1e5b75505Sopenharmony_cihostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP 2e5b75505Sopenharmony_ci Authenticator and RADIUS authentication server 3e5b75505Sopenharmony_ci================================================================ 4e5b75505Sopenharmony_ci 5e5b75505Sopenharmony_ciCopyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors 6e5b75505Sopenharmony_ciAll Rights Reserved. 7e5b75505Sopenharmony_ci 8e5b75505Sopenharmony_ciThis program is licensed under the BSD license (the one with 9e5b75505Sopenharmony_ciadvertisement clause removed). 10e5b75505Sopenharmony_ci 11e5b75505Sopenharmony_ciIf you are submitting changes to the project, please see CONTRIBUTIONS 12e5b75505Sopenharmony_cifile for more instructions. 13e5b75505Sopenharmony_ci 14e5b75505Sopenharmony_ci 15e5b75505Sopenharmony_ci 16e5b75505Sopenharmony_ciLicense 17e5b75505Sopenharmony_ci------- 18e5b75505Sopenharmony_ci 19e5b75505Sopenharmony_ciThis software may be distributed, used, and modified under the terms of 20e5b75505Sopenharmony_ciBSD license: 21e5b75505Sopenharmony_ci 22e5b75505Sopenharmony_ciRedistribution and use in source and binary forms, with or without 23e5b75505Sopenharmony_cimodification, are permitted provided that the following conditions are 24e5b75505Sopenharmony_cimet: 25e5b75505Sopenharmony_ci 26e5b75505Sopenharmony_ci1. Redistributions of source code must retain the above copyright 27e5b75505Sopenharmony_ci notice, this list of conditions and the following disclaimer. 28e5b75505Sopenharmony_ci 29e5b75505Sopenharmony_ci2. Redistributions in binary form must reproduce the above copyright 30e5b75505Sopenharmony_ci notice, this list of conditions and the following disclaimer in the 31e5b75505Sopenharmony_ci documentation and/or other materials provided with the distribution. 32e5b75505Sopenharmony_ci 33e5b75505Sopenharmony_ci3. Neither the name(s) of the above-listed copyright holder(s) nor the 34e5b75505Sopenharmony_ci names of its contributors may be used to endorse or promote products 35e5b75505Sopenharmony_ci derived from this software without specific prior written permission. 36e5b75505Sopenharmony_ci 37e5b75505Sopenharmony_ciTHIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 38e5b75505Sopenharmony_ci"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 39e5b75505Sopenharmony_ciLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 40e5b75505Sopenharmony_ciA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 41e5b75505Sopenharmony_ciOWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 42e5b75505Sopenharmony_ciSPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 43e5b75505Sopenharmony_ciLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 44e5b75505Sopenharmony_ciDATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 45e5b75505Sopenharmony_ciTHEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 46e5b75505Sopenharmony_ci(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 47e5b75505Sopenharmony_ciOF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 48e5b75505Sopenharmony_ci 49e5b75505Sopenharmony_ci 50e5b75505Sopenharmony_ci 51e5b75505Sopenharmony_ciIntroduction 52e5b75505Sopenharmony_ci============ 53e5b75505Sopenharmony_ci 54e5b75505Sopenharmony_ciOriginally, hostapd was an optional user space component for Host AP 55e5b75505Sopenharmony_cidriver. It adds more features to the basic IEEE 802.11 management 56e5b75505Sopenharmony_ciincluded in the kernel driver: using external RADIUS authentication 57e5b75505Sopenharmony_ciserver for MAC address based access control, IEEE 802.1X Authenticator 58e5b75505Sopenharmony_ciand dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN) 59e5b75505Sopenharmony_ciAuthenticator and dynamic TKIP/CCMP keying. 60e5b75505Sopenharmony_ci 61e5b75505Sopenharmony_ciThe current version includes support for other drivers, an integrated 62e5b75505Sopenharmony_ciEAP server (i.e., allow full authentication without requiring 63e5b75505Sopenharmony_cian external RADIUS authentication server), and RADIUS authentication 64e5b75505Sopenharmony_ciserver for EAP authentication. 