1e5b75505Sopenharmony_cihostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
2e5b75505Sopenharmony_ci	  Authenticator and RADIUS authentication server
3e5b75505Sopenharmony_ci================================================================
4e5b75505Sopenharmony_ci
5e5b75505Sopenharmony_ciCopyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors
6e5b75505Sopenharmony_ciAll Rights Reserved.
7e5b75505Sopenharmony_ci
8e5b75505Sopenharmony_ciThis program is licensed under the BSD license (the one with
9e5b75505Sopenharmony_ciadvertisement clause removed).
10e5b75505Sopenharmony_ci
11e5b75505Sopenharmony_ciIf you are submitting changes to the project, please see CONTRIBUTIONS
12e5b75505Sopenharmony_cifile for more instructions.
13e5b75505Sopenharmony_ci
14e5b75505Sopenharmony_ci
15e5b75505Sopenharmony_ci
16e5b75505Sopenharmony_ciLicense
17e5b75505Sopenharmony_ci-------
18e5b75505Sopenharmony_ci
19e5b75505Sopenharmony_ciThis software may be distributed, used, and modified under the terms of
20e5b75505Sopenharmony_ciBSD license:
21e5b75505Sopenharmony_ci
22e5b75505Sopenharmony_ciRedistribution and use in source and binary forms, with or without
23e5b75505Sopenharmony_cimodification, are permitted provided that the following conditions are
24e5b75505Sopenharmony_cimet:
25e5b75505Sopenharmony_ci
26e5b75505Sopenharmony_ci1. Redistributions of source code must retain the above copyright
27e5b75505Sopenharmony_ci   notice, this list of conditions and the following disclaimer.
28e5b75505Sopenharmony_ci
29e5b75505Sopenharmony_ci2. Redistributions in binary form must reproduce the above copyright
30e5b75505Sopenharmony_ci   notice, this list of conditions and the following disclaimer in the
31e5b75505Sopenharmony_ci   documentation and/or other materials provided with the distribution.
32e5b75505Sopenharmony_ci
33e5b75505Sopenharmony_ci3. Neither the name(s) of the above-listed copyright holder(s) nor the
34e5b75505Sopenharmony_ci   names of its contributors may be used to endorse or promote products
35e5b75505Sopenharmony_ci   derived from this software without specific prior written permission.
36e5b75505Sopenharmony_ci
37e5b75505Sopenharmony_ciTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
38e5b75505Sopenharmony_ci"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
39e5b75505Sopenharmony_ciLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
40e5b75505Sopenharmony_ciA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
41e5b75505Sopenharmony_ciOWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
42e5b75505Sopenharmony_ciSPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
43e5b75505Sopenharmony_ciLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
44e5b75505Sopenharmony_ciDATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
45e5b75505Sopenharmony_ciTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
46e5b75505Sopenharmony_ci(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
47e5b75505Sopenharmony_ciOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
48e5b75505Sopenharmony_ci
49e5b75505Sopenharmony_ci
50e5b75505Sopenharmony_ci
51e5b75505Sopenharmony_ciIntroduction
52e5b75505Sopenharmony_ci============
53e5b75505Sopenharmony_ci
54e5b75505Sopenharmony_ciOriginally, hostapd was an optional user space component for Host AP
55e5b75505Sopenharmony_cidriver. It adds more features to the basic IEEE 802.11 management
56e5b75505Sopenharmony_ciincluded in the kernel driver: using external RADIUS authentication
57e5b75505Sopenharmony_ciserver for MAC address based access control, IEEE 802.1X Authenticator
58e5b75505Sopenharmony_ciand dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
59e5b75505Sopenharmony_ciAuthenticator and dynamic TKIP/CCMP keying.
60e5b75505Sopenharmony_ci
61e5b75505Sopenharmony_ciThe current version includes support for other drivers, an integrated
62e5b75505Sopenharmony_ciEAP server (i.e., allow full authentication without requiring
63e5b75505Sopenharmony_cian external RADIUS authentication server), and RADIUS authentication
64e5b75505Sopenharmony_ciserver for EAP authentication.
65e5b75505Sopenharmony_ci
66e5b75505Sopenharmony_ci
67e5b75505Sopenharmony_ciRequirements
68e5b75505Sopenharmony_ci------------
69e5b75505Sopenharmony_ci
70e5b75505Sopenharmony_ciCurrent hardware/software requirements:
71e5b75505Sopenharmony_ci- drivers:
72e5b75505Sopenharmony_ci	Host AP driver for Prism2/2.5/3.
73e5b75505Sopenharmony_ci	(http://w1.fi/hostap-driver.html)
74e5b75505Sopenharmony_ci	Please note that station firmware version needs to be 1.7.0 or newer
75e5b75505Sopenharmony_ci	to work in WPA mode.
76e5b75505Sopenharmony_ci
77e5b75505Sopenharmony_ci	mac80211-based drivers that support AP mode (with driver=nl80211).
78e5b75505Sopenharmony_ci	This includes drivers for Atheros (ath9k) and Broadcom (b43)
79e5b75505Sopenharmony_ci	chipsets.
80e5b75505Sopenharmony_ci
81e5b75505Sopenharmony_ci	Any wired Ethernet driver for wired IEEE 802.1X authentication
82e5b75505Sopenharmony_ci	(experimental code)
83e5b75505Sopenharmony_ci
84e5b75505Sopenharmony_ci	FreeBSD -current
85e5b75505Sopenharmony_ci	BSD net80211 layer (e.g., Atheros driver)
86e5b75505Sopenharmony_ci
87e5b75505Sopenharmony_ci
88e5b75505Sopenharmony_ciBuild configuration
89e5b75505Sopenharmony_ci-------------------
90e5b75505Sopenharmony_ci
91e5b75505Sopenharmony_ciIn order to be able to build hostapd, you will need to create a build
92e5b75505Sopenharmony_citime configuration file, .config that selects which optional
93e5b75505Sopenharmony_cicomponents are included. See defconfig file for example configuration
94e5b75505Sopenharmony_ciand list of available options.
95e5b75505Sopenharmony_ci
96e5b75505Sopenharmony_ci
97e5b75505Sopenharmony_ci
98e5b75505Sopenharmony_ciIEEE 802.1X
99e5b75505Sopenharmony_ci===========
100e5b75505Sopenharmony_ci
101e5b75505Sopenharmony_ciIEEE Std 802.1X-2001 is a standard for port-based network access
102e5b75505Sopenharmony_cicontrol. In case of IEEE 802.11 networks, a "virtual port" is used
103e5b75505Sopenharmony_cibetween each associated station and the AP. IEEE 802.11 specifies
104e5b75505Sopenharmony_ciminimal authentication mechanism for stations, whereas IEEE 802.1X
105e5b75505Sopenharmony_ciintroduces a extensible mechanism for authenticating and authorizing
106e5b75505Sopenharmony_ciusers.
107e5b75505Sopenharmony_ci
108e5b75505Sopenharmony_ciIEEE 802.1X uses elements called Supplicant, Authenticator, Port
109e5b75505Sopenharmony_ciAccess Entity, and Authentication Server. Supplicant is a component in
110e5b75505Sopenharmony_cia station and it performs the authentication with the Authentication
111e5b75505Sopenharmony_ciServer. An access point includes an Authenticator that relays the packets
112e5b75505Sopenharmony_cibetween a Supplicant and an Authentication Server. In addition, it has a
113e5b75505Sopenharmony_ciPort Access Entity (PAE) with Authenticator functionality for
114e5b75505Sopenharmony_cicontrolling the virtual port authorization, i.e., whether to accept
115e5b75505Sopenharmony_cipackets from or to the station.
116e5b75505Sopenharmony_ci
117e5b75505Sopenharmony_ciIEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames
118e5b75505Sopenharmony_cibetween a Supplicant and an Authenticator are sent using EAP over LAN
119e5b75505Sopenharmony_ci(EAPOL) and the Authenticator relays these frames to the Authentication
120e5b75505Sopenharmony_ciServer (and similarly, relays the messages from the Authentication
121e5b75505Sopenharmony_ciServer to the Supplicant). The Authentication Server can be colocated with the
122e5b75505Sopenharmony_ciAuthenticator, in which case there is no need for additional protocol
123e5b75505Sopenharmony_cifor EAP frame transmission. However, a more common configuration is to
124e5b75505Sopenharmony_ciuse an external Authentication Server and encapsulate EAP frame in the
125e5b75505Sopenharmony_ciframes used by that server. RADIUS is suitable for this, but IEEE
126e5b75505Sopenharmony_ci802.1X would also allow other mechanisms.
127e5b75505Sopenharmony_ci
128e5b75505Sopenharmony_ciHost AP driver includes PAE functionality in the kernel driver. It
129e5b75505Sopenharmony_ciis a relatively simple mechanism for denying normal frames going to
130e5b75505Sopenharmony_cior coming from an unauthorized port. PAE allows IEEE 802.1X related
131e5b75505Sopenharmony_ciframes to be passed between the Supplicant and the Authenticator even
132e5b75505Sopenharmony_cion an unauthorized port.
133e5b75505Sopenharmony_ci
134e5b75505Sopenharmony_ciUser space daemon, hostapd, includes Authenticator functionality. It
135e5b75505Sopenharmony_cireceives 802.1X (EAPOL) frames from the Supplicant using the wlan#ap
136e5b75505Sopenharmony_cidevice that is also used with IEEE 802.11 management frames. The
137e5b75505Sopenharmony_ciframes to the Supplicant are sent using the same device.
138e5b75505Sopenharmony_ci
139e5b75505Sopenharmony_ciThe normal configuration of the Authenticator would use an external
140e5b75505Sopenharmony_ciAuthentication Server. hostapd supports RADIUS encapsulation of EAP
141e5b75505Sopenharmony_cipackets, so the Authentication Server should be a RADIUS server, like
142e5b75505Sopenharmony_ciFreeRADIUS (http://www.freeradius.org/). The Authenticator in hostapd
143e5b75505Sopenharmony_cirelays the frames between the Supplicant and the Authentication
144e5b75505Sopenharmony_ciServer. It also controls the PAE functionality in the kernel driver by
145e5b75505Sopenharmony_cicontrolling virtual port authorization, i.e., station-AP
146e5b75505Sopenharmony_ciconnection, based on the IEEE 802.1X state.
147e5b75505Sopenharmony_ci
148e5b75505Sopenharmony_ciWhen a station would like to use the services of an access point, it
149e5b75505Sopenharmony_ciwill first perform IEEE 802.11 authentication. This is normally done
150e5b75505Sopenharmony_ciwith open systems authentication, so there is no security. After
151e5b75505Sopenharmony_cithis, IEEE 802.11 association is performed. If IEEE 802.1X is
152e5b75505Sopenharmony_ciconfigured to be used, the virtual port for the station is set in
153e5b75505Sopenharmony_ciUnauthorized state and only IEEE 802.1X frames are accepted at this
154e5b75505Sopenharmony_cipoint. The Authenticator will then ask the Supplicant to authenticate
155e5b75505Sopenharmony_ciwith the Authentication Server. After this is completed successfully,
156e5b75505Sopenharmony_cithe virtual port is set to Authorized state and frames from and to the
157e5b75505Sopenharmony_cistation are accepted.
158e5b75505Sopenharmony_ci
159e5b75505Sopenharmony_ciHost AP configuration for IEEE 802.1X
160e5b75505Sopenharmony_ci-------------------------------------
161e5b75505Sopenharmony_ci
162e5b75505Sopenharmony_ciThe user space daemon has its own configuration file that can be used to
163e5b75505Sopenharmony_cidefine AP options. Distribution package contains an example
164e5b75505Sopenharmony_ciconfiguration file (hostapd/hostapd.conf) that can be used as a basis
165e5b75505Sopenharmony_cifor configuration. It includes examples of all supported configuration
166e5b75505Sopenharmony_cioptions and short description of each option. hostapd should be started
167e5b75505Sopenharmony_ciwith full path to the configuration file as the command line argument,
168e5b75505Sopenharmony_cie.g., './hostapd /etc/hostapd.conf'. If you have more that one wireless
169e5b75505Sopenharmony_ciLAN card, you can use one hostapd process for multiple interfaces by
170e5b75505Sopenharmony_cigiving a list of configuration files (one per interface) in the command
171e5b75505Sopenharmony_ciline.
172e5b75505Sopenharmony_ci
173e5b75505Sopenharmony_cihostapd includes a minimal co-located IEEE 802.1X server which can be
174e5b75505Sopenharmony_ciused to test IEEE 802.1X authentication. However, it should not be
175e5b75505Sopenharmony_ciused in normal use since it does not provide any security. This can be
176e5b75505Sopenharmony_ciconfigured by setting ieee8021x and minimal_eap options in the
177e5b75505Sopenharmony_ciconfiguration file.
178e5b75505Sopenharmony_ci
179e5b75505Sopenharmony_ciAn external Authentication Server (RADIUS) is configured with
180e5b75505Sopenharmony_ciauth_server_{addr,port,shared_secret} options. In addition,
181e5b75505Sopenharmony_ciieee8021x and own_ip_addr must be set for this mode. With such
182e5b75505Sopenharmony_ciconfiguration, the co-located Authentication Server is not used and EAP
183e5b75505Sopenharmony_ciframes will be relayed using EAPOL between the Supplicant and the
184e5b75505Sopenharmony_ciAuthenticator and RADIUS encapsulation between the Authenticator and
185e5b75505Sopenharmony_cithe Authentication Server. Other than this, the functionality is similar
186e5b75505Sopenharmony_cito the case with the co-located Authentication Server.
187e5b75505Sopenharmony_ci
188e5b75505Sopenharmony_ciAuthentication Server
189e5b75505Sopenharmony_ci---------------------
190e5b75505Sopenharmony_ci
191e5b75505Sopenharmony_ciAny RADIUS server supporting EAP should be usable as an IEEE 802.1X
192e5b75505Sopenharmony_ciAuthentication Server with hostapd Authenticator. FreeRADIUS
193e5b75505Sopenharmony_ci(http://www.freeradius.org/) has been successfully tested with hostapd
194e5b75505Sopenharmony_ciAuthenticator.
195e5b75505Sopenharmony_ci
196e5b75505Sopenharmony_ciAutomatic WEP key configuration
197e5b75505Sopenharmony_ci-------------------------------
198e5b75505Sopenharmony_ci
199e5b75505Sopenharmony_ciEAP/TLS generates a session key that can be used to send WEP keys from
200e5b75505Sopenharmony_cian AP to authenticated stations. The Authenticator in hostapd can be
201e5b75505Sopenharmony_ciconfigured to automatically select a random default/broadcast key
202e5b75505Sopenharmony_ci(shared by all authenticated stations) with wep_key_len_broadcast
203e5b75505Sopenharmony_cioption (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
204e5b75505Sopenharmony_ciwep_key_len_unicast option can be used to configure individual unicast
205e5b75505Sopenharmony_cikeys for stations. This requires support for individual keys in the
206e5b75505Sopenharmony_cistation driver.
207e5b75505Sopenharmony_ci
208e5b75505Sopenharmony_ciWEP keys can be automatically updated by configuring rekeying. This
209e5b75505Sopenharmony_ciwill improve security of the network since same WEP key will only be
210e5b75505Sopenharmony_ciused for a limited period of time. wep_rekey_period option sets the
211e5b75505Sopenharmony_ciinterval for rekeying in seconds.
212e5b75505Sopenharmony_ci
213e5b75505Sopenharmony_ci
214e5b75505Sopenharmony_ciWPA/WPA2
215e5b75505Sopenharmony_ci========
216e5b75505Sopenharmony_ci
217e5b75505Sopenharmony_ciFeatures
218e5b75505Sopenharmony_ci--------
219e5b75505Sopenharmony_ci
220e5b75505Sopenharmony_ciSupported WPA/IEEE 802.11i features:
221e5b75505Sopenharmony_ci- WPA-PSK ("WPA-Personal")
222e5b75505Sopenharmony_ci- WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")
223e5b75505Sopenharmony_ci- key management for CCMP, TKIP, WEP104, WEP40
224e5b75505Sopenharmony_ci- RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication
225e5b75505Sopenharmony_ci
226e5b75505Sopenharmony_ciWPA
227e5b75505Sopenharmony_ci---
228e5b75505Sopenharmony_ci
229e5b75505Sopenharmony_ciThe original security mechanism of IEEE 802.11 standard was not
230e5b75505Sopenharmony_cidesigned to be strong and has proved to be insufficient for most
231e5b75505Sopenharmony_cinetworks that require some kind of security. Task group I (Security)
232e5b75505Sopenharmony_ciof IEEE 802.11 working group (http://www.ieee802.org/11/) has worked
233e5b75505Sopenharmony_cito address the flaws of the base standard and has in practice
234e5b75505Sopenharmony_cicompleted its work in May 2004. The IEEE 802.11i amendment to the IEEE
235e5b75505Sopenharmony_ci802.11 standard was approved in June 2004 and this amendment was
236e5b75505Sopenharmony_cipublished in July 2004.
