On 25.05.2016 16:56, Dan Williams wrote:
> On Wed, 2016-05-18 at 21:10 -0400, Chris Laprise wrote:
>>
>> On 05/18/2016 02:25 PM, Dan Williams wrote:
>>>
>>>
>>> Randomization happens in the supplicant, and the supplicant also
>>> controls scanning.  If randomization is enabled, the supplicant
>>> will
>>> change the MAC address before it scans, so this should not be a
>>> problem.
>>>
>>> Of course, if you run 'iw dev wlan0 scan' manually, that does not
>>> go
>>> through the supplicant, and you will leak your MAC.
>>>
>>> If you use NM's MAC cloning functionality, then yes, that might
>>> leak
>>> your MAC because that only clones the MAC address for the duration
>>> of
>>> the connection to a specific access point.  It's not randomization,
>>> it's the same as ethernet MAC cloning.
>> It does seem like a primary use case for randomization would be
>> random 
>> addresses during scans only, and transition to chosen non-original 
>> addresses for connections (per-AP). The users and admins aren't going
>> to 
>> think to themselves: "We're going to assign different addresses to
>> these 
>> connections, so we're OK with the hardware address coming through."
>> Not 
>> if they're using pre-connection randomization (which should be 
>> considered the operational norm by now).
>>
>> And its not that connection randomization isn't important, too. I
>> just 
>> think that pre-connection randomization would work very well towards 
>> privacy if the 'randomization' were on a per-AP basis and not a 
>> per-session basis (the latter being less compatible with some 
>> institutional security schemes). Per-AP is more realistic and far
>> more 
>> likely to be used.
>>
>> So I would like to know if NM can coordinate with supplicant well
>> enough 
>> to transition the NIC between randomized pre-connection scanning and 
>> statically-spoofed connections without allowing the original address
>> to 
>> be broadcast.
> 
> NM always requests that non-associated scans (eg, before you've
> connected to a wifi network) be randomized by default.  You can
> (through the mac randomization property) request that the association
> address also be randomized.
> 
> You can also use the cloned MAC address property to set a specific MAC
> address for the association, on a per-connection basis.  If you choose
> "always" for mac randomization, that overrides the cloned mac address.
> 
> As far as we know, and as far as we've tested, these both work
> correctly when wpa_supplicant support exists and the driver uses the
> nl80211 kernel API.  Out-of-tree and WEXT-based drivers may not work
> correctly.
> 
> There does seem to be some confusion about the issue as you can see
> from this thread, so we're trying to investigate that and clear things
> up.  But when the features were added, they worked.
> 

On what -particular- commit you are referring to, as "worked" one?
Ref.
https://cgit.freedesktop.org/NetworkManager/NetworkManager/log/?qt=grep&q=randomization


_______________________________________________
networkmanager-list mailing list
networkmanager-list@gnome.org
https://mail.gnome.org/mailman/listinfo/networkmanager-list

Reply via email to