A few days ago, having become frustrated with my Nexus 7 (2012) and its slow decline in performance, combined with feeling generous towards myself, I ordered a Nexus 9.
It arrived today, and I once again have the problem I seem to always have with just about every new wifi device ever -- the thing will not tell me its MAC address.
I have a MAC white-list on my home wifi network. so it is of high utility for me to know the MAC addresses of devices I want to connect to the network before I connect them. A spate of recent devices have had this problem, the Nexus 5 (LG), the Nexus 7 (2012) (Asus), the Nexus 9 (HTC), the Chromecast, the Ouya, my LG DVD player. It's not everything, if I recall correctly, the Roku popped up the MAC address on the screen where you pick the ESSID you want to connect to. Is this really so hard? Shouldn't this be simple basic information? It could be on a sticker on the box, where there is also a serial number and various other device-specific bits of info, or, as for the Roku, it could be discreetly in a corner of the ESSID selection dialog.
And yes, I am familiar with the argument that MAC filters are useless, because MACs can be spoofed and a determined attacker can sniff a valid MAC from routine traffic and spoof it at their leisure. I am not defending against a determined attacker, I am just practicing reasonably simple "defense in depth", in the hopes that maybe the MAC filter will make a non-determined attacker move on to my neighbor and leave me alone. Besides which, it is not, in my opinion, the role of device manufacturers or set-up software authors to dictate network security policy for me. They should provide sufficient info to allow various policies to work.
My solution, incidentally, was rather creative, I thought. I turned on tethering on my phone, and attached the device to the phone, then opened a shell on the phone and looked in the ARP cache (it's in /proc/net/arp, no root access required) to find the MAC address, which I then entered into my home network's white list. The phone tethering does not have a MAC whitelist, because it's not continuously on, so it presents a smaller attack surface.