index.html 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
  2. <html>
  3. <head>
  4. <title>hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator</title>
  5. <meta name="description" content="hostapd (IEEE 802.1X, WPA, WPA2, RSN, IEEE 802.11i Authenticator and RADIUS authentication server)">
  6. <meta name="keywords" content="WPA, WPA2, IEEE 802.11i, IEEE 802.1X, WPA Authenticator, hostapd, TKIP, CCMP, EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-SIM, EAP-AKA, EAP-GTC, EAP-MSCHAPv2, EAP-MD5, EAP-PAX, EAP-PSK, EAP-FAST, IEEE 802.1X Supplicant, IEEE 802.1aa, EAPOL, RSN, pre-authentication, PMKSA caching, BSD WPA Authenticator, FreeBSD WPA Authenticator, RADIUS authentication server, EAP authenticator, EAP server, EAP-TNC, TNCS, IF-IMV, IF-TNCCS">
  7. <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
  8. </head>
  9. <body>
  10. <h2>hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator</h2>
  11. <p>hostapd is a user space daemon for access point and authentication
  12. servers. It implements IEEE 802.11 access point management, IEEE
  13. 802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
  14. RADIUS authentication server. The current version supports Linux (Host
  15. AP, madwifi, Prism54 drivers) and FreeBSD (net80211).</p>
  16. <p>hostapd is designed to be a "daemon" program that runs in the
  17. background and acts as the backend component controlling
  18. authentication. hostapd supports separate frontend programs and an
  19. example text-based frontend, hostapd_cli, is included with
  20. hostapd.</p>
  21. <h4>Supported WPA/IEEE 802.11i/EAP/IEEE 802.1X features</h4>
  22. <ul>
  23. <li>WPA-PSK ("WPA-Personal")</li>
  24. <li>WPA with EAP (with integrated EAP server or an external
  25. RADIUS backend authentication server) ("WPA-Enterprise")</li>
  26. <li>key management for CCMP, TKIP, WEP104, WEP40</li>
  27. <li>WPA and full IEEE 802.11i/RSN/WPA2</li>
  28. <li>RSN: PMKSA caching, pre-authentication</li>
  29. <li>RADIUS accounting</li>
  30. <li>RADIUS authentication server with EAP</li>
  31. </ul>
  32. <h4>Supported EAP methods (integrated EAP server and RADIUS authentication server)</h4>
  33. <ul>
  34. <li>EAP-TLS</li>
  35. <li>EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)</li>
  36. <li>EAP-PEAP/TLS (both PEAPv0 and PEAPv1)</li>
  37. <li>EAP-PEAP/GTC (both PEAPv0 and PEAPv1)</li>
  38. <li>EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)</li>
  39. <li>EAP-TTLS/EAP-MD5-Challenge</li>
  40. <li>EAP-TTLS/EAP-GTC</li>
  41. <li>EAP-TTLS/EAP-MSCHAPv2</li>
  42. <li>EAP-TTLS/MSCHAPv2</li>
  43. <li>EAP-TTLS/EAP-TLS</li>
  44. <li>EAP-TTLS/MSCHAP</li>
  45. <li>EAP-TTLS/PAP</li>
  46. <li>EAP-TTLS/CHAP</li>
  47. <li>EAP-SIM</li>
  48. <li>EAP-AKA</li>
  49. <li>EAP-AKA'</li>
  50. <li>EAP-PAX</li>
  51. <li>EAP-PSK</li>
  52. <li>EAP-SAKE</li>
  53. <li>EAP-FAST</li>
  54. <li>EAP-IKEv2</li>
  55. <li>EAP-GPSK (experimental)</li>
  56. </ul>
  57. <p>Following methods are also supported, but since they do not generate keying
  58. material, they cannot be used with WPA or IEEE 802.1X WEP keying.</p>
  59. <ul>
  60. <li>EAP-MD5-Challenge</li>
  61. <li>EAP-MSCHAPv2</li>
  62. <li>EAP-GTC</li>
  63. <li>EAP-TNC (Trusted Network Connect; TNCS, IF-IMV, IF-T, IF-TNCCS)</li>
  64. </ul>
  65. <p>More information about EAP methods and interoperability testing is
  66. available in <a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=hostapd/eap_testing.txt">eap_testing.txt</a>.</p>
  67. <h4>Supported wireless cards/drivers</h4>
  68. <ul>
  69. <li><a href="http://hostap.epitest.fi/">Host AP driver for Prism2/2.5/3</a></li>
  70. <li><a href="http://sourceforge.net/projects/madwifi/">madwifi (Atheros ar521x)</a></li>
  71. <li><a href="http://www.prism54.org/">Prism54.org (Prism GT/Duette/Indigo)</a></li>
  72. <li>BSD net80211 layer (e.g., Atheros driver) (FreeBSD 6-CURRENT)</li>
  73. </ul>
  74. <h3><a name="download">Download</a></h3>
  75. <p>
  76. <b>hostapd</b><br>
  77. Copyright (c) 2002-2008, Jouni Malinen &lt;j@w1.fi&gt;
  78. and contributors.
  79. </p>
  80. <p>
  81. This program is free software; you can redistribute it and/or modify
  82. it under the terms of the GNU General Public License version 2 as
  83. published by the Free Software Foundation. See
  84. <a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=COPYING">COPYING</a>
  85. for more details.
  86. </p>
  87. <p>Alternatively, this software may be distributed, used, and modified
  88. under the terms of BSD license. See <a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=hostapd/README">README</a>
  89. for more details.</p>
  90. <p>
  91. <b>Please see
  92. <a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=hostapd/README">README</a>
  93. for the current documentation.</b></p>
  94. <ul>
  95. <li><a href="../releases.html">Release graph</a></li>
  96. <li>Latest stable release:
  97. <ul>
  98. <li><a href="../releases/hostapd-0.5.11.tar.gz">hostapd-0.5.11.tar.gz</a></li>
  99. </ul>
  100. <li>Older stable release:
  101. <ul>
  102. <li><a href="../releases/hostapd-0.4.11.tar.gz">hostapd-0.4.11.tar.gz</a></li>
  103. </ul>
  104. <li>Older stable release:
  105. <ul>
  106. <li><a href="../releases/hostapd-0.3.11.tar.gz">hostapd-0.3.11.tar.gz</a></li>
  107. </ul>
  108. <li>Obsolete stable release<BR>
  109. (note: 0.2.x branch is not supported anymore - please upgrade to 0.4.x or 0.5.x):
  110. <ul>
  111. <li><a href="../releases/hostapd-0.2.8.tar.gz">hostapd-0.2.8.tar.gz</a></li>
  112. </ul>
  113. <li>Latest development release:
  114. <ul>
  115. <li><a href="../releases/hostapd-0.6.6.tar.gz">hostapd-0.6.6.tar.gz</a></li>
  116. </ul>
  117. <li>ChangeLog:
  118. <ul>
  119. <li><a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=hostapd/ChangeLog">development branch</a></li>
  120. <li><a href="/cgi-bin/viewcvs.cgi/*checkout*/hostap/hostapd/ChangeLog?rev=stable&amp;content-type=text/plain">stable branch</a>
  121. </ul>
  122. <li><a href="../releases/">Old releases</a></li>
  123. <li><a href="http://lists.shmoo.com/mailman/listinfo/hostap">Mailing list</a></li>
  124. <li><a href="http://lists.shmoo.com/pipermail/hostap/">New mailing list archives</a></li>
  125. <li><a href="/gitweb/gitweb.cgi">Web interface to GIT repository (0.6.x and newer)</a></li>
  126. <li><a href="/cgi-bin/viewcvs.cgi/hostap/">Web interface to CVS repository (0.5.x and older)</a></li>
  127. <li><a href="../releases/snapshots/">Snapshot releases from all active branches</a>
  128. <li><a href="../cvs.html">GIT and read-only anonymous CVS access (pserver)</a></li>
  129. <li><a href="../bugz/">Bug and feature request tracking</a></li>
  130. <li><a href="devel/">Developers' documentation for hostapd</a></li>
  131. </ul>
  132. <h3>WPA</h3>
  133. <p>The original security mechanism of IEEE 802.11 standard was not
  134. designed to be strong and has proven to be insufficient for most
  135. networks that require some kind of security. Task group I (Security)
  136. of <a href="http://www.ieee802.org/11/">IEEE 802.11 working group</a>
  137. has worked to address the flaws of the base standard and in
  138. practice completed its work in May 2004. The IEEE 802.11i amendment to
  139. the IEEE 802.11 standard was approved in June 2004 and published in
  140. July 2004.</p>
  141. <p><a href="http://www.wi-fi.org/">Wi-Fi Alliance</a> used a draft
  142. version of the IEEE 802.11i work (draft 3.0) to define a subset of the
  143. security enhancements that can be implemented with existing wlan
  144. hardware. This is called Wi-Fi Protected Access (WPA). This has
  145. now become a mandatory component of interoperability testing and
  146. certification done by Wi-Fi Alliance. Wi-Fi has
  147. <a href="http://www.wi-fi.org/OpenSection/protected_access.asp">information
  148. about WPA</a> at its web site.</p>
  149. <p>IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
  150. for protecting wireless networks. WEP uses RC4 with 40-bit keys,
  151. 24-bit initialization vector (IV), and CRC32 to protect against packet
  152. forgery. All these choices have proven to be insufficient: key space is
  153. too small against current attacks, RC4 key scheduling is insufficient
  154. (beginning of the pseudorandom stream should be skipped), IV space is
  155. too small and IV reuse makes attacks easier, there is no replay
  156. protection, and non-keyed authentication does not protect against bit
