logo资料库

Wi-Fi Simple Configuration (WPS) Technical Specification v2.0.5.pdf

第1页 / 共155页
第2页 / 共155页
第3页 / 共155页
第4页 / 共155页
第5页 / 共155页
第6页 / 共155页
第7页 / 共155页
第8页 / 共155页
资料共155页,剩余部分请下载后查看
1 Introduction
1.1 Purpose
1.2 Scope
1.3 Supported Usage Models
1.3.1 Primary Usage Models
1.3.2 Secondary Usage Models
1.4 Design Approach
1.5 Solution Flexibility
1.6 User Experience
1.6.1 In-band Setup
Setup steps
Setup steps
1.6.2 Out-of-Band Setup
Setup steps
2 References
3 Definitions
4 Core Architecture
4.1 Components and Interfaces
4.1.1 Architectural Overview
4.1.2 Interface E
Enrollee
Registrar
4.1.3 Interface M
AP
Registrar
4.1.4 Interface A
AP
Enrollee
4.2 Registration Protocol
4.3 Security Overview
4.3.1 In-band Configuration
Device Password
Headless Devices
Devices with Displays
Devices with NFC
4.3.2 Guidelines and Requirements for PIN values
4.3.3 Out-of-Band Configuration
Unencrypted Settings
Encrypted Settings
NFC Interfaces Operating in Peer-to-peer Mode
5 Initial WLAN Setup
5.1 Standalone AP
Security Considerations
5.2 AP With an External Registrar
5.2.1 EAP-based Setup of External Registrar
Mental model mapping
5.2.2 Ethernet-based Setup of External Registrar
6 Adding Member Devices
6.1 In-band Setup Using a Standalone AP/Registrar
Setup steps
6.2 In-band Setup Using an External Registrar
6.2.1 PIN based setup - External Registrar trigger first
6.2.2 PBC based setup – External Registrar trigger first
6.2.3 PIN based setup – Enrollee trigger first
6.2.4 PBC based setup – Enrollee trigger first
6.3 In-band Setup Using Multiple External Registrars
6.4 Secure Setup with Legacy Enrollee
Setup steps
6.4.1 Mental model mapping
7 Registration Protocol Definition
7.1 Registration Protocol Initiation
7.2 Registration Protocol Messages
7.2.1 Optional Parameters
M2 – ConfigData
M2D – Registrar Discovery Message
M7 – ConfigData
M8 – ConfigData
7.2.2 Validation of Configuration Data
7.3 Key Derivation
1536-bit MODP Group for Diffie-Hellman Exchange
Derivation of KDK
Derivation of AuthKey, KeyWrapKey, and EMSK
Application-specific master session keys
7.4 Proof-of-possession of Device Password
7.4.1 PIN Checksums
7.4.2 Device Password Splitting
7.4.3 Device Password Usage in M1 and M2
7.5 Key Wrap Algorithm
7.6 Key Summary and Classification
7.7 EAP Transport of Registration Protocol
7.7.1 EAP Message Framing
The Message Length field, if included, contains the total length of the WSC TLV attributes in the WSC message.
The Message Data field contains the WSC TLV attributes. The WSC message may be fragmented and placed in multiple EAP packets.
Fragmentation and Reassembly
EAP Identity
7.7.2 EAP Messages
WSC_Start
WSC_ACK
WSC_NACK
WSC_MSG
WSC_Done
WSC_FRAG_ACK
7.7.3 EAP State Machine for Enrollee Registration
7.7.4 EAP State Machine for Adding an External Registrar
7.8 UPnP Transport of Registration Protocol
7.9 Version Negotiation
8 Message Encoding
8.1 Wi-Fi Simple Configuration TLV Data Format
8.2 802.11 Management Frames
Wi-Fi Simple Configuration Information Element
8.2.1 Beacon Frame (C)
8.2.2 Association Request and Reassociation Request
8.2.3 Association Response and Reassociation Response
8.2.4 Probe Request (D-E or D-R)
8.2.5 Probe Response (D-AP/Registrar)
8.3 Registration Protocol Message Definitions
8.3.1 Message M1
8.3.2 Message M2
8.3.3 Message M2D
8.3.4 Message M3
8.3.5 Message M4
8.3.6 Message M5
8.3.7 Message M6
8.3.8 Message M7
8.3.9 Message M8
8.3.10 WSC_ACK Message
8.3.11 WSC_NACK Message
8.3.12 WSC_Done Message
8.4 AP Settings Message Definitions
8.4.1 SetSelectedRegistrar Message
9 Security Configuration Requirements
10 NFC Out-of-Band Interface Specification
10.1 NFC Usage Models
10.1.1 Password Token
10.1.2 Configuration Token
10.1.3 Connection Handover
10.2 Requirements for NFC Out-of-Band Support
10.2.1 Enrollee Requirements
10.2.2 Registrar Requirements
10.2.3 P2P Registrar Requirements
11 Push Button Configuration
11.1 Introduction
11.2 User Experience
11.3 PBC Technical Description
11.4 PBC Security Considerations
12 Data Element Definitions
13 Protocol Implementation Conformance Specification (PICS)
Wi-Fi Simple Configuration Technical Specification Version 2.0.5 This document contains a specification for easy, secure setup and introduction of devices into WPA2- enabled 802.11 networks. It is intended to meet the requirements determined by the Wi-Fi Protected Setup working group in Wi-Fi Alliance. WI-FI ALLIANCE PROPRIETARY – SUBJECT TO CHANGE WITHOUT NOTICE This document may be used with the permission of Wi-Fi Alliance under the terms set forth herein. By your use of the document, you are agreeing to these terms. Unless this document is clearly designated as an approved specification, this document is a work in process and is not an approved Wi-Fi Alliance specification. This document is subject to revision or removal at any time without notice. Information contained in this document may be used at your sole risk. Wi-Fi Alliance assumes no responsibility for errors or omissions in this document. This copyright permission does not constitute an endorsement of the products or services. Wi-Fi Alliance trademarks and certification marks may not be used unless specifically allowed by Wi-Fi Alliance. Wi-Fi Alliance has not conducted an independent intellectual property rights ("IPR") review of this document and the information contained herein, and makes no representations or warranties regarding IPR, including without limitation patents, copyrights or trade secret rights. This document may contain inventions for which you must obtain licenses from third parties before making, using or selling the inventions. Wi-Fi Alliance owns the copyright in this document and reserves all rights therein. A user of this document may duplicate and distribute copies of the document in connection with the authorized uses described herein, provided any duplication in whole or in part includes the copyright notice and the disclaimer text set forth herein. Unless prior written permission has been received from Wi-Fi Alliance, any other use of this document and all other duplication and distribution of this document are prohibited. Unauthorized use, duplication, or distribution is an infringement of Wi-Fi Alliance’s copyright. NO REPRESENTATIONS OR WARRANTIES (WHETHER EXPRESS OR IMPLIED) ARE MADE BY WI-FI ALLIANCE AND WI-FI ALLIANCE IS NOT LIABLE FOR AND HEREBY DISCLAIMS ANY DIRECT, INDIRECT, PUNITIVE, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR EXEMPLARY DAMAGES ARISING OUT OF OR IN CONNECTION WITH THE USE OF THIS DOCUMENT AND ANY INFORMATION CONTAINED IN THIS DOCUMENT. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved.
Wi-Fi Simple Configuration Technical Specification v2.0.5 Document History Version Date Status Comments 2.0.0.51 2010-09-01 Draft Draft release version to public 2.0.0 2010-12-20 Final Public release version 2.0.1 2011-08-11 Final Public release version - Added tablet PC to table 41 2.0.2 2012-01-30 Final Public release version - Change Headless Devices section to mandate implementation of strong mitigation against a brute force attack on the AP that uses a static PIN. 2.0.2.1.21 2014-01-27 Draft Draft release version to public - Updated to support NFC - Updated to incorporate the Wi-Fi Peer-to-Peer Services default configuration method - Updated to incorporate 60GHz_WPS_SRD_1.0 - Minor editorial corrections/clarifications 2.0.3 Draft Internal Draft, not publicly released 2.0.4 2014-03-21 Final Public release version - Clarifications on NFC sections - Minor editorial corrections/clarifications 2.0.5 2014-08-04 Final Public release version - Editorial updates to clarify references to Wi-Fi Peer-to-Peer Services (P2Ps) Specification Used with the permission of Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 2 of 155
Wi-Fi Simple Configuration Technical Specification v2.0.4 Table of Contents 1 Introduction ............................................................................................................ 11 1.1 1.2 1.3 Purpose ................................................................................................... 11 Scope....................................................................................................... 11 Supported Usage Models ........................................................................ 11 1.3.1 Primary Usage Models............................................................................. 11 1.3.2 Secondary Usage Models ........................................................................ 11 1.4 1.5 1.6 Design Approach ..................................................................................... 12 Solution Flexibility .................................................................................... 12 User Experience ...................................................................................... 13 1.6.1 In-band Setup .......................................................................................... 13 1.6.2 Out-of-Band Setup ................................................................................... 14 2 References ............................................................................................................. 15 3 Definitions .............................................................................................................. 16 4 Core Architecture ................................................................................................... 18 4.1 Components and Interfaces ..................................................................... 18 4.1.1 Architectural Overview ............................................................................. 18 4.1.2 Interface E ............................................................................................... 19 4.1.3 Interface M ............................................................................................... 20 4.1.4 Interface A ............................................................................................... 21 4.2 4.3 Registration Protocol................................................................................ 21 Security Overview .................................................................................... 23 4.3.1 In-band Configuration .............................................................................. 24 4.3.2 Guidelines and Requirements for PIN values .......................................... 26 4.3.3 Out-of-Band Configuration ....................................................................... 27 5 Initial WLAN Setup ................................................................................................. 28 5.1 5.2 Standalone AP ......................................................................................... 28 AP With an External Registrar ................................................................. 29 5.2.1 EAP-based Setup of External Registrar ................................................... 31 5.2.2 Ethernet-based Setup of External Registrar ............................................ 33 6 Adding Member Devices ........................................................................................ 34 In-band Setup Using a Standalone AP/Registrar ..................................... 35 In-band Setup Using an External Registrar .............................................. 36 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 3 of 155 6.1 6.2
Wi-Fi Simple Configuration Technical Specification v2.0.4 6.2.1 PIN based setup - External Registrar trigger first ..................................... 36 6.2.2 PBC based setup – External Registrar trigger first .................................. 38 6.2.3 PIN based setup – Enrollee trigger first ................................................... 39 6.2.4 PBC based setup – Enrollee trigger first .................................................. 41 6.3 6.4 In-band Setup Using Multiple External Registrars ................................... 42 Secure Setup with Legacy Enrollee ......................................................... 45 6.4.1 Mental model mapping............................................................................. 45 7 Registration Protocol Definition .............................................................................. 46 7.1 7.2 Registration Protocol Initiation ................................................................. 46 Registration Protocol Messages .............................................................. 48 7.2.1 Optional Parameters ................................................................................ 50 7.2.2 Validation of Configuration Data .............................................................. 51 7.3 7.4 Key Derivation ......................................................................................... 51 Proof-of-possession of Device Password ................................................ 53 7.4.1 PIN Checksums ....................................................................................... 54 7.4.2 Device Password Splitting ....................................................................... 