Ahoj resim problem s novymi mobily. Novy android devices maji defaultne nastaveno, ze fejkujou MAC adresu. Dosud jsem po vnitrni siti omezoval pristup ke zdrojum na zaklade MAC pres iptables. Jak nyni jednoznacne identifikovat zarizeni, kdyz si ten telefon vymysli? Pristup pres certifikaty mi neprijde easy protoze nechci mit vic wifi siti a treba telka certifikaty neumi a umi jen psk.
Android uses the persistent randomization type by default when the MAC randomization feature is enabled. Android generates a persistent randomized MAC address based on the parameters of the network profile including SSID, security type, or FQDN (for Passpoint networks). This MAC address remains the same until factory reset. The MAC address does not get re-randomized if the user forgets and re-adds the Wi-Fi network since the MAC addressed depends on the parameters of the network profile.
Persistent MAC addresses are necessary in cases where networks rely on the persistence of the MAC address to provide useful functionality to the user, for example, to remember a device and allow users to bypass the login screen as expected, or to enable parental controls.
For Android 10 and 11, the framework uses persistent randomization for all networks when MAC randomization is enabled.
To je prave to co nemuzu/nechci. Dany clovek/dite ma nekolik zarizeni a pripadne uz neni hloupy a umi si tohle nastaveni zmenit na random. Ze jsem nastavil static to bylo to prvni.
tak v ramci jedne kolizni domeny kterou domacnost je je takto zarizeni jednoznacne identifikovane. Navic na tomhle reseni nelpim sam se v dotazu ptam jestli existuje jina efektivni cesta krom klientskeho certifikatu.