wpa_supplicant

wpa_supplicant is a free software implementation of an IEEE 802.11i supplicant for LinuxFreeBSDNetBSDQNXAROSMicrosoft WindowsSolarisOS/2 (including ArcaOS and eComStation)[2] and Haiku.[3] In addition to being a WPA3 and WPA2 supplicant, it also implements WPA and older wireless LAN security protocols.

wpa_supplicant

Screenshot of wpa_gui

Developer(s)Jouni Malinen and others
Initial releaseApril 5, 2003
Stable release

2.10[1] / January 16, 2022; 8 months ago

Repository
  • w1.fi/hostap.git 
Written inC
Operating systemCross-platform
TypeWLAN tools
LicenseBSD
Websitew1.fi/wpa_supplicant/

Contents

Features[edit]

Features include:[4]

  • WPA-PSK and WPA2-PSK ("WPA-Personal", pre-shared key)
  • WPA3[5]
  • WPA with EAP ("WPA-Enterprise", for example with RADIUS authentication server)
  • RSN: PMKSA caching, pre-authentication
  • IEEE 802.11r
  • IEEE 802.11w
  • Wi-Fi Protected Setup (WPS)

Included with the supplicant are a GUI and a command-line utility for interacting with the running supplicant. From either of these interfaces it is possible to review a list of currently visible networks, select one of them, provide any additional security information needed to authenticate with the network (for example, a passphrase, or username and password) and add it to the preference list to enable automatic reconnection in the future.[6]

The graphical user interface is built on top of the Qt library.

wpa_supplicant can authenticate with any of the following EAP (Extensible Authentication Protocol) methods: EAP-TLSEAP-PEAP (both PEAPv0 and PEAPv1), EAP-TTLSEAP-SIMEAP-AKA, EAP-AKA', EAP-pwd, EAP-EKE, EAP-PSK (experimental), EAP-FAST, EAP-PAX, EAP-SAKE, EAP-GPSK, EAP-IKEv2EAP-MD5EAP-MSCHAPv2, and LEAP (requires special functions in the driver).[6]

Vulnerability to KRACK[edit]

wpa_supplicant was especially susceptible to KRACK, as it can be manipulated to install an all-zeros encryption key, effectively nullifying WPA2 protection in a man-in-the-middle attack.[7] Version 2.7 fixed KRACK and several other vulnerabilities.

See also[edit]

References[edit]

  1. ^ "Index of /releases". w1.fi. 2022-01-16. Retrieved 2022-02-28.
  2. ^ "wpa_supplicant". Retrieved 2020-09-03.
  3. ^ haiku/wpa_supplicant, Haiku, 2019-03-17, retrieved 2020-03-07
  4. ^ "wpa_supplicant(8) - Linux man page". Retrieved 2020-03-07.
  5. ^ "wpa_supplicant"wiki.archlinux.org. Retrieved 2021-05-18.
  6. Jump up to:a b "Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, RSN, IEEE 802.11i)". w1.fi. Retrieved 2014-07-04.
  7. ^ "Key Reinstallation Attacks disclosure website"KRACK Attacks. Retrieved 26 September 2018. Linux's wpa_supplicant v2.6 is also vulnerable to the installation of an all-zero encryption key in the 4-way handshake.

External links[edit]

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值