Any way to hide my router name

Hi

Any way to change how my router look in repeater mode?

Especially i want to hide my routers name:

As you see on picture routers owner to which I connect in repeater mode can see by device name what it is. Can I hide it fully?

By default it was specified as my router model from factory. I changed to "Hostname" but I want to hide it fully.

that's a TP-Link firmware, ask TP-Link.

2 Likes

According to wiki, https://openwrt.org/docs/guide-user/base-system/system_configuration#system_section, hostname is not required. I do not know what it does without it set though.

Another other option would be to setup the IP statically so that it doesn't request one via DHCP.

No. I run 24 OWRT. I mean hide from upper router. Read carefully please.

I mean you are demanding fixing tplink,s UI from decade ago?

how would we know whether you meant your router, or the upstream one ?
explain carefully please ...

  1. what would it achieve ?
  2. it'll still be listed, without any name, in best case ?

only way to hide, is not to connect to it, or if you're lucky, what @mk24 posted below.

1 Like

If DHCP hostname is not set, OpenWrt will use its Linux hostname. You can set DHCP hostname to something innocent looking like "iPhone". For further privacy and to look more like an iPhone, also set a random MAC address on wwan.

Setting a static IP may fool a TP-Link but it will not work on corporate networks which require clients to complete a DHCP request before they will be served.

1 Like

Sounds like you are stealing someone else’s service and that probably shouldn’t be discussed here.

2 Likes

No! I wanna hide my Owrt repeater mode router from Tp-link router.

How? I am in TP-link administration panel. Both mine. I just wanna use this tweak to use internet in cruise using my router for VPN because my smart watch and TVbox cannot use VPN directly. And I am afraid to use them without VPN. Yeah, tin foil cap.

1 Like

I'm not sure if there is really no better word in english, but the law differentiate between stealing, and stuff like taking the train without a valid ticket.

But still the request by OP (hiding the hostname) is kinda dump, because just set it to something random and consider your life choices.

:popcorn: Nice. It's getting even better! Please keep going!

Seriously, what do you wanna achieve here, it does not make sens!

Either take your meds regularly, or talk to your doctor about your prescription! (No, I'm not kidding.)

if cruise == cruise ship, then you probably won't be able to use your TP-Link anyway, they are detecting those kind of devices based on MAC.

you should put your openwrt device in front, since the MACs can be changed there, to make it look like a phone/tablet/laptop/etc.

oh, some/all also screen your luggage, like at the air port, there's a risk you'll get it confiscated in the "security check".

The network people at the cruise ship is not going to see the name of your OpenWrt router, just the name of your TP-Link router.

However, bear in mind that they have other methods to detect shared connections, like TTL.

This is waaay of topic but you are living very dangerously.
Maritime law is not...
...whatever you think it is.
You are under the authority of the Captain and whatever they say has legal authority.
They can drop you off at any, friendly, port and tell you to find a way home.
They do it all the time.

1 Like

If the repeater is using DHCP to get an address, you can avoid sending the hostname in the DHCP request by setting the hostname to * (asterisk) in the Interface setup.

1 Like

Probably need to hide dhcp client version too...

I do. Tp-link is only as example what I want to hide.

Even if I run OpenWrt on raspberry the same issue.

Once more, I am not talking about Tp-link. It is exactly example which information I wanna hide.

I think so too.

I purchased Gl.inet Flint. In their firmware there s camouflage mode. It helps. So it is possible.

Now I am on it, but flashed plain openwrt. If there is no way to do it in plain openwrt I will just flash their firmware. But I wanna at least try to use it in plain version.

For experiments I have Flint from Glinet and raspberry pi. Both latest versions of OpenWRT

If it hides it from router above, than it should work. Can I have more information how to do it? (I will just reset to default and set it up from scratch not to have any problems)

"Thanks". Public wifi is not secure as attacker can sniff nearly everything. Especially if there is captive portal instead of password like in hotels (not my situation, only as example). Idea of using router to run VPN forcefully and also bypass 3 devices limit. But mostly VPN.

In my situation it is no password wifi (HUGE security red flag) and cruise ship uses MAC address filter. After spoofing MAC and TTL I got in, but it kicks me out if device name looks like router (after changing it to somethinglike "77grest" it helps for some time but then i got kicked out again. So idea is especially HIDE device name (not send it, make it empty or simmilar). It is not forbidden by rules (there is no rule that I cannot use it) but they either slows down my connection to 1kbit/s or kicks from network (after reconnect everything starts to work).

So how to hide device name from UPPER router (ANY upper router, NOT just Tp-link)

Well, their OS is mostly Openwrt based, if it works there, it can be made to work here, but you won't find a big ON/OFF button for it..

Go to Network -> interfaces and set the client interface to "Do not send hostname"

People here need to be a little more respectful...

5 Likes

So, they are actively monitoring the network and you are spoofing the MAC to hide.

That would take human intervention, so they are actively, IRT, trying to throttle and you are evading.

Do you think the IT people on the boat are that inept?
Do you have any idea what I would do if I had been trying to throttle heavy users thinking, maybe, they are not related only to find a device sucking up precious, middle-of-the-ocean bandwidth, without a network name?
I'd simply turn on the "WiFi analyzer" app on my Android phone and hunt you down.

lol.
They keep finding you and shutting you down. Read the room.

Helped! Nothing banned anymore!

So for now working config:

Clone MAC that works (phone for example), set force TTL (input, output and forward to 64), set MTU 1400, and VPN on 443 port, rule to drop all incoming traffic via conntrack (wan non stateful) and hide device name.

It is not banned for like an hour. For now I can say everything works fine.

I think I won :slight_smile:

As I see they cannot do anything now. So yeah, definitely won.