WPA3 and Wi-Fi Enhanced Open Deployment Guide - v1.0
WPA3 and Wi-Fi Enhanced Open Deployment Guide - v1.0
Table of contents
1 INTRODUCTION .......................................................................................................................................................... 5
1.1 Reference documents ................................................................................................................................... 5
1.2 Definitions ..................................................................................................................................................... 5
1.2.1 Abbreviations and acronyms ............................................................................................................ 5
2 SECURITY MODE REQUIREMENTS AND RECOMMENDATIONS .......................................................................... 7
2.1 Introduction ................................................................................................................................................... 7
2.1.1 Overview .......................................................................................................................................... 7
2.1.2 Role of transition modes ................................................................................................................ 11
2.1.3 Interpretation of requirements and recommendations ................................................................... 11
2.2 Common security configuration for all WPA3 and Wi-Fi Enhanced Open modes ...................................... 12
2.3 WPA3-Personal Transition Mode ................................................................................................................ 13
2.4 WPA3-Personal Only Mode ........................................................................................................................ 14
2.5 WPA3-Personal SAE-PK Transition Mode ................................................................................................. 15
2.6 WPA3-Personal SAE-PK Only Mode .......................................................................................................... 16
2.7 WPA3-Enterprise Transition Mode ............................................................................................................. 16
2.8 WPA3-Enterprise Only Mode ...................................................................................................................... 17
2.9 WPA3-Enterprise 192-bit Mode .................................................................................................................. 18
2.10 Wi-Fi Enhanced Open Transition Mode ...................................................................................................... 19
2.11 Wi-Fi Enhanced Open Only Mode .............................................................................................................. 21
3 DEPLOYMENT AND IMPLEMENTATION RECOMMENDATIONS........................................................................... 22
3.1 Default requirements and recommendations .............................................................................................. 22
3.1.1 WPA3-Personal.............................................................................................................................. 22
3.1.2 WPA3-Enterprise ........................................................................................................................... 23
3.1.3 Wi-Fi Enhanced Open .................................................................................................................... 23
3.1.4 General .......................................................................................................................................... 24
3.2 Troubleshooting and resolving issues with legacy client connectivity to WPA3-Personal networks .......... 25
3.2.1 Dual-SSID WPA3-Personal configuration for legacy STA interoperability .................................... 25
3.3 Considerations to maximize Wi-Fi network security ................................................................................... 26
3.3.1 WPA3-Enterprise Server Certificate Validation policies ................................................................ 27
3.3.2 Transition Disable indication .......................................................................................................... 27
3.3.3 Dual-SSID alternative to WPA3-Personal transition mode for additional security protection ........ 27
3.3.4 STA isolation and filtering .............................................................................................................. 29
3.3.5 Wireless Protected Setup and Wi-Fi Easy Connect with WPA3 modes ........................................ 29
3.3.6 WPA3-Personal password selection considerations ..................................................................... 29
3.3.7 WPA3-Personal AP denial-of-service protection ........................................................................... 30
3.3.8 SAE Group downgrade protection ................................................................................................. 30
3.3.9 Protections against A-MSDU flag manipulation attacks ................................................................ 31
APPENDIX A EXAMPLE AP CONFIGURATIONS ............................................................................................... 32
A.1 Example tri-band AP configuration using WPA3-Personal Transition Mode .............................................. 32
A.2 Example tri-band AP configuration using WPA3-Enterprise Transition Mode ............................................ 32
A.3 Example tri-band AP configuration using Wi-Fi Enhanced Open Transition Mode .................................... 32
A.4 Example tri-band AP configuration using Dual-SSID Wi-Fi Enhanced Open ............................................. 33
A.5 Example tri-band Dual-SSID WPA3-Personal configuration for legacy STA interoperability ..................... 34
List of tables
Table 1. Definitions ..................................................................................................................................................... 5
Table 2. Abbreviations and acronyms ......................................................................................................................... 5
Table 3. Security configuration parameters ................................................................................................................ 7
Table 4. Common security configuration for all WPA3 and Wi-Fi Enhanced Open modes ...................................... 12
Table 5. WPA3-Personal Transition Mode security configuration ............................................................................ 13
List of figures
Figure 1. Example tri-band AP configuration using WPA3-Personal Transition Mode .............................................. 32
Figure 2. Example tri-band AP configuration using WPA3-Enterprise Transition Mode ............................................ 32
Figure 3. Example tri-band AP configuration using Wi-Fi Enhanced Open Transition Mode .................................... 33
Figure 4. Example tri-band AP configuration using Dual-SSID Wi-Fi Enhanced Open ............................................. 33
Figure 5. Example tri-band Dual-SSID WPA3-Personal configuration for legacy STA interoperability ..................... 34
1 Introduction
This document provides guidelines and recommended best practices for deployment of Wi-Fi CERTIFIED WPA3™ and
Wi-Fi Enhanced Open™ devices. The guidelines in this document are not mandatory for equipment certification unless
specified in the WPA3 Specification [1] and Opportunistic Wireless Encryption Specification [3]; however, their use will
contribute toward realizing maximum benefit from certified equipment.
[2] IEEE 802.11-REVme/D5.0 "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications", February 2024
[4] IEEE 802.11be/D5.0 "Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
- Amendment 8: Enhancements for extremely high throughput (EHT)", November 2023
[5] National Institute of Standards and Technology (NIST) Special Publication SP 800-56A, Revision 3, April 2018
1.2 Definitions
The definitions in Table 1, as well as the definitions in the WPA3 Specification [1], are applicable to this document.
Table 1. Definitions
Term Definition
Dual-SSID A configuration that uses two distinct SSIDs, each operated by a distinct BSS
Acronyms Definition
BP Beacon Protection
Acronyms Definition
EOS End-of-Support
IE Information element
Legacy When WEP is disallowed in a BSS configuration, When WEP is disallowed in a network profile on the STA,
Security the AP does not advertise or use WEP cipher the STA does not select a WEP cipher suite (as pairwise
Parameters suites (as pairwise or group cipher suite), and does or group cipher suite), and does not perform WEP Shared
not perform WEP Shared Key authentication, in Key authentication, with APs or AP MLDs in the network.
the BSS. When TKIP is disallowed in a network profile on the STA,
When TKIP is disallowed in a BSS configuration, the STA does not select a TKIP cipher suite (as pairwise or
the AP does not advertise or use TKIP cipher group cipher suite) when associating to an AP or AP MLD
suites (as pairwise or group cipher suite) in the in the network.
BSS. When WPA v1 is disallowed in a network profile on the
When WPA v1 is disallowed in a BSS STA, the STA does not send WPA IE when associating to
configuration, the BSS does not advertise the WPA an AP or AP MLD in the network.
IE in Beacon and Probe Response frames.
Privacy [2] 9.4.1.4 Privacy (Data frame confidentiality) configuration N/A
"Capability for the BSS.
Information When Privacy is required in the BSS, the AP sets
field" the Privacy subfield to 1.
Beacon [2] Table 9- Beacon Protection configuration for the BSS. Beacon Protection configuration in a network profile on the
Protection 192 "Extended Applicable only if PMF is enabled on the BSS. STA for use in the network (SSID). Applicable only if PMF
Capabilities When "Disabled", the capability bit in Extended is enabled in the network profile.
field" and Capabilities element is not set, and Beacon When "Disabled", Beacon Protection validation is not
11.52 "Beacon Protection is disabled in the BSS. performed when connected to an AP or AP MLD in the
Protection When "Enabled", Beacon Protection is enabled in network.
Procedures" the BSS, the capability bit in Extended Capabilities When "Enabled", the STA validates the integrity of Beacon
element is set, and Beacon frames include an frames using the MME when connected to an AP in the
MME. network that enables PMF and Beacon Protection and
validates the integrity of Beacon frames on all links when
AKM Suite [2] Table 9- List of one or more AKM Suites, enabled for use List of one or more AKM Suites enabled in a network
190 "AKM for authentication and key management in the profile on the STA for use in the network (SSID).
suite BSS, advertised in RSNE. When a STA associates with an AP in the network, it
selectors" The AP rejects association requests for the BSS selects one of the AKM Suites in this list which is also
from STAs that specify an AKM Suite not in this enabled by the AP. When a STA associates with an AP
list. MLD in the network, it selects one of the AKM Suites in
NOTE: The AP enables FT AKMs only when its this list which is also enabled by the BSSs of all affiliated
BSS is part of an FT mobility domain. The AP links. The STA indicates the selected AKM Suite in RSNE.
enables FILS AKMs only when it supports a FILS When multiple such suites exist, selection preference
authentication method for the BSS. orders are defined (see [1]). If no such suite exists, the
STA does not attempt to associate with the AP or AP MLD.
PMF [2] Table 12-5 PMF configuration for the BSS. PMF configuration in a network profile on the STA for use
"Robust When "Disabled", the capability bits in RSNE are in the network (SSID).
management not set (MFPC=0; MFPR=0), and PMF is disabled When "Disabled", the capability bits in RSNE are not set
frame in the BSS. (MFPC=0; MFPR=0) and PMF is not used when
selection in an When "Capable", PMF is enabled but not enforced associating to an AP or AP MLD in the network; the STA
infrastructure in the BSS, the corresponding capability bits in does not attempt to associate with an AP that advertises
BSS" and PMF "Required", or with an AP MLD in the network if any
RSNE are set (MFPC=1; MFPR=0), and PMF is
9.4.2.23.4 used when a STA indicates PMF "Capable" or of the affiliated links advertise PMF "Required".
"RSN "Required"; otherwise, PMF is not used with the When "Capable", PMF is used when associating to an AP
capabilities" STA. or AP MLD in the network that advertises PMF "Capable"
When "Required", PMF is enabled and enforced in or "Required"; otherwise PMF is not used. The
the BSS, the corresponding capability bits in RSNE corresponding capability bits in RSNE are set (MFPC=1;
are set (MFPC=1; MFPR=1), and PMF is used with MFPR=0) when associating to an AP or AP MLD in the
all STAs; the AP rejects association requests for network regardless of whether PMF is actually used.
the BSS from STAs that have PMF disabled. When "Required", PMF is always used when associating to
an AP or AP MLD in the network; the STA does not
attempt to associate with an AP in the network that
advertises PMF "Disabled", or with an AP MLD that
advertises PMF "Disabled" on any of its affiliated links. The
corresponding capability bits in RSNE are always set
(MFPC=1; MFPR=1) when associating to an AP or AP
MLD in the network.
SAE Groups List of one or more SAE groups, enabled for use in Ordered list of one or more SAE groups enabled in a
SAE authentication. network profile on the STA for use in the network (SSID).
The AP rejects SAE authentication attempts using When a STA attempts SAE authentication with an AP in
a group that is not on this list. the network, it selects the first SAE group in this list. If the
NOTE: An AP does not advertise its enabled SAE AP rejects an SAE authentication attempt because it does
Groups in Beacon and Probe Response frames. not support the selected SAE group, the STA re-attempts
SAE authentication using the next SAE group in the list (if
any).
SAE Hash-to- [2] Table 9- SAE Hash-to-Element configuration for the BSS. SAE Hash-to-Element configuration in a network profile on
Element 371 "Extended Applicable only if an SAE AKM suite is used. the STA for use in the network (SSID). Applicable only if
RSN When "Disabled", SAE Hash-to-Element method is an SAE AKM suite is used.
Capabilities not enabled or used, and the capability bit in When "Disabled", the capability bit in RSNXE is not set
field" and RSNXE is not set; the SAE Hunting-and-Pecking and SAE Hash-to-Element method is not used when
Table 9-131 method is used with an SAE AKM. connecting to an AP or AP MLD in the network; the SAE
"BSS When "Enabled", SAE Hash-to-Element method is Hunting-and-Pecking method is used with an SAE AKM;
membership enabled, the capability bit in RSNXE is set, and the STA does not attempt to connect to an AP using an
selector value SAE AKM if that AP advertises "Hash to Element Only" or
Hash-to-Element is used with an SAE AKM when a
encoding" STA indicates SAE Hash-to-Element "Enabled"; if the AP MLD advertises "Hash to Element Only" on any of
otherwise, the SAE Hunting-and-Pecking method its affiliated links.
is used with the STA. When "Enabled", SAE Hash-to-Element method is used
When "H2E Only", SAE Hash-to-Element method with an SAE AKM when connecting to an AP or AP MLD in
is enabled, the capability bit in RSNXE is set, the the network that advertises SAE Hash-to-Element
Hash-to-Element Only bit in Supported Rates and "Enabled" or "H2E Only"; otherwise, the SAE Hunting-and-
Pecking method is used. The capability bit in RSNXE is set
Unless otherwise stated in this document or the underlying specifications (see [1], [2], [3] and [4]), no additional
constraints exist regarding allowed combinations of security parameters. For example, use of AKM Suite SAE-GDH (:24)
with Cipher Suite CCMP-128 (:4) is also permitted, as is use of AKM Suite SAE (:8) with Cipher Suite GCMP-256 (:9).
Similarly, while the use of SAE Groups with higher strength estimates (e.g., SAE groups 20 and 21) with Cipher Suite
GCMP-256 is preferable from the perspective of security strength consistency (see Section 3.3.8), use of SAE Group 19
with Cipher Suite GCMP-256 and/or AKM Suite SAE-GDH is also permitted.
2.2 Common security configuration for all WPA3 and Wi-Fi Enhanced Open
modes
The security configuration that applies to all WPA3 and Wi-Fi Enhanced Open modes specified in this section are defined
in Table 4.
Table 4. Common security configuration for all WPA3 and Wi-Fi Enhanced Open modes
Enabled Disabled
Beacon AP: EHT enabled on BSS MAND DISALLOW
Protection [except sub-1 GHz band *] RECOM
AP: EHT not enabled on BSS
STA: EHT supported MAND DISALLOW
Transition AP: EHT enabled on BSS RECOM (when applicable ***) MAND (by default)
Disable RECOM (when applicable ***) MAND (by default)
AP: EHT not enabled on BSS
STA: EHT supported N/A N/A
(*) N/A for operation in sub-1 GHz band, since Beacon Protection is not supported.
(**) It is currently recommended that Operating Channel Validation is disabled due to potential interoperability issues,
particularly when EHT or MLO is enabled and/or when the BSS operating bandwidth is greater than or equal to 160 MHz.
This recommendation is expected to be revised at a future date.
(***) Transition Disable must be disabled by default on APs, except where otherwise specified. It is recommended to
enable Transition Disable on APs if specific network deployment conditions apply. See Sections 6.5.1 and 8.2 of [1], and
Section 3.3.2.
(****) SAE Groups parameter applies to all WPA3-Personal modes. There is no requirement on the order of the enabled
SAE Groups in a STA's network profile (see Table 3). Note that, if the list is ordered with the SAE Groups that have
highest strength estimate (see Appendix B of [1]) first, multiple authentication attempts (and, therefore, some additional
delay) might be incurred when connecting to APs that do not enable those stronger groups. On the other hand, if the list is
ordered with the SAE Groups that have the highest strength estimate last, those stronger groups might not actually be
used except when connecting to APs that have the weaker groups disabled.
SAE-GDH SAE (:8) PSK (:6) PSK (:2) FT-SAE- FT-SAE FT-PSK
(:24) GDH (:25) (:9) (:4)
AKM Suite AP: EHT enabled on BSS MAND MAND RECOM MAND RECOM RECOM RECOM
AP: EHT not enabled on BSS RECOM MAND RECOM MAND RECOM RECOM RECOM
STA: EHT supported MAND MAND RECOM MAND RECOM RECOM RECOM
STA: EHT not supported RECOM MAND RECOM MAND RECOM RECOM RECOM
STA: EHT not supported DISALLOW MAND (if supported *) DISALLOW (if supported)
SAE-GDH SAE (:8) PSK (:6) FT-SAE- FT-SAE (:9) FT-PSK (:4)
(:24) GDH (:25)
PSK (:2)
AKM Suite AP: EHT enabled on BSS MAND MAND (**) DISALLOW RECOM RECOM DISALLOW
AP: EHT not enabled on BSS RECOM MAND DISALLOW RECOM RECOM DISALLOW
STA: EHT supported MAND MAND (**) DISALLOW RECOM RECOM DISALLOW
STA: EHT not supported RECOM MAND DISALLOW RECOM RECOM DISALLOW
STA: EHT not supported DISALLOW MAND (if supported *) DISALLOW (if supported)
(*) SAE Hash-to-Element support is necessary to use SAE-GDH and FT-SAE-GDH AKM Suites, and to connect to a BSS
using any SAE AKM Suite in 6 GHz or sub-1 GHz bands.
(**) If this mode is used in a network where all APs and STAs are known to support EHT, GCMP-256 (00-0F-AC:9) can be
used as the only Group Data Cipher Suite, BIP-GMAC-256 (00-0F-AC:12) can be used as the only Group Management
Cipher Suite, CCMP-128 (00-0F-AC:4) does not need to be enabled as a Pairwise Cipher Suite, SAE (00-0F-AC:8) does
not need to be enabled as an AKM Suite, and H2E Only can be used.
(***) Although not strictly required, it is strongly recommended in these cases that the AP uses CCMP-128 as the Group
Data Cipher Suite, and BIP-CMAC-128 as the Group Management Cipher Suite, for compatibility with all non-EHT STAs.
An AP does not operate a BSS in this transition mode in the 6 GHz or sub-1 GHz bands; the mode defined in Section 2.6
can be used instead.
BSS selection rules based on SAE-PK support are defined for the STA; see [1].
BSS selection rules based on SAE-PK support are defined for the STA; see [1].
Enabled Disabled
Server AP: EHT enabled on BSS N/A N/A
Certificate N/A N/A
AP: EHT not enabled on BSS
Validation
STA: EHT supported MAND (if supported) DISALLOW (if supported)
STA: EHT not supported MAND (if supported) DISALLOW (if supported)
An AP does not operate a BSS in this transition mode in the 6 GHz band; the mode defined in Section 2.8 can be used
instead.
NOTE: WPA3-Enterprise transition mode is similar to WPA2-Enterprise, except that TKIP is disallowed, PMF is enabled
("Capable"), and support for SHA-256 AKM (in addition to SHA-1 AKM) is required.
Enabled Disabled
Server AP: EHT enabled on BSS N/A N/A
Certificate N/A N/A
AP: EHT not enabled on BSS
Validation
STA: EHT supported MAND (if supported) DISALLOW (if supported)
STA: EHT not supported MAND (if supported) DISALLOW (if supported)
(**) If this mode is used in a network where all APs and STAs are known to support EHT, GCMP-256 (00-0F-AC:9) can be
used as the only Group Data Cipher Suite, BIP-GMAC-256 (00-0F-AC:12) can be used as the only Group Management
Cipher Suite, and CCMP-128 (00-0F-AC:4) does not need to be enabled as a Pairwise Cipher Suite.
(***) Although not strictly required, it is strongly recommended in these cases that the AP uses CCMP-128 as the Group
Data Cipher Suite, and BIP-CMAC-128 as the Group Management Cipher Suite, for compatibility with all non-EHT STAs.
NOTE: WPA3-Enterprise Only Mode is separate and distinct from WPA3-Enterprise 192-bit Mode. For example, although
WPA3-Enterprise Only Mode requires PMF and disallows SHA-1 based AKMs, it allows FT and FILS AKMs to be used
and does not mandate use of CNSA Suite compliant EAP methods or GCMP-256 cipher suites.
802.1X CNSA Suite compliant EAP method All other AKM Suites
SHA-256 (:12)
AKM Suite AP: EHT enabled on BSS MAND DISALLOW
Enabled Disabled
Server AP: EHT enabled on BSS N/A N/A
Certificate N/A N/A
AP: EHT not enabled on BSS
Validation
STA: EHT supported MAND (if supported) DISALLOW (if supported)
STA: EHT not supported MAND (if supported) DISALLOW (if supported)
In WPA3-Enterprise 192-bit Mode, EAP-TLS is the only permitted EAP method, using one of the following EAP cipher
suites [1]:
OWE (:18)
AKM Suite AP: EHT enabled on BSS MAND
Enabled Disabled
OWE AP: EHT enabled on BSS MAND DISALLOW
Transition MAND DISALLOW
AP: EHT not enabled on BSS
Mode
element STA: EHT supported N/A N/A
An AP in this mode operates a pair of BSSs - a legacy Open BSS and an OWE BSS. The Open BSS uses the network
SSID. The OWE BSS uses a different, hidden, SSID. Both BSSs in the pair send an OWE Transition Mode element (see
Section 2.2 of [3]).
The Network Profile of a STA in this mode matches both SSIDs. It allows connection to both OWE BSSs and Open BSSs
using the network SSID, and also allows connection to OWE BSSs in Wi-Fi Enhanced Open Transition Mode using the
hidden SSID (discovered by receiving the OWE Transition Mode element).
An AP does not operate a BSS in this transition mode in the 6 GHz or sub-1 GHz bands, or if EHT or MLO is enabled on
the BSS in any band (see deployment considerations in Section 3.1.3); the mode defined in Section 2.11 can be used
instead.
OWE (:18)
AKM Suite AP: EHT enabled on BSS MAND
Enabled Disabled
OWE AP: EHT enabled on BSS DISALLOW MAND
Transition DISALLOW MAND
AP: EHT not enabled on BSS
Mode
element STA: EHT supported N/A N/A
(**) If this mode is used in a network where all APs and STAs are known to support EHT, GCMP-256 (00-0F-AC:9) can be
used as the only Group Data Cipher Suite, BIP-GMAC-256 (00-0F-AC:12) can be used as the only Group Management
Cipher Suite, and CCMP-128 (00-0F-AC:4) does not need to be enabled as a Pairwise Cipher Suite.
When a new network is configured on APs that use a PSK or SAE passphrase for authentication, the AP should use one
of the following modes as the default security configuration for each BSS:
3.1.1.2 STAs
If a STA auto-generates a network profile for an SSID (e.g., when the STA displays a list of discovered SSIDs and the
user selects one of the SSIDs for the first time), and one or more discovered BSSs with the selected SSID advertise a
PSK or SAE AKM, by default it should configure the network profile in WPA3-Personal Transition Mode (Section 2.3).
NOTE: WPA3-Personal Transition Mode does not permit use of WEP or TKIP. If the STA might need to enable WEP or
TKIP in the network (e.g., if any of the BSSs in the network are configured in WPA/WPA2-Personal Mixed Mode, which
uses TKIP group cipher), the network profile might need to be modified to additionally enable WEP and/or TKIP.
If the STA supports SAE-PK and the password is in the correct form, by default the network profile should be configured in
WPA3-Personal SAE-PK Transition Mode (Section 2.5).
3.1.2 WPA3-Enterprise
3.1.2.1 APs
When a new network is configured on APs that use IEEE 802.1X for authentication, and the network is not intended for
WPA3-Enterprise 192-bit mode security, the AP should use one of the following modes as the default security
configuration for each BSS:
3.1.2.2 STAs
If a STA auto-generates a network profile for an SSID, and one or more discovered BSSs with the selected SSID
advertise an 802.1X AKM, by default it should configure the network profile in WPA3-Enterprise Transition Mode (Section
2.7).
NOTE: WPA3-Enterprise Transition Mode does not permit use of WEP or TKIP. If the STA might need to enable WEP or
TKIP in the network (e.g., if any of the BSSs in the network are configured in WPA/WPA2-Enterprise Mixed Mode, which
uses TKIP group cipher), the network profile might need to be modified to additionally enable WEP and/or TKIP.
NOTE: It is expected that STAs connecting to a WPA3-Enterprise 192-bit Mode network will be explicitly configured with a
network profile for WPA3-Enterprise 192-bit Mode.
3.1.3.1 APs
When a new network is configured on APs that does not enable authentication, the AP should use one of the following
modes as the default security configuration for each BSS:
If the network also comprises APs that do not support Wi-Fi Enhanced Open, the BSSs on those APs should be
configured in legacy Open mode and use the network SSID (i.e., the same SSID that is used by the Open BSSs that are
in transition mode).
If Wi-Fi Enhanced Open Transition Mode is configured, it is recommended that Wi-Fi Enhanced Open Only Mode is not
configured on any other BSS in the same network, except for operation in the 6 GHz or sub-1 GHz bands. In other words,
in 2.4 and 5 GHz bands, other BSSs in the network should be configured in Wi-Fi Enhanced Open Transition Mode (if
supported) or legacy Open mode. This avoids interoperability issues between legacy STAs and BSSs in Wi-Fi Enhanced
Open Only mode (which do not use hidden SSID with OWE BSS).
If the network includes EHT or MLO APs and needs to support legacy STAs (that do not support Wi-Fi Enhanced Open)
then the network should be configured with Dual SSIDs, per the example given in Appendix A.4. In this configuration, the
BSSs using the legacy Open SSID have EHT and MLO disabled and operate in 2.4 and/or 5 GHz band only. The BSSs
using the OWE SSID can operate with EHT and MLO enabled and in any band. The OWE Transition Mode element is not
sent by any of the BSSs.
NOTE: Wi-Fi Enhanced Open Transition Mode is disallowed on BSSs with EHT or MLO enabled.
3.1.3.2 STAs
If a STA auto-generates a network profile for an SSID, and one or more discovered BSSs with the selected SSID
advertise legacy Open or OWE AKM, by default it should configure the network profile in Wi-Fi Enhanced Open Transition
Mode (Section 2.10).
When a STA "roams" between the OWE BSS of Wi-Fi Enhanced Open Transition Mode (in 2.4 or 5 GHz) and a BSS in
Wi-Fi Enhanced Open Only Mode (e.g., in 6 or sub-1 GHz GHz) or a BSS in legacy Open mode (e.g., operated by a non-
OWE AP in the same network), the SSID that the STA is associated with will change. The OWE Transition Mode element
provides the indication that both SSIDs provide access to the same DS. A STA implementation should handle this change
of SSID transparently to the upper layers, so that it does not cause unexpected user impact.
In the case of a Dual-SSID Wi-Fi Enhanced Open configuration, STAs that support Wi-Fi Enhanced Open should be
configured with a network profile for the OWE SSID only, while STAs that do not support Wi-Fi Enhanced Open should be
configured with a network profile for the Open SSID only.
3.1.4 General
3.1.4.1 APs
Where possible, it is recommended that the WPA3 AKMs (including, when appropriate, FT and FILS AKMs) supported by
a network are advertised by all BSSs of that network. This can help maximize interoperability when STAs roam between
BSSs because a consistent AKM can be used for all roams.
When FT is enabled on a network, where possible it is recommended that the same set of pairwise cipher suites is
enabled by all BSSs of a given FT mobility domain. This allows STAs to roam between all BSSs of the mobility domain
using FT protocol, which requires the pairwise cipher suite of target BSS (or target MLD APs) to be the same as that used
in the initial FT association (see 12.7.1.6.1 of [2]).
While in principle it is permitted for a given BSS, or different BSSs in the same network, to advertise a mixture of WPA3-
Personal, WPA3-Enterprise and/or OWE AKMs, it should be noted such deployments might cause unexpected
interoperability issues with STAs, e.g., related to auto-join, roaming or UI behavior.
NOTE: The RSNE and RSNXE advertised by all links of an AP MLD must be identical, except for the AKM Suite List field
and MFPR subfield of the RSN Capabilities field [4]. The (subset of) AKM Suites that is advertised on all links of an AP
MLD can be used in ML associations; AKM Suites that are not advertised on all links can only be used for non-ML
associations to the BSS that is advertising that AKM Suite.
3.1.4.2 STAs
A STA should not auto-configure a network profile in an "only" mode, rather than a transition mode, based purely on the
absence of BSS operating with legacy security in scan results, since BSSs in the network may be operating in different
modes and not all BSSs in the network might be detected in a given scan.
NOTE: The security mode of an auto-generated network profile might subsequently change after the STA's first
connection to the network if Transition Disable indication is enabled, e.g., from WPA3-Personal Transition Mode to WPA3-
Personal Only Mode.
If a STA's UI displays a list of discovered networks, a given SSID should be displayed only once, even when the BSSs
advertising that SSID are operating in different security modes.
A STA should not reject a BSS as a candidate for selection (either on initial network join, or on roam using the
reassociation procedure) on the basis of security if the BSS configuration and the STA's security configuration (for the
corresponding network profile) have a mutually compatible set of security parameters. Roaming between BSSs with the
same SSID (and in addition, in the case of Wi-Fi Enhanced Open Transition Mode, between an OWE BSS and Open
BSS) should be performed without user intervention or disconnection.
NOTE: This means that a STA configured in a transition mode might need to roam to a target BSS using a different AKM
and/or cipher suites than was used with the source BSS. Similarly, the STA might need to roam to a target BSS without
negotiating PMF even when PMF was negotiated with the source BSS (and vice versa).
NOTE: Specific rules for security-based BSS selection prioritization are defined for SAE-PK, see [1].
NOTE: Due to the AKM preference order requirements in [1], a STA that associated to a BSS using a WPA2 FT AKM
(e.g., FT-PSK) might need to perform non-FT reassociation or FT initial mobility domain reassociation (instead of FT
authentication) when roaming to a BSS that supports a WPA3 AKM (e.g., SAE or FT-SAE). Network deployments can
maximize the use of FT authentication by ensuring the same FT AKMs are enabled across all BSSs of a network.
• The STA has been designated as EOS by the device manufacturer, and so is no longer receiving software updates, or
• The STA was manufactured prior to December 31st, 2015
In the event that such issues are found with legacy STAs, it is recommended that a workaround configuration defined in
this section is used instead:
The Dual-SSID configuration for legacy STA interoperability is defined in Table 14.
• It ensures legacy STAs with interoperability issues do not attempt to connect to any BSS in the network with WPA3
enabled (since they are not configured with a Network Profile for the Main SSID)
• All WPA3 STAs will connect to the more secure SSID using WPA3
However, this configuration comes at the expense of deployment complexity and/or usability. For example, it may result in
a poor user experience for users who have difficulty determining which SSID a given STA should be configured to use
(based on whether it is a legacy STA with WPA3 interoperability issues), or who have difficulty manually reconfiguring
legacy STAs with the Legacy SSID.
Table 14. Dual-SSID WPA3-Personal configuration for legacy STA interoperability
Configuration
AP and radio deployment Main BSS: Deployed on all radios of all APs.
Legacy BSS: Deployed on all radios of all APs other than 6 GHz and sub-1 GHz radios.
SSID Distinct SSIDs, e.g.
Main BSS: "HomeNet"
Legacy BSS: "HomeNet-legacy"
Security mode Main BSS (6 GHz and sub-1 GHz): WPA3-Personal Only Mode (Section 2.4)
Main BSS (2.4 GHz and 5 GHz on WPA3 APs): WPA3-Personal Transition Mode (Section 2.3)
Main BSS (2.4 GHz and 5 GHz on WPA2-only APs): WPA2-Personal mode
Legacy BSS: WPA2-Personal mode
EHT Main BSS: EHT and MLO enabled if supported (WPA3 is also enabled)
Legacy BSS: EHT and MLO disabled
Password The same password can be used for Main SSID and Legacy SSID for convenience (see footnote 1)
STA configuration Legacy STAs that have WPA3 interoperability issues are configured with a Network Profile for the Legacy SSID (but
not the Main SSID)
All other STAs are configured with a Network Profile for the Main SSID (but not the Legacy SSID)
In the event that interoperability issues continue to be experienced even when this workaround is configured, the following
changes to the Legacy BSS configuration might be considered:
• Try disabling PMF (MFPC=0) on the Legacy BSS, to avoid issues with legacy STAs that advertise support for PMF
but fail to properly negotiate or sustain a PMF-enabled connection (see footnote 2)
• If there is a need for legacy pre-WPA2 STAs to connect, configure the Legacy BSS in Mixed Mode with WEP/TKIP
enabled
1When additional security protection is required, the configuration described in Section 3.3.3 is recommended.
2Unless interoperability issues are found, it is recommended that PMF is enabled on the Legacy BSS since it protects
against deauthentication attacks that can be used to facilitate offline dictionary attacks on the WPA2 passphrase.
© 2024 Wi-Fi Alliance. All Rights Reserved.
Used with the permission of Wi-Fi Alliance under the terms as stated in this document.
Page 26 of 34
WPA3™ and Wi-Fi Enhanced Open™ Deployment and Implementation Guide v1.0
• If the APs in the network have WPA3-Personal enabled, bit 0 (WPA3-Personal) should be set to 1. This causes a STA
that supports WPA3-Personal to configure the network profile in WPA3-Personal Only Mode:
▪ If the APs also have SAE-PK enabled, bit 1 (SAE-PK) should also be set to 1. This causes a STA that supports
SAE-PK to configure the network profile in WPA3-Personal SAE-PK Only Mode
• If the APs in the network have WPA3-Enterprise enabled, bit 2 (WPA3-Enterprise) should be set to 1. This causes a
STA that supports WPA3-Enterprise to configure the network profile in WPA3-Enterprise Only Mode
The passive attack on legacy WPA2-Personal only client devices is the same as exists with legacy WPA2-Personal only
networks. The active attack on an WPA3-Personal client device is complex and gains the attacker little because of the
possibility to run the simpler passive attack on legacy clients. An attacker who determines the password can access the
network simply by using WPA2-Personal, irrespective of WPA3-Personal. In addition, even after this attack is successful
and the attacker determines the password, the clients that connect with WPA3-Personal will still benefit from the forward-
secrecy that SAE affords—that is, the traffic encryption keys will still remain unknown even if the password is known.
Nevertheless, in some deployments, enhanced security is required to protect against the above attack. For these
scenarios, the Dual-SSID network configuration in Table 15 is recommended.
In this Dual-SSID configuration, since the WPA3 password is not used for WPA2 authentication exchanges, offline
dictionary attacks on the WPA2 passphrase (which, in transition mode, could lead to attacks on WPA3 STAs) are not
possible. In addition, since layer-2 forwarding between WPA2 and WPA3 BSSs is disabled or minimized, the risk of
insider attacks on WPA3 STAs via the network infrastructure, by an attacker that manages to obtain the WPA2
passphrase, is mitigated.
The benefits of this Dual-SSID configuration may come at the expense of deployment complexity and/or usability. For
example, it may result in a poor user experience for users who have difficulty determining which SSID a given STA should
connect to (based on its support for WPA3), or who have difficulty manually reconfiguring the SSID and password on
STAs that previously only supported WPA2 but were subsequently updated to support WPA3.
Table 15. Dual-SSID WPA3-Personal network configuration for enhanced security
Configuration
AP and radio deployment WPA3 BSS: Deployed on all radios of all APs that support WPA3 (see footnote 4)
(see footnote 3) WPA2 BSS: Deployed on all radios of all APs other than 6 GHz and sub-1 GHz radios (see footnote 5).
SSID Distinct SSIDs, e.g., (see footnote 6)
WPA3 BSS: "HomeNet"
WPA2 BSS: "HomeNet-legacy"
Security mode WPA3 BSS: WPA3-Personal Only Mode (Section 2.4)
WPA2 BSS: WPA2-Personal mode
EHT WPA3 BSS: EHT and MLO enabled if supported
WPA2 BSS: EHT and MLO disabled
Password Distinct passwords are used for WPA3 SSID and WPA2 SSID.
It is necessary for the WPA3 password to be unguessable – either directly, or from knowledge of the WPA2
passphrase, see Section 3.3.6.
The WPA2 passphrase should be a non-dictionary, high entropy password to improve resistance to dictionary
attack, and have length between 8 and 63 characters.
Layer-2 forwarding Layer-2 forwarding between WPA2 and WPA3 BSSs is disabled or (at least) limited to minimal forwarding rules (see
footnote 7)
Transition Disable WPA3 BSS: Enabled (if network deployment conditions apply)
WPA2 BSS: Disabled
STA configuration WPA3 STAs are configured with network profile for WPA3 SSID and password
WPA2 STAs are configured with network profile for WPA2 SSID and passphrase
3 An AP that supports "virtual APs" (aka "co-hosted BSSs" or "multiple BSSID set") can typically be configured with both a
WPA2 BSS and a WPA3 BSS on the same band/radio.
4 If an AP does not support WPA3, it is not configured with the WPA3 SSID or password.
5 Configuration of a WPA2-Personal BSS in the 6 GHz or Sub 1GHz bands is not permitted. All STAs that support the 6
In principle, a single-SSID solution is also possible, whereby the AP is configured with a different password for SAE AKM
and PSK AKM on the same BSS. However, this requires an AP configuration that might not be supported in typical
implementations (as well as the ability to apply per-STA filtering rules based on AKM), so is not discussed further.
3.3.5 Wireless Protected Setup and Wi-Fi Easy Connect with WPA3 modes
An AP can enable Wireless Protected Setup (WPS) or Wi-Fi Easy Connect when operating in any WPA3-Personal mode.
However, it is recommended that WPS is not enabled on a BSS if the BSSs in that network are configured in WPA3-
Personal Only Mode.
An AP can enable Wi-Fi Easy Connect when operating in any WPA3-Enterprise mode, except for WPA3-Enterprise 192-
bit mode.
A STA can use a password for a given network, that was obtained using WPS (with Authentication Type = WPA2-
Personal) or Wi-Fi Easy Connect (using DPP Configuration), to authenticate with any AP in that network using any PSK or
SAE AKM.
A STA can use an enterprise credential (X.509 certificate) for a given network, that was obtained using Wi-Fi Easy
Connect (using DPP Configuration), to authenticate with any AP in that network using any 802.1X AKM.
NOTE: The use of DPP AKM is defined in the Wi-Fi Easy Connect specification.
NOTE: In general, the overall security of network devices depends on the security of the bootstrapping and provisioning
mechanisms supported.
To illustrate the benefits that WPA3-Personal affords, consider a password selected randomly from 5,000 possible
passwords. The attacker knows this but does not know which password was randomly chosen. With WPA2-Personal an
attacker could determine the password through an off-line dictionary attack with a probability of success of 1. With WPA3-
Personal, the attacker must launch repeated active attacks, guessing a different password each time. The probability of
success of the WPA3-Personal attack would only reach 0.5 after 2,500 active attacks. It should be possible to detect such
an attack on WPA3-Personal long before the probability of success becomes high.
Implementations of WPA3-Personal should limit authentication attempts for a particular password—identified with an SAE
Password Identifier or not—when an active attack is identified. Determination of whether an attack is underway is
implementation dependent and left up to the vendor. One possible mitigation strategy may be that the AP temporarily
disable a password after a series of unsuccessful authentication attempts. Note that the source medium access control
(MAC) address used with failed authentication attempts is irrelevant and should not factor into the decision to disable or
limit authentication for a particular password because an attacker can easily change the MAC address between attempts.
In SAE, the initiator chooses the group to use and includes the group number in the first message. The responder accepts
the group or responds with a message containing an error code indicating group rejection if the responder does not want
to use the group. If the group is rejected, the initiator chooses another group and tries again.
When SAE is used with the Hunting-and-Pecking method, it is vulnerable to a downgrade attack where an attacker
impersonates the AP and responds with a rejection of a stronger group until the client device offers a weak group and
then lets the protocol proceed with the real AP. This can be mitigated by not allowing weak groups and only allowing
rejections to offer “upgraded” groups.
When SAE is used with the Hash-to-Element method, explicit protection against SAE Group Downgrade attacks is
provided because identifiers of the rejected groups are included in the KDF for subsequent SAE exchanges using other
groups.
Suitable Diffie-Hellman groups for use with SAE (aka suitable SAE Groups) all generate a key whose strength is
appropriate for the cipher CCMP-128. Stronger ciphers such as CCMP-256 and GCMP-256 can also be used with SAE.
When those stronger ciphers are used, it is recommended that SAE groups with higher strength estimates (e.g., SAE
group 20 or 21) are used, together with SAE AKMs that use a group-dependent hash function (e.g., SAE-GDH (00-0F-
AC:24) or FT-SAE-GDH (00-0F-AC:25)), in order that the security level is consistent.
When a STA uses SAE to connect to an AP using a given pairwise cipher suite, it is recommended that it first offers an
SAE group whose strength estimate (see Appendix B of [1]) is greater than or equal to the strength estimate of that
pairwise cipher suite. See Appendix D Table 24 and Table 25 of [5] for more information.
• DA does not map to 802.11 MAC header RA in a frame exiting DS (i.e., From DS subfield is 1 and To DS subfield is 0
in MAC header, DA is neither the device’s RA address nor a group/multicast address)
• SA does not match 802.11 MAC header TA in a frame destined to DS (i.e., To DS subfield is 1 and From DS subfield
is 0 in MAC header)
• DA is AA:AA:03:00:00:00 (any DS bits including 4-addr)
NOTE: This does not apply to some cases when operating as a GLK STA or S1G STA.
By flipping the A-MSDU Present subfield in the QoS Control field of the 802.11 MAC header in a non-A-MSDU frame, one
can make a vulnerable receiving device accept it as an A-MSDU frame. The first subframe will exhibit the pattern as
shown in the recommendation above and is usually discarded given its invalid construct. However, if a vulnerable device
retains the subsequent subframes, an adversary can inject specially formulated data to solicit sensitive user information.
Thus, a device should implement the mitigation mechanism to detect an abnormal first A-MSDU subframe behavior and
then discard the subsequent subframes. Such a mechanism can be accomplished on the receiving device side.
A more comprehensive solution may be to protect the A-MSDU Present subfield in the QoS Control field of the 802.11
MAC header using a mechanism such as Signaling and Payload Protection (SPP), and to offer a transition means to
bridge the gap between legacy and enhanced devices. The purpose of SPP is to protect an A-MSDU against attacks that
manipulate the unauthenticated A-MSDU Present subfield in its plaintext QoS Control field. SPP includes this flag as part
of the AAD calculation, which can effectively detect such manipulation.
A.3 Example tri-band AP configuration using Wi-Fi Enhanced Open Transition Mode
Figure 3 shows an example configuration using Wi-Fi Enhanced Open Transition Mode on a 2.4+5+6 GHz tri-band AP,
when support for legacy STAs is required. The AP is configured to operate BSSs in Wi-Fi Enhanced Open Transition
Mode in 2.4 and 5 GHz bands, with both OWE and legacy Open BSSs on each band, and operate an OWE BSS in Wi-Fi
Enhanced Open Only Mode in 6 GHz band.
All OWE BSSs in transition mode (i.e., in 2.4 and 5 GHz) use the same hidden SSID ("MyNetOWE3257" in this example).
OWE BSSs and legacy Open BSSs advertise each other by sending an OWE Transition Mode element.
The advertised SSID ("MyNet" in this example) is used by the 6 GHz OWE BSS and also by the legacy Open BSSs in 2.4
and 5 GHz. The advertised SSID is not hidden.The 6 GHz OWE BSS does not advertise an OWE Transition Mode
element.
NOTE: This configuration cannot be used if any of the 2.4 or 5 GHz BSSs have EHT or MLO enabled.
If the network does not need to support legacy STAs, all BSSs in the network should be configured in Enhanced Open
Only mode on all bands.
Figure 3. Example tri-band AP configuration using Wi-Fi Enhanced Open Transition Mode
A.5 Example tri-band Dual-SSID WPA3-Personal configuration for legacy STA interoperability
Figure 5 shows an example Dual-SSID WPA3-Personal configuration for legacy STA interoperability on a 2.4+5+6 GHz
tri-band AP. The configuration of BSSs b2, b4 and b5 is the same as shown in Figure 1. In addition, the AP operates
BSSs b1 and b3 in 2.4 and 5 GHz bands, which have a different SSID, and are configured in WPA2-Personal mode (and
therefore do not enable EHT or MLO).
Figure 5. Example tri-band Dual-SSID WPA3-Personal configuration for legacy STA interoperability