When posting questions, it is often quite useful to include debug output. However, it sometimes include the MAC address of my laptop, router, or both.
What are the possible dangers of releasing these mac addresses publicly?
When posting questions, it is often quite useful to include debug output. However, it sometimes include the MAC address of my laptop, router, or both.
What are the possible dangers of releasing these mac addresses publicly?
Disclosing the MAC address in itself shouldn't be a problem. MAC addresses are already quite predictable, easily sniffable, and any form of authentication dependent on them is inherently weak and shouldn't be relied upon.
MAC addresses are almost always only used "internally" (between you and your immediate gateway). They really don't make it to the outside world and thus cannot be used to connect back to you, locate you, or otherwise cause you any direct harm.
The disclosure can be linked to your real identity since it might be possible to track you using data collected from WiFi networks, or it can be used to falsify a device's MAC address to gain access to some service (mostly some networks) on which your MAC address is white-listed.
Personally, I wouldn't really worry about it. However, when it's not inconvenient, I usually try to redact any irrelevant information when asking for help or sharing anything.
A MAC address is a number used to uniquely identify your device on the local network segment. The address is (and needs to be) visible to everyone on the network segment, but because of how network routing works, is not normally visible to anyone else.
Unless you take steps to change it regularly, your MAC address uniquely identifies your device. Someone could use the address you posted to associate the device they've been tracking with an actual person, but if someone's going to the effort to track the movements of a wireless device, they probably already know who owns it.
Certain wireless routers set their default password based on the MAC address. This isn't as useful as it sounds, though: in order to actually use the password, they need to be within radio range of your AP, and in that case, they can simply sniff the MAC address off the air.
The first digits of the MAC address identify the manufacturer of your device. In theory, someone could use this information to make a targeted attack against a security hole in your card's network driver, but I've never heard of it happening in practice.
In short, there are some theoretical hazards, but in practice, anyone in a situation to exploit them has other ways to get your MAC address.
One significant thing is that there are databases that, given a mac address, can give the longitude and latitude of a wifi router. Most try to make sure you can only get your own location, but anyone can drive around and scan for the right mac address.
Skyhook wireless unofficial api
CNET article on google maps' database
Wireless Geographic Logging Engine (thanks to Brad)
Some Belkin routers set a default WPA password that could easily be derived from the router’s MAC address, and if you have one of those routers, then publishing your MAC address is an obvious security risk, because you’re effectively publishing your WPA password. Of course, the real risk is continuing to use the router without changing the default password, since your MAC address can quite easily be discovered by other means.
Mostly, no. If knew your MAC, I could disguise my network card as yours when dealing with a gateway (e.g. a Wi-Fi router); that's pretty much all of it. It's extremely unlikely that this could cause any annoyance to you, let alone pose a security risk. The only situation I can think of is something on the lines of
We're staying at the same hotel. The hotel has a Wi-Fi hotspot, to which both you and I have access; additionally, you bought an Internet pass, which enables you to connect to the Internet through the hotspot.
If I come into knowledge of your MAC address, I could connect to the Wi-Fi network disguising as your network card, therefore gaining access to the Internet. All the traffic I'll generate will appear to come from your computer.
There are no security concerns whatsoever, unless you used some kind of very, very badly designed software that only relies on your MAC to give a computer access to your data and an attacker were on the same network as the listener.
The only serious issue I can think of is identification. MAC addresses are designed to be unique; therefore, if you see a debug report coming from user shelvacu
with the MAC 00:1C:B3:09:85:15
, and then stumble upon another report from user John Doe
with the same MAC, you may conclude quite safely that shelvacu
and John Doe
use the same computer and likely are the same person. See an example of this in the comments to this question.
There was real case when guy discovered that some website used MySQL's UUID value somewhere in URL. Also he learned that output of function contains MAC address. Guy looked up and found that MAC belongs to Dell. So, server is probably Dell make. After making this discovery about 2am he went to sleep and in some reason looked on this site again on morning. For big surprise this time MAC was IBM's. He sent mail to webmaster@xxxxx with question "Hey, what you did with Dell server?" and as he later found, caused quite a big panic inside company. It came out that Dell server failed at night and was replaced with first handy computer. Only sysadmin knew about it. Because someone from outside started to question it seemed that stranger knows too much and most probably server is deeply hacked.
From this viewpoint it is dangerous. At minimum this MAC leak caused some amount of lost work hours for employees.
The short version is the other accepted answers here are more or less correct, essentially you shouldn't assume your mac address is private, and posting it doesn't pose any direct risk to you as a person unless you're trying to remain anonymous.
The long version: To really understand what risks leaking your MAC address poses requires two parts. Firstly to understand what metadata can be derived from it. And secondly the ways in which it can be used as a unique identifier for you.
The MAC address is intended to assist your network in getting you the packets intended for you rather than your co-worker sitting next to you. For legitimate devices it is directly tied to the hardware and often burned into "rom" on the network card itself (but sometimes it's not actually read only). To prevent collisions each vendor has a set of prefixes they're allowed to use, and it's up to them how they use them and how they uniquely generate the rest of the MAC
Therefore you can reliably get
You can get the vendor from Wireshark using their tool
But a hacker can, through a variety of ways, falsify a mac address to pretend to be pretty much anything. Even mimicking another device on the network (though if they do this without knocking the other device out you end up with each device receiving only some of the packets which is both useless to the hacker and alerts the admins that something's probably wrong)
The MAC can reliably (though not uncontestably) tie traffic to a single "machine". This information is overwritten each time traffic passes through a "layer 3" device (like your router). Normally this means that at most your router's mac address could be seen by another machine (and sometimes not even then, depending how the ISPs route their traffic).
Therefore the biggest things to keep in mind if someone hostile got your mac address are
Also if you made it this far you might be really interested in this stuff so here's some links to check out
The other questions are excellent, but something else that wasn't mentioned is in regards to identifying whether a particular device is yours, by a government or organization.
For example, say you are Edward Snowden and you had once posted your Mac address on a public forum where it's clear you are the one who posted it. Now, say that a government raided your house and found your PC with secret classified documents on it. You took great precautions to make sure there were no traces of you, but the government was able to trace your PC's mac address to the post you made, and now they have caught you.
Or, say that you were an American journalist travelling abroad and you captured by the IS IS and they had traced your Mac address you posted on a public forum to identify your PC, and then they had a mole in the USA who accessed your home PC to discover secrets they wanted to know.
Obviously these are rare or next-to-impossible case scenarios, but nonetheless it is a valid risk, even for more obscure and less blatant reasons.
I think it's always best to keep any potentially personally identifying information private at all times except when absolutely demanded, even if you have done nothing wrong. This goes for everything from obvious things like your SSN or birth date, to more subtle things like merely an idea you have for, say, an invention. A MAc address would fall somewhere in between.
On the contrary, however, it is unlikely in most cases that disclosing your Mac address will pose any threat to your security. It's just better safe than sorry.
p.s. one more thing, some websites are advanced enough to register you Mac address internally when you register (it's rare but it has happened). If they have sniffed out your Mac address when you registered with them, they would be able to trace that registration to you if you posted it publicly in another location on the internet under another account. They would be able to determine you are the same person, since all Mac addresses are totally unique (unlike IP addresses which are recycled), and a malicious person may be able to use this information nefariously.
People have hinted around the possibilities of what a known MAC hardware address can deprive a device of. Two very real uses that I have researched and written programs to do: one, if your address is spoofed on another computer packet sniffing becomes very easy (obtaining usernames, passwords... just about every keystroke); two, you could plant packets or data onto a device by spoofing the MAC (I believe the second is more dangerous than the first as it can present many unwanted problems). Unfortunately, the everyday consumer has to deal with communications from their devices through these manners when networked as the identity of it (the MAC address) is the only way to direct the traffic to and from it.