Beefy Boxes and Bandwidth Generously Provided by pair Networks
Perl-Sensitive Sunglasses
 
PerlMonks  

Re: Add Hash Key Based on Matching Another Key

by zek152 (Pilgrim)
on Jul 28, 2010 at 16:12 UTC ( [id://851744]=note: print w/replies, xml ) Need Help??


in reply to Add Hash Key Based on Matching Another Key

It looks like your question has been answered well. I just wanted to make sure that you were aware that MAC address can be changed and spoofed. As long as that doesn't happen in your system then you will be fine. But realize that if you key with MAC addresses be prepared for that failure mode.

  • Comment on Re: Add Hash Key Based on Matching Another Key

Replies are listed 'Best First'.
Re^2: Add Hash Key Based on Matching Another Key
by spickles (Scribe) on Jul 29, 2010 at 15:12 UTC

    Thanks zek152. In this case, we're using the burned in MAC of an Access Point, something that's not easily spoofed. Spoofing the MAC of a Linksys router and/or a client laptop wired/wireless is certainly trivial.

    Regards,
    Scott

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://851744]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others taking refuge in the Monastery: (3)
As of 2025-07-15 09:35 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found

    Notices?
    erzuuliAnonymous Monks are no longer allowed to use Super Search, due to an excessive use of this resource by robots.