Wi-Fi Protected Setup Specification 1.0

时间:2015-04-17 16:36:39
【文件属性】:

文件名称:Wi-Fi Protected Setup Specification 1.0

文件大小:1.62MB

文件格式:PDF

更新时间:2015-04-17 16:36:39

WIFI, WPS 1,0

1. Introduction ........................................................................................................................7 1.1. Purpose .............................................................................................................................................. 7 1.2. Scope................................................................................................................................................... 7 1.3. Related Documents .......................................................................................................................... 7 1.4. Supported Usage Models................................................................................................................. 7 Primary Usage Models................................................................................................................................. 7 Secondary Usage Models ............................................................................................................................. 7 1.5. Mental Model .................................................................................................................................... 8 1.6. Design Approach .............................................................................................................................. 8 1.7. Solution Flexibility ........................................................................................................................... 8 1.8. User Experience................................................................................................................................ 9 1.8.1. In-band Setup ............................................................................................................................... 9 1.8.2. Out-of-band Setup ....................................................................................................................... 9 2. Core Architecture..............................................................................................................11 2.1. Definitions........................................................................................................................................ 11 2.2. Components and Interfaces .......................................................................................................... 12 2.2.1. Architectural Overview .......................................................................................................................... 12 2.2.2. Interface E ............................................................................................................................................... 12 2.2.3. Interface M.............................................................................................................................................. 13 2.2.4. Interface A............................................................................................................................................... 14 2.3. Registration Protocol ..................................................................................................................... 15 2.4. Security Overview.......................................................................................................................... 16 2.4.1. In-band Configuration .............................................................................................................. 16 2.4.2. Guidelines and Requirements for PIN values ....................................................................... 18 2.4.3. Out-of-band Configuration ...................................................................................................... 18 3. Initial WLAN Setup ..........................................................................................................19 3.1. Standalone AP ................................................................................................................................ 19 3.2. Legacy AP........................................................................................................................................ 19 3.3. AP With an External Registrar ................................................................................................... 20 3.3.1. EAP-based Setup of External Registrar................................................................................. 21 3.3.2. Ethernet-based Setup of External Registrar ......................................................................... 23 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 3 of 110 Version: 1.0h 4. Adding Member Devices ...................................................................................................25 4.1. In-band Setup Using a Standalone AP/Registrar ..................................................................... 25 4.2. Out-of-band Setup Using a Standalone AP/Registrar.............................................................. 27 4.3. Out-of-band Setup Using an External Registrar ...................................................................... 28 4.4. Secure Setup with Legacy AP ...................................................................................................... 29 4.5. Secure Setup with Legacy Enrollee ............................................................................................. 29 4.5.1. Mental model mapping ............................................................................................................. 29 4.6. No-Security Out-of-band Setup Using a Standalone AP ......................................................... 29 4.6.1. Mental model mapping ............................................................................................................. 30 5. Secondary Usage Models ..................................................................................................31 5.1. Removing Members from the WLAN......................................................................................... 31 5.2. Guest access..................................................................................................................................... 31 5.3. Re-keying credentials .................................................................................................................... 31 5.4. Expanding the network - Adding additional AP or Router .................................................... 31 5.5. Changing Network Name (SSID), radio channels, etc. ............................................................ 31 6. Registration Protocol Definition .......................................................................................33 6.1. Registration Protocol Initiation ................................................................................................... 33 6.2. Registration Protocol Messages ................................................................................................... 34 6.2.1. Optional Parameters................................................................................................................................ 35 6.3. Key Derivation................................................................................................................................ 36 6.4. Proof-of-possession of Device Password ..................................................................................... 38 6.4.1. PIN Checksums .......................................................................................................................... 38 6.4.2. Device Password Splitting......................................................................................................... 39 6.4.3. Device Password Usage ............................................................................................................. 39 6.5. Key Wrap Algorithm..................................................................................................................... 40 6.6. Rekeying .......................................................................................................................................... 41 6.7. Key Summary and Classification ................................................................................................ 41 6.8. Security Analysis ............................................................................................................................ 42 6.9. Out-Of-Band Channels ................................................................................................................. 43 6.9.1. Out-of-band Channel Characteristics .................................................................................................... 43 6.10. EAP Transport of Registration Protocol................................................................................ 43 6.10.1. EAP Message Framing ........................................................................................................................... 44 6.10.2. EAP Messages......................................................................................................................................... 45 6.10.3. EAP State Machine for Enrollee Registration ...................................................................................... 47 6.10.4. EAP State Machine for Adding an External Registrar ......................................................................... 48 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 4 of 110 Version: 1.0h 6.11. UPnP Transport of Registration Protocol ............................................................................. 49 7. Message Encoding ............................................................................................................50 7.1. Wi-Fi Protected Setup TLV Data Format.................................................................................. 50 7.2. 802.11 Management Frames......................................................................................................... 50 7.2.1. Beacon Frame (C) ...................................................................................................................... 52 7.2.2. Association Request and Reassociation Request................................................................... 52 7.2.3. Association Response and Reassociation Response .............................................................. 52 7.2.4. Probe Request (D-E or D-R) .................................................................................................... 53 7.2.5. Probe Response (D-AP/Registrar)........................................................................................... 53 7.3. Registration Protocol Message Definitions ................................................................................ 54 7.3.1. Message M1................................................................................................................................. 54 7.3.2. Message M2................................................................................................................................. 55 7.3.3. Message M2D.............................................................................................................................. 56 7.3.4. Message M3................................................................................................................................. 56 7.3.5. Message M4................................................................................................................................. 56 7.3.6. Message M5................................................................................................................................. 57 7.3.7. Message M6................................................................................................................................. 57 7.3.8. Message M7................................................................................................................................. 58 7.3.9. Message M8................................................................................................................................. 59 7.3.10. WSC_ACK Message .................................................................................................................. 60 7.3.11. WSC_NACK Message ............................................................................................................... 60 7.3.12. WSC_Done Message .................................................................................................................. 60 7.4. AP Settings Message Definitions.................................................................................................. 61 7.4.1. GetAPSettings Input Message.................................................................................................. 61 7.4.2. GetAPSettings Output Message............................................................................................... 62 7.4.3. SetAPSettings Message.............................................................................................................. 63 7.4.4. DelAPSettings Message ............................................................................................................. 63 7.4.5. SetSelectedRegistrar Message.................................................................................................. 64 7.4.6. ResetAP and RebootAP Messages........................................................................................... 64 7.5. STA Settings Message Definitions ............................................................................................... 65 7.5.1. GetSTASettings Input Message ............................................................................................... 65 7.5.2. GetSTASettings Output Message ............................................................................................ 65 7.5.3. SetSTASettings Message ........................................................................................................... 66 7.5.4. DelSTASettings Message .......................................................................................................... 67 7.5.5. ResetSTA and RebootSTA Messages...................................................................................... 67 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 5 of 110 Version: 1.0h 8. USBA (USB Host) Out-of-Band Interface Specification ..................................................68 8.1. Requirements for USB Flash Drives (UFD)............................................................................... 68 8.2. Enrollee Requirements for USBA OOB Interfaces .................................................................. 68 8.3. Firmware and Software Requirements ...................................................................................... 69 8.3.1. Encrypted Settings File (xxxxxxxx.WSC) .............................................................................. 69 8.3.2. Unencrypted Settings File (00000000.WSC).......................................................................... 69 8.3.3. Enrollee Device Password and Key Hash (xxxxxxxx.WFA) ............................................... 70 9. NFC Out-of-Band Interface Specification........................................................................71 9.1. Disclaimer........................................................................................................................................ 71 9.2. Overview.......................................................................................................................................... 71 9.3. NFC Use Cases................................................................................................................................ 72 9.3.1. NFC Password Token................................................................................................................ 72 9.3.2. Touching Devices ....................................................................................................................... 72 9.3.3. NFC Configuration Token........................................................................................................ 73 9.4. Generic Requirements for NFC OOB Support ......................................................................... 73 9.4.1. New Devices (Enrollee or AP) Requirements ........................................................................ 73 9.4.2. Registrar Requirements ............................................................................................................ 74 9.5. Hardware Requirements............................................................................................................... 74 9.5.1. Requirements for NFC Tokens................................................................................................ 74 9.5.2. Requirements for an NFC Device............................................................................................ 74 9.6. Firmware and Software Requirements ...................................................................................... 74 9.6.1. NFC Password Token................................................................................................................ 74 9.6.2. NFC Configuration Token........................................................................................................ 75 9.6.3. NFC Device ................................................................................................................................. 75 9.7. Informative: NFC Forum specifications..................................................................................... 75 9.7.1. NFC Data Exchange Format (NDEF)..................................................................................... 75 9.7.2. NDEF mapping documents ...................................................................................................... 76 10. PushButton Configuration............................................................................................77 10.1. Introduction ................................................................................................................................ 77 10.2. User Experience.......................................................................................................................... 77 10.3. PBC Technical Description ...................................................................................................... 78 10.4. User Feedback ............................................................................................................................ 81 10.5. PBC Security Considerations................................................................................................... 82 11. Data Element Definitions ..............................................................................................84 Wi-Fi Alliance Confidential Wi-Fi Protected Setup Specification Page 6 of 110 Version: 1.0h 12. Conclusion...................................................................................................................105 13. Appendix: Additional Setup Scenarios .......................................................................107 14. Appendix: Out-of-Band Channel Considerations ......................................................109


网友评论

  • 有知道官方文档如何下载吗? 下载地址 ?
  • 这个挺不错的,虽然是英文的
  • 不错,虽然是英文的,但这个资料正是我需要的.
  • 没用上,还是挺不错的
  • 不错,WIFI联盟的标准规范,正是我需要的。 不知道有没有中文版?
  • 不错,但是是1.0的协议,现在已经有2.0协议了。
  • 好东西,3分值了,顶楼主
  • 非常好,WPS资源不多
  • Wi-Fi Protected Setup Technical Specification 1.0,详细介绍了wps规范,值得一看。
  • 资料非常的不错,但是要积分,这个还是有点遗憾
  • 现在WPS 2.0已经出来了,建议更新
  • 非常好,正是我想要的内容。
  • 规范文档,很不错,唯一不好就是没有目录的书签,看起来不太方便
  • 极好地一份文档。赞
  • 资源是不错,就是要3分。能免费共享就完美了。
  • 不错。要是有这个就更好了:“IBSS with Wi-Fi Protected Setup Technical Specification v1.0.0”
  • 非常好,WPS资源不多,这个很好了
  • 非常不错,除了有点旧。但是毕竟是要花钱的嘛。谢谢啦。v1.0h - 2006 版本。
  • v1.0h - 2006 年版, 謝謝提供.
  • 资源还是不错的,但版本稍微老了点。谢谢!