Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

mac address



> MAC filtering is useful to prevent casual or unintentional use of an
> otherwise open network. Much the same way that turning off broadcast of
> the network ID discourages casual use, but has no real impact on
> security. But both can have some value in slightly raising the bar
> against attacks, in the same way as having ssh listen on an alternate
> port does.
>
> ?-Tom
>

Both the MAC and SSID are in the non-encrypted portion of a wireless
packet and have to be for wireless to work.  Looking at this data can
be done without any knowledge of the target.  So it's more similar to
the protection of moving ssh to a non-standard port and then
broadcasting the port number to the network that ssh can be found at
if such a protocol existed for that.

To pull off an attack on a ssh on a non-standard port you have to at
least port scan the target which will likely result in traffic from
your IP address being blocked.  Although this can be done in a
distributed manner making it tough to detect.

This wouldn't really slow down anyone with the knowledge to
maliciously break into a wireless network.  But MAC filtering like you
say prevent the casual use or an otherwise protected network.  Similar
to how moving the port of ssh will prevent a script kiddy from running
brute force attempts against your server.
--
David







BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org