![]() That said, checking the MAC address is not a reliable way to verify your peer's identity, anyway, since MAC addresses are easily forged.ĭepending on your needs, you may want to consider better, well-established and reliable means of host authentication such as TLS client and server certificates. It certainly sees the MAC address, and if you have administrative or SNMP access to it you may query it for that information.Ĭ) Some other host on that network segment you can control, and from which you can issue an ARP request for the IP address of the host under investigation. It may also inadvertently expose it, for example by using it as the host part of its IPv6 address or otherwise including it in its layer 3 traffic, but you cannot rely on that, either.ī) The router forwarding packets from that network segment to you. You could simply ask it, but of course it may lie, so that's hardly useful if your goal is to unmask an impostor. Possibilities:Ī) The remote host itself whose MAC address you want to retrieve. In order to get a MAC address from a network segment you are not directly connected to, you need the cooperation of a node which is directly connected to it. This is the underlying reason why ARP does not work across routers. ![]() Note: If you see an error message to the effect of permission denied, then instead enter su -c /. It is stripped when a packet is passed to layer 3 (network layer). Type /sbin/ifconfig at shell prompt then press Enter button. ![]() The MAC address is a purely layer 2 (link layer) property. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |