WPA3 Specification v3.3
WPA3 Specification v3.3
Specification
Version 3.3
Updated to include Fast BSS Transition, Server Certificate Validation, WPA3-Personal only and
2.0 2019-12-20
transition mode definition, WPA3-Enterprise only and transition mode definition
Update to include SAE-PK, WIFI URI, Transition Disable indication, and Privacy Extension
3.0 2020-12-14
mechanisms
Update to Transition Disable indication section to clarify the use of the mechanism and to add a
3.1 2022-11-23
requirement prohibiting an AP from enabling Transition Disable indication by default.
Updates to STA AKM Preference Order, updates to Modes of operation for WPA3-Personal and
3.2 2023-12-18 WPA3-Enterprise, updates to Transition Disable Indication for AKM 24 and AKM 25, updates to
Authentication using SAE-PK for AKM 24 and AKM 25 and added section for MLD Security.
Updates to add section on AKM Constraints on Wi-Fi Alliance Generational PHYs and Bands, and
3.3 2024-02-16
clarify various requirements and terminology
Table of contents
1 INTRODUCTION .......................................................................................................................................................... 5
1.1 Scope ............................................................................................................................................................ 5
1.2 References .................................................................................................................................................... 5
1.3 Definitions and acronyms .............................................................................................................................. 6
1.3.1 Shall/should/may/might word usage ................................................................................................ 6
1.3.2 Conventions ..................................................................................................................................... 6
1.3.3 Definitions ........................................................................................................................................ 6
1.3.4 Abbreviations and acronyms ............................................................................................................ 7
2 REQUIREMENTS ON CONFIGURATION AND OPERATION OF WPA3-PERSONAL .............................................. 9
2.1 Modes of operation ....................................................................................................................................... 9
2.2 WPA3-Personal Only Mode .......................................................................................................................... 9
2.3 WPA3-Personal Transition Mode .................................................................................................................. 9
2.4 Additional Requirements on WPA3-Personal modes ................................................................................. 10
3 REQUIREMENTS ON CONFIGURATION AND OPERATION OF WPA3-ENTERPRISE ........................................ 11
3.1 Modes of operation ..................................................................................................................................... 11
3.2 WPA3-Enterprise Only Mode ...................................................................................................................... 11
3.3 WPA3-Enterprise Transition Mode ............................................................................................................. 11
3.4 Additional Requirements on WPA3-Enterprise modes ............................................................................... 11
3.5 WPA3-Enterprise 192-bit mode .................................................................................................................. 11
4 STA AKM SELECTION PREFERENCE ORDER ....................................................................................................... 13
4.1 Personal modes .......................................................................................................................................... 13
4.2 Enterprise modes ........................................................................................................................................ 13
5 SERVER CERTIFICATE VALIDATION ...................................................................................................................... 14
5.1 Failure Conditions for Server Certificate Validation .................................................................................... 14
5.2 Support for User Override of Server Certificate .......................................................................................... 14
5.3 Criteria to disable UOSC ............................................................................................................................. 14
5.3.1 TOD Policies .................................................................................................................................. 14
5.3.2 Additional Consideration on TOD Policies ..................................................................................... 15
6 SAE-PK ....................................................................................................................................................................... 16
6.1 Background ................................................................................................................................................. 16
6.2 SAE-PK overview ........................................................................................................................................ 16
6.3 Credential generation procedure ................................................................................................................ 17
6.4 Authentication using SAE-PK ..................................................................................................................... 18
6.5 SAE-PK Modes of operation ....................................................................................................................... 21
6.5.1 SAE-PK AP operation .................................................................................................................... 21
6.5.2 SAE-PK Password Format ............................................................................................................. 22
6.5.3 SAE-PK STA operation .................................................................................................................. 22
6.6 Security considerations ............................................................................................................................... 23
6.6.1 General .......................................................................................................................................... 23
6.6.2 Resistance to preimage attacks ..................................................................................................... 23
6.6.3 Resistance to downgrade .............................................................................................................. 24
6.7 SAE-PK element ......................................................................................................................................... 25
7 WIFI URI ..................................................................................................................................................................... 26
7.1 URI format ................................................................................................................................................... 26
7.2 WIFI URI device support ............................................................................................................................. 26
7.3 URI examples .............................................................................................................................................. 27
8 TRANSITION DISABLE .............................................................................................................................................. 28
8.1 Transition Disable Overview ....................................................................................................................... 28
8.2 Transition Disable Deployment Guide ........................................................................................................ 28
8.3 Transition Disable Requirements ................................................................................................................ 28
8.3.1 AP Requirements ........................................................................................................................... 28
8.3.2 STA Requirements ......................................................................................................................... 28
List of tables
Table 1. Abbreviations and acronyms ......................................................................................................................... 7
Table 2. Examples of average time required to find a second preimage.................................................................. 24
Table 3. SAE-PK element format .............................................................................................................................. 25
Table 4. Transition Disable KDE format .................................................................................................................... 29
Table 5. Transition Disable Bitmap field index values .............................................................................................. 29
1 Introduction
This document is the specification for the Wi-Fi CERTIFIED WPA3™ certification program and defines a subset of
functionality for WPA3™ devices that achieve Wi-Fi CERTIFIED WPA3 certification. Only devices that complete the
certification program test requirements for Wi-Fi CERTIFIED WPA3 shall be designated as Wi-Fi CERTIFIED WPA3.
1.1 Scope
The content of this specification addresses the solution requirements for the following features:
1.2 References
Knowledge of the documents listed in this section is required for understanding this specification. If a reference includes a
date or a version identifier, only that specific version of the document is required. If the listing includes neither a date nor a
version identifier, then the latest version of the document is required. In the event of a conflict between this specification
and the following referenced documents, the contents of this specification take precedence.
[1] IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local
and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications, 2020
[4] NIST SP 800-89, Recommendation for Obtaining Assurances for Digital Signature Applications,
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-89.pdf
[5] NIST SP 800-107 Revision 1, Recommendations for Applications using Approved Hash Functions,
https://csrc.nist.gov/publications/detail/sp/800-107/rev-1/final
[6] IETF RFC 4648, The Base16, Base32 and Base64 Data Encodings, https://tools.ietf.org/html/rfc4648
[7] IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax, https://tools.ietf.org/html/rfc3986
[9] IETF RFC 3279, Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile, https://tools.ietf.org/html/rfc3279
[13] IEEE 802.11-2020, Amendment 1: Enhancements for High-Efficiency WLAN, 2021 (IEEE Std. 802.11ax-2021)
[16] Wi-Fi Alliance Opportunistic Wireless Encryption Specification Version 1.1, https://www.wi-fi.org/file/opportunistic-
wireless-encryption-specification
1.3.2 Conventions
The ordering of bits and bytes in the fields within information elements, attributes and action frames shall follow the
conventions in Section 8.2.2 of IEEE Standard 802.11 [1] unless otherwise stated.
The word ignored shall be used to describe bits, bytes, fields or parameters whose values are not verified by the recipient.
The word reserved shall be used to describe objects (bits, bytes, or fields or their assigned values) whose usage and
interpretation will be defined in the future by this specification or by other specifications/bulletins. A reserved object shall
be set to zero unless otherwise stated. The recipient of a reserved object shall ignore its value unless that object becomes
defined at a later date. The sender of an object defined by this specification shall not use a reserved code value.
1.3.3 Definitions
Term Definition
Wi-Fi Enhanced Open Only Mode AP: operating a BSS configured to support Wi-Fi Enhanced Open connections but not using Wi-Fi
Enhanced Open Transition Mode to support (legacy) Open System authentication connections
STA: configured to connect to BSSs in a given network using Wi-Fi Enhanced Open but not using
(legacy) Open System authentication
Wi-Fi Enhanced Open Transition Mode AP: operating multiple BSSs (using OWE SSID and Open SSID, advertised in OWE Transition
Mode element) configured to support Wi-Fi Enhanced Open and non Wi-Fi Enhanced Open STAs
to connect to the same distribution system simultaneously
STA: configured to connect to BSSs in a given network using either Wi-Fi Enhanced Open or, if an
AP does not support Wi-Fi Enhanced Open, (legacy) Open System authentication
Term Definition
Network Profile The collection of credentials and allowed security parameters for a particular network name (SSID)
that a STA uses when connecting to any AP in that network.
WPA3-Enterprise 192-bit Mode AP: operating a BSS configured to support WPA3-Enterprise 192-bit connections, but not support
WPA3-Enterprise without 192-bit or WPA2-Enterprise connections
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Enterprise 192-bit
mode, but not WPA3-Enterprise without 192-bit or WPA2-Enterprise
WPA3-Enterprise Only Mode AP: operating a BSS configured to support WPA3-Enterprise connections but not support WPA2-
Enterprise connections
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Enterprise but not
WPA2-Enterprise
WPA3-Enterprise Transition Mode AP: operating a BSS configured to support WPA3-Enterprise and WPA2-Enterprise connections
simultaneously
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Enterprise or, if the
BSS does not support WPA3-Enterprise, WPA2-Enterprise
WPA3-Personal Only Mode AP: operating a BSS configured to support WPA3-Personal connections but not support WPA2-
Personal connections
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Personal but not
WPA2-Personal
WPA3-Personal SAE-PK Mode AP: operating a BSS configured to support WPA3-Personal with SAE-PK and WPA3-Personal
without SAE-PK connections simultaneously, but not support WPA2-Personal connections
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Personal with SAE-PK
(or, if the BSS does not support SAE-PK, without SAE-PK if allowed by local policy), but not WPA2-
Personal
WPA3-Personal Transition Mode AP: operating a BSS configured to support WPA3-Personal and WPA2-Personal connections
simultaneously
STA: configured to connect to BSSs in a given network (SSID) using WPA3-Personal or, if the BSS
does not support WPA3-Personal, WPA2-Personal
WPA3 STA A STA capable of operating in either WPA3-Personal or WPA3-Enterprise modes
Acronyms Definition
CN Common Name
Acronyms Definition
TOFU Trust-On-First-Use
2. A STA's Network Profile shall allow at least AKM suite selectors 00-0F-AC:2 and 00-0F-AC:8.
3. An AP's BSS configuration should enable AKM suite selector 00-0F-AC:6.
4. A STA's Network Profile shall allow AKM suite selector: 00-0F-AC:6.
5. An AP's BSS configuration shall be PMF Capable, i.e., AP sets MFPC to 1 and MFPR to 0 in beacons and probe
responses of the BSS.