65e5b75505Sopenharmony_ci 66e5b75505Sopenharmony_ci 67e5b75505Sopenharmony_ciRequirements 68e5b75505Sopenharmony_ci------------ 69e5b75505Sopenharmony_ci 70e5b75505Sopenharmony_ciCurrent hardware/software requirements: 71e5b75505Sopenharmony_ci- drivers: 72e5b75505Sopenharmony_ci Host AP driver for Prism2/2.5/3. 73e5b75505Sopenharmony_ci (http://w1.fi/hostap-driver.html) 74e5b75505Sopenharmony_ci Please note that station firmware version needs to be 1.7.0 or newer 75e5b75505Sopenharmony_ci to work in WPA mode. 76e5b75505Sopenharmony_ci 77e5b75505Sopenharmony_ci mac80211-based drivers that support AP mode (with driver=nl80211). 78e5b75505Sopenharmony_ci This includes drivers for Atheros (ath9k) and Broadcom (b43) 79e5b75505Sopenharmony_ci chipsets. 80e5b75505Sopenharmony_ci 81e5b75505Sopenharmony_ci Any wired Ethernet driver for wired IEEE 802.1X authentication 82e5b75505Sopenharmony_ci (experimental code) 83e5b75505Sopenharmony_ci 84e5b75505Sopenharmony_ci FreeBSD -current 85e5b75505Sopenharmony_ci BSD net80211 layer (e.g., Atheros driver) 86e5b75505Sopenharmony_ci 87e5b75505Sopenharmony_ci 88e5b75505Sopenharmony_ciBuild configuration 89e5b75505Sopenharmony_ci------------------- 90e5b75505Sopenharmony_ci 91e5b75505Sopenharmony_ciIn order to be able to build hostapd, you will need to create a build 92e5b75505Sopenharmony_citime configuration file, .config that selects which optional 93e5b75505Sopenharmony_cicomponents are included. See defconfig file for example configuration 94e5b75505Sopenharmony_ciand list of available options. 95e5b75505Sopenharmony_ci 96e5b75505Sopenharmony_ci 97e5b75505Sopenharmony_ci 98e5b75505Sopenharmony_ciIEEE 802.1X 99e5b75505Sopenharmony_ci=========== 100e5b75505Sopenharmony_ci 101e5b75505Sopenharmony_ciIEEE Std 802.1X-2001 is a standard for port-based network access 102e5b75505Sopenharmony_cicontrol. In case of IEEE 802.11 networks, a "virtual port" is used 103e5b75505Sopenharmony_cibetween each associated station and the AP. IEEE 802.11 specifies 104e5b75505Sopenharmony_ciminimal authentication mechanism for stations, whereas IEEE 802.1X 105e5b75505Sopenharmony_ciintroduces a extensible mechanism for authenticating and authorizing 106e5b75505Sopenharmony_ciusers. 107e5b75505Sopenharmony_ci 108e5b75505Sopenharmony_ciIEEE 802.1X uses elements called Supplicant, Authenticator, Port 109e5b75505Sopenharmony_ciAccess Entity, and Authentication Server. Supplicant is a component in 110e5b75505Sopenharmony_cia station and it performs the authentication with the Authentication 111e5b75505Sopenharmony_ciServer. An access point includes an Authenticator that relays the packets 112e5b75505Sopenharmony_cibetween a Supplicant and an Authentication Server. In addition, it has a 113e5b75505Sopenharmony_ciPort Access Entity (PAE) with Authenticator functionality for 114e5b75505Sopenharmony_cicontrolling the virtual port authorization, i.e., whether to accept 115e5b75505Sopenharmony_cipackets from or to the station. 116e5b75505Sopenharmony_ci 117e5b75505Sopenharmony_ciIEEE 802.1X uses Extensible Authentication Protocol (EAP). The frames 118e5b75505Sopenharmony_cibetween a Supplicant and an Authenticator are sent using EAP over LAN 119e5b75505Sopenharmony_ci(EAPOL) and the Authenticator relays these frames to the Authentication 120e5b75505Sopenharmony_ciServer (and similarly, relays the messages from the Authentication 121e5b75505Sopenharmony_ciServer to the Supplicant). The Authentication Server can be colocated with the 122e5b75505Sopenharmony_ciAuthenticator, in which case there is no need for additional protocol 123e5b75505Sopenharmony_cifor EAP frame transmission. However, a more common configuration is to 124e5b75505Sopenharmony_ciuse an external Authentication Server and encapsulate EAP frame in the 125e5b75505Sopenharmony_ciframes used by that server. RADIUS is suitable for this, but IEEE 126e5b75505Sopenharmony_ci802.1X would also allow other mechanisms. 