Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    DHCP lease dubplicate errors.

    Scheduled Pinned Locked Moved DHCP and DNS
    24 Posts 4 Posters 9.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      Darkanyons
      last edited by

      @kejianshi:

      Or the IPs are being handed out VIA DHCP so each time a previously known MACs IP is changed for some reason, you will see that also.

      Thank you.
      Can this scenario result in duplicate lease errors?

      @kejianshi:

      If you see the same MAC used simultaneously and switching back and forth alot its probably been spoofed.  This is an unsercure, unencryped wifi?

      On the logs the mac-changing-errors occurred on the same time. Yes this is unsecured and unencrypted wifi.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        If its unsecure, there, yes.  More than likely someone is using a simple packet sniffer and has a record of all the MACs in use on your system.  This would be very easy for them to get on an unsecure wifi.  Hacking wifi is like a national sport there.

        1 Reply Last reply Reply Quote 0
        • D
          Darkanyons
          last edited by

          waaaaaa…........................ I'll be damned if this is happening here too.

          The log above just shows that the macs have been cycling on just three addresses:
          34:6b:d3:4c:d0:26 = MAC address 346BD3 Company Huawei
          94:db:c9:0e:23:82 = MAC address 94DBC9 Company Azurewave
          8c:a9:82:ac:fc:50  = MAC address 8CA982 Company Intel Corporate

          I'm wondering how to make this public hotspot more secure. should i migrate away from PFs' Captive portal?

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            Use captive portal with WAP2.

            This way, in the future, a person standing to the side can't sniff the unencrypted packets, get your MACs then use the MACs to get a free ride on your wifi.
            It won't prevent one of your customers from sharing the WPA2 key though if they purposely want to do that.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.