Home Page

WiFi Protected Setup - Download




About WiFi Protected Setup

WiFi Protected Setup supports development of a patch for the wpa_supplicant adding configuration via WiFi Protected Setup.

The goal of Wi-Fi Protected Setup (WPS) is to automate the creation of a secure wireless network. The protocol removes the need for users to understand what a SSID is or the difference between WEP, WPA, and WPA2 and their associated ciphers. Essentially, the protocol automatically creates the network blocks specified by the wpa_supplicant's configuration file. As such, the user typically only needs to run the WPS protocol once for each AP.
In WPS's simplest topology, there are two participants: the registrar and the enrollee. The registrar has the authority to issue and revoke credentials on the network. Typically, but not always, this is the access point. The enrollee, on the other hand, is the device seeking to join the wireless network. The purpose of the WPS patch is to add the enrollee function to the 0.5.x version of the wpa_supplicant.
WPS Methods
Before you can configure the supplicant, it is helpful to understand the two supported configuration methods: Push Button Control (PBC) and PIN. Both methods accomplish the same goal, but provide different levels security and ease of use. The PBC method is the simpler of the two. In this method, the user pushes a button on the registrar (usually the AP) and a button on the enrollee (a laptop, cell phone, etc). The protocol then takes care of connecting to the correct AP and retrieving the
encryption settings.
The advantage of PBC is a very simple user interface, but there are a few issues:
• The user must push both buttons within two minutes of each other. WPS refers to this time
period as the "walk time".
• Only one enrollee can use the PBC method at a time. The second enrollee using PBC will
receive an error message and can either elect to wait until the other enrollee is done or use
the PIN method without waiting. Note that this restriction is across all detected SSID and
BSSID on all channels.
• The method is unauthenticated and does not protect against active attacks
The PIN method requires the user to retrieve a PIN number from the enrollee and enter it into the
registrar either via a key pad or, more likely, through a web based interface. The user then notifies
the enrollee that the registrar has accepted the PIN and can proceed with connection. This method is
slightly more involved than PBC, but is no more complicated than getting money from a bank's cash
machine.



Previous Versions

Here you can find the changelog of WiFi Protected Setup since it was posted on our website on 2015-04-28 03:00:00. The latest version is and it was updated on 2024-03-19 19:19:22. See below the changes in each version.

WiFi Protected Setup version wps-20091211_00
Updated At: 2009-12-12
Changes: Several fixes and updates
WiFi Protected Setup version wps-20091211_00
Updated At: 2009-12-12


Related Apps

Here you can find apps that are similar with WiFi Protected Setup.



Disclaimer

External Download


We do not host WiFi Protected Setup on our servers. We did not scan it for viruses, adware, spyware or other type of malware. This app is hosted by the software publisher and passed their terms and conditions to be listed there. We recommend caution when installing it.

The external download link for WiFi Protected Setup is provided to you by apps112.com without any warranties, representations or guarantees of any kind, so access it at your own risk.

If you have questions regarding this particular app contact the publisher directly. For questions about the functionalities of apps112.com contact us.

BarCode2D-PNG


Click stars to rate this APP!

Users Rating:  
  3.9/5     99
Downloads: 14473
Updated At: 2024-03-19 19:19:22
Publisher: ctuffli
Operating System: Mac,windows,linux
License Type: Free