6. A STA's Network Profile shall be PMF Capable, i.e., STA sets MFPC to 1 and MFPR to 0 in all (re)association
requests to APs in that network.
7. An AP shall reject an association for SAE if PMF is not negotiated for that association.
8. If a STA negotiates SAE when associating to an AP, A STA shall negotiate PMF.
9. An AP's BSS configuration should enable AKM suite selector 00-0F-AC:24.
A Wi-Fi 7 AP's BSS Configuration shall enable AKM suite selector 00-0F-AC:24.
If an AP implements AKM suite selector 00-0F-AC:24, the AP's BSS Configuration should enable AKM suite
selector 00-0F-AC:24.
10. A STA's Network Profile should allow AKM suite selector: 00-0F-AC:24.
A Wi-Fi 7 STA's Network Profile shall allow AKM suite selector 00-0F-AC:24.
If a STA implements AKM suite selector 00-0F-AC:24, the STA's Network Profile shall allow AKM suite selector
00-0F-AC:24.
1. An AP's BSS configuration shall enable AKM suite selector 00-0F-AC:12 (Suite B 192b) and shall not enable any
other AKM suite selector.
Note: WPA3-Enterprise 192-bit mode does not interoperate with any other security mode.
2. A STA's Network Profile shall allow AKM suite selector 00-0F-AC:12 (Suite B 192b) and shall not allow any other
AKM suite selector.
3. An AP's BSS configuration shall be PMF Required, i.e., AP sets MFPC to 1 and MFPR to 1 in beacons and probe
responses of the BSS.
4. A STA's Network Profile shall be PMF Required, i.e., STA sets MFPC to 1 and MFPR to 1 in all (re)association
requests to APs in that network.
5. Permitted EAP cipher suites for use with WPA3-Enterprise 192-bit mode are:
▪ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- ECDHE and ECDSA using the 384-bit prime modulus curve P-384
▪ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- ECDHE using the 384-bit prime modulus curve P-384
- RSA ≥ 3072-bit modulus
▪ TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
- RSA ≥ 3072-bit modulus
- DHE ≥ 3072-bit modulus
• TOD-STRICT: "1.3.6.1.4.1.40808.1.3.1"
• TOD-TOFU: "1.3.6.1.4.1.40808.1.3.2"
2. The STA is using configured EAP credentials for the EAP exchange that include an explicitly configured server
certificate, and that configured certificate includes the TOD-STRICT or TOD-TOFU policy OID.
3. The certificate in the received Server Certificate message contains the TOD-STRICT policy OID.
In the first two conditions above, the STA typically selects the EAP credential configuration (aka network profile) to be
used for the EAP exchange based on the network SSID or Interworking parameters (e.g., Home Realm, Roaming
Consortium). The two conditions above apply to the selected configured EAP credentials irrespective of the values of the
attributes in the received Server Certificate message (e.g., irrespective of whether or not the dNSName or CN matches a
domain name specified in the selected EAP credentials).
All three conditions above apply to the TOD-STRICT policy. Therefore, the TOD-STRICT policy disallows UOSC in all
EAP exchanges with the network, including first-use connection to that network. This policy might, for example, be used to
help enforce user behavior to obtain EAP credentials via a trusted out-of-band mechanism.
Only the first two conditions above apply to the TOD-TOFU policy. Therefore, the TOD-TOFU policy does not disallow
UOSC in scenarios where neither of those two conditions apply, such as first-use connection to a network without pre-
configured credentials. This policy might, for example, be used to allow UOSC for Trust-On-First-Use (TOFU), while
helping avoid users inadvertently accepting trust via UOSC in an adversary's certificate in subsequent connections to the
network.
6 SAE-PK
6.1 Background
Some public Wi-Fi networks use a group-level password for link-layer authentication. A password can be conveniently
distributed to a group of users in various scenarios, e.g., displayed on public signage, distributed in written materials, or
even verbally exchanged if necessary. Users are familiar with reading a password, sometimes from a distance, and
entering it into their personal client devices.
The deployment and provisioning of a Wi-Fi network using a group-level password is straightforward and is attractive in
use cases where the technical skill, infrastructure, and maintenance that would be required to deploy strong
authentication using, for example, a preinstalled PKI trust root, provisioned certificates, or unique per-user secret
credentials is not available.
The password is usually intended to provide, at a minimum, a simple means of (group-level) network access control.
Depending on the use case, the size of the user group to which the password is distributed might be large, there might be
no mutual trust relationship between users in the group, and the secrecy of the password from third parties outside the
intended group might be only weakly protected. Therefore, in many such deployments, it is not difficult for a potential
adversary to gain knowledge of the password.
