1 1.1 christos <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"> 2 1.1 christos 3 1.1 christos <refentry> 4 1.1.1.8 christos <refentryinfo> 5 1.1.1.8 christos <date>07 August 2019</date> 6 1.1.1.8 christos </refentryinfo> 7 1.1.1.8 christos 8 1.1 christos <refmeta> 9 1.1 christos <refentrytitle>wpa_background</refentrytitle> 10 1.1 christos <manvolnum>8</manvolnum> 11 1.1 christos </refmeta> 12 1.1 christos <refnamediv> 13 1.1 christos <refname>wpa_background</refname> 14 1.1 christos <refpurpose>Background information on Wi-Fi Protected Access and IEEE 802.11i</refpurpose> 15 1.1 christos </refnamediv> 16 1.1 christos <refsect1> 17 1.1 christos <title>WPA</title> 18 1.1 christos 19 1.1 christos <para>The original security mechanism of IEEE 802.11 standard was 20 1.1 christos not designed to be strong and has proven to be insufficient for 21 1.1 christos most networks that require some kind of security. Task group I 22 1.1 christos (Security) of IEEE 802.11 working group 23 1.1 christos (http://www.ieee802.org/11/) has worked to address the flaws of 24 1.1 christos the base standard and has in practice completed its work in May 25 1.1 christos 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was 26 1.1 christos approved in June 2004 and published in July 2004.</para> 27 1.1 christos 28 1.1 christos <para>Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version 29 1.1 christos of the IEEE 802.11i work (draft 3.0) to define a subset of the 30 1.1 christos security enhancements that can be implemented with existing wlan 31 1.1 christos hardware. This is called Wi-Fi Protected Access<TM> (WPA). This 32 1.1 christos has now become a mandatory component of interoperability testing 33 1.1 christos and certification done by Wi-Fi Alliance. Wi-Fi provides 34 1.1 christos information about WPA at its web site 35 1.1 christos (http://www.wi-fi.org/OpenSection/protected_access.asp).</para> 36 1.1 christos 37 1.1 christos <para>IEEE 802.11 standard defined wired equivalent privacy (WEP) 38 1.1 christos algorithm for protecting wireless networks. WEP uses RC4 with 39 1.1 christos 40-bit keys, 24-bit initialization vector (IV), and CRC32 to 40 1.1 christos protect against packet forgery. All these choices have proven to 41 1.1 christos be insufficient: key space is too small against current attacks, 42 1.1 christos RC4 key scheduling is insufficient (beginning of the pseudorandom 43 1.1 christos stream should be skipped), IV space is too small and IV reuse 44 1.1 christos makes attacks easier, there is no replay protection, and non-keyed 45 1.1 christos authentication does not protect against bit flipping packet 46 1.1 christos data.</para> 47 1.1 christos 48 1.1 christos <para>WPA is an intermediate solution for the security issues. It 49 1.1 christos uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP 50 1.1 christos is a compromise on strong security and possibility to use existing 51 1.1 christos hardware. It still uses RC4 for the encryption like WEP, but with 52 1.1 christos per-packet RC4 keys. In addition, it implements replay protection, 53 1.1 christos keyed packet authentication mechanism (Michael MIC).</para> 54 1.1 christos 55 1.1 christos <para>Keys can be managed using two different mechanisms. WPA can 56 1.1 christos either use an external authentication server (e.g., RADIUS) and 57 1.1 christos EAP just like IEEE 802.1X is using or pre-shared keys without need 58 1.1 christos for additional servers. Wi-Fi calls these "WPA-Enterprise" and 59 1.1 christos "WPA-Personal", respectively. Both mechanisms will generate a 60 1.1 christos master session key for the Authenticator (AP) and Supplicant 61 1.1 christos (client station).</para> 62 1.1 christos 63 1.1 christos <para>WPA implements a new key handshake (4-Way Handshake and 64 1.1 christos Group Key Handshake) for generating and exchanging data encryption 65 1.1 christos keys between the Authenticator and Supplicant. This handshake is 66 1.1 christos also used to verify that both Authenticator and Supplicant know 67 1.1 christos the master session key. These handshakes are identical regardless 68 1.1 christos of the selected key management mechanism (only the method for 69 1.1 christos generating master session key changes).</para> 70 1.1 christos </refsect1> 71 1.1 christos 72 1.1 christos <refsect1> 73 1.1 christos <title>IEEE 802.11i / WPA2</title> 74 1.1 christos 75 1.1 christos <para>The design for parts of IEEE 802.11i that were not included 76 1.1 christos in WPA has finished (May 2004) and this amendment to IEEE 802.11 77 1.1 christos was approved in June 2004. Wi-Fi Alliance is using the final IEEE 78 1.1 christos 802.11i as a new version of WPA called WPA2. This includes, e.g., 79 1.1 christos support for more robust encryption algorithm (CCMP: AES in Counter 80 1.1 christos mode with CBC-MAC) to replace TKIP and optimizations for handoff 81 1.1 christos (reduced number of messages in initial key handshake, 82 1.1 christos pre-authentication, and PMKSA caching).</para> 83 1.1 christos </refsect1> 84 1.1 christos 85 1.1 christos <refsect1> 86 1.1 christos <title>See Also</title> 87 1.1 christos <para> 88 1.1 christos <citerefentry> 89 1.1 christos <refentrytitle>wpa_supplicant</refentrytitle> 90 1.1 christos <manvolnum>8</manvolnum> 91 1.1 christos </citerefentry> 92 1.1 christos </para> 93 1.1 christos </refsect1> 94 1.1 christos 95 1.1 christos <refsect1> 96 1.1 christos <title>Legal</title> 97 1.1.1.8 christos <para>wpa_supplicant is copyright (c) 2003-2022, 98 1.1 christos Jouni Malinen <email>j (a] w1.fi</email> and 99 1.1 christos contributors. 100 1.1 christos All Rights Reserved.</para> 101 1.1 christos 102 1.1.1.2 christos <para>This program is licensed under the BSD license (the one with 103 1.1.1.2 christos advertisement clause removed).</para> 104 1.1 christos </refsect1> 105 1.1 christos </refentry> 106