127e5b75505Sopenharmony_ci 128e5b75505Sopenharmony_ciHost AP driver includes PAE functionality in the kernel driver. It 129e5b75505Sopenharmony_ciis a relatively simple mechanism for denying normal frames going to 130e5b75505Sopenharmony_cior coming from an unauthorized port. PAE allows IEEE 802.1X related 131e5b75505Sopenharmony_ciframes to be passed between the Supplicant and the Authenticator even 132e5b75505Sopenharmony_cion an unauthorized port. 133e5b75505Sopenharmony_ci 134e5b75505Sopenharmony_ciUser space daemon, hostapd, includes Authenticator functionality. It 135e5b75505Sopenharmony_cireceives 802.1X (EAPOL) frames from the Supplicant using the wlan#ap 136e5b75505Sopenharmony_cidevice that is also used with IEEE 802.11 management frames. The 137e5b75505Sopenharmony_ciframes to the Supplicant are sent using the same device. 138e5b75505Sopenharmony_ci 139e5b75505Sopenharmony_ciThe normal configuration of the Authenticator would use an external 140e5b75505Sopenharmony_ciAuthentication Server. hostapd supports RADIUS encapsulation of EAP 141e5b75505Sopenharmony_cipackets, so the Authentication Server should be a RADIUS server, like 142e5b75505Sopenharmony_ciFreeRADIUS (http://www.freeradius.org/). The Authenticator in hostapd 143e5b75505Sopenharmony_cirelays the frames between the Supplicant and the Authentication 144e5b75505Sopenharmony_ciServer. It also controls the PAE functionality in the kernel driver by 145e5b75505Sopenharmony_cicontrolling virtual port authorization, i.e., station-AP 146e5b75505Sopenharmony_ciconnection, based on the IEEE 802.1X state. 147e5b75505Sopenharmony_ci 148e5b75505Sopenharmony_ciWhen a station would like to use the services of an access point, it 149e5b75505Sopenharmony_ciwill first perform IEEE 802.11 authentication. This is normally done 150e5b75505Sopenharmony_ciwith open systems authentication, so there is no security. After 151e5b75505Sopenharmony_cithis, IEEE 802.11 association is performed. If IEEE 802.1X is 152e5b75505Sopenharmony_ciconfigured to be used, the virtual port for the station is set in 153e5b75505Sopenharmony_ciUnauthorized state and only IEEE 802.1X frames are accepted at this 154e5b75505Sopenharmony_cipoint. The Authenticator will then ask the Supplicant to authenticate 155e5b75505Sopenharmony_ciwith the Authentication Server. After this is completed successfully, 156e5b75505Sopenharmony_cithe virtual port is set to Authorized state and frames from and to the 157e5b75505Sopenharmony_cistation are accepted. 158e5b75505Sopenharmony_ci 159e5b75505Sopenharmony_ciHost AP configuration for IEEE 802.1X 160e5b75505Sopenharmony_ci------------------------------------- 161e5b75505Sopenharmony_ci 162e5b75505Sopenharmony_ciThe user space daemon has its own configuration file that can be used to 163e5b75505Sopenharmony_cidefine AP options. Distribution package contains an example 164e5b75505Sopenharmony_ciconfiguration file (hostapd/hostapd.conf) that can be used as a basis 165e5b75505Sopenharmony_cifor configuration. It includes examples of all supported configuration 166e5b75505Sopenharmony_cioptions and short description of each option. hostapd should be started 167e5b75505Sopenharmony_ciwith full path to the configuration file as the command line argument, 168e5b75505Sopenharmony_cie.g., './hostapd /etc/hostapd.conf'. If you have more that one wireless 169e5b75505Sopenharmony_ciLAN card, you can use one hostapd process for multiple interfaces by 170e5b75505Sopenharmony_cigiving a list of configuration files (one per interface) in the command 171e5b75505Sopenharmony_ciline. 172e5b75505Sopenharmony_ci 173e5b75505Sopenharmony_cihostapd includes a minimal co-located IEEE 802.1X server which can be 174e5b75505Sopenharmony_ciused to test IEEE 802.1X authentication. However, it should not be 175e5b75505Sopenharmony_ciused in normal use since it does not provide any security. This can be 176e5b75505Sopenharmony_ciconfigured by setting ieee8021x and minimal_eap options in the 177e5b75505Sopenharmony_ciconfiguration file. 178e5b75505Sopenharmony_ci 179e5b75505Sopenharmony_ciAn external Authentication Server (RADIUS) is configured with 180e5b75505Sopenharmony_ciauth_server_{addr,port,shared_secret} options. In addition, 181e5b75505Sopenharmony_ciieee8021x and own_ip_addr must be set for this mode. With such 182e5b75505Sopenharmony_ciconfiguration, the co-located Authentication Server is not used and EAP 183e5b75505Sopenharmony_ciframes will be relayed using EAPOL between the Supplicant and the 184e5b75505Sopenharmony_ciAuthenticator and RADIUS encapsulation between the Authenticator and 185e5b75505Sopenharmony_cithe Authentication Server. Other than this, the functionality is similar 186e5b75505Sopenharmony_cito the case with the co-located Authentication Server. 