<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Issues with Zephyr Peripheral NFC Pairing Example</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/98394/issues-with-zephyr-peripheral-nfc-pairing-example</link><description>Hi! I&amp;#39;m using the nRF52-DK development kit to implement secure communications via Bluetooth Low Energy (BLE) on Zephyr. For that I&amp;#39;m using the &amp;quot;Peripheral NFC Pairing&amp;quot; example from the nRF Connect SDK ( https://developer.nordicsemi.com/nRF_Connect_SDK</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 02 May 2023 09:50:43 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/98394/issues-with-zephyr-peripheral-nfc-pairing-example" /><item><title>RE: Issues with Zephyr Peripheral NFC Pairing Example</title><link>https://devzone.nordicsemi.com/thread/423232?ContentTypeID=1</link><pubDate>Tue, 02 May 2023 09:50:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ad7b5f09-8c06-467b-badc-ae26c25d1ca6</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Sorry about the late reply. I&amp;#39;ve been out of office travelling for the last week.&lt;/p&gt;
&lt;p&gt;I think the reason you&amp;#39;re not seeing this data on Wireshark is because the OOB pairing share encryption keys/authentication data over the &amp;quot;alternative&amp;quot; communication channel, in this case being NFC.&lt;/p&gt;
&lt;p&gt;Wireshark won&amp;#39;t be able to sniff any data transferred over NFC as it&amp;#39;s a completely different protocol and frequency than BLE.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Issues with Zephyr Peripheral NFC Pairing Example</title><link>https://devzone.nordicsemi.com/thread/422470?ContentTypeID=1</link><pubDate>Wed, 26 Apr 2023 10:27:32 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f07618c8-b4f3-4493-8229-61b262c0ea76</guid><dc:creator>andreribeiro423</dc:creator><description>&lt;p&gt;I checked out the &lt;a href="https://infocenter.nordicsemi.com/index.jsp?topic=%2Fug_sniffer_ble%2FUG%2Fsniffer_ble%2Faction_paired.html"&gt;Sniffing the pairing procedure of a connection&lt;/a&gt; in the nRF Sniffer user guide. Since I am using LE Secure Connections I had to enable Secure Connections Debug Mode on the device. So, for that I added the CONFIG_BT_USE_DEBUG_KEYS=y on the prj.conf. However, after this I continued not to see any Security Manager Protocol (SMP) packet exchanged in Wireshark during the pairing procedure. I also checked out the menuconfig for exploring the available Kconfig options and ensure that the Secure Connections Debug Mode option is enabled.&lt;br /&gt;Thank you for your help!&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" alt=" " src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/7776.MenuConfig.png" /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Issues with Zephyr Peripheral NFC Pairing Example</title><link>https://devzone.nordicsemi.com/thread/418983?ContentTypeID=1</link><pubDate>Tue, 04 Apr 2023 08:56:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:721e9faa-1a8a-4b46-9867-dffa76b46980</guid><dc:creator>Simonr</dc:creator><description>&lt;p&gt;Hi&lt;/p&gt;
[quote user=""]I cannot see any Security Manager Protocol (SMP) packet exchanged in Wireshark[/quote]
&lt;p&gt;This is the intended behavior, as a sniffer shouldn&amp;#39;t be able to join in on the OOB pairing without having any of the OOB data on the sniffer side as well. You can check out the &lt;a href="https://infocenter.nordicsemi.com/topic/ug_sniffer_ble/UG/sniffer_ble/action_paired.html"&gt;Sniffing the pairing procedure of a connection&lt;/a&gt; in the nRF Sniffer user guide.&lt;/p&gt;
[quote user=""](even when cleaning the bonds of the nRF52-DK board)[/quote]
&lt;p&gt;Do you erase the bond on both ends here though? When the devices have paired (and then bonded) once, they won&amp;#39;t have to pair again on subsequent connections as they have already found a LTK (long term key) to start encrypted communication upon connection. If you erase bonding info on both devices, you should be able to see the same pairing info as you did initially.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Simon&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>