MAC spoofing is enabled by default in this test ISO. You can change this with a [[startup option|doc/first_steps/welcome_screen]]. The (preliminary) MAC spoofing documentation tries to explain situations where it actually may be a bad idea to keep this option enabled. However, as this is just a test version we of course urge you to not use it for anything serious, and if possible, to test both to enable and disable the option.
For any MAC spoofing-related issues you experience using this test ISO, please include the output from the following commands when reporting it to us (note: it requires setting an [[doc/first_steps/welcome_screen/administration_password]]):
Some wireless networks are configured to only allow connections for devices with certain MAC addresses, called MAC address whiteallowlisting. MAC address spoofing will cause issues on networks like these. Therefore Tails has a crude mechanism for detecting this, and will show an informative notification about what to do about it.
Some wireless networks are configured to only allow connections for devices with certain MAC addresses, called MAC address allowlisting. MAC address spoofing will cause issues on networks like these. Therefore Tails has a crude mechanism for detecting this, and will show an informative notification about what to do about it.
28
If you have access to a wireless network that employs MAC address whiteallowlisting, then connect to it with MAC spoofing enabled and verify that Tails shows a notification with the headline: "Network connection blocked?".
If you have access to a wireless network that employs MAC address allowlisting, then connect to it with MAC spoofing enabled and verify that Tails shows a notification with the headline: "Network connection blocked?".
29
Note: Tails detection mechanism for MAC address whiteallowlisting only works for wireless (Wi-Fi) networks.