一键加密:WPS(Wi-Fi Protected Setup,Wi-Fi保护设置)

    如果没有有效的安全加密设置,自己的局域网很可能在无意间就变成了公共网络。但是,面对WEP、WPA、WPA2等加密技术,用户往往觉得无线安全设置太麻烦,甚至感到那是高深莫测的事情。正是考虑到普通用户对无线安全设置的困惑,Wi-Fi联盟(Wi-Fi联盟是一家非营利性的全球行业协会,拥有275家成员企业,致力于共同推动无线局域网产业的发展)于2006年末推出了名为WPS的认证程序,那么,什么是wps呢?

 

一、什么是wps

    WPS (Wi-Fi Protected Setup,Wi-Fi保护设置):即双键上网(各按无线网卡wps键和路由器wps键,就能实现网卡与路由器连接)是一种无线安全设置,主要致力于简化无线局域网WiFi的安装及安全性能配置工作。该技术结合目前最安全的加密方式WPA/WPA2和简单方便的配置方式于一体,使无线局域网的相关产品更易于被普通用户接受。Wi-Fi联盟宣称,WPS可以将设置安全网络的步骤减少一半。目前,NETGEAR新一代11n无线路由器及网卡均支持WPS功能,这对用户来说绝对是个好消息。

    WPS有的叫做AOSS、有的叫做QSS(更为普遍些)。通过WPS,AP和客户端可以自动的进行安全设置,用户只需简单的按下按钮或输入PIN就可以了。在有些客户端或路由器上,WPS也称为WSC(Wi-Fi简单设置)。

    更多关于WPS详细资料见  wpa_supplicant wps手册的翻译

 

二、wps实现的过程(RT5370网卡wps实现步骤)?

一.PC端
1.PC上解压:
    tar xjf DPA_RT5572_LinuxSTA_2.6.1.4_20121211.tar.bz2
2.修改网卡驱动源码
    主要为Makefile、config.mk、*.h文件,修改芯片、平台、交叉编译工具链、内核源码路径、大小端、STA/AP、HAS_WSC*、RXBULKAGGRE_SIZE等等问题,主要根据insmod加载驱动模块时报错情况来修改,如果运气好,都不用改。
3.make  或 make ARCH=arm KBUILD_NOPEDANTIC=1
    在MODULE、NETIF、UTIL三个目录下的os/linux上生成相应的*.ko驱动。
4.拷贝所需文件到U盘
    拷贝RT2870STA.dat、rtutil5370sta.ko、rt5370sta.ko、rtnet5370sta.ko到u盘

二.Hi35xx(开发板端)
1.挂载u盘
    mount /dev/sda1 /nfs
    cd /nfs
2.拷贝驱动信息文档
    mkdir -p /etc/Wireless/RT2870STA
    cp ./RT2870STA.dat /etc/Wireless/RT2870STA/
3.顺序加载驱动:
    #insmod rtutil5370sta.ko
    #insmod rt5370sta.ko
    #insmod rtnet5370sta.ko
4.启动网卡

    ifconfig ra0 up

5.按网卡键或运行指令(软硬PBC)2min内完成:

    !!! WscScanExec !!!


    <----- WscPBCTimeOutAction
    !!! WscScanExec !!!
    !!! WscScanTimeOutAction !!!
    WscPBCBssTableSort : Total 0 PBC Registrar Found

    WscPBCExec --> AP list is 0, wait for next time

 平均每10s打印一次,2min后停止。

6.按路由器wps键后,反应如下:
UUID-E= 00  00  00  00  00  00  00  00  00  00  00  00  00  00  00  00
WscPBCBssTableSort : Total 1 PBC Registrar Found
<----- WscPBCExec !!!
<----- WscPBCTimeOutAction
Rcv Wcid(1) AddBAReq
Start Seq = 00000000
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 1
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 254
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 254
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 254
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 254
WpsSmProcess::  EAPOL Packet.  Code = 1.    Type = 254
WpsSmProcess::  EAPOL Packet.  Code = 4.    Type = 85
Rcv Wcid(1) AddBAReq
Start Seq = 00000000
7.连接成功

    ping 192.168.1.1,能ping通路由。

    ping 202.108.22.5  能ping通百度。

8.再按网卡键(开关),断开连接。

     WPS的精神就是当AP进入Configured状态后,无论再用什么方式启动WPS,当前的SSID和加密方式就不能再更改,这样才能保证有新设备加入时,原来已经通过WPS加入到网络中的设备不会因AP密码更改而与网络断开。另外,WPS每次登陆的用户名与密码都是随机的。

