Wpa supplicant explained

wpa_supplicant
Developer:Jouni Malinen and others
Latest Release Version:2.10[1]
Programming Language:C
Operating System:Cross-platform
Genre:WLAN tools
License:BSD

wpa_supplicant is a free software implementation of an IEEE 802.11i supplicant for Linux, FreeBSD, NetBSD, QNX, AROS, Microsoft Windows, Solaris, OS/2 (including ArcaOS and eComStation)[2] and Haiku. In addition to being a WPA3 and WPA2 supplicant, it also implements WPA and older wireless LAN security protocols.

Features

Features include:[3]

Included with the supplicant are a GUI and a command-line utility for interacting with the running supplicant. From either of these interfaces it is possible to review a list of currently visible networks, select one of them, provide any additional security information needed to authenticate with the network (for example, a passphrase, or username and password) and add it to the preference list to enable automatic reconnection in the future.[5]

The graphical user interface is built on top of the Qt library.

wpa_supplicant can authenticate with any of the following EAP (Extensible Authentication Protocol) methods: EAP-TLS, EAP-PEAP (both PEAPv0 and PEAPv1), EAP-TTLS, EAP-SIM, EAP-AKA, EAP-AKA', EAP-pwd, EAP-EKE, EAP-PSK (experimental), EAP-FAST, EAP-PAX, EAP-SAKE, EAP-GPSK, EAP-IKEv2, EAP-MD5, EAP-MSCHAPv2, and LEAP (requires special functions in the driver).

Vulnerability to KRACK

wpa_supplicant was especially susceptible to KRACK, as it can be manipulated to install an all-zeros encryption key, effectively nullifying WPA2 protection in a man-in-the-middle attack.[6] Version 2.7 fixed KRACK and several other vulnerabilities.

See also

External links

Notes and References

  1. Web site: Index of /releases . w1.fi . 2022-01-16 . 2022-02-28.
  2. Web site: wpa_supplicant. 2020-09-03.
  3. Web site: wpa_supplicant(8) - Linux man page. 2020-03-07.
  4. Web site: wpa_supplicant. 2021-05-18. wiki.archlinux.org.
  5. Web site: Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, RSN, IEEE 802.11i) . w1.fi . 2014-07-04.
  6. Web site: Key Reinstallation Attacks disclosure website . KRACK Attacks . 26 September 2018 . paper . Linux's wpa_supplicant v2.6 is also vulnerable to the installation of an all-zero encryption key in the 4-way handshake..