background image

                                                                                     EH-MA41 User Guide

 

 

 

 

 

 

10-26

 

5.1.6. MM

—Query or configure Man-In-The-Middle protection 

feature  

 

5.1.6.1. Description: 

 

This command can query or configure the Man-In-The-Middle protection feature of Bluetooth module. Once configured, 
the configuration will take effect immediately and until the next time the module is configured by this command. It means 
the Bluetooth module will remember the configuration, and even if the Bluetooth module has been powered off, the 
configuration will not be lost.  
If the parameter is not presented, the Bluetooth module will report current configuration by the Indicator MM.  

 

5.1.6.2. Syntax: 

 

Synopsis:  

AT+MM[=State]<CR><LF> 

 

           

5.1.6.3. Parameter Description: 

 

Parameter 

Description 

Mandatory  

Comments 

 

State

 

The new state of Man-In-The-
Middle protection. Value: 00h or 
02h 
00: Deactivated 
01: Activated 

 

02: Activated and auto confirm the 
numeric comparison. 
Default: 02 (Activated and auto 
confirm) 

 

 

        O

 

The default value 
may be different 
per software 
version. 

 

  

Notes: 

 

1. 

A man-in-the-middle (MITM) attack occurs when a user wants to connect two devices but instead of connecting 
directly with each other they unknowingly connect to a third (attacking) device that plays the role of the device they 
are attempting to pair with. The third device then relays information between the two devices giving the illusion that 
they are directly connected. The attacking device may even eavesdrop on communication between the two devices 
(known as active eavesdropping) and is able to insert and modify information on the connection. In this type of 
attack, all of the information exchanged between the two devices are compromised and the attacker may inject 
commands and information into each of the devices thus potentially damaging the function of the devices. Devices 
falling victim to the attack are capable of communicating only when the attacker is present. If the attacker is not 
active or out range, the two victim devices will not be able to communicate directly with each other and the user will 
notice it. 

 

2. 

To prevent MITM attacks, Secure Simple Pairing offers two user assisted numeric methods: numerical comparison 
or passkey entry. If Secure Simple Pairing would use 16 decimal digit numbers, then the usability would be the 
same as using legacy pairing with 16 decimal digit PIN. The chance for a MITM to succeed inserting its own link 
keys in this case is a 1 in 1016 = 253 pairing instances, which is an unnecessarily low probability.  

 

Secure Simple Pairing protects the user from MITM attacks with a goal of offering a 1 in 1,000,000 chance that a 
MITM could mount a successful attack. The strength of the MITM protections was selected to minimize the user 
impact by using a six digit number for numerical comparison and Passkey entry. This level of MITM protection was 
selected since, in most cases, users can be alerted to the potential presence of a MITM attacker when the 
connection process fails as a result of a failed MITM attack. While most users feel that provided that they have not 
compromised their passkey, a 4-digit key is sufficient for authentication (i.e. bank card PIN codes), the use of six 
digits allows Secure Simple Pairing to be FIPS compliant and this was deemed to have little perceivable usability 
impact. 

 

3. 

If the Man-In-The-Middle protection feature is activated, the module may output the number for numeric comparison 
by indicator NC or a passkey request by indicator PK. About the command NC and PK, please refer to section 
5.1.24 and 5.1.25.  

4. 

If the Man-In-The-Middle protection feature is activated, the IO capability can only be configured to 

Display 

Yes/No

 or 

Keyboard Only

”. About the IO capability, please refer to section  5.1.7 .

  

5. 

When connect with some Android device by the SPP profile, it is required to active the Man-In-The-Middle 
protection. 

 

 

 

5.1.6.4. Examples:  

Ex. 5.11. To query current Man-In-The-Middle protection state of the Bluetooth module:  

 AT+MM<CR><LF>                    

 query the current Man-In-The-Middle protection state. 

 

Summary of Contents for EH-MA41

Page 1: ...cations detailed herein at any time without notice and does not make any commitment to update the information contained herein Ehong Technologies products are not authorized for use as critical compon...

Page 2: ...hange the local friendly name 13 5 1 11 BR Query or change the UART baud rate 13 5 1 12 UM Query or configure the UART mode 14 5 1 13 UI Query or configure the UART indicator output mode 15 5 1 14 DB...

Page 3: ...All of the indicators are listed in section 4 is the separator between command indicator and parameter It s only needed if a parameter is presented Para1 is the first parameter Not all of the command...

Page 4: ...dule FT Query or configure the features of the module MM Query or configure Man In The Middle protection feature IO Query or configure IO capability of local device MT Query or configure force to be m...

