Wi-Fi Protected Access

#navi(contents-page-name): No such page: Linux

CONTENTS


REFERENCES


はじめに

用語・略語集

WPA
Wireless Projecter Adaptorとは関係ない。
WPA
Windows Product Activation氏ね。
EAP
Extensible Authentication Protocol
PSK
Pre-Shared Key
TKIP
Temporal Key Integrity Protocol
AES
Advanced Encryption Standard

WPA関連MIB

MIBdescription
DOT11_RSN_ENABLEDWPA enable or disable
DOT11_RSN_CONFIG_MULTICAST_CIPHERWEP40,TKIP,CCMP(AES),WEP104
DOT11_RSN_CONFIG_UNICAST_CIPHERWEP40,TKIP,CCMP(AES),WEP104
DOT11_RSN_CONFIG_AUTH_SUITEWPA(802.1x),WPA(PreSharedKey),WPA-none(11Adhoc)
DOT11_PMK_TSC
DOT11_GMK1_TSC
DOT11_GMK2_TSC

AuthenticationSuite Set?

OID_AUTH_MODEOID_WEP_STATUSENABLEDUNICAST_CIPHERMULTICAST_CIPHERAUTH_SUITE
Open/SharedEncyption1EnabledWPA disable
WPAPSKTEncyption2EnabledWPA enableTKIPTKIPWPA(PreSharedKey)
WPAPSKTEncyption2EnabledWPA enableTKIPWEP40WPA(PreSharedKey)
WPAPSKTEncyption3EnabledWPA enableCCMP(AES)CCMP(AES)WPA(PreSharedKey)
WPAPSKTEncyption3EnabledWPA enableCCMP(AES)TKIPWPA(PreSharedKey)
WPAPSKTEncyption3EnabledWPA enableCCMP(AES)WEP40WPA(PreSharedKey)
WPATEncyption2EnabledWPA enableTKIPTKIPWPA(802.1x)
WPATEncyption2EnabledWPA enableTKIPWEP40WPA(802.1x)
WPATEncyption3EnabledWPA enableCCMP(AES)CCMP(AES)WPA(802.1x)
WPATEncyption3EnabledWPA enableCCMP(AES)TKIPWPA(802.1x)
WPATEncyption3EnabledWPA enableCCMP(AES)WEP40WPA(802.1x)

WPA対応機器

WPA Supplicant

Install

FreeBSD ガ━━ΣΣ(゚Д゚;)━━ン

# portinstall security/wpa_supplicant/
[Updating the pkgdb <format:bdb1_btree> in /var/db/pkg ... - 204 packages found (-0 +0)  done]
** Port marked as IGNORE: security/wpa_supplicant:
        is not supported on FreeBSD < 6.0

Debian

# apt-get install wpasupplicant

Driver I/F

実験

WPA-PSK (TKIP/AES) on WN-AG/CB2

# cat /etc/default/wpasupplicant 
ENABLED=1
OPTIONS="-Dmadwifi -iath0 -c/etc/wpa_supplicant.conf -dd -w"
# cat /etc/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
ap_scan=1
network={
   ssid="ioAirportAp13"
   psk="hidemaru4000en"
   priority=1
}
network={
   ssid="tacoma"
   psk="aesaesaes"
   priority=2
}
# /etc/init.d/wpasupplicant start
Starting wpasupplicant: Initializing interface 
  'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
ap_scan=1
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=13):
     69 6f 41 69 72 70 6f 72 74 41 70 31 33            ioAirportAp13   
PSK (ASCII passphrase) - hexdump_ascii(len=14): [REMOVED]
priority=5 (0x5)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 5
   id=0 ssid='ioAirportAp13'
Daemonize..
done.
# iwconfig ath0
ath0      IEEE 802.11g  ESSID:"ioAirportAp13"  
          Mode:Managed  Frequency:2.472 GHz  Access Point: 00:A0:B0:6A:09:00
          Bit Rate:36 Mb/s   Tx-Power:50 dBm   Sensitivity=0/3
          Retry:off   RTS thr:off   Fragment thr:off
          Encryption key:41E0-9CF8-AF33-EDF7-00DD-4CC4-3C9D-2277
          Security mode:restricted
          Power Management:off
          Link Quality=46/94  Signal level=-49 dBm  Noise level=-95 dBm
          Rx invalid nwid:0  Rx invalid crypt:0  Rx invalid frag:0
          Tx excessive retries:0  Invalid misc:0   Missed beacon:0
# dhclient ath0
Internet Software Consortium DHCP Client 2.0pl5
Copyright 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium.
All rights reserved.