Authentication between an AP and a STA using a regular password as a symmetric credential is vulnerable to insider
impersonation attack - i.e., an adversary with knowledge of the password can launch a man-in-the-middle attack on client
STAs by impersonating an AP. This is sometimes known as an "evil twin AP" attack. The tools required to enable such
attacks are becoming more sophisticated and easier to obtain. Once a client STA connects to the adversary's AP, the
adversary is able to inspect, modify, and forge any data exchanged with the client STA.
SAE Public Key (SAE-PK) authentication is an extension of SAE that is intended for use cases where authentication is
based on a password that might be distributed to or obtained by a potential adversary. With SAE-PK, the AP in an
infrastructure network is additionally authenticated based on a static public/private key pair, in order to provide protection
against impersonation attacks as described above.
The SAE-PK password is set equal to a representation of a fingerprint of the AP's public key, and therefore serves both as
a secret by which the AP authenticates STAs for network access, and also as a means to bootstrap trust in the AP's static
public key for STAs to authenticate the AP. There is some (parameterized) trade-off between the security of the public key
fingerprint and the convenience of using a password of moderate length.
the AP's public key prepended by the SSID (to mitigate rainbow preimage attacks) and a 16-octet Modifier value. The
Modifier is found randomly by one-time brute-force search (when the password is initially generated) and is a value that
results in the first 8*Sec bits of the fingerprint being equal to zero. This allows a fingerprint of effective length (8*Sec +
19*λ/4 - 5)-bits to be represented in only 5λ bits (where base32 encoding results in a λ-character password excluding
separators), using λ/4 bits to redundantly encode Sec and one of the characters (5 bits) for the checksum. Further details
and recommendations for these values are found in Section 6.6.2.
• L(S, F, N) is the function that extracts bits F to F+N–1 of the bit string S starting from the left
• Hash() is the function implementing the hash algorithm defined in Table 12-1 of [1], depending on the length of
the AP's public key K_AP, using the ECC column for the prime length of ECDSA keys
• Advertise one or more SAE AKMs in RSNE of Beacon and Probe Response frames
© 2024 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 18 of 35
WPA3™ Specification v3.3
• Advertise support for SAE-PK by setting the SAE-PK bit (6) to 1 in RSNXE (which is sent in Beacon, Probe
Response, and certain other frames as defined in [1])
• Use SAE-PK with a peer STA that indicates SAE_PK status code in its SAE Commit message.
• Use one or more SAE passwords generated using the SAE-PK credential generation procedure defined in
Section 6.3
When SAE-PK is used, the key derivation from keyseed and context (as defined in 12.4.5.4 of [1]) is expanded to
additionally derive a Q-bit KEK, as follows:
Length = 2Q + PMK_bits
kck_pmk_kek = KDF-Hash-Length(keyseed, “SAE-PK keys”, context)
KCK = L(kck_ pmk_kek, 0, Q)
PMK = L(kck_pmk_kek, Q, PMK_bits)
KEK = L(kck_pmk_kek, Q+PMK_bits, Q)
where:
• Q is the length of the digest of the hash function H() depending on the SAE group, as defined in 12.4.2 of [1]
• PMK_bits is the length of the PMK in bits, e.g., 256 for AKM suite selectors 00-0F-AC:8 and 00-0F-AC:9, or equal
to Q for AKM suite selectors 00-0F-AC:24 and 00-0F-AC:25
NOTE: The KCK and KEK above are unrelated to the EAPOL-Key KCK and KEK obtained from the PTK in a subsequent
4-way handshake.
When SAE-PK is used, an AP that supports SAE-PK that sends an SAE Confirm message with status of Success shall
include an SAE-PK element (as defined in Section 6.7), a FILS Public Key element and a FILS Key Confirmation element
in the Authentication frame, where:
• The EncryptedModifier field of the SAE-PK element contains the output of the AES-SIV-Q algorithm, where Q ∈
{256, 384, 512} is as defined above and KEK is the key. The plaintext passed to the AEAD algorithm is the 16-
octet Modifier M, with no AAD
• The FILS Public Key field of the FILS Public Key element (as defined in [1]) contains the AP's public key K_AP
(represented as the DER of ASN.1 SubjectPublicKeyInfo), and the Key Type field is set to 2 (for ECDSA, encoded
according to RFC 5480 [8])
• The KeyAuth field of the FILS Key Confirmation element (as defined in [1]) is set equal to:
KeyAuth = Sig_AP(eleAP || eleSTA || scaAP || scaSTA || M || K_AP || AP-MAC || STA-MAC)
where:
• Sig_AP() is a function that generates the digital signature of the hash of the input using the AP's private key k_AP
(see Section 6.3). The hash algorithm depends on the prime length of the AP's public key K_AP, and is the same
as the hash function Hash() defined in Section 6.3. The form of signature is as defined in ISO/IEC 14888-3 for
ECDSA, and the signature value is encoded as DER of ASN.1 according to RFC 5480 [8] and RFC 3279 [9]. A
constant-time algorithm shall be used to generate the digital signature. The ASN.1 representation for an ECDSA
signature value is as follows:
Ecdsa-Sig-Value ::= SEQUENCE {
r INTEGER,
s INTEGER }
• eleAP and eleSTA are equal to the SAE element sent by the AP and STA, respectively, in the current
authentication sequence, converted to octet strings per 12.4.7.4 (Encoding and decoding of SAE Commit
messages) of [1]
• scaAP and scaSTA are equal to the SAE scalar sent by the AP and STA, respectively, in the current
authentication sequence, converted to octet strings per 12.4.7.4 (Encoding and decoding of SAE Commit
messages) of [1]
• M and K_AP are the Modifier and AP public key, respectively, as defined in Section 6.3. M and K_AP are
identified by the SAE Password Identifier, if negotiated during the SAE Commit exchange
• AP-MAC and STA-MAC are the MAC addresses of the AP and STA, respectively. Between two MLDs, they are
the MLD MAC addresses.
