:orphan: .. title:: CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE .. kconfig:: CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE CONFIG_BT_SMP_ALLOW_UNAUTH_OVERWRITE #################################### *Allow unauthenticated pairing for paired device* Type: ``bool`` Help ==== .. code-block:: none This option allows all unauthenticated pairing attempts made by the peer where an unauthenticated bond already exists. This would enable cases where an attacker could copy the peer device address to connect and start an unauthenticated pairing procedure to replace the existing bond. When this option is disabled in order to create a new bond the old bond has to be explicitly deleted with bt_unpair. Direct dependencies =================== \ :kconfig:`BT_SMP ` && \ :kconfig:`BT_CONN ` && \ :kconfig:`BT_HCI_HOST ` && \ :kconfig:`BT_HCI ` && \ :kconfig:`BT ` *(Includes any dependencies from ifs and menus.)* Defaults ======== No defaults. Implicitly defaults to ``n``. Kconfig definition ================== At ``/bluetooth/host/Kconfig:340`` Included via ``Kconfig:8`` → ``Kconfig.zephyr:44`` → ``/Kconfig:9`` → ``/bluetooth/Kconfig:174`` Menu path: (Top) → Sub Systems and OS Services → Bluetooth → Security Manager Protocol support .. code-block:: kconfig config BT_SMP_ALLOW_UNAUTH_OVERWRITE bool "Allow unauthenticated pairing for paired device" depends on BT_SMP && BT_CONN && BT_HCI_HOST && BT_HCI && BT help This option allows all unauthenticated pairing attempts made by the peer where an unauthenticated bond already exists. This would enable cases where an attacker could copy the peer device address to connect and start an unauthenticated pairing procedure to replace the existing bond. When this option is disabled in order to create a new bond the old bond has to be explicitly deleted with bt_unpair. *(The 'depends on' condition includes propagated dependencies from ifs and menus.)*