[u-u] Attacks on MAC address lists (was: suggestions for stopping occasional spurious use of commercial wi-fi)

David Collier-Brown davec-b at rogers.com
Sun Sep 16 17:51:06 EDT 2018


On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:

> I have a Rogers-supplied router and cable modem package, which twice 
> has shown significant usage when I was out, once with the original 
> unit and once with their replacement Cisco.  That makes me suspicious 
> of the current state of authentication for wi-fi schemes (and I use 
> the term "schemes" advisedly: they used to horribly leaky (;-))
>
> What's a good approach? I have considered
>
>   * MAC address lists,
>   * no wi-fi (strictly wired doesn't work with solid concrete walls),
>   * a second router with a more secure protocol (/is/ there such a
>     protocol? And will my wife's Mac speak it?))
>   * something I haven't thought of
>
> --dave
>
I've set up MAC address lists, after a surprising number of reboots to 
unwedge the router  (did I even mention I hate flaky PC-style software?).

How can my hacker avoid them? Wait until my wife's Mac drops off-line 
and steal her MAC?

--dave

-- 
David Collier-Brown,         | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
davecb at spamcop.net           |                      -- Mark Twain

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://unixunanimous.org/pipermail/u-u/attachments/20180916/ae78a3d2/attachment.html>


More information about the u-u mailing list