If required, the FILS Public Key and FILS Key Confirmation elements are fragmented per 10.28.11 (Element
Fragmentation) of [1]. The FILS Public Key element (and any associated Fragment elements) and FILS Key Confirmation
element (and any associated Fragment elements) appear, in that order, immediately prior to all Vendor Specific elements
(including the SAE-PK element) in the Authentication frame.
If a STA that supports SAE-PK in "Confirmed" state is using SAE-PK and receives an SAE Confirm message then, per
12.4.8.6.5 of [1], it processes the SAE Confirm message in accordance with 12.4.5.6 of [1]. If this processing is successful
and the SAE Confirm message is verified, then, prior to proceeding further, the STA shall verify an SAE-PK element, FILS
Public Key element, and FILS Key Confirmation element are also present in the Authentication frame, unwrap the
Modifier, validate the public key, verify the signature and complete authentication per the following steps:
1. Unwrapping
• The STA attempts to unwrap the Modifier in the SAE-PK element using the KEK
2. Public key validation
• If the STA has a stored trusted public key that corresponds to the same SSID, password, and (if used) password
identifier (e.g., from scanning a QR code containing SAE-PK password and public key, or from a previous
successful authentication):
▪ If the public key K_AP in the FILS Public Key element matches the stored key, the STA determines that K_AP
is trusted; else (i.e., if it does not match, or a valid public key could not be parsed) it determines that K_AP is
not trusted
• Otherwise (i.e., if the STA does not have a corresponding stored trusted public key), the STA calculates the
expected (8*Sec + 19*λ/4 - 5)-bit fingerprint Fingerprint_Expected from the configured Password as defined
below, and generates Fingerprint of the unwrapped Modifier and public key K_AP (from the FILS Public Key
element) as defined in Section 6.3. If they exactly match, the STA determines that K_AP is trusted; else it
determines K_AP is not trusted:
▪ PasswordBase || ChkSum = RemSeparators(Password)
▪ λ = Len(Password) - Floor(Len(Password) / 5))
▪ PW = Base32d(PasswordBase)
▪ Sec is 3 when L(PW, 0, 1) is equal to 1, or is 5 when L(PW, 0, 1) is equal to 0
▪ Fingerprint_Expected = 0^(8*Sec) || F(0) || F(1) || … || F(λ/4-1)
where:
▪ Password is identified by the SAE Password Identifier, if negotiated during the SAE Commit exchange
▪ RemSeparators() is the function that removes a hyphen character (ASCII 0x2D) every fifth character of the
US-ASCII input string
▪ Len() is the function returning the length of the input string in characters
▪ Floor() is the function defined in 1.5 of [1]
▪ Base32d() is the base32 decoding function, outputting 5λ bits
▪ 0^(8*Sec) is the bit string comprising Sec octets of the value zero
▪ When i< (λ/4-1), F(i) = L(PW, 20*i+1, 19)
▪ When i=(λ/4-1), F(i) = L(PW, 20*i+1, 14)
NOTE: The length of the output of the base32 decoding function is not in general an integer number of octets. An
implementation might need to pad the input and correctly truncate the output so that a λ-character input always
results in a 5λ-bit output.
NOTE: Per Section 6.5.3, a password that is not in the correct form for SAE-PK (including a valid checksum
character, and consistency of redundant Sec encoding) is not used in the SAE-PK authentication exchange.
3. Signature verification
• If the STA has successfully validated trust in the public key K_AP, the STA attempts to verify the digital signature
in the FILS Key Confirmation element using K_AP. The digital signature verification procedure is as defined in
ISO/IEC 14888-3 for ECDSA, where the hash algorithm and input data are specified in the definition of Sig_AP()
above
4. Authentication confirmation
• If the STA has successfully validated trust in the public key K_AP, and successfully verified the signature in the
FILS Key Confirmation element, and the SAE Confirm message was successfully verified, then the STA should
store the trusted public key (if not already stored), and shall proceed per 12.4.8.6.5 of [1], resulting in transition to
"Accepted" state. Otherwise (i.e., if the SAE-PK element, FILS Public Key element, or FILS Key Confirmation
element were absent or invalid, or public key validation failed, or signature verification failed, or the SAE Confirm
message was not verified), the STA shall remain in "Confirmed" state
NOTE: If a client STA is reconfigured with a new password for a given network, any stored trusted public key for that
network pertaining to the old password might no longer be valid and so should be deleted.
When the STA performs (re)association using SAE-PK, it shall include RSNXE with SAE-PK bit (6) set to 1 in the
(Re)Association Request frame.
• WEP
• TKIP
• PSK AKM
• SAE AKM without SAE-PK
NOTE: A PMK derived using SAE-PK can be used with PMKSA caching using the same PMKSA caching association
exchanges as when a PMK derived using regular SAE authentication is used. An (M)PMK derived using SAE-PK (during
FT Initial Mobility Domain Association) can be used for FT authentication using the same FT key hierarchy derivation and
FT authentication exchanges as when an (M)PMK derived using regular SAE authentication is used.
• The password is configured for use with PSK AKM on a BSS that has SAE-PK enabled, and has a value that is
not equal to the value of an SAE-PK Password Format (with corresponding key pair and modifier) configured for
use with SAE AKM (in dot11RSNAConfigPasswordValueTable) on the same BSS
• The password is configured for use with SAE AKM (in dot11RSNAConfigPasswordValueTable) on a BSS that has
SAE-PK enabled, and does not have a corresponding SAE-PK key pair and modifier configured
An AP that supports SAE-PK shall support the Transition Disable mechanism defined in Section 8. The AP should, by
default, indicate Transition Disable for SAE-PK when SAE-PK authentication is performed.
NOTE: If an AP that supports SAE-PK does not indicate Transition Disable for SAE-PK, STAs that are not explicitly
configured to only use SAE-PK remain vulnerable to downgrade attack even after first connection to the network, as
described in Section 6.6.3. It is strongly recommended that APs indicate Transition Disable for SAE-PK when SAE-PK
authentication is performed, if all APs in the network support SAE-PK. This recommendation also applies even if only a
subset of the APs in the network support SAE-PK, unless the coverage area of that subset of APs would be insufficient. If
the QR-code representation of SAE-PK credentials is used, the "trdisable" attribute should be specified accordingly (see
Section 7).
• Every fifth octet in the octet string of the password is equal to 0x2D (ASCII hyphen)
• All other octets correspond to values in the base32 lowercase US-ASCII alphabet
• The number of base32 characters (λ) is at least 12, and an integer multiple of 4
• The MSBs corresponding to the i=(4*n+1)th base32 characters have the same value for all integer values of n
between 0 and λ/4-1
• The λth (i.e., final) base32 character is a valid checksum character for the preceding base32 characters per the
Verhoeff algorithm as defined in Section 6.3
• If the password is not in the correct SAE-PK Password Format, but the STA has identified at least one AP in the
network that advertises "SAE-PK Passwords Used Exclusively” bit set to one:
▪ Confirm with the user that the password is correctly entered, before using it with any other (non-SAE-PK)
authentication protocol allowed by the configured mode of operation
• If the password is in the correct SAE-PK Password Format:
▪ Enable SAE-PK by default for that Network Profile
NOTE: If a STA that supports SAE-PK identifies a network for which all SAE and PSK passwords in use are SAE-PK
passwords (i.e., where at least one AP sets the "SAE-PK Passwords Used Exclusively" bit to 1), and the STA provides a
UI for manual input of passwords, the STA implementation can assist manual entry by, for example, rejecting or auto-
correcting invalid characters (that are not in the base32 character set or are in uppercase) and pre-populating hyphen
separator characters (ASCII 0x2D) every fifth non-trailing character.
A STA that supports SAE-PK shall support the Transition Disable mechanism defined in Section 8.
NOTE: If a STA that supports SAE-PK receives Transition Disable indication for SAE-PK, the STA uses WPA3-Personal
SAE-PK Only Mode for the corresponding network (see Section 6.5).
When a STA has SAE-PK enabled for a Network Profile, and is selecting between discovered APs in that Network Profile
(SSID) that it considers suitable candidates for association, it shall attempt to authenticate with an AP that advertises
support for SAE-PK, before attempting to authenticate with any AP that is not advertising support for SAE-PK.
NOTE: How a STA determines whether an AP is a suitable candidate for association is out of scope of this specification.
A STA might determine that an AP is not suitable if it predicts an acceptable level of link quality will not be achieved.
There is a trade-off between the second preimage security strength and the effective fingerprint length, which depends on
the password length (λ characters, excluded separators) and the value of Sec (where larger values of Sec require more
computation resources to find a value of Modifier on initial credential generation).
In order to launch such an attack, an adversary with its own public key pair would need to find a value for Modifier for
which the fingerprint is identical to that represented in the password. A conventional (non-quantum) brute-force attack
would require an average of 2^S trials, where S = 8*Sec + 19*λ/4 - 5 is the length of the truncated hash fingerprint, and is
equal to the preimage strength (see [5]).
The feasibility of a second preimage attack depends both on the time and monetary cost required to execute the attack.
