From Surf Wiki (app.surf) — the open knowledge base
Wpa supplicant
Open-source implementation of IEEE 802.11i
Open-source implementation of IEEE 802.11i
| Field | Value | ||
|---|---|---|---|
| name | wpa_supplicant | ||
| screenshot | [[File:wpa gui-screenshot.png | 227px | Screenshot of wpa gui]] |
| caption | Screenshot of wpa_gui | ||
| developer | Jouni Malinen and others | ||
| released | |||
| latest_release_version | 2.11{{cite web | ||
| url | https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog | ||
| title | Index of /releases | ||
| publisher | w1.fi | ||
| date | 2024-07-20 | ||
| accessdate | 2024-09-19}} | ||
| latest_release_date | |||
| programming_language | C | ||
| operating_system | Cross-platform | ||
| genre | WLAN tools | ||
| license | BSD | ||
| website |
wpa_supplicant is a free software implementation of an IEEE 802.11i supplicant for Linux, FreeBSD, NetBSD, QNX, AROS, Microsoft Windows, Solaris, OS/2 (including ArcaOS and eComStation) and Haiku. In addition to being a WPA3 and WPA2 supplicant, it also implements WPA and older wireless LAN security protocols.
Features
Features include:
- WPA-PSK and WPA2-PSK ("WPA-Personal", pre-shared key)
- WPA3
- WPA with EAP ("WPA-Enterprise", for example with RADIUS authentication server)
- RSN: PMKSA caching, pre-authentication
- IEEE 802.11r
- IEEE 802.11w
- Wi-Fi Protected Setup (WPS)
Included with the supplicant are a GUI and a command-line utility for interacting with the running supplicant. From either of these interfaces it is possible to review a list of currently visible networks, select one of them, provide any additional security information needed to authenticate with the network (for example, a passphrase, or username and password) and add it to the preference list to enable automatic reconnection in the future.
The graphical user interface is built on top of the Qt library.
wpa_supplicant can authenticate with any of the following EAP (Extensible Authentication Protocol) methods: EAP-TLS, EAP-PEAP (both PEAPv0 and PEAPv1), EAP-TTLS, EAP-SIM, EAP-AKA, EAP-AKA', EAP-PWD, EAP-EKE, EAP-PSK (experimental), EAP-FAST, EAP-PAX, EAP-SAKE, EAP-GPSK, EAP-IKEv2, EAP-MD5, EAP-MSCHAPv2, and LEAP (requires special functions in the driver).
Vulnerability to KRACK
wpa_supplicant was especially susceptible to KRACK, as it can be manipulated to install an all-zeros encryption key, effectively nullifying WPA2 protection in a man-in-the-middle attack. Version 2.7 fixed KRACK and several other vulnerabilities.
References
References
- "wpa_supplicant".
- (2019-03-17). "haiku/wpa_supplicant". Haiku.
- "wpa_supplicant(8) - Linux man page".
- "wpa_supplicant".
- "Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, RSN, IEEE 802.11i)". w1.fi.
- "Key Reinstallation Attacks disclosure website".
This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.
Ask Mako anything about Wpa supplicant — get instant answers, deeper analysis, and related topics.
Research with MakoFree with your Surf account
Create a free account to save articles, ask Mako questions, and organize your research.
Sign up freeThis content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.
Report