  157. flipping packet data.</p>
  158. <p>WPA is an intermediate solution for the security issues. It uses
  159. Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
  160. compromise on strong security and possibility to use existing
  161. hardware. It still uses RC4 for the encryption like WEP, but with
  162. per-packet RC4 keys. In addition, it implements replay protection,
  163. keyed packet authentication mechanism (Michael MIC).</p>
  164. <p>Keys can be managed using two different mechanisms. WPA can either use
  165. an external authentication server (e.g., RADIUS) and EAP just like
  166. IEEE 802.1X is using or pre-shared keys without need for additional
  167. servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",
  168. respectively. Both mechanisms will generate a master session key for
  169. the Authenticator (AP) and Supplicant (client station).</p>
  170. <p>WPA implements a new key handshake (4-Way Handshake and Group Key
  171. Handshake) for generating and exchanging data encryption keys between
  172. the Authenticator and Supplicant. This handshake is also used to
  173. verify that both Authenticator and Supplicant know the master session
  174. key. These handshakes are identical regardless of the selected key
  175. management mechanism (only the method for generating master session
  176. key changes).</p>
  177. <h3>IEEE 802.11i / RSN / WPA2</h3>
  178. <p>The design for parts of IEEE 802.11i that were not included in WPA
  179. has finished (May 2004) and this amendment to IEEE 802.11 was approved
  180. in June 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new
  181. version of WPA called WPA2. This included, e.g., support for more
  182. robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
  183. to replace TKIP, optimizations for handoff (reduced number of messages
  184. in initial key handshake, pre-authentication, and PMKSA caching).</p>
  185. <h4>Configuration file</h4>
  186. <p>hostapd is configured using a text file that lists all the configuration
  187. parameters. See an example configuration file,
  188. <a href="/gitweb/gitweb.cgi?p=hostap.git;a=blob_plain;f=hostapd/hostapd.conf">hostapd.conf</a>,
  189. for detailed information about the configuration format and supported
  190. fields.</p>
  191. <h3>Feedback, comments, mailing list</h3>
  192. <p>
  193. Any comments, reports on success/failure, ideas for further
  194. improvement, feature requests, etc. are welcome at j@w1.fi.
  195. Please note, that I often receive more email than I have time to answer.
  196. Unfortunately, some messages may not get a reply, but I'll try to go
  197. through my mail whenever time permits.
  198. </p>
  199. <p>
  200. Host AP mailing list can also be used for topics related to
  201. hostapd. Since this list has a broader audience, your likelyhood of
  202. getting responses is higher. This list is recommended for general
  203. questions about hostapd and its development. In addition, I
  204. will send release notes to it whenever a new version is available.
  205. </p>
  206. <p>
  207. The mailing list information and web archive is at <a
  208. href="http://lists.shmoo.com/mailman/listinfo/hostap">http://lists.shmoo.com/mailman/listinfo/hostap</a>.
  209. Messages to hostap@shmoo.com will be delivered to the
  210. subscribers. Please note, that due to large number of spam and virus
  211. messages sent to the list address, the list is configured to accept
  212. messages only from subscribed addresses. Messages from unsubscribed addresses
  213. may be accepted manually, but their delivery will be delayed.
  214. </p>
  215. <p>
  216. If you want to make sure your bug report of feature request does not
  217. get lost, please report it through the bug tracking system as
  218. <a href="../bugz/enter_bug.cgi">a new
  219. bug/feature request</a>.
  220. </p>
  221. <hr>
  222. The server and hosting for hostap.epitest.fi is kindly provided by
  223. Internet Systems Consortium (ISC).
  224. <a href="http://www.isc.org/"><img src="../isc.png" border="0"></a>
  225. <hr>
  226. <div>
  227. <address><a href="mailto:j@w1.fi">Jouni Malinen</a></address>
  228. <!-- Created: Sun Jan 2 17:20:17 PST 2005 -->
  229. <!-- hhmts start -->
  230. Last modified: Sun Dec 7 19:24:25 EET 2008
  231. <!-- hhmts end -->
  232. </div>
  233. </body>
  234. </html>