################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --char-read --handle 0x32 --sec-level=high # Here nothing happens for 5 min... ctrl + c, or a timout occures HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 11 SMP: Pairing Request (0x01) capability 0x01 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayYesNo (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > ACL data: handle 64 flags 0x02 dlen 11 SMP: Pairing Response (0x02) capability 0x00 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayOnly (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK < ACL data: handle 64 flags 0x00 dlen 6 SMP: Pairing Failed (0x05) reason 0x03 Reason Authentication Requirements > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > HCI Event: LE Meta Event (0x3e) plen 10 LE Connection Update Complete status 0x00 handle 64 interval 97.50ms, latency 0.00ms, superv. timeout 6000.00ms < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 > HCI Event: Disconn Complete (0x05) plen 4 status 0x00 handle 64 reason 0x16 Reason: Connection Terminated by Local Host ################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --char-read --handle 0x32 --sec-level=medium HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 11 SMP: Pairing Request (0x01) capability 0x01 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayYesNo (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > ACL data: handle 64 flags 0x02 dlen 11 SMP: Pairing Response (0x02) capability 0x00 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayOnly (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK < ACL data: handle 64 flags 0x00 dlen 21 SMP: Pairing Confirm (0x03) key 3aef6adb6eb1af64b0acdac769833385 > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > ACL data: handle 64 flags 0x02 dlen 21 SMP: Pairing Confirm (0x03) key bc083e9344418fea3ac85a5d52b2f690 < ACL data: handle 64 flags 0x00 dlen 21 SMP: Pairing Random (0x04) random 28c0b0570e4cb8a947779b086e468b02 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > ACL data: handle 64 flags 0x02 dlen 21 SMP: Pairing Random (0x04) random e68d16c8754cdb24091a10c5258c4a18 < HCI Command: LE Start Encryption (0x08|0x0019) plen 28 > HCI Event: Command Status (0x0f) plen 4 LE Start Encryption (0x08|0x0019) status 0x00 ncmd 1 < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 > HCI Event: Disconn Complete (0x05) plen 4 status 0x00 handle 64 reason 0x16 Reason: Connection Terminated by Local Host ################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --char-read --handle 0x32 --sec-level=low Characteristic value/descriptor read failed: Attribute requires authentication before read/write HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 7 ATT: Read req (0x0a) handle 0x0032 > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > ACL data: handle 64 flags 0x02 dlen 9 ATT: Error (0x01) Error: Insufficient authentication (5) Read req (0x0a) on handle 0x0032 > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: LE Meta Event (0x3e) plen 10 LE Connection Update Complete status 0x00 handle 64 interval 97.50ms, latency 0.00ms, superv. timeout 6000.00ms < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 ################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --characteristics --sec-level=high HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 11 SMP: Pairing Request (0x01) capability 0x01 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayYesNo (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > ACL data: handle 64 flags 0x02 dlen 11 SMP: Pairing Response (0x02) capability 0x00 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayOnly (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK < ACL data: handle 64 flags 0x00 dlen 6 SMP: Pairing Failed (0x05) reason 0x03 Reason Authentication Requirements > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 > HCI Event: Disconn Complete (0x05) plen 4 status 0x00 handle 64 reason 0x16 Reason: Connection Terminated by Local Host ################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --characteristics --sec-level=medium HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 11 SMP: Pairing Request (0x01) capability 0x01 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayYesNo (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > ACL data: handle 64 flags 0x02 dlen 11 SMP: Pairing Response (0x02) capability 0x00 oob 0x00 auth req 0x05 max key size 0x10 init key dist 0x05 resp key dist 0x05 Capability: DisplayOnly (OOB data not present) Authentication: Bonding (MITM Protection) Initiator Key Distribution: LTK CSRK Responder Key Distribution: LTK CSRK < ACL data: handle 64 flags 0x00 dlen 21 SMP: Pairing Confirm (0x03) key 08a549c3613082d6caacdfaf1bbf0e1e > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > ACL data: handle 64 flags 0x02 dlen 21 SMP: Pairing Confirm (0x03) key 0f3ea0d7d07c0d0e862bc9305c8048fa < ACL data: handle 64 flags 0x00 dlen 21 SMP: Pairing Random (0x04) random a0a0f6f8ed5b0cb46ed9b61e123366ff > ACL data: handle 64 flags 0x02 dlen 21 SMP: Pairing Random (0x04) random 5fd5c2fa5fd0f2ba50c4c2ff2f90f95e < HCI Command: LE Start Encryption (0x08|0x0019) plen 28 > HCI Event: Command Status (0x0f) plen 4 LE Start Encryption (0x08|0x0019) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 > HCI Event: Disconn Complete (0x05) plen 4 status 0x00 handle 64 reason 0x16 Reason: Connection Terminated by Local Host ################################################################################### sudo gatttool -b 84:DD:20:E2:41:92 --characteristics --sec-level=low HCI sniffer - Bluetooth packet analyzer ver 2.5 device: hci0 snap_len: 1500 filter: 0xffffffffffffffff < HCI Command: LE Create Connection (0x08|0x000d) plen 25 bdaddr 84:DD:20:E2:41:92 type 0 interval 96 window 48 initiator_filter 0 own_bdaddr_type 0 min_interval 40 max_interval 56 latency 0 supervision_to 42 min_ce 0 max_ce 0 > HCI Event: Command Status (0x0f) plen 4 LE Create Connection (0x08|0x000d) status 0x00 ncmd 1 > HCI Event: LE Meta Event (0x3e) plen 19 LE Connection Complete status 0x00 handle 64, role master bdaddr 84:DD:20:E2:41:92 (Public) < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x0001, end 0xffff type-uuid 0x2803 > ACL data: handle 64 flags 0x02 dlen 16 L2CAP(d): cid 0x0005 len 12 [psm 0] < ACL data: handle 64 flags 0x00 dlen 10 L2CAP(d): cid 0x0005 len 6 [psm 0] < HCI Command: LE Connection Update (0x08|0x0013) plen 14 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x0002, value 0x02 0x03 0x00 0x00 0x2a handle 0x0004, value 0x02 0x05 0x00 0x01 0x2a handle 0x0006, value 0x0a 0x07 0x00 0x02 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x0007, end 0xffff type-uuid 0x2803 > HCI Event: Command Status (0x0f) plen 4 LE Connection Update (0x08|0x0013) status 0x00 ncmd 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x0008, value 0x0a 0x09 0x00 0x03 0x2a handle 0x000a, value 0x02 0x0b 0x00 0x04 0x2a handle 0x000d, value 0x20 0x0e 0x00 0x05 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x000e, end 0xffff type-uuid 0x2803 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x0011, value 0x02 0x12 0x00 0x23 0x2a handle 0x0013, value 0x02 0x14 0x00 0x24 0x2a handle 0x0015, value 0x02 0x16 0x00 0x25 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x0016, end 0xffff type-uuid 0x2803 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x0017, value 0x02 0x18 0x00 0x26 0x2a handle 0x0019, value 0x02 0x1a 0x00 0x27 0x2a handle 0x001b, value 0x02 0x1c 0x00 0x28 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x001c, end 0xffff type-uuid 0x2803 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x001d, value 0x02 0x1e 0x00 0x29 0x2a handle 0x001f, value 0x02 0x20 0x00 0x2a 0x2a handle 0x0021, value 0x02 0x22 0x00 0x50 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x0022, end 0xffff type-uuid 0x2803 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x0024, value 0x0a 0x25 0x00 0xf1 0xff handle 0x0027, value 0x02 0x28 0x00 0xf2 0xff handle 0x002a, value 0x08 0x2b 0x00 0xf3 0xff < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x002b, end 0xffff type-uuid 0x2803 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 2 > ACL data: handle 64 flags 0x02 dlen 27 ATT: Read By Type resp (0x09) length: 7 handle 0x002d, value 0x10 0x2e 0x00 0xf4 0xff handle 0x0031, value 0x02 0x32 0x00 0xf5 0xff handle 0x0035, value 0x12 0x36 0x00 0x19 0x2a < ACL data: handle 64 flags 0x00 dlen 11 ATT: Read By Type req (0x08) start 0x0036, end 0xffff type-uuid 0x2803 > HCI Event: Number of Completed Packets (0x13) plen 5 handle 64 packets 1 > ACL data: handle 64 flags 0x02 dlen 9 ATT: Error (0x01) Error: Attribute not found (10) Read By Type req (0x08) on handle 0x0036 < HCI Command: Disconnect (0x01|0x0006) plen 3 handle 64 reason 0x13 Reason: Remote User Terminated Connection > HCI Event: Command Status (0x0f) plen 4 Disconnect (0x01|0x0006) status 0x00 ncmd 1 > HCI Event: Disconn Complete (0x05) plen 4 status 0x00 handle 64 reason 0x22 Reason: LMP Response Timeout