Am Samstag, 19. Oktober 2024, 19:51:45 CEST schrieb Chris Green:
Another option might be using
nmap --spoof-mac 00:25:de:ad:be:ef -sn 192.168.0.1/24
Doing so, you will not get your REAL MAC address, but you will get your ACTUAL
one for the
scanning moment.
Yes, it is not the same, but maybe
On Sun, Oct 20, 2024 at 08:38:45 +0100, Chris Green wrote:
> Yes, but the output from 'ip link show' wraps a whole lot of other
> junk around the MAC address which I'd need to remove for the
> application I want it for.
ip -brief link show
You can also combine -brief wit
On Sun, Oct 20, 2024 at 12:12:19PM +, Andy Smith wrote:
> Hi,
>
> On Sun, Oct 20, 2024 at 08:38:45AM +0100, Chris Green wrote:
> > Yes, but the output from 'ip link show' wraps a whole lot of other
> > junk around the MAC address which I'd need to remove f
Hi,
On Sun, Oct 20, 2024 at 08:38:45AM +0100, Chris Green wrote:
> Yes, but the output from 'ip link show' wraps a whole lot of other
> junk around the MAC address which I'd need to remove for the
> application I want it for.
$ ip --json link show | jq '.[].addres
On Sunday, 20-10-2024 at 04:51 Chris Green wrote:
> I am using nmap to scan my LAN with:-
>
> sudo nmap -sn 192.168.1.0/24
>
> It works as expected except that it doesn't show the MAC address for
> the system that it's being run on:-
>
> c
On 20/10/24 15:38, Chris Green wrote:
Yes, but the output from 'ip link show' wraps a whole lot of other
junk around the MAC address which I'd need to remove for the
application I want it for.
An easy filter
ip a | grep -oE '([[:xdigit:]]{2}:){5}[[:xdigit:]]{2}'
jeremy ardley wrote:
>
>
> On 20/10/24 01:51, Chris Green wrote:
> > I am using nmap to scan my LAN with:-
> >
> > sudo nmap -sn 192.168.1.0/24
> >
> > It works as expected except that it doesn't show the MAC address for
> > the system
Andy Smith wrote:
> Hi,
>
> On Sat, Oct 19, 2024 at 06:51:45PM +0100, Chris Green wrote:
> > I am using nmap to scan my LAN with:-
> >
> > sudo nmap -sn 192.168.1.0/24
> >
> > It works as expected except that it doesn't show the MAC addre
On Sat, Oct 19, 2024 at 06:51:45PM +0100, Chris Green wrote:
> I am using nmap to scan my LAN with:-
>
> sudo nmap -sn 192.168.1.0/24
>
> It works as expected except that it doesn't show the MAC address for
> the system that it's being run on:-
>
> c
On 20/10/24 01:51, Chris Green wrote:
I am using nmap to scan my LAN with:-
sudo nmap -sn 192.168.1.0/24
It works as expected except that it doesn't show the MAC address for
the system that it's being run on:-
chris$ sudo nmap -sn 192.
On Sat, Oct 19, 2024 at 20:16:53 -0400, Timothy M Butterworth wrote:
> You can display your systems mac address with the following command:
>
> $ ip address
>
> sample output
> link/ether d8:c0:a6:f4:cb:fd
Sure, you can *find* that somewhere in the output. But if the OP wan
On Sat, Oct 19, 2024 at 6:40 PM Chris Green wrote:
> I am using nmap to scan my LAN with:-
>
> sudo nmap -sn 192.168.1.0/24
>
> It works as expected except that it doesn't show the MAC address for
> the system that it's being run on:-
>
> c
Hi,
On Sat, Oct 19, 2024 at 06:51:45PM +0100, Chris Green wrote:
> I am using nmap to scan my LAN with:-
>
> sudo nmap -sn 192.168.1.0/24
>
> It works as expected except that it doesn't show the MAC address for
> the system that it's being run on:-
The reason w
I am using nmap to scan my LAN with:-
sudo nmap -sn 192.168.1.0/24
It works as expected except that it doesn't show the MAC address for
the system that it's being run on:-
chris$ sudo nmap -sn 192.168.1.0/24
...
