Home | History | Annotate | Line # | Download | only in docbook
      1      1.1  christos <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">
      2      1.1  christos 
      3      1.1  christos <refentry>
      4  1.1.1.8  christos   <refentryinfo>
      5  1.1.1.8  christos     <date>07 August 2019</date>
      6  1.1.1.8  christos   </refentryinfo>
      7  1.1.1.8  christos 
      8      1.1  christos   <refmeta>
      9      1.1  christos     <refentrytitle>wpa_background</refentrytitle>
     10      1.1  christos     <manvolnum>8</manvolnum>
     11      1.1  christos   </refmeta>
     12      1.1  christos   <refnamediv>
     13      1.1  christos     <refname>wpa_background</refname>
     14      1.1  christos     <refpurpose>Background information on Wi-Fi Protected Access and IEEE 802.11i</refpurpose>
     15      1.1  christos   </refnamediv>
     16      1.1  christos   <refsect1>
     17      1.1  christos     <title>WPA</title>
     18      1.1  christos 
     19      1.1  christos     <para>The original security mechanism of IEEE 802.11 standard was
     20      1.1  christos     not designed to be strong and has proven to be insufficient for
     21      1.1  christos     most networks that require some kind of security. Task group I
     22      1.1  christos     (Security) of IEEE 802.11 working group
     23      1.1  christos     (http://www.ieee802.org/11/) has worked to address the flaws of
     24      1.1  christos     the base standard and has in practice completed its work in May
     25      1.1  christos     2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was
     26      1.1  christos     approved in June 2004 and published in July 2004.</para>
     27      1.1  christos 
     28      1.1  christos     <para>Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version
     29      1.1  christos     of the IEEE 802.11i work (draft 3.0) to define a subset of the
     30      1.1  christos     security enhancements that can be implemented with existing wlan
     31      1.1  christos     hardware. This is called Wi-Fi Protected Access&lt;TM&gt; (WPA). This
     32      1.1  christos     has now become a mandatory component of interoperability testing
     33      1.1  christos     and certification done by Wi-Fi Alliance. Wi-Fi provides
     34      1.1  christos     information about WPA at its web site
     35      1.1  christos     (http://www.wi-fi.org/OpenSection/protected_access.asp).</para>
     36      1.1  christos 
     37      1.1  christos     <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)
     38      1.1  christos     algorithm for protecting wireless networks. WEP uses RC4 with
     39      1.1  christos     40-bit keys, 24-bit initialization vector (IV), and CRC32 to
     40      1.1  christos     protect against packet forgery. All these choices have proven to
     41      1.1  christos     be insufficient: key space is too small against current attacks,
     42      1.1  christos     RC4 key scheduling is insufficient (beginning of the pseudorandom
     43      1.1  christos     stream should be skipped), IV space is too small and IV reuse
     44      1.1  christos     makes attacks easier, there is no replay protection, and non-keyed
     45      1.1  christos     authentication does not protect against bit flipping packet
     46      1.1  christos     data.</para>
     47      1.1  christos 
     48      1.1  christos     <para>WPA is an intermediate solution for the security issues. It
     49      1.1  christos     uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP
     50      1.1  christos     is a compromise on strong security and possibility to use existing
     51      1.1  christos     hardware. It still uses RC4 for the encryption like WEP, but with
     52      1.1  christos     per-packet RC4 keys. In addition, it implements replay protection,
     53      1.1  christos     keyed packet authentication mechanism (Michael MIC).</para>
     54      1.1  christos 
     55      1.1  christos     <para>Keys can be managed using two different mechanisms. WPA can
     56      1.1  christos     either use an external authentication server (e.g., RADIUS) and
     57      1.1  christos     EAP just like IEEE 802.1X is using or pre-shared keys without need
     58      1.1  christos     for additional servers. Wi-Fi calls these "WPA-Enterprise" and
     59      1.1  christos     "WPA-Personal", respectively. Both mechanisms will generate a
     60      1.1  christos     master session key for the Authenticator (AP) and Supplicant
     61      1.1  christos     (client station).</para>
     62      1.1  christos 
     63      1.1  christos     <para>WPA implements a new key handshake (4-Way Handshake and
     64      1.1  christos     Group Key Handshake) for generating and exchanging data encryption
     65      1.1  christos     keys between the Authenticator and Supplicant. This handshake is
     66      1.1  christos     also used to verify that both Authenticator and Supplicant know
     67      1.1  christos     the master session key. These handshakes are identical regardless
     68      1.1  christos     of the selected key management mechanism (only the method for
     69      1.1  christos     generating master session key changes).</para>
     70      1.1  christos   </refsect1>
     71      1.1  christos 
     72      1.1  christos   <refsect1>
     73      1.1  christos     <title>IEEE 802.11i / WPA2</title>
     74      1.1  christos 
     75      1.1  christos     <para>The design for parts of IEEE 802.11i that were not included
     76      1.1  christos     in WPA has finished (May 2004) and this amendment to IEEE 802.11
     77      1.1  christos     was approved in June 2004. Wi-Fi Alliance is using the final IEEE
     78      1.1  christos     802.11i as a new version of WPA called WPA2. This includes, e.g.,
     79      1.1  christos     support for more robust encryption algorithm (CCMP: AES in Counter
     80      1.1  christos     mode with CBC-MAC) to replace TKIP and optimizations for handoff
     81      1.1  christos     (reduced number of messages in initial key handshake,
     82      1.1  christos     pre-authentication, and PMKSA caching).</para>
     83      1.1  christos   </refsect1>
     84      1.1  christos 
     85      1.1  christos   <refsect1>
     86      1.1  christos     <title>See Also</title>
     87      1.1  christos     <para>
     88      1.1  christos       <citerefentry>
     89      1.1  christos 	<refentrytitle>wpa_supplicant</refentrytitle>
     90      1.1  christos 	<manvolnum>8</manvolnum>
     91      1.1  christos       </citerefentry>
     92      1.1  christos     </para>
     93      1.1  christos   </refsect1>
     94      1.1  christos 
     95      1.1  christos   <refsect1>
     96      1.1  christos     <title>Legal</title>
     97  1.1.1.8  christos     <para>wpa_supplicant is copyright (c) 2003-2022,
     98      1.1  christos     Jouni Malinen <email>j (a] w1.fi</email> and
     99      1.1  christos     contributors.
    100      1.1  christos     All Rights Reserved.</para>
    101      1.1  christos 
    102  1.1.1.2  christos     <para>This program is licensed under the BSD license (the one with
    103  1.1.1.2  christos     advertisement clause removed).</para>
    104      1.1  christos   </refsect1>
    105      1.1  christos </refentry>
    106