If I’m creating a whitelist for a mobile device on my network and that device is using a randomized MAC, is it going to work at all? How are randomized MACs not a nightmare on small networks?

  • just_another_person@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 days ago

    Because the MAC address isn’t a part of the tcp/ip exchange. You’re specifically addressing TCP/IP only.

    If you’re trying to block something by MAC address, you’re doing it wrong.

    • modus@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      7 days ago

      I see. Thanks.

      What other way is there if the the IP is dynamic. I thought to create a whitelist for devices I had to add the client’s MAC to the custom group. It seems to work fine so far. I was just concerned that it wouldn’t continue to work if the iPhone changed its MAC.

      • friend_of_satan@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        7 days ago

        That person is missing the point that a randomized MAC will often get a different DHCP lease, and the MAC address is used in that, so the IP address will change.

        On a trusted Wi-Fi network, disable MAC randomization on your clients, and if possible reserve an IP address for their non-random MAC address. Some devices have deterministic random per WiFi network, which could also work. In iOS this is WiFi network -> private WiFi address “fixed”. “Rotating” would cause your pihole problems.