...
...
Nmap scan report for jrbb.zbmc.eu (192
Am 22.11.2023 um 12:00:52 Uhr schrieb Nicolas George:
> Thanks for clarifying. But AFAIK, with proxy ARP, the network mask
> covers all the networks covered by the proxy. That is not the case
> here.
Does your Router have a default route?
The it covers 0.0.0.0/0.
Am 22.11.2023 um 11:58:55 Uhr schrieb Nicolas George:
> I do not see what the router has to do with anything. Can you
> elaborate what you mean?
Proxy-ARP offers the possibility to answer ARP requests of addresses
outside the own subnet sitting on another ethernet link.
In normal cases that is no
Marco Moock (12023-11-22):
> Sorry, not gracious-arp, proxy-arp can be responsible for that.
Thanks for clarifying. But AFAIK, with proxy ARP, the network mask
covers all the networks covered by the proxy. That is not the case here.
Regards,
--
Nicolas George
Marco Moock (12023-11-22):
> Are those networks on the same ethernet link?
No, they are on a different VLAN.
> Are some systems with wrong subnet masks on the link and the router has
> gratious ARP enabled?
I do not see what the router has to do with anything. Can you elaborate
what you mean?
O
Am 22.11.2023 um 11:51:36 Uhr schrieb Marco Moock:
> Are some systems with wrong subnet masks on the link and the router
> has gratious ARP enabled?
Sorry, not gracious-arp, proxy-arp can be responsible for that.
Am 22.11.2023 um 11:29:47 Uhr schrieb Nicolas George:
> As you can see, the server is on the …96.0/22 subnet, i.e. …96-…99,
> but it sees MAC addresses on the 100 and 103 networks.
Are those networks on the same ethernet link?
Are some systems with wrong subnet masks on the link and the router ha
Hi.
Since last we have four MAC addresses in the ARP table of a server that
should not be there:
$ ip route
default via XXX.XXX.98.254 dev eth0 onlink
XXX.XXX.96.0/22 dev eth0 proto kernel scope link src XXX.XXX.98.94
But:
$ ip neigh | grep -v 'XXX.XXX.9[6789]'
XXX.XXX.103.161 dev eth0 lla
On Wed, 4 Jan 2023, ?ngel wrote:
There are no transparent proxies for https. They would either pass
traffic without inspecting it, or they would need to break the TLS
connection to MITM it, and -unless the client has installed a CA for
the proxy- cause all https connections to fail due to untrus
On Wed, 4 Jan 2023, Jeffrey Walton wrote:
The preauth scheme does not hide the service like your TOTP scheme.
However, it looks like both schemes achieve the same thing - they both
avoid the costly key exchange. Avoiding the key exchange is a big win
since those public key operations are so cos
On 5/1/23 12:56, Jeffrey Walton wrote:
On Wed, Jan 4, 2023 at 11:34 PM Gareth Evans wrote:
On 3 Jan 2023, at 22:07, Tom Browder wrote:
I ... would like to access my home server from my laptop ...
On 5 Jan 2023, at 04:13, Jeffrey Walton wrote:
...
Avoiding the key exchange is a big win
s
On Wed, Jan 4, 2023 at 11:34 PM Gareth Evans wrote:
>
> > On 3 Jan 2023, at 22:07, Tom Browder wrote:
> > I ... would like to access my home server from my laptop ...
>
>
> > On 5 Jan 2023, at 04:13, Jeffrey Walton wrote:
> > ...
> > Avoiding the key exchange is a big win
> > since those public
> On 3 Jan 2023, at 22:07, Tom Browder wrote:
> I ... would like to access my home server from my laptop ...
> On 5 Jan 2023, at 04:13, Jeffrey Walton wrote:
> ...
> Avoiding the key exchange is a big win
> since those public key operations are so costly.
Costly in what sense and circumstance
On Wed, Jan 4, 2023 at 5:45 PM Tim Woodall wrote:
>
> On Wed, 4 Jan 2023, Jeffrey Walton wrote:
>
> > On Wed, Jan 4, 2023 at 2:20 PM Tim Woodall wrote:
> >> ...