187e5b75505Sopenharmony_ci 188e5b75505Sopenharmony_ciAuthentication Server 189e5b75505Sopenharmony_ci--------------------- 190e5b75505Sopenharmony_ci 191e5b75505Sopenharmony_ciAny RADIUS server supporting EAP should be usable as an IEEE 802.1X 192e5b75505Sopenharmony_ciAuthentication Server with hostapd Authenticator. FreeRADIUS 193e5b75505Sopenharmony_ci(http://www.freeradius.org/) has been successfully tested with hostapd 194e5b75505Sopenharmony_ciAuthenticator. 195e5b75505Sopenharmony_ci 196e5b75505Sopenharmony_ciAutomatic WEP key configuration 197e5b75505Sopenharmony_ci------------------------------- 198e5b75505Sopenharmony_ci 199e5b75505Sopenharmony_ciEAP/TLS generates a session key that can be used to send WEP keys from 200e5b75505Sopenharmony_cian AP to authenticated stations. The Authenticator in hostapd can be 201e5b75505Sopenharmony_ciconfigured to automatically select a random default/broadcast key 202e5b75505Sopenharmony_ci(shared by all authenticated stations) with wep_key_len_broadcast 203e5b75505Sopenharmony_cioption (5 for 40-bit WEP or 13 for 104-bit WEP). In addition, 204e5b75505Sopenharmony_ciwep_key_len_unicast option can be used to configure individual unicast 205e5b75505Sopenharmony_cikeys for stations. This requires support for individual keys in the 206e5b75505Sopenharmony_cistation driver. 207e5b75505Sopenharmony_ci 208e5b75505Sopenharmony_ciWEP keys can be automatically updated by configuring rekeying. This 209e5b75505Sopenharmony_ciwill improve security of the network since same WEP key will only be 210e5b75505Sopenharmony_ciused for a limited period of time. wep_rekey_period option sets the 211e5b75505Sopenharmony_ciinterval for rekeying in seconds. 212e5b75505Sopenharmony_ci 213e5b75505Sopenharmony_ci 214e5b75505Sopenharmony_ciWPA/WPA2 215e5b75505Sopenharmony_ci======== 216e5b75505Sopenharmony_ci 217e5b75505Sopenharmony_ciFeatures 218e5b75505Sopenharmony_ci-------- 219e5b75505Sopenharmony_ci 220e5b75505Sopenharmony_ciSupported WPA/IEEE 802.11i features: 221e5b75505Sopenharmony_ci- WPA-PSK ("WPA-Personal") 222e5b75505Sopenharmony_ci- WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise") 223e5b75505Sopenharmony_ci- key management for CCMP, TKIP, WEP104, WEP40 224e5b75505Sopenharmony_ci- RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authentication 225e5b75505Sopenharmony_ci 226e5b75505Sopenharmony_ciWPA 227e5b75505Sopenharmony_ci--- 228e5b75505Sopenharmony_ci 229e5b75505Sopenharmony_ciThe original security mechanism of IEEE 802.11 standard was not 230e5b75505Sopenharmony_cidesigned to be strong and has proved to be insufficient for most 231e5b75505Sopenharmony_cinetworks that require some kind of security. Task group I (Security) 232e5b75505Sopenharmony_ciof IEEE 802.11 working group (http://www.ieee802.org/11/) has worked 233e5b75505Sopenharmony_cito address the flaws of the base standard and has in practice 234e5b75505Sopenharmony_cicompleted its work in May 2004. The IEEE 802.11i amendment to the IEEE 235e5b75505Sopenharmony_ci802.11 standard was approved in June 2004 and this amendment was 236e5b75505Sopenharmony_cipublished in July 2004. 237e5b75505Sopenharmony_ci 238e5b75505Sopenharmony_ciWi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the 239e5b75505Sopenharmony_ciIEEE 802.11i work (draft 3.0) to define a subset of the security 240e5b75505Sopenharmony_cienhancements that can be implemented with existing wlan hardware. This 241e5b75505Sopenharmony_ciis called Wi-Fi Protected Access<TM> (WPA). This has now become a 242e5b75505Sopenharmony_cimandatory component of interoperability testing and certification done 243e5b75505Sopenharmony_ciby Wi-Fi Alliance. 