Originally posted by: STaSh
Yes, this is the exact scenario outlined in the link. However, I do not see why the attacker would need to turn off the 'victim', the machine whose MAC they cloned. If you map a single MAC to a port, if the attacker clones it, the switch wouldn't be able to tell, would it?
Which would then bypass the problem of getting a cert, since the victim has already done the authN for you.
If you plugged a computer in with the same MAC address as another computer, you're opening yourself up to being detected. Microsoft Windows will alert you if there is a duplicate MAC on the network, there are also other ways to detect duplicate MAC's. If you want to avoid possibly giving yourself away, you ensure that the victim machine is not online when you turn your machine on. By doing this, there will be a fraction of a second where the port is in the "down" state, and the 802.1x state is reset to de-authenticated, forcing you to have to reauthenticate.
Also, 802.1x does re-auth checks against the client. The time interval is configurable in most implementations. It typically just takes a few milliseconds to re-auth a client, so any deployment I did, I'd probably set the re-auth period pretty low.
It's not as easy as the article suggests although it is possible to do, but that is the case with most things. However, you're getting into an area where it's fairly difficult to get onto a network with 802.1x properly deployed, and very easy to get caught doing it. Given that risk, it would take a pretty determined person to want to take the chance.
Keep in mind that you're also going to have to get past my physical safegaurds to even get access to the network to attempt any of this.