wpa_background.sgml 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. <!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">
  2. <refentry>
  3. <refmeta>
  4. <refentrytitle>wpa_background</refentrytitle>
  5. <manvolnum>8</manvolnum>
  6. </refmeta>
  7. <refnamediv>
  8. <refname>wpa_background</refname>
  9. <refpurpose>Background information on Wi-Fi Protected Access and IEEE 802.11i</refpurpose>
  10. </refnamediv>
  11. <refsect1>
  12. <title>WPA</title>
  13. <para>The original security mechanism of IEEE 802.11 standard was
  14. not designed to be strong and has proven to be insufficient for
  15. most networks that require some kind of security. Task group I
  16. (Security) of IEEE 802.11 working group
  17. (http://www.ieee802.org/11/) has worked to address the flaws of
  18. the base standard and has in practice completed its work in May
  19. 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was
  20. approved in June 2004 and published in July 2004.</para>
  21. <para>Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version
  22. of the IEEE 802.11i work (draft 3.0) to define a subset of the
  23. security enhancements that can be implemented with existing wlan
  24. hardware. This is called Wi-Fi Protected Access&lt;TM&gt; (WPA). This
  25. has now become a mandatory component of interoperability testing
  26. and certification done by Wi-Fi Alliance. Wi-Fi provides
  27. information about WPA at its web site
  28. (http://www.wi-fi.org/OpenSection/protected_access.asp).</para>
  29. <para>IEEE 802.11 standard defined wired equivalent privacy (WEP)
  30. algorithm for protecting wireless networks. WEP uses RC4 with
  31. 40-bit keys, 24-bit initialization vector (IV), and CRC32 to
  32. protect against packet forgery. All these choices have proven to
  33. be insufficient: key space is too small against current attacks,
  34. RC4 key scheduling is insufficient (beginning of the pseudorandom
  35. stream should be skipped), IV space is too small and IV reuse
  36. makes attacks easier, there is no replay protection, and non-keyed
  37. authentication does not protect against bit flipping packet
  38. data.</para>
  39. <para>WPA is an intermediate solution for the security issues. It
  40. uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP
  41. is a compromise on strong security and possibility to use existing
  42. hardware. It still uses RC4 for the encryption like WEP, but with
  43. per-packet RC4 keys. In addition, it implements replay protection,
  44. keyed packet authentication mechanism (Michael MIC).</para>
  45. <para>Keys can be managed using two different mechanisms. WPA can
  46. either use an external authentication server (e.g., RADIUS) and
  47. EAP just like IEEE 802.1X is using or pre-shared keys without need
  48. for additional servers. Wi-Fi calls these "WPA-Enterprise" and
  49. "WPA-Personal", respectively. Both mechanisms will generate a
  50. master session key for the Authenticator (AP) and Supplicant
  51. (client station).</para>
  52. <para>WPA implements a new key handshake (4-Way Handshake and
  53. Group Key Handshake) for generating and exchanging data encryption
  54. keys between the Authenticator and Supplicant. This handshake is
  55. also used to verify that both Authenticator and Supplicant know
  56. the master session key. These handshakes are identical regardless
  57. of the selected key management mechanism (only the method for
  58. generating master session key changes).</para>
  59. </refsect1>
  60. <refsect1>
  61. <title>IEEE 802.11i / WPA2</title>
  62. <para>The design for parts of IEEE 802.11i that were not included
  63. in WPA has finished (May 2004) and this amendment to IEEE 802.11
  64. was approved in June 2004. Wi-Fi Alliance is using the final IEEE
  65. 802.11i as a new version of WPA called WPA2. This includes, e.g.,
  66. support for more robust encryption algorithm (CCMP: AES in Counter
  67. mode with CBC-MAC) to replace TKIP and optimizations for handoff
  68. (reduced number of messages in initial key handshake,
  69. pre-authentication, and PMKSA caching).</para>
  70. </refsect1>
  71. <refsect1>
  72. <title>See Also</title>
  73. <para>
  74. <citerefentry>
  75. <refentrytitle>wpa_supplicant</refentrytitle>
  76. <manvolnum>8</manvolnum>
  77. </citerefentry>
  78. </para>
  79. </refsect1>
  80. <refsect1>
  81. <title>Legal</title>
  82. <para>wpa_supplicant is copyright (c) 2003-2017,
  83. Jouni Malinen <email>j@w1.fi</email> and
  84. contributors.
  85. All Rights Reserved.</para>
  86. <para>This program is licensed under the BSD license (the one with
  87. advertisement clause removed).</para>
  88. </refsect1>
  89. </refentry>