Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

MAC address filtering isn't a first step towards 802.1x, precisely because of the reason you mentioned. It's damn near pointless for all but the most basic security scenarios.


Obviously it's not a first step toward certificates, but it is a first step away from "anyone can casually plug in a hidden Pi."


Anyone who knows how to setup that RPi to do anything meaningful knows how to spoof mac


But would they be able to figure out a MAC to spoof without significant amounts of time in the data center/switch?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: