Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0bbee9e4-78b5-c7d9-369f-2f2d9a480bf3@nmatt.com>
Date: Fri, 9 Jun 2017 09:11:54 -0400
From: Matt Brown <matt@...tt.com>
To: Theodore Ts'o <tytso@....edu>, intrigeri <intrigeri@...m.org>,
 HacKurx <hackurx@...il.com>
Cc: kernel-hardening@...ts.openwall.com
Subject: Re: Patch for random mac address

On 5/25/17 11:48 AM, Theodore Ts'o wrote:
> On Thu, May 25, 2017 at 09:31:15AM +0200, intrigeri wrote:
>>
>> HacKurx:
>>> Because this would be useful for distributions like Tails, Subgraph
>>> OS, Kali Linux and other ...
>>
>> For what it's worth, it's unlikely that Tails ever uses this unless it
>> can be controlled at runtime from userspace: we need to give users an
>> option to disable MAC address randomization, because it breaks network
>> connectivity in some cases.
> 
> BTW, in case people aren't aware ---- you can set the MAC address from
> userspace already:
> 
> Package: macchanger


Yeah I've used this program before. If you want it to always run at boot
you can write a service script for your init system of choice and set it
to run on start up.

In what way does this patch protect you more than a start up script as
described above?

Matt

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.