     需要说明的是,wps只是实现网卡与路由器的连接,网卡能ping通192.168.1.1(路由地址)就说明wps成功了,至于能不能上网,要看电信了,呵呵,也就是你是否缴费了。。。


三、wps实现方式

WPS的配置方式非常灵活,可分为下列四种:

    PBC:Push Button,只需要按一下AP上的一个按钮,客户端在网卡的UI上也按一下相应软按钮,两者之间就可以轻松建立连接。

    PIN:PIN 码,AP与客户端通过统一的PIN 码建立安全连接。

    UFD:USB Flash Device,即通过存储在USB接口的闪存设备上的信息来建立认证交换过程。

    NFC :通过刷卡的方式来建立连接。

------------------------------------------------

PBC: 按WPS按钮实现WPS安全连接

------------------------------------------------

    PBC(Push Button)方式有个细节不要忽略:它有软件PBC和硬件PBC两种启动方式。虽然二者实现的功能都是一样的,但是在实现的细节上却有不同,可以说是两种机制实现的同一种功能,所以在测试时不能以偏概全,只注意AP 的软体而忽略了用户使用频率最高的那个按钮。即PBC要么是产品上的一个硬的按键/开关,要么是UI上用鼠标或触摸屏(软)上点击的一个按钮。

    1. 在AP(Access Point:接入点,AP路由器)和WPS设置中,设置为启用.

    2. 按一下客户端(无线网卡)上的WPS按键,搜索WPS网络.

    3. 按一下AP上的WPS按键,WPS开始链接协商,片刻后WPS安全连接成功建立.

    我就是用硬件PBC实现的。

------------------------------------------------

PIN:输入PIN码实现WPS安全连接

------------------------------------------------

1. PIN(InternalRegistra, 相对于AP而言):通过在路由器中输入客户端PIN码来实现WPS安全连接.

    1). 在WPS设置中,把状态设置为启用.

    2). 打开客户端WPS设置软件,选择在路由器中输入PIN的方式连接,同时软件上还会显示客户端当前的PIN码.

    3). 打开路由器界面,在WPS模式里选择PIN模式,然后输入客户端的PIN码,点添加新设备,一会儿后,WPS安全连接成功建立.

2. PIN(ExternalRegistra, 相对于AP而言):通过输入AP的PIN码实现WPS安全连接.

    1). 在AP中,在WPS设置中,设置为启用.

    2). 记住AP的PIN码,然后打开客户端(无线网卡)WPS设置软件,选择以AP的PIN码(一般在无线路由的盒子外面标识有该pin码)来进行连接.

    3). 输入完PIN码后,点下一步,一会儿后,WPS安全连接成功建立.

四、WPS的缺点

    wps是比较新的技术,更准确的说,使用不是很普遍,导致了wps出现了不少问题,主要体现在网卡厂商与路由器厂商的不同,类型不一。如果你做wps,特别是在Linux下,特别在嵌入式上,你会发现,网卡-网卡驱动-路由器之间的匹配问题是多么的让人伤尽脑经,这就他的缺点所在。


    有了WPS“一键加密,我们只需按一下无线路由器上的WPS键,就能轻松快速地完成无线网络连接,并且获得WPA2级加密的无线网络,让客户端用户可以迅速并安心的体验无线生活。