Assuming integrity of the password, the average time required for an adversary using (for example) a high-speed
accelerated "hash miner" capable of 50 TeraHashes/sec to find a Modifier value by brute-force search that results in a
second preimage of the fingerprint, for various combinations of λ and Sec, is shown in Table 2. There is a small probability
that the adversary can find a second preimage in much less than the average time. The average time required might be
substantially reduced using a faster hash miner, e.g., with additional parallelization of local or cloud-based compute
resources comprising ASICs with a very large number of cores. The monetary cost of the attack (including cost of
consumed power) scales with the number of trials required.
Table 2. Examples of average time required to find a second preimage
λ Sec S Average time required to find a
second preimage at 50 TH/sec
(years)
12 3 76 48
12 5 92 3.1 million
16 3 95 25.1 million
Passwords with the lowest supported security strength (λ=12, Sec=3) are attractive in terms of usability (shorter
password) and deployment (short time required to generate the password). However, in the case of network deployments
with stronger security requirements, it is recommended that passwords with security strength of at least S=92 bits are
used.
NOTE: If a STA has stored the full (trusted) AP public key - either following successful authentication to the network using
SAE-PK or by being provisioned using the QR code - a preimage attack on that STA on subsequent authentication does
not apply since the STA will verify that the full AP public key matches.
adversary blocks or manipulates frames to prevent successful connection to the genuine network, or if the user inputs an
incorrect password containing typos that are predictable by the adversary (e.g., omitted hyphen separators) or that has
been maliciously modified (see Section 6.6.1).
Similarly, if a network had previously been using a non-SAE-PK password and is subsequently reconfigured to enable
SAE-PK with a new SAE-PK password, STAs that had previously connected to the network with the old password might
retain a profile containing that password. If the user does not update the profile with the new SAE-PK password, the STA
might connect to an adversary's AP that is configured with the old password.
A STA that does not support SAE-PK does not have protection against downgrade attack when connecting to an SAE-PK
network. In addition, a legacy STA that does not support SAE (and, therefore, uses PSK) does not have meaningful
confidentiality or integrity protection against an adversary that knows the password.
OUI 3 0x50-6F-9A Wi-Fi Alliance specific OUI (refer to sub-clause 9.4.1.31 of [1])
OUI Type 1 0x1F Identifying the type and version of the SAE-PK element
7 WIFI URI
This section defines the URI representation for Wi-Fi credentials using the "WIFI" URI scheme. The URI can be encoded
in a QR code to provide a convenient means to provisioning the credentials to devices.
In this version of the specification, the URI supports provisioning of credentials for Wi-Fi networks using password-based
authentication, and for unauthenticated (open and Wi-Fi Enhanced Open™ [16]) Wi-Fi networks.
If the "type" is present, its value is set to "WPA" and it indicates password-based authentication is used.
If the "type" is absent, it indicates an unauthenticated network (open or Wi-Fi Enhanced Open).
NOTE: This specification does not define usage of the WIFI URI with WEP shared key.
The value of "trdisable", if present, is set to a hexadecimal representation of the Transition Disable bitmap field (defined in
Section 8).
NOTE: "trdisable" allows transition modes to be disabled at initial configuration of a network profile, and therefore provides
protection against downgrade attack on a first connection (e.g., before a Transition Disable indication is received from an
AP).
The values of "ssid", "password", and "id" are, in general, octet strings. Octets that do not correspond to characters in the
printable set defined in this ABNF rule are percent-encoded.
NOTE: The semi-colon is excluded from the printable set as defined in this ABNF rule, and therefore is percent-encoded.
NOTE: When the password is used with WPA2-Personal (including WPA3-Personal Transition Mode), it comprises only
ASCII-encoded characters. When the password is used with only SAE, it comprises octets with arbitrary values. The SAE
password identifier is a UTF-8 string.
Devices parsing this URI shall ignore semicolon separated components that they do not recognize in the WIFI-qr
instantiation. Ignoring unknown components allows devices to be forward compatible with future extensions to this
specification
If the URI does not contain Transition Disable indication, the STA should by default enable algorithms in the configured
network profile corresponding to the transition modes that are supported by the STA (e.g., WPA3-Personal Transition
Mode when a password is specified, or Wi-Fi Enhanced Open Transition Mode when no password is specified).
8 Transition Disable
8.1 Transition Disable Overview
Transition Disable is an indication from an AP to a STA, that the STA is to not allow certain security parameters in the
STA's Network Profile (such that the Network Profile is no longer configured in certain transition modes) for subsequent
(re)associations to the AP's network.
A Network Profile configured on a STA might be configured in certain transition modes (possibly also with other legacy
security algorithms enabled). For example, a WPA3-Personal STA implementation might have a Network Profile
configured in WPA3-Personal Transition Mode by default, which enables a legacy PSK algorithm. However, at such time
that (all) BSSs in the network have WPA3-Personal enabled, APs in, that network can use the Transition Disable
indication to cause the STA to reconfigure its Network Profile to WPA3-Personal Only Mode, and therefore provide
protection against subsequent downgrade attacks.