237e5b75505Sopenharmony_ci
238e5b75505Sopenharmony_ciWi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the
239e5b75505Sopenharmony_ciIEEE 802.11i work (draft 3.0) to define a subset of the security
240e5b75505Sopenharmony_cienhancements that can be implemented with existing wlan hardware. This
241e5b75505Sopenharmony_ciis called Wi-Fi Protected Access<TM> (WPA). This has now become a
242e5b75505Sopenharmony_cimandatory component of interoperability testing and certification done
243e5b75505Sopenharmony_ciby Wi-Fi Alliance.
244e5b75505Sopenharmony_ci
245e5b75505Sopenharmony_ciIEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
246e5b75505Sopenharmony_cifor protecting wireless networks. WEP uses RC4 with 40-bit keys,
247e5b75505Sopenharmony_ci24-bit initialization vector (IV), and CRC32 to protect against packet
248e5b75505Sopenharmony_ciforgery. All these choices have proven to be insufficient: key space is
249e5b75505Sopenharmony_citoo small against current attacks, RC4 key scheduling is insufficient
250e5b75505Sopenharmony_ci(beginning of the pseudorandom stream should be skipped), IV space is
251e5b75505Sopenharmony_citoo small and IV reuse makes attacks easier, there is no replay
252e5b75505Sopenharmony_ciprotection, and non-keyed authentication does not protect against bit
253e5b75505Sopenharmony_ciflipping packet data.
254e5b75505Sopenharmony_ci
255e5b75505Sopenharmony_ciWPA is an intermediate solution for the security issues. It uses
256e5b75505Sopenharmony_ciTemporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a
257e5b75505Sopenharmony_cicompromise on strong security and possibility to use existing
258e5b75505Sopenharmony_cihardware. It still uses RC4 for the encryption like WEP, but with
259e5b75505Sopenharmony_ciper-packet RC4 keys. In addition, it implements replay protection,
260e5b75505Sopenharmony_cikeyed packet authentication mechanism (Michael MIC).
261e5b75505Sopenharmony_ci
262e5b75505Sopenharmony_ciKeys can be managed using two different mechanisms. WPA can either use
263e5b75505Sopenharmony_cian external authentication server (e.g., RADIUS) and EAP just like
264e5b75505Sopenharmony_ciIEEE 802.1X is using or pre-shared keys without need for additional
265e5b75505Sopenharmony_ciservers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",
266e5b75505Sopenharmony_cirespectively. Both mechanisms will generate a master session key for
267e5b75505Sopenharmony_cithe Authenticator (AP) and Supplicant (client station).
268e5b75505Sopenharmony_ci
269e5b75505Sopenharmony_ciWPA implements a new key handshake (4-Way Handshake and Group Key
270e5b75505Sopenharmony_ciHandshake) for generating and exchanging data encryption keys between
271e5b75505Sopenharmony_cithe Authenticator and Supplicant. This handshake is also used to
272e5b75505Sopenharmony_civerify that both Authenticator and Supplicant know the master session
273e5b75505Sopenharmony_cikey. These handshakes are identical regardless of the selected key
274e5b75505Sopenharmony_cimanagement mechanism (only the method for generating master session
275e5b75505Sopenharmony_cikey changes).
276e5b75505Sopenharmony_ci
277e5b75505Sopenharmony_ci
278e5b75505Sopenharmony_ciIEEE 802.11i / WPA2
279e5b75505Sopenharmony_ci-------------------
280e5b75505Sopenharmony_ci
281e5b75505Sopenharmony_ciThe design for parts of IEEE 802.11i that were not included in WPA has
282e5b75505Sopenharmony_cifinished (May 2004) and this amendment to IEEE 802.11 was approved in
283e5b75505Sopenharmony_ciJune 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new
284e5b75505Sopenharmony_civersion of WPA called WPA2. This includes, e.g., support for more
285e5b75505Sopenharmony_cirobust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
286e5b75505Sopenharmony_cito replace TKIP and optimizations for handoff (reduced number of
287e5b75505Sopenharmony_cimessages in initial key handshake, pre-authentication, and PMKSA caching).
288e5b75505Sopenharmony_ci
289e5b75505Sopenharmony_ciSome wireless LAN vendors are already providing support for CCMP in
290e5b75505Sopenharmony_citheir WPA products. There is no "official" interoperability
291e5b75505Sopenharmony_cicertification for CCMP and/or mixed modes using both TKIP and CCMP, so
292e5b75505Sopenharmony_cisome interoperability issues can be expected even though many
293e5b75505Sopenharmony_cicombinations seem to be working with equipment from different vendors.
294e5b75505Sopenharmony_ciTesting for WPA2 is likely to start during the second half of 2004.
295e5b75505Sopenharmony_ci
296e5b75505Sopenharmony_cihostapd configuration for WPA/WPA2
297e5b75505Sopenharmony_ci----------------------------------
298e5b75505Sopenharmony_ci
299e5b75505Sopenharmony_ciTODO
300e5b75505Sopenharmony_ci
301e5b75505Sopenharmony_ci# Enable WPA. Setting this variable configures the AP to require WPA (either
302e5b75505Sopenharmony_ci# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
303e5b75505Sopenharmony_ci# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
304e5b75505Sopenharmony_ci# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
305e5b75505Sopenharmony_ci# RADIUS authentication server must be configured, and WPA-EAP must be included
306e5b75505Sopenharmony_ci# in wpa_key_mgmt.
307e5b75505Sopenharmony_ci# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)
308e5b75505Sopenharmony_ci# and/or WPA2 (full IEEE 802.11i/RSN):
309e5b75505Sopenharmony_ci# bit0 = WPA
310e5b75505Sopenharmony_ci# bit1 = IEEE 802.11i/RSN (WPA2)
311e5b75505Sopenharmony_ci#wpa=1
312e5b75505Sopenharmony_ci
313e5b75505Sopenharmony_ci# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
314e5b75505Sopenharmony_ci# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase
315e5b75505Sopenharmony_ci# (8..63 characters) that will be converted to PSK. This conversion uses SSID
316e5b75505Sopenharmony_ci# so the PSK changes when ASCII passphrase is used and the SSID is changed.
317e5b75505Sopenharmony_ci#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
318e5b75505Sopenharmony_ci#wpa_passphrase=secret passphrase
319e5b75505Sopenharmony_ci
320e5b75505Sopenharmony_ci# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
321e5b75505Sopenharmony_ci# entries are separated with a space.
322e5b75505Sopenharmony_ci#wpa_key_mgmt=WPA-PSK WPA-EAP
323e5b75505Sopenharmony_ci
324e5b75505Sopenharmony_ci# Set of accepted cipher suites (encryption algorithms) for pairwise keys
325e5b75505Sopenharmony_ci# (unicast packets). This is a space separated list of algorithms:
326e5b75505Sopenharmony_ci# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
327e5b75505Sopenharmony_ci# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i]
328e5b75505Sopenharmony_ci# Group cipher suite (encryption algorithm for broadcast and multicast frames)
329e5b75505Sopenharmony_ci# is automatically selected based on this configuration. If only CCMP is
330e5b75505Sopenharmony_ci# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
331e5b75505Sopenharmony_ci# TKIP will be used as the group cipher.
332e5b75505Sopenharmony_ci#wpa_pairwise=TKIP CCMP
333e5b75505Sopenharmony_ci
334e5b75505Sopenharmony_ci# Time interval for rekeying GTK (broadcast/multicast encryption keys) in
335e5b75505Sopenharmony_ci# seconds.
336e5b75505Sopenharmony_ci#wpa_group_rekey=600
337e5b75505Sopenharmony_ci
338e5b75505Sopenharmony_ci# Time interval for rekeying GMK (master key used internally to generate GTKs
339e5b75505Sopenharmony_ci# (in seconds).
340e5b75505Sopenharmony_ci#wpa_gmk_rekey=86400
341e5b75505Sopenharmony_ci
342e5b75505Sopenharmony_ci# Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
343e5b75505Sopenharmony_ci# roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
344e5b75505Sopenharmony_ci# authentication and key handshake before actually associating with a new AP.
345e5b75505Sopenharmony_ci#rsn_preauth=1
346e5b75505Sopenharmony_ci#
347e5b75505Sopenharmony_ci# Space separated list of interfaces from which pre-authentication frames are
348e5b75505Sopenharmony_ci# accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
349e5b75505Sopenharmony_ci# interface that are used for connections to other APs. This could include
350e5b75505Sopenharmony_ci# wired interfaces and WDS links. The normal wireless data interface towards
351e5b75505Sopenharmony_ci# associated stations (e.g., wlan0) should not be added, since
352e5b75505Sopenharmony_ci# pre-authentication is only used with APs other than the currently associated
353e5b75505Sopenharmony_ci# one.
354e5b75505Sopenharmony_ci#rsn_preauth_interfaces=eth0
355