什么是 WPS(Wi-Fi Protected Setup)

        什么是 WPS(Wi-Fi Protected Setup) WPS(Wi-Fi Protected Setup,Wi-Fi保护设置)是由Wi-Fi联盟(http://www.wi-fi.org/)组织实施的认证项目,

主要致力于简化无线局域网的安装及安全性能配置工作。在传统方式下,用户新建一个无线网络时,必须在接入点手动设置网络名(SSID)和安全密钥,

然后在客户端验证密钥以阻止“不速之客”的闯入。这整个过程需要用户具备Wi-Fi设备的背景知识和修改必要配置的能力。

        Wi- Fi Protected Setup能帮助用户自动设置网络名(SSID)、配置强大的WPA数据编码及认证功能,用户只需输入个人信息码(PIN方法)或按下按钮

(按钮设置,或称PBC),即能安全地连入WLAN。这大大简化了无线安全设置的操作。Wi-Fi Protected Setup支持多种通过Wi-Fi认证的802.11产品,

包括接入点、无线适配器、Wi-Fi电话以及其他消费性电子设备。 WPS的优点 * WPS能够在网络中为接入点及WPS客户端设备自动配置网络名(SSID)及WPA安全密钥。

* 当连接WPS设备时,用户没有必要去了解SSID和安全密钥等概念。 * 用户的安全密钥不可能被外人破解,因为它是随机产生的。

* 用户不必输入预知的密码段或冗长的十六进制字符串。 * 信息及网络证书通过扩展认证协议(EAP)在空中进行安全交换,该协议是WPA2 使用的认证协议之一。

 * WPS支持Windows Vista操作系统。 WPS的缺点 * WPS不支持设备不依靠AP而直接通讯的“ad hoc”网络。

* 网络中所有的Wi-Fi设备必须通过WPS认证或与WPS兼容,否则将不能利用WPS简化网络安全配置工作。

* 由于WPS中的十六进制字符串是随机产生的,所以很难在WPS网络中添加一个非WPS的客户端设备。

 * WPS是一项新的认证技术,所以并非所有厂商都支持。关于WPS * WPS是一项非专有的规范,它是由Wi-Fi联盟实施的认证项目。

* WPS是Wi-Fi认证产品的可选认证项目。 o 并非所有的Wi-Fi认证产品都支持WPS,用户可在产品上寻找Wi-Fi Protected Setup 的标志,以确保所购产品已具备 Wi-Fi Protected Setup功能。

* 已通过Wi-Fi Protected Setup 的产品目前能够为用户提供两种安装解决方案: o 输入PIN码——对于WPS认证的设备为强制配置。 o 按钮配置(PBC)——它可以是设备上的硬件按钮或软件模拟的按钮(对于无线客户端为可选配置)。

 * 在PIN配置模式中,系统在接入点或无线路由器中设置注册表,用户通过在注册表中输入客户端PIN码为网络中新增设备分配证书(注意:在PBC模式中,当客户端PIN码为全0时,系统也需要设置注册表)。

