52
10
I am a university student, and my university's network administrator uses MAC addresses (1 MAC address / student) to authorise access to the internet. The students regularly use virtual routing softwares to create a hotspot to connect to their other devices (MAC spooofing is one possible workaround, but spoofing on a handheld device, for example, an android device, requires root access, which itself is a pain to gain).
Recently, the administrator redirected all the students to refrain from using hotspots, otherwise he will punish those who don't comply (by removing the student's MAC address from the authorised MACs database, I suppose). I have a strong feeling that he is just plain bluffing.
My query is, is it at all possible for the administrator to know that a device is using virtual routing to connect to other unauthorised devices?
Note: I tried searching for resources online, for example, how do exactly the virtual routers network, but I couldn't find any substantial information. I would appreciate even if someone could point me to some resources which would be of use to me.
17They won't know via the MAC address, but will be able to find the unauthorized wifi point. At my last job we got a map of all wifi points, authorized and non-authorized, accurate to usually a room. We didn't restrict people to one MAC address, that is too limiting, we just didn't want rogue wifi points. Students would complain to housing, dean, administration and anyone if we tried to restrict them. We found the average student had 3-5 devices on our wifi in dorms and 2 for non-dorm. (Phone, tablet, laptop, xbox, playstation, etc.) – MikeP – 2016-09-15T18:52:58.660
7Depending on the other devices you want to use, the solution may just be to bridge the legitimate connection from your machine to one or more networking cables and plug into those. Those wouldn't be found short of a physical inspection of the room. – SeldomNeedy – 2016-09-15T20:22:49.297
2One of easy ways to detect connection sharing is the examination of TTL values in IP packets, originating from device. There are lists of default TTL values for various operating systems and devices. If a system detects a TTL of (default-1, e.g. 127 when 128 appears in the list of defaults and 127 does not) it can be pretty sure that the packet came from a device on a shared connection. Some 3G mobile providers use that trick as well. – xmp125a – 2016-09-16T13:06:56.310
3WIPS is detection of ANY access points within radio range. An AP without access to the network (or any network) would be detected just as well and drive admin crazy. – Agent_L – 2016-09-16T14:48:18.590
2@xmp125a He can make his computer set the same TTL on all outgoing packets, such as using iptables. – v7d8dpo4 – 2016-09-16T16:17:13.150
Does it mean he can safely use multiple devices if they're connected via ethernet cables or via Wi-Fi in a metal box connected to ground? – v7d8dpo4 – 2016-09-16T16:21:14.793
1@v7d8dpo4 I did not mean to instruct him how to hack his way in, just making him aware that he may be identified quite easily by the administrator. My advice is: talk to admin and ask nicely for authorization for using more devices. – xmp125a – 2016-09-17T14:16:45.880
1@xmp125a: If you're going to do what OP is talking about after being told not to by a BOFH, you really need to be using a VPN for all your traffic, in which case they're not going to be able to examine your TTLs. – R.. GitHub STOP HELPING ICE – 2016-09-18T20:44:36.953