Wi-Fi Protected Access
Wi-Fi Protected Access
WPA
What is WPA?
Enterprise Mode
Requires an authentication server
Uses RADIUS protocols for authentication and
key distribution.
Centralizes management of user credentials.
WPA
802.1x
Features:
BSS
Key hierarchy
Key management
Cipher & Authentication Negotiation
Data Privacy Protocol: TKIP
Comparing WPA and 802.11i
802.1x
Features:
BSS
Independent Basic Service Set
Pre-authentication
Key hierarchy
Key management
Cipher & Authentication Negotiation
Data Privacy Protocols: TKIP and CCMP
WPA Summary
Enterprise:
Select EAP types and 802.1X supplicants to be
supported on stations, APs, and authentication
servers.
Select and deploy RADIUS-based authentication
servers
How WPA Addresses the WEP Vulnerabilities
However…
Cowpatty
http://www.remote-exploit.org/?page=codes
WPA_attack
http://www.tinypeap.com/page8.html
WPA_Supplicant
http://hostap.epitest.fi/wpa_supplicant
Conclusions on WEP and WPA
WEP is insufficient to protect WLANs
today from determined attackers.