Q: Cannot spoof MAC Address on Macbook Pro 2019 13.3 on Big Sur Beta 4

I usually change my MAC Address frequently and it worked perfectly on Catalina, however when I transitioned to Big Sur it didn't seem to work correctly, at least for Beta 4. I would run the command

sudo ifconfig en0 ether yourspoofedmacaddress

where I confirmed that en0 is my wireless device. I would expect that after running ifconfig the en0 interface ether would display the spoofed mac address, and it does, but as soon as it connects to any wifi connection, the en0 interface reverts right back to the original MAC address.

This also happens after I try to spoof any interface MAC address including en1, en2, and en3. These interfaces aren't used at all, but once en0 receives any type of network connection, all of the spoofing reverts.

Any ideas as to why it might not work anymore in Big Sur or any workarounds for that matter?


I had same issue, your solution actually works

sudo ifconfig en0 ether yourspoofedmacaddress

What you have to do is hit up arrow in terminal and keep reentering it rapidly about 3 times and then it changes. I needed to do this to Login to a captive wifi and my IOT devices can't do that so have to spoof from my Mac.


I'm using an M1 MacBook Pro/Big Sur 11.2.3 I've been using the following command to generate MAC addresses:

openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//'

(Also, I'd like to mention that you MUST be disconnected from any AP before attempting to change your MAC otherwise it will be refused.)

I've had no success with the previously stated claim that reentering the command multiple times somehow results in the MAC being accepted, however, I have noticed that there appears to be a pattern as to which MAC addresses are accepted and which aren't.

This is the command to change your MAC address:

sudo ifconfig en0 ether -ADDRESS-

You can easily test if It's worked or not with:

ifconfig

(then checking the 'ether -ADDRESS-' under en0)

Below are some of the addresses I've tested, both working and non-working:

[WORKING]
6a:dc:25:64:92:0b
c4:10:9c:cd:a3:38
de:28:17:27:3d:24
64:40:d4:2a:bf:77
6e:c5:a2:91:93:2b
9c:4a:93:cb:19:ae
d6:01:57:42:d8:60
f8:63:1f:cb:28:33
ca:a2:78:89:dc:80
58:c7:e5:87:a7:26
f8:81:b6:6a:a0:9b
ec:3f:cd:a7:d0:41

[NON-WORKING]
29:c8:a3:bb:00:e0
65:8c:62:47:94:aa
9b:01:2d:be:1f:41
7f:5a:28:df:c5:28
6f:e5:8a:c8:13:83
33:26:14:64:3b:7a
97:3a:e7:b1:b1:af

I'd appreciate it if some of you would try these and report back as to whether they follow the same pattern for you as well. If you could also mention what hardware you are using/what version of Big Sur you have that would help.

I'll continue trying to figure out why only certain MAC addresses are accepted and report back any discoveries.

Finally, if anyone has any alternate syntax for generating MAC addresses using OpenSSL I've found quite a few online and I suspect it could be an issue with the instructions I'm giving OpenSSL in the first place.