 * WPS并没有新增安全性能——它使得现有的安全技术更容易配置。

  • 0
    点赞
  • 7
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
1. Introduction ........................................................................................................................7 1.1. Purpose .............................................................................................................................................. 7 1.2. Scope................................................................................................................................................... 7 1.3. Related Documents .......................................................................................................................... 7 1.4. Supported Usage Models................................................................................................................. 7 Primary Usage Models................................................................................................................................. 7 Secondary Usage Models ............................................................................................................................. 7 1.5. Mental Model .................................................................................................................................... 8 1.6. Design Approach .............................................................................................................................. 8 1.7. Solution Flexibility ........................................................................................................................... 8 1.8. User Experience................................................................................................................................ 9 1.8.1. In-band Setup ............................................................................................................................... 9 1.8.2. Out-of-band Setup ....................................................................................................................... 9 2. Core Architecture..............................................................................................................11 2.1. Definitions........................................................................................................................................ 11 2.2. Components and Interfaces .......................................................................................................... 12 2.2.1. Architectural Overview .......................................................................................................................... 12 2.2.2. Interface E ............................................................................................................................................... 12 2.2.3. Interface M.............................................................................................................................................. 13 2.2.4. Interface A............................................................................................................................................... 14 2.3. Registration Protocol ..................................................................................................................... 15 2.4. Security Overview.......................................................................................................................... 16 2.4.1. In-band Configuration .............................................................................................................. 16 2.4.2. Guidelines and Requirements for PIN values ....................................................................... 18 2.4.3. Out-of-band Configuration ...................................................................................................... 18 3. Initial WLAN Setup ..........................................................................................................19 3.1. Standalone AP ................................................................................................................................ 19 3.2. Legacy AP........................................................................................................................................ 19 3.3. AP With an External Registrar ................................................................................................... 20 3.3.1. EAP-based Setup of External Registrar................................................................................. 21 3.3.2. Ethernet-based Setup of External Registrar ......................................................................... 23 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 3 of 110 Version: 1.0h 4. Adding Member Devices ...................................................................................................25 4.1. In-band Setup Using a Standalone AP/Registrar ..................................................................... 25 4.2. Out-of-band Setup Using a Standalone AP/Registrar.............................................................. 27 4.3. Out-of-band Setup Using an External Registrar ...................................................................... 28 4.4. Secure Setup with Legacy AP ...................................................................................................... 29 4.5. Secure Setup with Legacy Enrollee ............................................................................................. 29 4.5.1. Mental model mapping ............................................................................................................. 29 4.6. No-Security Out-of-band Setup Using a Standalone AP ......................................................... 29 4.6.1. Mental model mapping ............................................................................................................. 30 5. Secondary Usage Models ..................................................................................................31 5.1. Removing Members from the WLAN......................................................................................... 31 5.2. Guest access..................................................................................................................................... 31 5.3. Re-keying credentials .................................................................................................................... 31 5.4. Expanding the network - Adding additional AP or Router .................................................... 31 5.5. Changing Network Name (SSID), radio channels, etc. ............................................................ 31 6. Registration Protocol Definition .......................................................................................33 6.1. Registration Protocol Initiation ................................................................................................... 33 6.2. Registration Protocol Messages ................................................................................................... 34 6.2.1. Optional Parameters................................................................................................................................ 35 6.3. Key Derivation................................................................................................................................ 36 6.4. Proof-of-possession of Device Password ..................................................................................... 38 6.4.1. PIN Checksums .......................................................................................................................... 38 6.4.2. Device Password Splitting......................................................................................................... 39 6.4.3. Device Password Usage ............................................................................................................. 39 6.5. Key Wrap Algorithm..................................................................................................................... 40 6.6. Rekeying .......................................................................................................................................... 41 6.7. Key Summary and Classification ................................................................................................ 41 6.8. Security Analysis ............................................................................................................................ 42 6.9. Out-Of-Band Channels ................................................................................................................. 43 6.9.1. Out-of-band Channel Characteristics .................................................................................................... 43 6.10. EAP Transport of Registration Protocol................................................................................ 43 6.10.1. EAP Message Framing ........................................................................................................................... 44 6.10.2. EAP Messages......................................................................................................................................... 45 6.10.3. EAP State Machine for Enrollee Registration ...................................................................................... 47 6.10.4. EAP State Machine for Adding an External Registrar ......................................................................... 48 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 4 of 110 Version: 1.0h 6.11. UPnP Transport of Registration Protocol ............................................................................. 49 7. Message Encoding ............................................................................................................50 7.1. Wi-Fi Protected Setup TLV Data Format.................................................................................. 50 7.2. 802.11 Management Frames......................................................................................................... 50 7.2.1. Beacon Frame (C) ...................................................................................................................... 52 7.2.2. Association Request and Reassociation Request................................................................... 52 7.2.3. Association Response and Reassociation Response .............................................................. 52 7.2.4. Probe Request (D-E or D-R) .................................................................................................... 53 7.2.5. Probe Response (D-AP/Registrar)........................................................................................... 53 7.3. Registration Protocol Message Definitions ................................................................................ 54 7.3.1. Message M1................................................................................................................................. 54 7.3.2. Message M2................................................................................................................................. 55 7.3.3. Message M2D.............................................................................................................................. 56 7.3.4. Message M3................................................................................................................................. 56 7.3.5. Message M4................................................................................................................................. 56 7.3.6. Message M5................................................................................................................................. 57 7.3.7. Message M6................................................................................................................................. 57 7.3.8. Message M7................................................................................................................................. 58 7.3.9. Message M8................................................................................................................................. 59 7.3.10. WSC_ACK Message .................................................................................................................. 60 7.3.11. WSC_NACK Message ............................................................................................................... 60 7.3.12. WSC_Done Message .................................................................................................................. 60 7.4. AP Settings Message Definitions.................................................................................................. 61 7.4.1. GetAPSettings Input Message.................................................................................................. 61 7.4.2. GetAPSettings Output Message............................................................................................... 62 7.4.3. SetAPSettings Message.............................................................................................................. 63 7.4.4. DelAPSettings Message ............................................................................................................. 63 7.4.5. SetSelectedRegistrar Message.................................................................................................. 64 7.4.6. ResetAP and RebootAP Messages........................................................................................... 64 7.5. STA Settings Message Definitions ............................................................................................... 65 7.5.1. GetSTASettings Input Message ............................................................................................... 65 7.5.2. GetSTASettings Output Message ............................................................................................ 65 7.5.3. SetSTASettings Message ........................................................................................................... 66 7.5.4. DelSTASettings Message .......................................................................................................... 67 7.5.5. ResetSTA and RebootSTA Messages...................................................................................... 67 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 5 of 110 Version: 1.0h 8. USBA (USB Host) Out-of-Band Interface Specification ..................................................68 8.1. Requirements for USB Flash Drives (UFD)............................................................................... 68 8.2. Enrollee Requirements for USBA OOB Interfaces .................................................................. 68 8.3. Firmware and Software Requirements ...................................................................................... 69 8.3.1. Encrypted Settings File (xxxxxxxx.WSC) .............................................................................. 69 8.3.2. Unencrypted Settings File (00000000.WSC).......................................................................... 69 8.3.3. Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ............................................... 70 9. NFC Out-of-Band Interface Specification........................................................................71 9.1. Disclaimer........................................................................................................................................ 71 9.2. Overview.......................................................................................................................................... 71 9.3. NFC Use Cases................................................................................................................................ 72 9.3.1. NFC Password Token................................................................................................................ 72 9.3.2. Touching Devices ....................................................................................................................... 72 9.3.3. NFC Configuration Token........................................................................................................ 73 9.4. Generic Requirements for NFC OOB Support ......................................................................... 73 9.4.1. New Devices (Enrollee or AP) Requirements ........................................................................ 73 9.4.2. Registrar Requirements ............................................................................................................ 74 9.5. Hardware Requirements............................................................................................................... 74 9.5.1. Requirements for NFC Tokens................................................................................................ 74 9.5.2. Requirements for an NFC Device............................................................................................ 74 9.6. Firmware and Software Requirements ...................................................................................... 74 9.6.1. NFC Password Token................................................................................................................ 74 9.6.2. NFC Configuration Token........................................................................................................ 75 9.6.3. NFC Device ................................................................................................................................. 75 9.7. Informative: NFC Forum specifications..................................................................................... 75 9.7.1. NFC Data Exchange Format (NDEF)..................................................................................... 75 9.7.2. NDEF mapping documents ...................................................................................................... 76 10. PushButton Configuration............................................................................................77 10.1. Introduction ................................................................................................................................ 77 10.2. User Experience.......................................................................................................................... 77 10.3. PBC Technical Description ...................................................................................................... 78 10.4. User Feedback ............................................................................................................................ 81 10.5. PBC Security Considerations................................................................................................... 82 11. Data Element Definitions ..............................................................................................84 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 6 of 110 Version: 1.0h 12. Conclusion...................................................................................................................105 13. Appendix: Additional Setup Scenarios .......................................................................107 14. Appendix: Out-of-Band Channel Considerations ......................................................109
Wi-Fi P2P技术规范v1.7是指Wi-Fi Direct技术的最新版本,它提供了一种在没有中间设备的情况下直接连接Wi-Fi设备的能力。以下是关于Wi-Fi P2P技术规范v1.7的一些主要内容。 1. 设备发现和连接:Wi-Fi P2P技术使用设备发现协议来使设备能够相互寻找和识别彼此。一旦设备被发现,它们可以通过Wi-Fi Direct通道进行连接,建立直接的无线连接。 2. 组形和管理:Wi-Fi P2P技术允许设备在没有传统的Wi-Fi网络基础设施的情况下组成点对点网络组。其中一个设备充当组主,其他设备则作为组成员。组主负责管理组中的连接,包括分配IP地址和管理连接状态。 3. 安全性:Wi-Fi P2P技术规范v1.7支持多种安全机制,包括WPA2-PSK、WPA2-Enterprise和WPS等。这些安全机制能够确保设备之间的通信是加密的,并防止未经授权的设备加入P2P网络。 4. 服务发现和应用:Wi-Fi P2P技术规范v1.7提供了一种服务发现机制,使设备能够在对等网络中查找和使用其他设备提供的服务。这为应用程序开发者提供了很大的灵活性,并可以通过Wi-Fi P2P来实现各种应用场景,如音频/视频流传输、共享文件和打印等。 总之,Wi-Fi P2P技术规范v1.7提供了一种易于使用且安全的无线直连技术,可以在没有中间设备的情况下实现设备之间的直接通信和互操作。它方便了用户之间的文件共享、设备连接和应用程序间的协作,为无线连接带来了更多便利和可能性。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值