Issues with Zephyr Peripheral NFC Pairing Example

Hi! Following my last post, I continue having problems with Zephyr Peripheral NFC Pairing Example on verifying the packets exchanged since as soon as I touch the NFC antenna with my smartphone I cannot see any Security Manager Protocol (SMP) packet exchanged in Wireshark. I needed to visualize these packets to ensure that Pairing Feature Exchange and next pairing steps (key exchange) are occurring as intended (LE Secure Connections OOB pairing).
I checked out the Sniffing the pairing procedure of a connection in the nRF Sniffer user guide. Since I am using LE Secure Connections I had to enable Secure Connections Debug Mode on the device. So, for that I added the CONFIG_BT_USE_DEBUG_KEYS=y on the prj.conf. However, after this I continued not to see any Security Manager Protocol (SMP) packet exchanged in Wireshark during the pairing procedure. I also checked out the menuconfig for exploring the available Kconfig options and ensure that the Secure Connections Debug Mode option is enabled.
Thank you for your help!

Parents
  • Hi

    I think the reason you're not seeing this data on Wireshark is because the OOB pairing share encryption keys/authentication data over the "alternative" communication channel, in this case being NFC.

    Wireshark won't be able to sniff any data transferred over NFC as it's a completely different protocol and frequency than BLE.

    Best regards,

    Simon

  • But if I enable Security Manager Debug Mode, the connection uses the debug keys specified in the Bluetooth Core Specification Vol. 3, Part H, 2.3.5.6.1 and anyone is able to decipher encrypted air traffic. So, the sniffer should be able to join in on the OOB pairing because uses the same keys to decrypt the encrypted packets (debug private/public key pair described in Core Specification Vol. 3, Part H, 2.3.5.6.1).

Reply
  • But if I enable Security Manager Debug Mode, the connection uses the debug keys specified in the Bluetooth Core Specification Vol. 3, Part H, 2.3.5.6.1 and anyone is able to decipher encrypted air traffic. So, the sniffer should be able to join in on the OOB pairing because uses the same keys to decrypt the encrypted packets (debug private/public key pair described in Core Specification Vol. 3, Part H, 2.3.5.6.1).

Children
Related