• 111 Posts
  • 204 Comments
Joined 1 year ago
cake
Cake day: June 28th, 2023

help-circle




  • What do you mean by “tracked and registered?” What is your goal for “securing even more?”

    MAC addresses are visible to anyone sniffing traffic for a wireless LAN, even if they haven’t joined your network. If you are having anonymous folks join your network and you’re granting them access based on MAC addresses, then you could consider this a security risk. They can sniff a MAC, spoof it, and join your network.

    Two devices with the same MAC address may cause some routing issues, but it will likely work well enough to have privileged access and be a bad actor. Plus, there are tools that can spoof a network disconnect request as your access point to temporarily kick off the legitimate client.

    The easiest way to handle this would be to host two access points. You can typically serve both with one physical piece of hardware. One would be for your private stuff, and you can pretty much give it a full-trust model. Join the network, get the privileges. The other would be for guests. Join that, and you just get Internet access. You can separate these networks with VLANs to achieve this.