55 7.4.3 Device Password Usage in M1 and M2 ................................................... 55 7.5 7.6 7.7 Key Wrap Algorithm ................................................................................. 57 Key Summary and Classification ............................................................. 57 EAP Transport of Registration Protocol ................................................... 58 7.7.1 EAP Message Framing ............................................................................ 59 7.7.2 EAP Messages ........................................................................................ 61 7.7.3 EAP State Machine for Enrollee Registration .......................................... 63 7.7.4 EAP State Machine for Adding an External Registrar .............................. 64 7.8 7.9 UPnP Transport of Registration Protocol ................................................. 65 Version Negotiation ................................................................................. 66 8 Message Encoding ................................................................................................. 67 8.1 8.2 Wi-Fi Simple Configuration TLV Data Format .......................................... 67 802.11 Management Frames ................................................................... 68 8.2.1 Beacon Frame (C) ................................................................................... 69 8.2.2 Association Request and Reassociation Request ................................... 70 8.2.3 Association Response and Reassociation Response .............................. 71 8.2.4 Probe Request (D-E or D-R) .................................................................... 71 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 4 of 155
Wi-Fi Simple Configuration Technical Specification v2.0.4 8.2.5 Probe Response (D-AP/Registrar) ........................................................... 72 8.3 Registration Protocol Message Definitions .............................................. 73 8.3.1 Message M1 ............................................................................................ 74 8.3.2 Message M2 ............................................................................................ 75 8.3.3 Message M2D .......................................................................................... 76 8.3.4 Message M3 ............................................................................................ 77 8.3.5 Message M4 ............................................................................................ 77 8.3.6 Message M5 ............................................................................................ 78 8.3.7 Message M6 ............................................................................................ 78 8.3.8 Message M7 ............................................................................................ 79 8.3.9 Message M8 ............................................................................................ 80 8.3.10 WSC_ACK Message................................................................................ 82 8.3.11 WSC_NACK Message ............................................................................. 82 8.3.12 WSC_Done Message .............................................................................. 83 8.4 AP Settings Message Definitions ............................................................. 83 8.4.1 SetSelectedRegistrar Message ............................................................... 83 9 Security Configuration Requirements ..................................................................... 85 10 NFC Out-of-Band Interface Specification ............................................................... 86 10.1 NFC Usage Models ................................................................................. 86 10.1.1 Password Token ...................................................................................... 86 10.1.2 Configuration Token ................................................................................ 87 10.1.3 Connection Handover .............................................................................. 88 10.2 Requirements for NFC Out-of-Band Support ........................................... 91 10.2.1 Enrollee Requirements ............................................................................ 91 10.2.2 Registrar Requirements ........................................................................... 92 10.2.3 P2P Registrar Requirements ................................................................... 92 11 Push Button Configuration ..................................................................................... 93 11.1 11.2 11.3 11.4 Introduction .............................................................................................. 93 User Experience ...................................................................................... 93 PBC Technical Description ...................................................................... 95 PBC Security Considerations ................................................................... 98 12 Data Element Definitions ...................................................................................... 100 13 Protocol Implementation Conformance Specification (PICS) .............................. 132 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 5 of 155
Wi-Fi Simple Configuration Technical Specification v2.0.4 Annex A - ................................................................Out-of-Band Channel Considerations 136 Annex B - ......................................................... Security Analysis of Registration Protocol 138 Out-Of-Band Channels ............................................................................................ 138 Out-of-band Channel Characteristics ...................................................................... 139 Annex C - ....................................... Out-of-band Setup Using a Standalone AP/Registrar 140 Setup steps .............................................................................................................. 140 Annex D - ................................................ Out-of-band Setup Using an External Registrar 141 Annex E - ................................................................................. Secondary Usage Models 142 Removing Members from the WLAN ....................................................................... 