GrapheneOS / os-issue-tracker

Issue tracker for GrapheneOS Android Open Source Project hardening work. Standalone projects like Auditor, AttestationServer and hardened_malloc have their own dedicated trackers.
https://grapheneos.org/
365 stars 21 forks source link

Add option for better randomized MAC addresses to workaround enterprise wireless networks from blocking randomized MAC addresses #3013

Open metronidazole opened 11 months ago

metronidazole commented 11 months ago

Randomized wifi mac addresses are easily discernible because the second digit of the MAC address will be a 2, 6, A, or E.

This is a problem when connecting to some enterprise wireless networks (including many eduroam networks) because they enable a feature that prevents clients with a randomized MAC address from connecting.

It would be nice if a feature could be added to improve the privacy of grapheneOS by allowing a randomized MAC address to not follow the standards and thus not be trivially blockable. The risk of conflicts is low and is outweighed by the privacy and usability benefits from such a feature.

ypid commented 1 month ago

The MAC randomization feature randomizes the address by setting the locally administered bit to 1, and the unicast bit to 0. The other 46 bits are randomized.

Ref: https://source.android.com/docs/core/connect/wifi-mac-randomization-behavior

But there is no easy solution to this, see Tails - MAC address anonymization. Any good proposals? How do we get suitable OUIs to use?