Skip to content
Surf Wiki
Save to docs
general/wi-fi

From Surf Wiki (app.surf) — the open knowledge base

Wpa supplicant

Open-source implementation of IEEE 802.11i


Open-source implementation of IEEE 802.11i

FieldValue
namewpa_supplicant
screenshot[[File:wpa gui-screenshot.png227pxScreenshot of wpa gui]]
captionScreenshot of wpa_gui
developerJouni Malinen and others
released
latest_release_version2.11{{cite web
urlhttps://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog
titleIndex of /releases
publisherw1.fi
date2024-07-20
accessdate2024-09-19}}
latest_release_date
programming_languageC
operating_systemCross-platform
genreWLAN tools
licenseBSD
website

wpa_supplicant is a free software implementation of an IEEE 802.11i supplicant for Linux, FreeBSD, NetBSD, QNX, AROS, Microsoft Windows, Solaris, OS/2 (including ArcaOS and eComStation) and Haiku. In addition to being a WPA3 and WPA2 supplicant, it also implements WPA and older wireless LAN security protocols.

Features

Features include:

  • WPA-PSK and WPA2-PSK ("WPA-Personal", pre-shared key)
  • WPA3
  • WPA with EAP ("WPA-Enterprise", for example with RADIUS authentication server)
  • RSN: PMKSA caching, pre-authentication
  • IEEE 802.11r
  • IEEE 802.11w
  • Wi-Fi Protected Setup (WPS)

Included with the supplicant are a GUI and a command-line utility for interacting with the running supplicant. From either of these interfaces it is possible to review a list of currently visible networks, select one of them, provide any additional security information needed to authenticate with the network (for example, a passphrase, or username and password) and add it to the preference list to enable automatic reconnection in the future.

The graphical user interface is built on top of the Qt library.

wpa_supplicant can authenticate with any of the following EAP (Extensible Authentication Protocol) methods: EAP-TLS, EAP-PEAP (both PEAPv0 and PEAPv1), EAP-TTLS, EAP-SIM, EAP-AKA, EAP-AKA', EAP-PWD, EAP-EKE, EAP-PSK (experimental), EAP-FAST, EAP-PAX, EAP-SAKE, EAP-GPSK, EAP-IKEv2, EAP-MD5, EAP-MSCHAPv2, and LEAP (requires special functions in the driver).

Vulnerability to KRACK

wpa_supplicant was especially susceptible to KRACK, as it can be manipulated to install an all-zeros encryption key, effectively nullifying WPA2 protection in a man-in-the-middle attack. Version 2.7 fixed KRACK and several other vulnerabilities.

References

References

  1. "wpa_supplicant".
  2. (2019-03-17). "haiku/wpa_supplicant". Haiku.
  3. "wpa_supplicant(8) - Linux man page".
  4. "wpa_supplicant".
  5. "Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, RSN, IEEE 802.11i)". w1.fi.
  6. "Key Reinstallation Attacks disclosure website".
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Wpa supplicant — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report