in reply to Add Hash Key Based on Matching Another Key

It looks like your question has been answered well. I just wanted to make sure that you were aware that MAC address can be changed and spoofed. As long as that doesn't happen in your system then you will be fine. But realize that if you key with MAC addresses be prepared for that failure mode.

  • Comment on Re: Add Hash Key Based on Matching Another Key

Replies are listed 'Best First'.
Re^2: Add Hash Key Based on Matching Another Key
by spickles (Scribe) on Jul 29, 2010 at 15:12 UTC

    Thanks zek152. In this case, we're using the burned in MAC of an Access Point, something that's not easily spoofed. Spoofing the MAC of a Linksys router and/or a client laptop wired/wireless is certainly trivial.

    Regards,
    Scott