> >>
> >> I've also thought about TOTP dns requests as a type of port knocking : a
> >> dns request to .knock.example.com would open the
On 2023-01-04 at 19:20 +, Tim Woodall wrote:
> It doesn't work through a transparent proxy unfortunately (at least the
> android client doesn't) which I assume was doing SNI snooping - but I've
> only encountered that once in the UK so far.
>
> My plan was to write something that used a dns re
On Wed, 4 Jan 2023, Jeffrey Walton wrote:
On Wed, Jan 4, 2023 at 2:20 PM Tim Woodall wrote:
...
I've also thought about TOTP dns requests as a type of port knocking : a
dns request to .knock.example.com would open the ssh port for a
minute. Small local webpage to do the TOTP port knock in jav
On 2023-01-04 at 16:03 +, Joe wrote:
> I actually use ssh for remote access if I can, but it only allows TCP
> forwarding, so I can get to email but not to anything that requires
> DNS or UDP. A VPN connection gives full access to all network
> protocols.
> The VPN will have a pre-defined IP ad
On Wed, Jan 4, 2023 at 2:20 PM Tim Woodall wrote:
> ...
>
> I've also thought about TOTP dns requests as a type of port knocking : a
> dns request to .knock.example.com would open the ssh port for a
> minute. Small local webpage to do the TOTP port knock in javascript
> should work anywhere. Somet
On Wed, 4 Jan 2023, Joe wrote:
On Tue, 3 Jan 2023 17:06:30 -0500
Tom Browder wrote:
Is it possible to use UFW to limit ssh access to a server by an
external host by its MAC address?
I now have a permanent IPv4 address for my home IP router and would
like to access my home server from my
On Wed, Jan 4, 2023 at 01:06 john doe wrote:
> On 1/3/23 23:06, Tom Browder wrote:
...
This is in addition to the other answers.
>
> If you have a server which is publicly available, you can only
> "restrict" by IP, rate limiting, port nocking and having your server...
Thanks, John Doe, and
On 1/3/23 23:06, Tom Browder wrote:
Is it possible to use UFW to limit ssh access to a server by an external
host by its MAC address?
I now have a permanent IPv4 address for my home IP router and would like to
access my home server from my laptop when away from home, but allow no
other external
On 1/3/23 14:06, Tom Browder wrote:
Is it possible to use UFW to limit ssh access to a server by an external
host by its MAC address?
I now have a permanent IPv4 address for my home IP router and would like to
access my home server from my laptop when away from home, but allow no
other external
On Tue, 3 Jan 2023 17:30:48 -0500
Dan Ritter wrote:
> Tom Browder wrote:
> > Is it possible to use UFW to limit ssh access to a server by an
> > external host by its MAC address?
> >
> > I now have a permanent IPv4 address for my home IP router and would
> > l
On Tue, 3 Jan 2023, Dan Ritter wrote:
Tom Browder wrote:
Is it possible to use UFW to limit ssh access to a server by an external
host by its MAC address?
I now have a permanent IPv4 address for my home IP router and would like to
access my home server from my laptop when away from home, but
On Tue, Jan 3, 2023 at 5:07 PM Tom Browder wrote:
>
> Is it possible to use UFW to limit ssh access to a server by an external host
> by its MAC address?
>
> I now have a permanent IPv4 address for my home IP router and would like to
> access my home server from my laptop w
Tom Browder wrote:
> Is it possible to use UFW to limit ssh access to a server by an external
> host by its MAC address?
>
> I now have a permanent IPv4 address for my home IP router and would like to
> access my home server from my laptop when away from home, but allow no
&
Tom Browder (12023-01-03):
> Is it possible to use UFW to limit ssh access to a server by an external
> host by its MAC address?
>
> I now have a permanent IPv4 address for my home IP router and would like to
> access my home server from my laptop when away from home, but a
On Tue, Jan 03, 2023 at 05:06:30PM -0500, Tom Browder wrote:
> Is it possible to use UFW to limit ssh access to a server by an external
> host by its MAC address?
"External" meaning not on your Local Area Network? In that case, no.
The MAC address of a host that's not on yo
Is it possible to use UFW to limit ssh access to a server by an external
host by its MAC address?
