MAC Address Randomization: Not as Random as You Think

Originally published at: News - Whonix Forum

MAC Address Randomization: Not as Random as You Think

For privacy-minded individuals, randomization of Media Access Control (MAC) addresses for Wi-Fi networks and mobile devices has long been touted as a standard defensive technique. However, recent research [1] suggests that major flaws in implementation have left smartphone users defenseless and vulnerable to exploitation.

What is MAC Address Randomization?

All network interfaces on networked devices have a factory-assigned MAC address which is hard-coded on a network interface controller. In the case of smartphones using 802.11 (Wi-Fi) radio specifications, [2] devices have a 48-bit link-layer MAC address that functions as a globally unique identifier. The MAC address is sent in every link-layer frame sent to or from the mobile device. [3]

Smartphone behavior is distinct from general computing network cards (both wired and wireless), as the MAC address used to assign an address to your computer on the local network is not passively sent to computers beyond the local router. This means the MAC address is not traceable unless logged by other computers on the network. [4]
[5]

Smartphone behavior has grave privacy implications. Any network observer can eavesdrop on nearby Wi-Fi traffic, with pinpointing of this traffic to a uniquely identified device. [6] In addition to broadcasting of the MAC address ID, smartphones send probe requests that broadcast at a semi-constant rate, posing an even greater surveillance risk: [7]

... wireless devices identify access points within close proximity. Traditionally, devices perform active scanning where they broadcast probe request frames asking nearby APs to identify themselves and respond with 802.11 parameter information required for connection setup. These probe request frames require a source MAC address, but if an 802.11 device uses its globally unique MAC address then it is effectively broadcasting its identity at all times to any wireless receiver that is nearby. Wireless device users can then easily be tracked across temporal and spatial boundaries as their devices are transmitting with their unique identity.
In an attempt to solve this problem, most major smartphone device manufacturers and operating systems (Android, iOS etc.) have implemented protocols to create temporary, randomized MAC addresses that are distinct from the true global identifier. Randomized, pseudonym addresses are changed periodically to restrict third party tracking. [8]

In theory, observers of network traffic (like ISPs) should be prevented from singling out smartphone traffic or identifying the physical location from other nearby devices, because randomized MAC addresses shouldn’t be linkable to the previous address. [9]

The Flawed MAC Address Randomization Implementation

Transportation of network traffic without a static ID is a common sense approach for privacy advocates. Unfortunately, a recent study by the US Naval Academy shows the implementation of this technique in smartphones is seriously flawed across every OS platform, device manufacturer and model.

Using real-world datasets, the 2017 study found: [10]

  • Randomization techniques and schemes were easily identified from large collections of wireless traffic.
  • Adoption rates for MAC randomization are low, particularly for Android devices. [11]
  • Passive and active techniques for determining true global identifiers is a trivial task due to flawed MAC randomization implementations, particularly for Android devices. [12]
  • The global MAC address was discoverable via a "control frame attack". This allows tracking/surveillance for all known devices, irrespective of the OS, manufacturer, device type or randomization scheme.
Smartphone chipsets were discovered to have a flaw in how they handled low-level control frames, allowing an identification rate of 100%. Considering previous studies exhibited "only" a 50% accuracy rate, and Android devices were susceptible even when Wi-Fi was disabled or Airplane Mode enabled, this is a devastating result for user privacy. [13]

Conclusion

Unfortunately, smartphone MAC address randomization policies are not universally adopted, nor particularly effective at eliminating privacy risks. Network adversaries currently have a smaller test set to contend with, making their job of identification easier. [14]

Standardized MAC address randomization needs to be correctly implemented on any mobile device using Wi-Fi, with the entire length of the MAC field used as randomization input. Unique methods of randomization simply increase the attacker’s chances of deanonymizing a user. [15]

Other critical changes for smartphone user privacy include: [16] [17]

  • Random addresses for every probe request.
  • Removal of sequencing numbers from probe requests.
  • Removal of global MAC addresses from probe requests.
  • Elimination of directed probe requests for cellular offloading.
  • Redesign of chipset firmware to prevent RTS frames eliciting a CTS response while in State 1.
Convincing device manufacturers to implement MAC address randomization consistently across all devices is a large and improbable undertaking. [18] Without a solution on the horizon, users of mobile devices should expect to be uniquely fingerprinted. User behavior on mobile devices should be adjusted accordingly in response to this clear and present danger to user privacy.

Primary Source

Martin, J. et al. (2017). β€œA Study of MAC Address Randomization in Mobile Devices and When it Fails”. US Naval Academy.


  1. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  2. ↑ https://en.wikipedia.org/wiki/IEEE_802.11
  3. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  4. ↑ Unfortunately, due to weaknesses in current spoofing methods it is likely the MAC address can be enumerated via the physical characteristics of the Wi-Fi card. https://www.whonix.org/wiki/Computer_Security_Education#Introduction_2
  5. ↑ Spoofing is only necessary if you expect to travel with your laptop or PC. It is not required for home PCs that do not change locations. For further information on spoofing MAC addresses in Whonix, see https://www.whonix.org/wiki/Computer_Security_Education#MAC_Address
  6. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  7. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  8. ↑ https://en.wikipedia.org/wiki/MAC_spoofing#MAC_Address_Randomization_in_WiFi
  9. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  10. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  11. ↑ Possibly due to chipset and firmware incompatibilities.
  12. ↑ Notably, Samsung devices were never observed to perform MAC randomization, despite being the leading manufacturer of Android devices.
  13. ↑ https://securityintelligence.com/news/mac-address-randomization-gets-clobbered/
  14. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  15. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  16. ↑ https://arxiv.org/pdf/1703.02874v1.pdf
  17. ↑ See the original paper for further discussion of these issues.
  18. ↑ https://securityintelligence.com/news/mac-address-randomization-gets-clobbered/
1 Like

Edit: Thanks for the blog post and your edits.

Can you edit it on the blog please? Should be possible since you are an
editor nonetheless it already being published.