OUI 3 0x50-6F-9A Wi-Fi Alliance specific OUI (refer to sub-clause 9.4.1.31 of [1])
OUI Type 1 0x20 Identifying the type and version of the Transition Disable KDE
Transition Disable Bitmap Variable Variable Bit field indicating transition modes (see Table 5).
0 WPA3-Personal AKM suite selector 00-0F-AC:8 (SAE) or 00-0F- All PSK and FT over PSK AKM suite selectors (i.e., 00-0F-
Only AC:24 (SAE using group-dependent hash) AC:2, 00-0F-AC:4. 00-0F-AC:6, 00-0F-AC:19 and 00-0F-
AC:20)
1 SAE-PK Only AKM suite selectors 00-0F-AC:8 or 00-0F-AC:24 All SAE and FT over SAE AKM suite selectors when not using
when using SAE-PK SAE-PK (i.e., 00-0F-AC:8, 00-0F-AC:9, 00-0F-AC:24, 00-0F-
AC:25)
All PSK and FT over PSK AKM suite selectors
2 WPA3-Enterprise AKM suite selector 00-0F-AC:5 (IEEE 802.1X using AKM suite selector 00-0F-AC:1 (IEEE 802.1X using SHA-1)
SHA-256)
3 Wi-Fi Enhanced AKM suite selector 00-0F-AC:18 (OWE) Open system authentication without encryption
Open
A STA shall follow the scrambler seed procedures defined in Section 12.2.10 of [1] when changing its MAC address to a
new random address.
9.4 GAS
GAS queries reveal the existence of a STA in the environment. The dialog token is a predictable identifier that can lead to
user identification in every location the client sends GAS queries, regardless of a randomized MAC address.
A STA shall use a randomized dialog token for every new GAS exchange.
10 MLD security
For the (Re)Association Request frame sent by a non-AP MLD to an AP MLD:
• The A2 field shall be the same as the A2 field of the latest Authentication frame(s) sent from the non-AP MLD to
the AP MLD that leads to a successful authentication to set the state to State 2
• The A1 field shall be the same as the A1 field of the latest Authentication frame(s) sent from the non-AP MLD to
the AP MLD that leads to a successful authentication to set the state to State 2
NOTE: If non-AP MLD has performed a successful authentication beforehand with an AP MLD to save time for the later
association, and the non-AP MLD cannot transmit to the AP affiliated with the AP MLD that responds to the Authentication
frame sent from the non-AP MLD that leads to successful authentication (for example, due to the reason that AP MLD
removes the affiliated AP), then the non-AP MLD might initiate another authentication exchange with AP MLD through any
AP affiliated with the AP MLD using PMKSA caching.
• The AP's BSS configuration shall not allow any PSK AKM or 802.1X SHA-1 AKM to be used in an association that
negotiates use of EHT or MLO
NOTE: The AP's BSS configuration is still allowed to advertise these AKMs and might still enable these AKMs for
backwards interoperability with STAs in an association that does not negotiate use of EHT nor MLO.
• The AP's BSS configuration shall not enable legacy open
NOTE: Wi-Fi Enhanced Open might be used for unauthenticated access with EHT or MLO.
• The AP's BSS configuration shall not allow Wi-Fi Enhanced Open Transition Mode (i.e., where the OWE
Transition Mode element is included in Beacons and Probe responses).
When a STA associates to an AP with EHT or MLO enabled, the STA shall abide by the constraints defined in subclause
12.12.3 of [13] and additionally:
• The STA shall not negotiate any PSK AKM or 802.1X SHA-1 AKM in an association that negotiates use of EHT or
MLO
NOTE: If the AP does not advertise any AKM that would be allowed with EHT or MLO, the STA might associate
with EHT and MLO disabled (i.e., fall back to Wi-Fi 6 functionality and select one of the advertised AKMs).
• The STA shall not allow Open System authentication without encryption in an association that negotiates use of
EHT or MLO
• Untrusted root CA: Warning: Attackers might be trying to steal your information (for example, passwords,
messages, or credit cards). Authentication of the Wi-Fi® network "Wi-Fi" failed because the Certificate Authority
that signed the network's certificate is not trusted by this device. Do not accept trust in this network unless you
have verified the certificate's SHA-1 fingerprint "4e 7d e4 cd e8 5f 32 60 d6 fc 32 4d 0d 30 07 f7 bd 2d 14 17"
presented by the network with your network administrator or service provider
• Trusted root CA but host name mismatch: Warning: Attackers might be trying to steal your information (for
example, passwords, messages, or credit cards). Authentication of the Wi-Fi network "Wi-Fi" failed because the
host name configured on this device does not match the host name presented by the network. Do not accept trust
in this network unless you have verified the host name "server1.wi_fi" presented by the network with your network
administrator or service provider
• Trusted public root CA (in trust store) but no host name configuration: Warning: Attackers might be trying to steal
your information (for example, passwords, messages, or credit cards). Authentication of the Wi-Fi network "Wi-Fi"
failed because this device is not configured with a host name for the network. Do not accept trust in this network
unless you have verified the host name "server.operator.org" presented by the network with your network
administrator or service provider