I now have a permanent IPv4 address for my home IP router and would like to
access my home server from my laptop when away from home, but allow no
other external access. Is that possible?
Thanks
For both scenarios, what is the effectively seen MAC address by the
>GW when the VM access the Internet (host or VM MAC address)?
Hello,
Thank you all for contribution.
I will investigate further with wireshark.
Regards,
--
Rand Pritelrohm
> ip link add dev br0 type bridge
> ip link set dev br0 up
>
> ip link set dev eth0 master br0
> ip link set dev eth0 up
> ip addr add 192.168.0.200/24 dev br0
> ip route add default via 192.168.0.1
>
> ip tuntap add tap0 mode tap
> ip
On Sun, Sep 04, 2022 at 09:42:34AM +0200, john doe wrote:
> On 9/4/2022 8:39 AM, Rand Pritelrohm wrote:
[...]
> > #Then I have to enable routing
> > echo '1' > /proc/sys/net/ipv4/ip_forward
> > iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
> >
>
> You are answering your ow
untap add tap0 mode tap
ip link set dev tap0 up
ip link set dev tap0 master br0
The MAC addr of the VM will be seen upstream.
For both scenarios the VM is then setup with it's own MAC address and
it's IP on the configured subnet of the bridge.
Here is my question:
For b
set dev eth0 up
ip addr add 192.168.0.200/24 dev br0
ip route add default via 192.168.0.1
ip tuntap add tap0 mode tap
ip link set dev tap0 up
ip link set dev tap0 master br0
Here is my question:
For both scenarios, what is the effectively seen MAC address by the
tap0 mode tap
ip link set dev tap0 up
ip link set dev tap0 master br0
For both scenarios the VM is then setup with it's own MAC address and
it's IP on the configured subnet of the bridge.
Here is my question:
For both scenarios, what is the effectively seen MAC address by
e VMs. Eventually
> I worked out that the MACs from the VMs were causing my bridge to
> change IP.
OK, for me Debian stretch worked reliable and stable in that the
bridge interface always got the MAC address of the physical eth0
interface which was added as bridge port immediately after bridge
c
he upgrade the bridge interface got its MAC address from
>the physical LAN interface. With Bullseye this is no longer the
>case. Instead, the MAC address seems to be generated "somehow".
>At least, this new address is fixed and doesn't change on each
>reboot.
>
&g
the upgrade the bridge interface got its MAC address from
the physical LAN interface. With Bullseye this is no longer the
case. Instead, the MAC address seems to be generated "somehow".
At least, this new address is fixed and doesn't change on each
reboot.
But how is that MAC address
address from
the physical LAN interface. With Bullseye this is no longer the
case. Instead, the MAC address seems to be generated "somehow".
At least, this new address is fixed and doesn't change on each
reboot.
But how is that MAC address generated? Is it stored somewhere?
Can
config for the VM, set the lladdr.
I'm pleased to report that Dan's solution works perfectly! That is,
(contrary to my misunderstanding) the host (OpenBSD) owns BOTH ends of
the virtual network and can set the MAC address seen by the guest (Debian).
Stay safe and COVID-free, everyone, -- Jonathan
Jonathan Thornburg wrote:
> I have a virtual machine (VM) running Debian 10.10.0 ("Buster") x86-64,
> running in an OpenBSD 7.0 host (using the OpenBSD 'vmm' VM monitor).
...
> So, my question is, how can I set a fixed virtual-ethernet MAC address
> in Debian an
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
tux#
(As is evident from the ifconfig output, there is also an IPv6 address
assigned to the interface, but I'm not using IPv6 here.)
My problem is that by default, Debian randomizes the (virtual) ethernet
MAC address
two sweeps
found. Additionally, there was 1 mac address with no other
information such as an IP address or system name, just that MAC
on a row all by itself.
I had been looking for our DVD player which has the
ability to view streamed movies and I think this might be it.
https
. Additionally, there was 1 mac address with no other
> information such as an IP address or system name, just that MAC
> on a row all by itself.
>
> I had been looking for our DVD player which has the
> ability to view streamed movies and I think this might be it.
https://ouilooku
stuff that the first two sweeps
found. Additionally, there was 1 mac address with no other
information such as an IP address or system name, just that MAC
on a row all by itself.
I had been looking for our DVD player which has the
ability to view streamed movies and I think this might be it
Hi,
On 2021-06-02 8:45 a.m., Gokan Atmaca wrote:
> Hello
>
> There I am trying to compile openvpn. I am getting an error as below.
>
> What can be the problem ?
>
> -% error:
> /usr/bin/install: cannot stat './openvpn.8': No such file or directory
> make[4]: *** [Makefile:515: install-man8] Err
tory '/root/openvpn'
make: *** [Makefile:915: install] Error 2
On Mon, May 31, 2021 at 12:18 PM Gokan Atmaca wrote:
>
> > Mac address is available only on the local network. You usually do not
> > get the mac address of the openvpn client but the mac address of nic of
>
> Mac address is available only on the local network. You usually do not
> get the mac address of the openvpn client but the mac address of nic of
> the last router facing your openvpn server.
You are right. I will try Google 2fa.
On Sat, May 29, 2021 at 9:57 PM Erwan David wrote:
Le 29/05/2021 à 20:09, Gokan Atmaca a écrit :
> Hello
>
> Can we filter MAC addresses of Openvpn clients ?
>
> Thanks.
>
>
>
Mac address is available only on the local network. You usually do not
get the mac address of the openvpn client but the mac address of nic of
the
Hello
Can we filter MAC addresses of Openvpn clients ?
Thanks.
--
⢀⣴⠾⠻⢶⣦⠀
⣾⠁⢠⠒⠀⣿⡁ Debian - The universal operating system
⢿⡄⠘⠷⠚⠋⠀ https://www.debian.org
⠈⠳⣄
manufacturers used the MAC address as a serial number
for their cards. It also meant that you would never have a collision,
two cards using the same MAC address on the same subnet.
Now many of them can change MAC addresses. I notice that my iPhone
under iOS 14 does so routinely (unless told not to) as an
On Mon, 19 Oct 2020 13:18:52 +
Xianwen Chen (陈贤文) wrote:
> I would like to set a permanent MAC address spoofing for both the
> Ethernet and the Wife adapters.
...
> After rebooting, I run "ip addr" to check MAC addresses. The
> Ethernet's MAC address is change
Hi,
I would like to set a permanent MAC address spoofing for both the
Ethernet and the Wife adapters.
I set the following in /etc/network/interfaces:
#
# This file describes the network interfaces available on your system
# and how to
Am Mittwoch, 8. Februar 2017, 16:26:35 CET schrieb commentsab...@riseup.net:
Hi!
Try package "macchanger".
Best
Hans
> Hello,
>
> I am a Debian 8.7 user.
> I use the default Network Manager.
>
> I would like to know if there is a way to automatically spoof the
Hello,
Thank you for your answer.
On 2017-02-09 01:19, Pyroteus wrote:
- give a try # tail
Do you mean "Tails"? Tails is not an option here.
- type on your browser : how to spoof his MAC address on linux
Yeah, I did that, didn't find any working solution so I came
Hello,
Thank you for you answer.
On 2017-02-08 16:38, Michael Lange wrote:
Does this help:
https://help.ubuntu.com/community/AnonymizingNetworkMACAddresses
?
No :(
That is strange, the file already exists (it is a symbolic link):
su
ls -la /etc/network/if-pre-up.d/
lrwxrwxrwx 1 root root
Hi,
On Wed, 08 Feb 2017 16:26:35 -0800
commentsab...@riseup.net wrote:
> Hello,
>
> I am a Debian 8.7 user.
> I use the default Network Manager.
>
> I would like to know if there is a way to automatically spoof the MAC
> address of my wireless interface every time
Hello,
I am a Debian 8.7 user.
I use the default Network Manager.
I would like to know if there is a way to automatically spoof the MAC
address of my wireless interface every time I bring down (and up)?
I have a Thinkpad x210 and there is a physical switch for the wifi
interface. For the
On 12/31/2015 04:42 PM, Vincent Lefevre wrote:
> On 2015-12-30 16:11:39 +0100, Hans wrote:
>> I changed the MAC cause of security purposes in this mail.