  • 6
    点赞
  • 15
    收藏
    觉得还不错? 一键收藏
  • 23
    评论
1. Introduction ........................................................................................................................7 1.1. Purpose .............................................................................................................................................. 7 1.2. Scope................................................................................................................................................... 7 1.3. Related Documents .......................................................................................................................... 7 1.4. Supported Usage Models................................................................................................................. 7 Primary Usage Models................................................................................................................................. 7 Secondary Usage Models ............................................................................................................................. 7 1.5. Mental Model .................................................................................................................................... 8 1.6. Design Approach .............................................................................................................................. 8 1.7. Solution Flexibility ........................................................................................................................... 8 1.8. User Experience................................................................................................................................ 9 1.8.1. In-band Setup ............................................................................................................................... 9 1.8.2. Out-of-band Setup ....................................................................................................................... 9 2. Core Architecture..............................................................................................................11 2.1. Definitions........................................................................................................................................ 11 2.2. Components and Interfaces .......................................................................................................... 12 2.2.1. Architectural Overview .......................................................................................................................... 12 2.2.2. Interface E ............................................................................................................................................... 12 2.2.3. Interface M.............................................................................................................................................. 13 2.2.4. Interface A............................................................................................................................................... 14 2.3. Registration Protocol ..................................................................................................................... 15 2.4. Security Overview.......................................................................................................................... 16 2.4.1. In-band Configuration .............................................................................................................. 16 2.4.2. Guidelines and Requirements for PIN values ....................................................................... 18 2.4.3. Out-of-band Configuration ...................................................................................................... 18 3. Initial WLAN Setup ..........................................................................................................19 3.1. Standalone AP ................................................................................................................................ 19 3.2. Legacy AP........................................................................................................................................ 19 3.3. AP With an External Registrar ................................................................................................... 20 3.3.1. EAP-based Setup of External Registrar................................................................................. 21 3.3.2. Ethernet-based Setup of External Registrar ......................................................................... 23 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 3 of 110 Version: 1.0h 4. Adding Member Devices ...................................................................................................25 4.1. In-band Setup Using a Standalone AP/Registrar ..................................................................... 25 4.2. Out-of-band Setup Using a Standalone AP/Registrar.............................................................. 27 4.3. Out-of-band Setup Using an External Registrar ...................................................................... 28 4.4. Secure Setup with Legacy AP ...................................................................................................... 29 4.5. Secure Setup with Legacy Enrollee ............................................................................................. 29 4.5.1. Mental model mapping ............................................................................................................. 29 4.6. No-Security Out-of-band Setup Using a Standalone AP ......................................................... 29 4.6.1. Mental model mapping ............................................................................................................. 30 5. Secondary Usage Models ..................................................................................................31 5.1. Removing Members from the WLAN......................................................................................... 31 5.2. Guest access..................................................................................................................................... 31 5.3. Re-keying credentials .................................................................................................................... 31 5.4. Expanding the network - Adding additional AP or Router .................................................... 31 5.5. Changing Network Name (SSID), radio channels, etc. ............................................................ 31 6. Registration Protocol Definition .......................................................................................33 6.1. Registration Protocol Initiation ................................................................................................... 33 6.2. Registration Protocol Messages ................................................................................................... 34 6.2.1. Optional Parameters................................................................................................................................ 35 6.3. Key Derivation................................................................................................................................ 36 6.4. Proof-of-possession of Device Password ..................................................................................... 38 6.4.1. PIN Checksums .......................................................................................................................... 38 6.4.2. Device Password Splitting......................................................................................................... 39 6.4.3. Device Password Usage ............................................................................................................. 39 6.5. Key Wrap Algorithm..................................................................................................................... 40 6.6. Rekeying .......................................................................................................................................... 41 6.7. Key Summary and Classification ................................................................................................ 41 6.8. Security Analysis ............................................................................................................................ 42 6.9. Out-Of-Band Channels ................................................................................................................. 43 6.9.1. Out-of-band Channel Characteristics .................................................................................................... 43 6.10. EAP Transport of Registration Protocol................................................................................ 43 6.10.1. EAP Message Framing ........................................................................................................................... 44 6.10.2. EAP Messages......................................................................................................................................... 45 6.10.3. EAP State Machine for Enrollee Registration ...................................................................................... 47 6.10.4. EAP State Machine for Adding an External Registrar ......................................................................... 48 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 4 of 110 Version: 1.0h 6.11. UPnP Transport of Registration Protocol ............................................................................. 