Page 5: ...al friendly name of the module IF Host interface of the module BR UART baud rate UM Configuration of UART mode UI Configuration of UART indicator output RC Configuration of remote control function PM...

Page 6: ...efault 00 M Hid HID disable or enable Value 00 or 01 Default 00 M 5 1 1 4 Examples Ex 5 1 To query current profile configuration of Bluetooth module MA41 or MA46 AT PF CR LF query current profile conf...

Page 7: ...imum TX power in dBm Bluetooth power control may raise the TX power up to this value Value a 8 digits signed number Default 00 O The values of this parameter will always be rounded to the next availab...

Page 8: ...e the features of Bluetooth module Once configured the configuration will take effect immediately and until the next time the module is configured by this command It means the Bluetooth module will re...

Page 9: ...ble status The unit is second Value 0000h FFFFh 0000 No timeout for discoverable status O 0001 FFFF The timeout in second of discoverable status Notes The default feature configuration may be differen...

Page 10: ...ot active or out range the two victim devices will not be able to communicate directly with each other and the user will notice it 2 To prevent MITM attacks Secure Simple Pairing offers two user assis...

Page 11: ...lay Only The local device can only display 01 Display Yes No The local device can display and select Yes or No 02 Keyboard Only The local device can only input 03 No IO The local device has no IO capa...

Page 12: ...e master feature AT MT CR LF query current state of force to be master feature MT 00 CR LF report the force to be master feature is deactivated currently Ex 5 17 To active the force to be master featu...

Page 13: ...LF query current local friendly name NM EH MA41 CR LF report current local friendly name it s EH MA41 Ex 5 27 To change the local friendly name of Bluetooth module AT NM MY_BT_DEVICE CR LF change the...

Page 14: ...odule AT BR 0C CR LF change the baud rate to 115200 OK CR LF response from the module to indicate the command is adopted Notes The response will be sent in current baud rate 5 1 12 UM Query or configu...

Page 15: ...cator output mode 5 1 13 1 Description This command can query or configure disable or enable the UART indicator output mode of Bluetooth module Once configured the configuration will take effect immed...

Page 16: ...e the content received from UART to find if there is a BP command so the speed is affected accordingly 1 High speed mode When working in this mode the Bluetooth module will transfer the content receiv...

Page 17: ...he pairing mode is enabled it can be paired bonded with other Bluetooth device If the parameter is not presented the Bluetooth module will report current status of pairing mode by the Indicator PA 5 1...

Page 18: ...pted 5 1 18 CP Clear the paired Bluetooth device list 5 1 18 1 Description This command can clear the paired device list stored in the Bluetooth module If there is some Bluetooth device is connected w...

Page 19: ...ice which address is 00 18 96 00 00 0A CS 00 00189600000A CR LF connecting result success SS 02 00189600000A CR LF the Bluetooth module is now connected to the specified SPP device Ex 5 79 To connect...

Page 20: ...ectable SS 40 CR LF the SPP channel 4 of Bluetooth module is now connectable SS 50 CR LF the SPP channel 5 of Bluetooth module is now connectable 5 2 4 DT Send data packet to remote SPP device 5 2 4 1...

Page 21: ...01 00189600000A CR LF the Bluetooth module is now connecting to the specified HID host which address is 00 18 96 00 00 0A CI 00 00189600000A CR LF connecting result success IS 02 00189600000A CR LF t...

Page 22: ...n in ASCII characters and separated by comma while in Bypass mode all of the data field should be given in raw data binary and no separator is needed About the Proxy mode and Bypass mode please refer...

Page 23: ...an Previous Track 00 02 Stop 00 04 Eject 00 08 Fast Forward 00 10 Rewind 00 20 Stop Eject 00 40 AL Internet Browser 00 80 Ex 5 93 To increase the volume the consumer key report should be A1 02 10 00 E...

Page 24: ...mmand is adopted AT KR A1 03 00 03 C0 FF 00 CR LF send a mouse report to the HID host The mouse is move to upper right OK CR LF response from the module to indicate the command is adopted AT KR A1 03...

Page 25: ...d report to the HID host OK CR LF response from the module to indicate the command is adopted AT KR A1 04 F6 00 00 00 00 05 06 40 CR LF send a joystick gamepad report to the HID host OK CR LF response...

Page 26: ...presents character 5 3 5 4 Examples Ex 5 104 To send an ASCII string to HID host AT AS Hello Bluetooth HID CR LF send an ASCII string to the HID host OK CR LF response from the module to indicate the...

Reviews: