:orphan: .. title:: BT_SMP_ALLOW_UNAUTH_OVERWRITE .. option:: CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE *Allow unauthenticated pairing for paired device* Type: ``bool`` Help ==== This option allows all unauthenticated pairing attempts made by the peer where an unauthenticated bond already exists. This would enable cases where an attacker could copy the peer device address to connect and start an unauthenticated pairing procedure to replace the existing bond. When this option is disabled in order to create a new bond the old bond has to be explicitly deleted with bt_unpair. Direct dependencies =================== \ :option:`BT_SMP ` && \ :option:`BT_CONN ` && \ :option:`BT_HCI_HOST ` && \ :option:`BT_HCI ` && \ :option:`BT ` *(Includes any dependencies from ifs and menus.)* Defaults ======== No defaults. Implicitly defaults to ``n``. Kconfig definition ================== .. highlight:: kconfig At ``subsys/bluetooth/host/Kconfig:401`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:34`` → ``subsys/Kconfig:9`` → ``subsys/bluetooth/Kconfig:239`` Menu path: (Top) → Sub Systems and OS Services → Bluetooth → Security Manager Protocol support .. parsed-literal:: config BT_SMP_ALLOW_UNAUTH_OVERWRITE bool "Allow unauthenticated pairing for paired device" depends on \ :option:`BT_SMP ` && \ :option:`BT_CONN ` && \ :option:`BT_HCI_HOST ` && \ :option:`BT_HCI ` && \ :option:`BT ` help This option allows all unauthenticated pairing attempts made by the peer where an unauthenticated bond already exists. This would enable cases where an attacker could copy the peer device address to connect and start an unauthenticated pairing procedure to replace the existing bond. When this option is disabled in order to create a new bond the old bond has to be explicitly deleted with bt_unpair. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*