📄 readme
字号:
LAN card, you can use one hostapd process for multiple interfaces bygiving a list of configuration files (one per interface) in the commandline.hostapd includes a minimal co-located IEEE 802.1X server which can beused to test IEEE 802.1X authentication. However, it should not beused in normal use since it does not provide any security. This can beconfigured by setting ieee8021x and minimal_eap options in theconfiguration file.An external Authentication Server (RADIUS) is configured withauth_server_{addr,port,shared_secret} options. In addition,ieee8021x and own_ip_addr must be set for this mode. With suchconfiguration, the co-located Authentication Server is not used and EAPframes will be relayed using EAPOL between the Supplicant and theAuthenticator and RADIUS encapsulation between the Authenticator andthe Authentication Server. Other than this, the functionality is similarto the case with the co-located Authentication Server.Authentication Server and Supplicant------------------------------------Any RADIUS server supporting EAP should be usable as an IEEE 802.1XAuthentication Server with hostapd Authenticator. FreeRADIUS(http://www.freeradius.org/) has been successfully tested with hostapdAuthenticator and both Xsupplicant (http://www.open1x.org) and WindowsXP Supplicants. EAP/TLS was used with Xsupplicant andEAP/MD5-Challenge with Windows XP.http://www.missl.cs.umd.edu/wireless/eaptls/ has useful informationabout using EAP/TLS with FreeRADIUS and Xsupplicant (just replaceCisco access point with Host AP driver, hostapd daemon, and a Prism2card ;-). http://www.freeradius.org/doc/EAP-MD5.html has informationabout using EAP/MD5 with FreeRADIUS, including instructions for WinXPconfiguration. http://www.denobula.com/EAPTLS.pdf has a HOWTO onEAP/TLS use with WinXP Supplicant.Automatic WEP key configuration-------------------------------EAP/TLS generates a session key that can be used to send WEP keys froman AP to authenticated stations. The Authenticator in hostapd can beconfigured to automatically select a random default/broadcast key(shared by all authenticated stations) with wep_key_len_broadcastoption (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,wep_key_len_unicast option can be used to configure individual unicastkeys for stations. This requires support for individual keys in thestation driver.WEP keys can be automatically updated by configuring rekeying. Thiswill improve security of the network since same WEP key will only beused for a limited period of time. wep_rekey_period option sets theinterval for rekeying in seconds.WPA/WPA2========Features--------Supported WPA/IEEE 802.11i features:- WPA-PSK ("WPA-Personal")- WPA with EAP (e.g., with RADIUS authentication server) ("WPA-Enterprise")- key management for CCMP, TKIP, WEP104, WEP40- RSN/WPA2 (IEEE 802.11i), including PMKSA caching and pre-authenticationWPA---The original security mechanism of IEEE 802.11 standard was notdesigned to be strong and has proved to be insufficient for mostnetworks that require some kind of security. Task group I (Security)of IEEE 802.11 working group (http://www.ieee802.org/11/) has workedto address the flaws of the base standard and has in practicecompleted its work in May 2004. The IEEE 802.11i amendment to the IEEE802.11 standard was approved in June 2004 and this amendment is likelyto be published in July 2004.Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of theIEEE 802.11i work (draft 3.0) to define a subset of the securityenhancements that can be implemented with existing wlan hardware. Thisis called Wi-Fi Protected Access<TM> (WPA). This has now become amandatory component of interoperability testing and certification doneby Wi-Fi Alliance. Wi-Fi provides information about WPA at its website (http://www.wi-fi.org/OpenSection/protected_access.asp).IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithmfor protecting wireless networks. WEP uses RC4 with 40-bit keys,24-bit initialization vector (IV), and CRC32 to protect against packetforgery. All these choices have proven to be insufficient: key space istoo small against current attacks, RC4 key scheduling is insufficient(beginning of the pseudorandom stream should be skipped), IV space istoo small and IV reuse makes attacks easier, there is no replayprotection, and non-keyed authentication does not protect against bitflipping packet data.WPA is an intermediate solution for the security issues. It usesTemporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is acompromise on strong security and possibility to use existinghardware. It still uses RC4 for the encryption like WEP, but withper-packet RC4 keys. In addition, it implements replay protection,keyed packet authentication mechanism (Michael MIC).Keys can be managed using two different mechanisms. WPA can either usean external authentication server (e.g., RADIUS) and EAP just likeIEEE 802.1X is using or pre-shared keys without need for additionalservers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal",respectively. Both mechanisms will generate a master session key forthe Authenticator (AP) and Supplicant (client station).WPA implements a new key handshake (4-Way Handshake and Group KeyHandshake) for generating and exchanging data encryption keys betweenthe Authenticator and Supplicant. This handshake is also used toverify that both Authenticator and Supplicant know the master sessionkey. These handshakes are identical regardless of the selected keymanagement mechanism (only the method for generating master sessionkey changes).IEEE 802.11i / WPA2-------------------The design for parts of IEEE 802.11i that were not included in WPA hasfinished (May 2004) and this amendment to IEEE 802.11 was approved inJune 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a newversion of WPA called WPA2. This includes, e.g., support for morerobust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)to replace TKIP and optimizations for handoff (reduced number ofmessages in initial key handshake, pre-authentication, and PMKSA caching).Some wireless LAN vendors are already providing support for CCMP intheir WPA products. There is no "official" interoperabilitycertification for CCMP and/or mixed modes using both TKIP and CCMP, sosome interoperability issues can be expected even though manycombinations seem to be working with equipment from different vendors.Testing for WPA2 is likely to start during the second half of 2004.hostapd configuration for WPA/WPA2----------------------------------TODO# Enable WPA. Setting this variable configures the AP to require WPA (either# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),# RADIUS authentication server must be configured, and WPA-EAP must be included# in wpa_key_mgmt.# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)# and/or WPA2 (full IEEE 802.11i/RSN):# bit0 = WPA# bit1 = IEEE 802.11i/RSN (WPA2)#wpa=1# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase# (8..63 characters) that will be converted to PSK. This conversion uses SSID# so the PSK changes when ASCII passphrase is used and the SSID is changed.#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef#wpa_passphrase=secret passphrase# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The# entries are separated with a space.#wpa_key_mgmt=WPA-PSK WPA-EAP# Set of accepted cipher suites (encryption algorithms) for pairwise keys# (unicast packets). This is a space separated list of algorithms:# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i]# Group cipher suite (encryption algorithm for broadcast and multicast frames)# is automatically selected based on this configuration. If only CCMP is# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,# TKIP will be used as the group cipher.#wpa_pairwise=TKIP CCMP# Time interval for rekeying GTK (broadcast/multicast encryption keys) in# seconds.#wpa_group_rekey=600# Time interval for rekeying GMK (master key used internally to generate GTKs# (in seconds).#wpa_gmk_rekey=86400# Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up# roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN# authentication and key handshake before actually associating with a new AP.#rsn_preauth=1## Space separated list of interfaces from which pre-authentication frames are# accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all# interface that are used for connections to other APs. This could include# wired interfaces and WDS links. The normal wireless data interface towards# associated stations (e.g., wlan0) should not be added, since# pre-authentication is only used with APs other than the currently associated# one.#rsn_preauth_interfaces=eth0
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -