Pi MAC address
Frederick Bambrough (1372) 837 posts |
On my BB -xM I placed a file in PreDesk to fix the machine’s MAC address which, IIRC, changed between OS updates. Do I need to do the same for the RPi 4? It’s a while back, I don’t remember the details. |
Stuart Painting (5389) 714 posts |
The last time I had to worry about a machine’s MAC address unexpectedly changing was back in the days of ICL mainframes. Yes, that long ago. The EtherCPSW driver (on the Titanium) does have a facility for exposing multiple (or at least different) MAC addresses, but AFAIAA it is not active on the Pi 4. |
Frederick Bambrough (1372) 837 posts |
I think this comment by Chris Hall in 2017 answers my question. I won’t need to create a MAC address. |
Steve Pampling (1551) 8170 posts |
Possibly. The early developer boards (beagle etc) had a MAC set at first use IIRC. It used to be that dropping those first 6 into a “MAC Vendor Lookup”: site would give you a response of Acorn – obviously so long gone that they’ve cleared that bit of the table. Why is it important that they are different? I floods it out of ALL the ports, and that’s not efficient (damned inefficient in fact)2 Just make sure all your devices are different MACs and everything will be fine at that L2/L3 level. Normal NIC devices are factory programmed with a Globally Unique value. Yes, that was simple – I had a lecturer that spent 2 days covering the basics of the different layers in the OSI model (in which layer boundaries are sort of fuzzy…) 1 Random address, but that translation could be true wherever 82.165.2.1 is located. |
Rick Murray (539) 13840 posts |
Aren’t some devices trying to introduce MAC randomisation “for privacy”?
Uh… nothing major then. |
Stuart Painting (5389) 714 posts |
If by “trying to introduce” you mean “did it 6 years ago” then yes they are. It’s sort-of OK provided that you have a big enough pool of addresses to choose from, otherwise you could have problems when two devices “randomly” choose the same MAC address. The idea of a constantly-changing address is quite common in IPv6, but there it’s the IP address that is changing, not the MAC address. So a device would retrieve the web page using source address A, grab the stylesheet with source address B, grab the images with source addresses C through M and grab the adverts with source addresses N through Z. Someone monitoring from afar would have difficulty establishing who was requesting what; only the local router would “know” that all 26 addresses actually belonged to one device. A /64 subnet has nearly 2^64 addresses available for client use, so even if you had a million clients on that subnet it would still take quite a while to burn through all of the addresses. |
Steve Pampling (1551) 8170 posts |
He put the icing on the cake on the “fix” day by stating to everybody in the office “it’s OK they have different IP’s” and got the “networks don’t work like that” response from one of the server guys. I was, incredibly, incapable of speech… His manager later had the cheek to suggest that “no one in GE1 would do that as it isn’t the correct procedure”2 1 Oh, sorry did I give away the name of the collection of clowns? Shame. 2 If only I had a penny for every instance of one of their employees quoting procedure for a work method or system setting that was different to the last machine they or any of their colleagues worked on. |
Steve Pampling (1551) 8170 posts |
Not a fan. It isn’t more efficient so why do it?
Spell security and audit. |
Stuart Painting (5389) 714 posts |
I was exaggerating slightly. A more realistic scenario would be to use a different IPv6 source address for each unique destination address (so for a website with 4 different adverts you’d use 5 different IPv6 source addresses in total). A given advertiser would see that client appear for one day only then disappear forever.
That’s why I was careful to specify “from afar”. Someone on the local subnet (e.g. the security and audit teams) would be able to see the underlying – and presumably unchanging – MAC address so could ignore the IPv6 shenanigans (and should have other local mechanisms for establishing bona fides in any case). Someone sitting at the ISP (i.e. “from afar”) would know which subnet the traffic came from but not a lot else. |
Rick Murray (539) 13840 posts |
In theory. It’d fall apart when one sees a bunch of sequential requests all saying “Mozilla/5.0 (Android 8.0.0; Mobile; rv:60.0) Gecko/60.0 Firefox/60.0” or whatever as the user agent. Worse if some add-on has pasted it’s own unique ID into the user agent string and other header info.
Mom wasn’t a fan of GE either. She worked in nursing, but before all the computer stuff. Maybe they just “have a reputation”? I’d ask, but…
You’d probably be surprised what information can be collected on you. That little Like thumb tracks you all over the place (except here, kind of pleased that ROOL offer up a local copy of the logo). |
Rick Murray (539) 13840 posts |
Probably just as well for the health and well-being of the person who has clearly never looked up and realised there are more than two layers in the OSI model. |
Stuart Painting (5389) 714 posts |
If someone has MITM’d all your HTTPS traffic you have bigger problems. And someone monitoring at one of the destinations would only be seeing the traffic sent to that destination (which would be from a single source IP address).
Well, it tracks that device. That isn’t necessarily the same as tracking me. |
David J. Ruck (33) 1635 posts |
That’s mainly with Bluetooth to prevent beacons being able to track you where ever you go. Shops often use it to see where you go, and to put more crap in between the door and what you actually want. |
Steve Pampling (1551) 8170 posts |
Bit of a shame that I routinely disable bluetooth then :) |