Please contribute if you find this software useful.
For info, please visit http://www.isc.org/dhcp-contrib.html

sit0: unknown hardware address type 776
eth1: unknown hardware address type 24
sit0: unknown hardware address type 776
eth1: unknown hardware address type 24
Listening on LPF/ath0/00:a0:b0:4c:5b:b8
Sending on   LPF/ath0/00:a0:b0:4c:5b:b8
Sending on   Socket/fallback/fallback-net
DHCPDISCOVER on ath0 to 255.255.255.255 port 67 interval 7
DHCPOFFER from 192.168.104.1
DHCPREQUEST on ath0 to 255.255.255.255 port 67
DHCPACK from 192.168.104.1
bound to 192.168.104.3 -- renewal in 43200 seconds.
# ifconfig ath0
ath0      Link encap:Ethernet  HWaddr 00:A0:B0:4C:5B:B8  
          inet addr:192.168.104.3  Bcast:192.168.104.255  Mask:255.255.255.0
          inet6 addr: fe80::2a0:b0ff:fe4c:5bb8/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:319 errors:24 dropped:0 overruns:0 frame:24
          TX packets:40 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:199 
          RX bytes:98324 (96.0 KiB)  TX bytes:5139 (5.0 KiB)
          Interrupt:10 Memory:dfc3f000-dfc4f000 
# ping 192.168.104.1
PING 192.168.104.1 (192.168.104.1) 56(84) bytes of data.
64 bytes from 192.168.104.1: icmp_seq=1 ttl=127 time=0.627 ms

WPA (AES) EAP-TLS on WN-AG/CB2

  1. Certificate Autority関係を何とかする。
  2. /usr/local/etc/raddb以下の環境ファイル(死ぬほどある)を何とかする。
  3. APの設定を何とかする。
  4. 証明書などをクライアントマシンにコピーして何とかする。

radiusd -X

rad_recv: Access-Request packet from host 192.168.100.1:1202, id=204, length=142
        User-Name = "hasebe"
        NAS-IP-Address = 192.168.123.1
        NAS-Port = 0
        Called-Station-Id = "00-A0-B0-46-85-E2"
        Calling-Station-Id = "00-A0-B0-4C-5B-B8"
        NAS-Identifier = "tacoma"
        Framed-MTU = 1380
        NAS-Port-Type = Wireless-802.11
        EAP-Message = 0x020500060d00
        State = 0xa400d73454b06110b20bb42ad551e5d4
        Message-Authenticator = 0xf25aa2cbda033033b6f726c1486e395f
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 17
  modcall[authorize]: module "preprocess" returns ok for request 17
  modcall[authorize]: module "chap" returns noop for request 17
  modcall[authorize]: module "mschap" returns noop for request 17
    rlm_realm: No '@' in User-Name = "hasebe", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 17
  rlm_eap: EAP packet type response id 5 length 6
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 17
    users: Matched entry DEFAULT at line 153
  modcall[authorize]: module "files" returns ok for request 17
modcall: group authorize returns updated for request 17
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 17
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/tls
  rlm_eap: processing type tls
  rlm_eap_tls: Authenticate
  rlm_eap_tls: processing TLS
rlm_eap_tls: Received EAP-TLS ACK message
  rlm_eap_tls: ack handshake is finished
  eaptls_verify returned 3 
  eaptls_process returned 3 
  rlm_eap: Freeing handler
  modcall[authenticate]: module "eap" returns ok for request 17
modcall: group authenticate returns ok for request 17
Sending Access-Accept of id 204 to 192.168.100.1:1202
        MS-MPPE-Recv-Key = 0x3002dbe723b42c89fe8794040232857a811157e23e7d4775bd4d6f3a8068243c
        MS-MPPE-Send-Key = 0x8c3358754b17c94c6e8be4d3c6c46562a353030f304506410030f01c63c883fe
        EAP-Message = 0x03050004
        Message-Authenticator = 0x00000000000000000000000000000000
        User-Name = "hasebe"
Finished request 17

トップ   新規 一覧 検索 最終更新   ヘルプ   最終更新のRSS