>
> FYI:
>
> http://security.stackexchange.com/questions/67893/is-it-dangerous-to-post-my-mac-address-publicly
I disagre
On 2015-12-30 16:11:39 +0100, Hans wrote:
> I changed the MAC cause of security purposes in this mail.
FYI:
http://security.stackexchange.com/questions/67893/is-it-dangerous-to-post-my-mac-address-publicly
--
Vincent Lefèvre - Web: <https://www.vinc17.net/>
100% accessible validate
Joe Pfeiffer writes:
> Muntasim-Ul-Haque writes:
>
>> Hi,
>> How can I determine the IP address if I already have the MAC address
>> or Hardware Address? What is the most convenient way?
>>
>> -Muntasim Ul Haque
>
> The fact that you already have the M
Ahoj,
Dňa Tue, 18 Feb 2014 00:36:08 +0600 Muntasim-Ul-Haque
napísal:
> Hi,
> How can I determine the IP address if I already have the MAC address
> or Hardware Address? What is the most convenient way?
The simplest way is look into (as root):
arp -a
I you are happy man, it will
Muntasim-Ul-Haque writes:
> Hi,
> How can I determine the IP address if I already have the MAC address
> or Hardware Address? What is the most convenient way?
>
> -Muntasim Ul Haque
The fact that you already have the MAC address doesn't matter in finding
out your IP address.
Hi
On Tue, Feb 18, 2014 at 12:36:08AM +0600, Muntasim-Ul-Haque wrote:
> Hi,
> How can I determine the IP address if I already have the MAC address
> or Hardware Address? What is the most convenient way?
I know of no "easy" way - but there *are* two ways I can think
of. Both a
You can't, it's two different thing. As you said the MAC address, is
linked to your hardware, whereas the IP is given by the network, it will
change if you change network.
fabrice
On 02/17/2014 07:36 PM, Muntasim-Ul-Haque wrote:
Hi,
How can I determine the IP address if I already ha
Hi,
How can I determine the IP address if I already have the MAC address or
Hardware Address? What is the most convenient way?
-Muntasim Ul Haque
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.
F:CF:F0:3F
> 00:0F:0F:87:E6:3F
>
> The device will operate just fine with its shiny new MAC address, I'm not
> looking for paths to functionality. What I am wondering is:
>
> 1. What's causing this?
AFAIK, it means that either the device lacks a hardwired MAC, or that th
Hi everybody,
I've noticed that when I re-load my wireless card's driver (rt61pci), the
MAC address changes. Not only that, but the first three octets aren't
correct for the card I have (Edimax EW-7128g). They should be 00:1F:1F.
I also dual boot with Windows 7, which uses drive
On Mon, Sep 5, 2011 at 3:56 PM, Brian wrote:
> On Mon 05 Sep 2011 at 08:41:39 -0400, Tom H wrote:
>>>
>> It's probably hard-wired the MAC into the udev rules. Move
>> "/etc/udev/rules/70-persistent-net.rules" out and reboot (there's
>> probably a way of regenerating it with udevadm but I don't kno
Steven wrote:
> Some time ago, an update on my wheezy system brought in dnet-common and
> some related packages. I noticed that decnet changes the hardware
> address of my interfaces, but didn't pay much attention to it, figuring
I originally reported this as Bug#608807 back in January when I hit
On Mon, 2011-09-05 at 16:22 +0100, Brian wrote:
> On Mon 05 Sep 2011 at 16:58:02 +0200, Steven wrote:
>
> > Thanks, I was able to find the old hw addresses
> > in /etc/udev/rules.d/70-persistent-net.rule (thanks Tom H for the tip),
> > unfortunately the ifconfig method does not persist after rebo
On Mon 05 Sep 2011 at 16:58:02 +0200, Steven wrote:
> Thanks, I was able to find the old hw addresses
> in /etc/udev/rules.d/70-persistent-net.rule (thanks Tom H for the tip),
> unfortunately the ifconfig method does not persist after reboot.
> And I doubt the method Tom H suggested would work sin
On Mon, 2011-09-05 at 13:29 +0100, Darac Marjal wrote:
[...snip...]
>
> According to wikipedia[1], this is a feature, not a bug:
> | The Ethernet implementation was unusual in that the software changed
> | the physical address of the Ethernet interface on the network to
> | AA-00-04-00-xx-yy wher
On Mon 05 Sep 2011 at 08:41:39 -0400, Tom H wrote:
> It's probably hard-wired the MAC into the udev rules. Move
> "/etc/udev/rules/70-persistent-net.rules" out and reboot (there's
> probably a way of regenerating it with udevadm but I don't know it).
> It'll be regenerated with your original MACs.
On Mon, Sep 5, 2011 at 8:10 AM, Steven wrote:
>
> Some time ago, an update on my wheezy system brought in dnet-common and
> some related packages. I noticed that decnet changes the hardware
> address of my interfaces, but didn't pay much attention to it, figuring
> they would at least be unique, s
On Mon, Sep 05, 2011 at 02:10:11PM +0200, Steven wrote:
> Dear Debian users,
>
> Some time ago, an update on my wheezy system brought in dnet-common and
> some related packages. I noticed that decnet changes the hardware
> address of my interfaces, but didn't pay much attention to it, figuring
> t
Dear Debian users,
Some time ago, an update on my wheezy system brought in dnet-common and
some related packages. I noticed that decnet changes the hardware
address of my interfaces, but didn't pay much attention to it, figuring
they would at least be unique, so I could fix up dhcp later. Having a
Martin writes:
> is there private MAC address space?
There are "locally administered addresses" which are what you want (and
have). You set the second least significant bit of the most significant
byte of the address to mark it as local.
You could also use addresses in 00:16:3e:xx
On 05/10/2010 02:50 AM, Martin wrote:
> For IP addresses there are 10.x.x.x , 192.168.x.x IP address that can
> be used for private networks. Is there something similar for MAC
> address of network cards that can be safely used with virtual
> emulators and to be sure not to collide w
On 05/10/2010 11:50 AM, Martin wrote:
For IP addresses there are 10.x.x.x , 192.168.x.x IP address that can
be used for private networks. Is there something similar for MAC
address of network cards that can be safely used with virtual
emulators and to be sure not to collide with any real network
Martin wrote:
> For IP addresses there are 10.x.x.x , 192.168.x.x IP address that can
> be used for private networks. Is there something similar for MAC
> address of network cards that can be safely used with virtual
> emulators and to be sure not to collide with any real network car
For IP addresses there are 10.x.x.x , 192.168.x.x IP address that can
be used for private networks. Is there something similar for MAC
address of network cards that can be safely used with virtual
emulators and to be sure not to collide with any real network card
(current or future)?
Currently I
On Wednesday 06 January 2010 20:01:18 John Hasler wrote:
> Boyd Stephen Smith Jr. writes:
> > MAC addresses are not normally used for network identification outside
> > of their segment. In addition, none of the higher level protocols in
> > common use contain the MAC add
Boyd Stephen Smith Jr. writes:
> MAC addresses are not normally used for network identification outside
> of their segment. In addition, none of the higher level protocols in
> common use contain the MAC address in their headers.
The reason being that said network segments are not ne
In <1262814712.27527.5.ca...@ubuntu>, Vadkan Jozsef wrote:
>How can I get the MAC address of a computer, if it isn't in the same
>network segment?
MAC addresses are not normally used for network identification outside of
their segment. In addition, none of the higher level pr
Hi,
On Wed, Jan 6, 2010 at 11:57 PM, Stan Hoeppner wrote:
> Vadkan Jozsef put forth on 1/6/2010 3:51 PM:
>> How can I get the MAC address of a computer, if it isn't in the same
>> network segment?
>>
>> e.g.: can I get the MAC from a normal, public IP?
>
Vadkan Jozsef put forth on 1/6/2010 3:51 PM:
> How can I get the MAC address of a computer, if it isn't in the same
> network segment?
>
> e.g.: can I get the MAC from a normal, public IP?
>
> There is no solution for this?
tcpdump with the "-e" option will
1 - 100 of 184 matches
Mail list logo