244e5b75505Sopenharmony_ci 245e5b75505Sopenharmony_ciIEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm 246e5b75505Sopenharmony_cifor protecting wireless networks. WEP uses RC4 with 40-bit keys, 247e5b75505Sopenharmony_ci24-bit initialization vector (IV), and CRC32 to protect against packet 248e5b75505Sopenharmony_ciforgery. All these choices have proven to be insufficient: key space is 249e5b75505Sopenharmony_citoo small against current attacks, RC4 key scheduling is insufficient 250e5b75505Sopenharmony_ci(beginning of the pseudorandom stream should be skipped), IV space is 251e5b75505Sopenharmony_citoo small and IV reuse makes attacks easier, there is no replay 252e5b75505Sopenharmony_ciprotection, and non-keyed authentication does not protect against bit 253e5b75505Sopenharmony_ciflipping packet data. 254e5b75505Sopenharmony_ci 255e5b75505Sopenharmony_ciWPA is an intermediate solution for the security issues. It uses 256e5b75505Sopenharmony_ciTemporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a 257e5b75505Sopenharmony_cicompromise on strong security and possibility to use existing 258e5b75505Sopenharmony_cihardware. It still uses RC4 for the encryption like WEP, but with 259e5b75505Sopenharmony_ciper-packet RC4 keys. In addition, it implements replay protection, 260e5b75505Sopenharmony_cikeyed packet authentication mechanism (Michael MIC). 261e5b75505Sopenharmony_ci 262e5b75505Sopenharmony_ciKeys can be managed using two different mechanisms. WPA can either use 263e5b75505Sopenharmony_cian external authentication server (e.g., RADIUS) and EAP just like 264e5b75505Sopenharmony_ciIEEE 802.1X is using or pre-shared keys without need for additional 265e5b75505Sopenharmony_ciservers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal", 266e5b75505Sopenharmony_cirespectively. Both mechanisms will generate a master session key for 267e5b75505Sopenharmony_cithe Authenticator (AP) and Supplicant (client station). 268e5b75505Sopenharmony_ci 269e5b75505Sopenharmony_ciWPA implements a new key handshake (4-Way Handshake and Group Key 270e5b75505Sopenharmony_ciHandshake) for generating and exchanging data encryption keys between 271e5b75505Sopenharmony_cithe Authenticator and Supplicant. This handshake is also used to 272e5b75505Sopenharmony_civerify that both Authenticator and Supplicant know the master session 273e5b75505Sopenharmony_cikey. These handshakes are identical regardless of the selected key 274e5b75505Sopenharmony_cimanagement mechanism (only the method for generating master session 275e5b75505Sopenharmony_cikey changes). 276e5b75505Sopenharmony_ci 277e5b75505Sopenharmony_ci 278e5b75505Sopenharmony_ciIEEE 802.11i / WPA2 279e5b75505Sopenharmony_ci------------------- 280e5b75505Sopenharmony_ci 281e5b75505Sopenharmony_ciThe design for parts of IEEE 802.11i that were not included in WPA has 282e5b75505Sopenharmony_cifinished (May 2004) and this amendment to IEEE 802.11 was approved in 283e5b75505Sopenharmony_ciJune 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new 284e5b75505Sopenharmony_civersion of WPA called WPA2. This includes, e.g., support for more 285e5b75505Sopenharmony_cirobust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 286e5b75505Sopenharmony_cito replace TKIP and optimizations for handoff (reduced number of 287e5b75505Sopenharmony_cimessages in initial key handshake, pre-authentication, and PMKSA caching). 288e5b75505Sopenharmony_ci 289e5b75505Sopenharmony_ciSome wireless LAN vendors are already providing support for CCMP in 290e5b75505Sopenharmony_citheir WPA products. There is no "official" interoperability 291e5b75505Sopenharmony_cicertification for CCMP and/or mixed modes using both TKIP and CCMP, so 292e5b75505Sopenharmony_cisome interoperability issues can be expected even though many 293e5b75505Sopenharmony_cicombinations seem to be working with equipment from different vendors. 294e5b75505Sopenharmony_ciTesting for WPA2 is likely to start during the second half of 2004. 