142 Guest access ........................................................................................................... 142 Re-keying credentials .............................................................................................. 142 Expanding the network - Adding additional AP or Router ........................................ 142 Changing Network Name (SSID), radio channels, etc. ............................................ 142 Rekeying .................................................................................................................. 143 Annex F - ...................................................... Management Interface Message Definitions 144 GetAPSettings Input Message ................................................................................. 144 GetAPSettings Output Message .............................................................................. 145 SetAPSettings Message .......................................................................................... 146 DelAPSettings Message .......................................................................................... 146 ResetAP and RebootAP Messages ......................................................................... 147 STA Settings Message Definitions .......................................................................... 148 GetSTASettings Input Message .............................................................................. 148 GetSTASettings Output Message ............................................................................ 148 SetSTASettings Message ........................................................................................ 149 DelSTASettings Message ........................................................................................ 150 ResetSTA and RebootSTA Messages .................................................................... 150 Annex G - ..................................... USBA (USB Host) Out-of-Band Interface Specification 152 Requirements for USB Flash Drives (UFD) ............................................................. 152 Enrollee Requirements for USBA out-of-band Interfaces ........................................ 152 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 6 of 155
Wi-Fi Simple Configuration Technical Specification v2.0.4 Firmware and Software Requirements .................................................................... 153 Encrypted Settings File (xxxxxxxx.WSC) ................................................................. 153 Unencrypted Settings File (00000000.WSC) ........................................................... 154 Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ..................................... 154 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 7 of 155
Wi-Fi Simple Configuration Technical Specification v2.0.4 Tables Table 1 – Key Types and Lifetimes ............................................................................... 57 Table 2 – Type, Length, Value (TLV) format for Wi-Fi Simple Configuration binary data ...................................................................................................................................... 67 Table 3 – Attributes in WSC IE in the Beacon Frame ................................................... 69 Table 4 – Attributes in WSC IE in the Association/Reassociation Request frame ......... 70 Table 5 – Attributes in WSC IE in the Association/Reassociation Response frame ...... 71 Table 6 – Attributes in WSC IE in the Probe Request frame ......................................... 71 Table 7 – Attributes in WSC IE in the Probe Response frame ...................................... 72 Table 8 – Attributes in the Message M1 ........................................................................ 74 Table 9 – Attributes in the Message M2 ........................................................................ 75 Table 10 – Attributes in the Message M2D ................................................................... 76 Table 11 – Attributes in the Message M3 ...................................................................... 77 Table 12 – Attributes in the Message M4 ...................................................................... 77 Table 13 – Attributes in Encrypted Settings Data in the M4 .......................................... 78 Table 14 – Attributes in the Message M5 ...................................................................... 78 Table 15 – Attributes in the Message M6 ...................................................................... 78 Table 16 – Attributes in the Message M7 ...................................................................... 79 Table 17 – Enrollee Settings Attributes in Encrypted Settings of M7 ............................ 79 Table 18 – AP Settings Attributes in Encrypted Settings of M7 ..................................... 80 Table 19 – Attributes in the Message M8 ...................................................................... 80 Table 20 – Attributes in Encrypted Settings of M2, M8 if Enrollee is AP ....................... 81 Table 21 – Attributes in Encrypted Settings of M2, M8 if Enrollee is STA ..................... 81 Table 22 – Attributes in the WSC_ACK Message ......................................................... 82 Table 23 – Attributes in the WSC_NACK Message ....................................................... 82 Table 24 – Attributes in the WSC_Done Message ........................................................ 83 Table 25 – Attributes in the SetSelectedRegistrar Message ......................................... 84 Table 26 – NDEF Record Payload of the NFC Password Token .................................. 87 Table 27 – NDEF Record Payload of the NFC Configuration Token ............................. 87 Table 28 – Attribute types and sizes defined for Wi-Fi Simple Configuration .............. 100 Table 29 – WFA Vendor Extension Subelements ....................................................... 104 Table 30 – Attributes in the Data field (out-of-band channel) ...................................... 106 Table 31 – Association State Values ........................................................................... 106 Table 32 – Authentication Types ................................................................................. 107 Used with the permission of the Wi-Fi Alliance under the terms as stated in this document. © 2014 Wi-Fi Alliance. All Rights Reserved. Page 8 of 155
分享到:
收藏