So when using BLUE you have to add Wifi devices as they connect to the network, I think this is default behaviour, at least I did nothing to change that.
But how do you solve MAC filtering when this anonymization of MAC addresses needs to be active, at least as recommended security measure… ? Is there any other way?
You need some sort of identification. This in the ethernet based area ( 802.11 belongs to it ) the MAC address.
If there is another unique id which can be used, the concept of security with MAC anonymization is useless, IMO.
That was actually what spurred my question, after reviewing some of my settings for this.
Since Android, and Windows, also have this functionality, albeit perhaps without the issues depicted in the article, I found it necessary to check how this actually works.
You never need to block what you do not want in, only allow what you recognize, but , as I understand it, once you let a device with a randomized MAC in, it will hold the same MAC for that network. It will not change again.
Device A on Network A will always show MAC A.
On Network B it will show MAC B.
On Network C it will show MAC C.
You should be able to verify this by looking at the MAC, as I did, on different connected networks and check if it changes from one connected session to the next.
Hmmm… I’ll have to check this out. It doesn’t sound right to me. I currently have 28 expired dynamic leases and if the above was true, then I would have much less.
I know if the second character from the left is 2, 6, a, e then that is a randomized MAC. And 13 of those expired dynamic leases are randomized MAC.
Interesting article.
The complete table contains a row “SSID Profile Forget and Reconnection”, which shows a significant difference between smartphone OSs and Windows. Windows generates a new MAC!
Therefore using the feature with mobile devices may be OK, but beware to use it with Windows clients.