295e5b75505Sopenharmony_ci 296e5b75505Sopenharmony_cihostapd configuration for WPA/WPA2 297e5b75505Sopenharmony_ci---------------------------------- 298e5b75505Sopenharmony_ci 299e5b75505Sopenharmony_ciTODO 300e5b75505Sopenharmony_ci 301e5b75505Sopenharmony_ci# Enable WPA. Setting this variable configures the AP to require WPA (either 302e5b75505Sopenharmony_ci# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either 303e5b75505Sopenharmony_ci# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK. 304e5b75505Sopenharmony_ci# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys), 305e5b75505Sopenharmony_ci# RADIUS authentication server must be configured, and WPA-EAP must be included 306e5b75505Sopenharmony_ci# in wpa_key_mgmt. 307e5b75505Sopenharmony_ci# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0) 308e5b75505Sopenharmony_ci# and/or WPA2 (full IEEE 802.11i/RSN): 309e5b75505Sopenharmony_ci# bit0 = WPA 310e5b75505Sopenharmony_ci# bit1 = IEEE 802.11i/RSN (WPA2) 311e5b75505Sopenharmony_ci#wpa=1 312e5b75505Sopenharmony_ci 313e5b75505Sopenharmony_ci# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit 314e5b75505Sopenharmony_ci# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase 315e5b75505Sopenharmony_ci# (8..63 characters) that will be converted to PSK. This conversion uses SSID 316e5b75505Sopenharmony_ci# so the PSK changes when ASCII passphrase is used and the SSID is changed. 317e5b75505Sopenharmony_ci#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef 318e5b75505Sopenharmony_ci#wpa_passphrase=secret passphrase 319e5b75505Sopenharmony_ci 320e5b75505Sopenharmony_ci# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The 321e5b75505Sopenharmony_ci# entries are separated with a space. 322e5b75505Sopenharmony_ci#wpa_key_mgmt=WPA-PSK WPA-EAP 323e5b75505Sopenharmony_ci 324e5b75505Sopenharmony_ci# Set of accepted cipher suites (encryption algorithms) for pairwise keys 325e5b75505Sopenharmony_ci# (unicast packets). This is a space separated list of algorithms: 326e5b75505Sopenharmony_ci# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i] 327e5b75505Sopenharmony_ci# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i] 328e5b75505Sopenharmony_ci# Group cipher suite (encryption algorithm for broadcast and multicast frames) 329e5b75505Sopenharmony_ci# is automatically selected based on this configuration. If only CCMP is 330e5b75505Sopenharmony_ci# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise, 331e5b75505Sopenharmony_ci# TKIP will be used as the group cipher. 332e5b75505Sopenharmony_ci#wpa_pairwise=TKIP CCMP 333e5b75505Sopenharmony_ci 334e5b75505Sopenharmony_ci# Time interval for rekeying GTK (broadcast/multicast encryption keys) in 335e5b75505Sopenharmony_ci# seconds. 336e5b75505Sopenharmony_ci#wpa_group_rekey=600 337e5b75505Sopenharmony_ci 338e5b75505Sopenharmony_ci# Time interval for rekeying GMK (master key used internally to generate GTKs 339e5b75505Sopenharmony_ci# (in seconds). 340e5b75505Sopenharmony_ci#wpa_gmk_rekey=86400 341e5b75505Sopenharmony_ci 342e5b75505Sopenharmony_ci# Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up 343e5b75505Sopenharmony_ci# roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN 344e5b75505Sopenharmony_ci# authentication and key handshake before actually associating with a new AP. 345e5b75505Sopenharmony_ci#rsn_preauth=1 346e5b75505Sopenharmony_ci# 347e5b75505Sopenharmony_ci# Space separated list of interfaces from which pre-authentication frames are 348e5b75505Sopenharmony_ci# accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all 349e5b75505Sopenharmony_ci# interface that are used for connections to other APs. This could include 350e5b75505Sopenharmony_ci# wired interfaces and WDS links. The normal wireless data interface towards 351e5b75505Sopenharmony_ci# associated stations (e.g., wlan0) should not be added, since 352e5b75505Sopenharmony_ci# pre-authentication is only used with APs other than the currently associated 353e5b75505Sopenharmony_ci# one. 354e5b75505Sopenharmony_ci#rsn_preauth_interfaces=eth0 355