[17358] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Bluetooth cracked further

daemon@ATHENA.MIT.EDU (Dan Riley)
Sat Jun 4 12:16:32 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: Matt Crawford <crawdad@fnal.gov>
Cc: "Perry E. Metzger" <perry@piermont.com>,
	cryptography@metzdowd.com
From: Dan Riley <dsr@mail.lns.cornell.edu>
Date: 04 Jun 2005 11:50:03 -0400
In-Reply-To: <dfd1aefe4b1974a0af0bbd33690f5e4e@fnal.gov>

Matt Crawford <crawdad@fnal.gov> writes:
> On Jun 3, 2005, at 11:55, Perry E. Metzger wrote:
> > 2) They also have a way of forcing pairing to happen, by impersonating
> >    one of the devices and saying "oops! I need to pair again!" to the
> >    other.
> 
> Do the devices then pair again without user intervention, re-using the
> PIN that paired them initially?

In the notes for section 5, they say

    If the attack is successful, the Bluetooth user will need to enter
    the PIN again - so a suspicious user may realize that his
    Bluetooth device is under attack and refuse to enter the PIN.

So no, it doesn't re-pair without intervention.

-dan

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post