryption with Passkey and Just Works are both very weak if someone is able to collect all the packets when the keys are exchanged (a poor OOB system would be equally weak).  If you use bonding, the keys are usually only exchanged on the first connection.  As long as the link is always encrypted and the first exchange is done in a secure place (or perhaps, as Anders suggests, with low power transmissions to limit sniffing) there should be pretty good security for most applications.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30869?ContentTypeID=1</link><pubDate>Tue, 04 Aug 2015 08:54:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:99f2fc82-7d26-41b1-b10f-d015fd65a2c4</guid><dc:creator>Anders Strand</dc:creator><description>&lt;p&gt;You can make sniffing more difficult by lowering TX power during pairing, and holding the central and peripheral very close. This is only a bandaid solution of course :)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30868?ContentTypeID=1</link><pubDate>Tue, 04 Aug 2015 03:26:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4ab0f099-b3ee-46c8-bfa2-6c13f9afc43e</guid><dc:creator>sara</dc:creator><description>&lt;p&gt;It seems that using static passkey is not a save way, isn&amp;#39;t it? If we want to do some BLE application in high security way,  what can we do? Using OOB only or any other methods?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30867?ContentTypeID=1</link><pubDate>Mon, 03 Aug 2015 16:11:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:9d3f77ab-ff08-428a-8b6b-1816e4ce6531</guid><dc:creator>syntroniks</dc:creator><description>&lt;ol&gt;
&lt;li&gt;Yes 2) Not sure, my phone has NFC but we aren&amp;#39;t prepared to require it for pairing our peripherals yet.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;QR code OOB is an alternative if you are developing with smartphones in mind and have display capabilities. I believe it is fairly common but most users I know have NFC turned off.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30866?ContentTypeID=1</link><pubDate>Mon, 03 Aug 2015 13:28:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:fd86e377-b0b1-401e-980a-63c3b4328549</guid><dc:creator>Bill Siever</dc:creator><description>&lt;p&gt;That seems to be the intention, but it&amp;#39;s not something I know much about yet.  Since NFC has a very small range, it seems like it would limit key interception partly by limiting range of transmission.  So, my questions are:  1) Is sniffing of NFC possible (even if not usually practical) to retrieve the OOB key? and 2) Which devices (Android, iOS, Windows Phone, etc.) currently support NFC for OOB?  (I think the demos I&amp;#39;ve seen used Android devices)&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30865?ContentTypeID=1</link><pubDate>Mon, 03 Aug 2015 13:22:06 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0ca296d1-39f6-4c68-b7b3-318d478ca1bd</guid><dc:creator>Alex</dc:creator><description>&lt;p&gt;Bill, thank you for the article. Can NFC in nRF52 be used as OOB then?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30864?ContentTypeID=1</link><pubDate>Mon, 03 Aug 2015 13:00:13 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:237261c2-6223-4910-89d8-e5b67d0b5ad4</guid><dc:creator>Bill Siever</dc:creator><description>&lt;p&gt;Based on work by Mike Ryan (See: &lt;a href="https://lacklustre.net/bluetooth/Ryan_Bluetooth_Low_Energy_USENIX_WOOT.pdf"&gt;https://lacklustre.net/bluetooth/Ryan_Bluetooth_Low_Energy_USENIX_WOOT.pdf&lt;/a&gt;) it looks like even Passkey is pretty weak if the initial key exchange is monitored.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MITM attacks</title><link>https://devzone.nordicsemi.com/thread/30863?ContentTypeID=1</link><pubDate>Fri, 31 Jul 2015 12:22:25 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3431dac6-cd4b-400a-8c32-d649d688f531</guid><dc:creator>Petter Myhre</dc:creator><description>&lt;p&gt;It depends.&lt;/p&gt;
&lt;p&gt;If you use the passkey to identify the device the attacker can pretend to be a trusted device, while it is not.&lt;/p&gt;
&lt;p&gt;If not, the attacker can only decrypt an encrypted link if he has the passkey &lt;strong&gt;and&lt;/strong&gt; sniffs the pairing process, only then will he get the keys used to actually encrypt the link.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>