[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #11096 [Applications/Tor bundles/installation]: Randomize MAC address before start of Tor



#11096: Randomize MAC address before start of Tor
---------------------------------------------------+-----------------------
 Reporter:  csoghoian                              |          Owner:  erinn
     Type:  enhancement                            |         Status:  new
 Priority:  Medium                                 |      Milestone:
Component:  Applications/Tor bundles/installation  |        Version:
 Severity:  Blocker                                |     Resolution:
 Keywords:  needs-triage                           |  Actual Points:
Parent ID:                                         |         Points:
 Reviewer:                                         |        Sponsor:
---------------------------------------------------+-----------------------
Changes (by nobody):

 * severity:   => Blocker


Comment:

 I do agree.

 I always run:
  macchanger -r --another eth0

 Unfortunately if I forget to do so, or if the connection fails, the system
 takes the permanent MAC back.

 Furthermore it should be nice if the mac were chosen among a good set,
 where by "good" I mean "compatible" with the used HW

 Ticket #10969 (an old one) says:
 «It's well understood that your set of guard nodes can act as a
 fingerprint.»
 Well, currently I always connect to the very same guard node (which is a
 safe one, btw)
 Can anyone pls clarify this point?

 None the less, may be somebody is behind a router or a wan, so even
 changing his local Mac, wouldn't be enough to mask him...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11096#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs