|
Message-ID: <0bbee9e4-78b5-c7d9-369f-2f2d9a480bf3@nmatt.com> Date: Fri, 9 Jun 2017 09:11:54 -0400 From: Matt Brown <matt@...tt.com> To: Theodore Ts'o <tytso@....edu>, intrigeri <intrigeri@...m.org>, HacKurx <hackurx@...il.com> Cc: kernel-hardening@...ts.openwall.com Subject: Re: Patch for random mac address On 5/25/17 11:48 AM, Theodore Ts'o wrote: > On Thu, May 25, 2017 at 09:31:15AM +0200, intrigeri wrote: >> >> HacKurx: >>> Because this would be useful for distributions like Tails, Subgraph >>> OS, Kali Linux and other ... >> >> For what it's worth, it's unlikely that Tails ever uses this unless it >> can be controlled at runtime from userspace: we need to give users an >> option to disable MAC address randomization, because it breaks network >> connectivity in some cases. > > BTW, in case people aren't aware ---- you can set the MAC address from > userspace already: > > Package: macchanger Yeah I've used this program before. If you want it to always run at boot you can write a service script for your init system of choice and set it to run on start up. In what way does this patch protect you more than a start up script as described above? Matt
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.