49 7. Message Encoding ............................................................................................................50 7.1. Wi-Fi Protected Setup TLV Data Format.................................................................................. 50 7.2. 802.11 Management Frames......................................................................................................... 50 7.2.1. Beacon Frame (C) ...................................................................................................................... 52 7.2.2. Association Request and Reassociation Request................................................................... 52 7.2.3. Association Response and Reassociation Response .............................................................. 52 7.2.4. Probe Request (D-E or D-R) .................................................................................................... 53 7.2.5. Probe Response (D-AP/Registrar)........................................................................................... 53 7.3. Registration Protocol Message Definitions ................................................................................ 54 7.3.1. Message M1................................................................................................................................. 54 7.3.2. Message M2................................................................................................................................. 55 7.3.3. Message M2D.............................................................................................................................. 56 7.3.4. Message M3................................................................................................................................. 56 7.3.5. Message M4................................................................................................................................. 56 7.3.6. Message M5................................................................................................................................. 57 7.3.7. Message M6................................................................................................................................. 57 7.3.8. Message M7................................................................................................................................. 58 7.3.9. Message M8................................................................................................................................. 59 7.3.10. WSC_ACK Message .................................................................................................................. 60 7.3.11. WSC_NACK Message ............................................................................................................... 60 7.3.12. WSC_Done Message .................................................................................................................. 60 7.4. AP Settings Message Definitions.................................................................................................. 61 7.4.1. GetAPSettings Input Message.................................................................................................. 61 7.4.2. GetAPSettings Output Message............................................................................................... 62 7.4.3. SetAPSettings Message.............................................................................................................. 63 7.4.4. DelAPSettings Message ............................................................................................................. 63 7.4.5. SetSelectedRegistrar Message.................................................................................................. 64 7.4.6. ResetAP and RebootAP Messages........................................................................................... 64 7.5. STA Settings Message Definitions ............................................................................................... 65 7.5.1. GetSTASettings Input Message ............................................................................................... 65 7.5.2. GetSTASettings Output Message ............................................................................................ 65 7.5.3. SetSTASettings Message ........................................................................................................... 66 7.5.4. DelSTASettings Message .......................................................................................................... 67 7.5.5. ResetSTA and RebootSTA Messages...................................................................................... 67 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 5 of 110 Version: 1.0h 8. USBA (USB Host) Out-of-Band Interface Specification ..................................................68 8.1. Requirements for USB Flash Drives (UFD)............................................................................... 68 8.2. Enrollee Requirements for USBA OOB Interfaces .................................................................. 68 8.3. Firmware and Software Requirements ...................................................................................... 69 8.3.1. Encrypted Settings File (xxxxxxxx.WSC) .............................................................................. 69 8.3.2. Unencrypted Settings File (00000000.WSC).......................................................................... 69 8.3.3. Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ............................................... 70 9. NFC Out-of-Band Interface Specification........................................................................71 9.1. Disclaimer........................................................................................................................................ 71 9.2. Overview.......................................................................................................................................... 71 9.3. NFC Use Cases................................................................................................................................ 72 9.3.1. NFC Password Token................................................................................................................ 72 9.3.2. Touching Devices ....................................................................................................................... 72 9.3.3. NFC Configuration Token........................................................................................................ 73 9.4. Generic Requirements for NFC OOB Support ......................................................................... 73 9.4.1. New Devices (Enrollee or AP) Requirements ........................................................................ 73 9.4.2. Registrar Requirements ............................................................................................................ 74 9.5. Hardware Requirements............................................................................................................... 74 9.5.1. Requirements for NFC Tokens................................................................................................ 74 9.5.2. Requirements for an NFC Device............................................................................................ 74 9.6. Firmware and Software Requirements ...................................................................................... 74 9.6.1. NFC Password Token................................................................................................................ 74 9.6.2. NFC Configuration Token........................................................................................................ 75 9.6.3. NFC Device ................................................................................................................................. 75 9.7. Informative: NFC Forum specifications..................................................................................... 75 9.7.1. NFC Data Exchange Format (NDEF)..................................................................................... 75 9.7.2. NDEF mapping documents ...................................................................................................... 76 10. PushButton Configuration............................................................................................77 10.1. Introduction ................................................................................................................................ 77 10.2. User Experience.......................................................................................................................... 77 10.3. PBC Technical Description ...................................................................................................... 78 10.4. User Feedback ............................................................................................................................ 81 10.5. PBC Security Considerations................................................................................................... 82 11. Data Element Definitions ..............................................................................................84 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 6 of 110 Version: 1.0h 12. Conclusion...................................................................................................................105 13. Appendix: Additional Setup Scenarios .......................................................................107 14. Appendix: Out-of-Band Channel Considerations ......................................................109

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 23
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值