linux/iptables, the sort-of blacklist way, this will drop all traffic originating from the specified mac addresses:
iptables -I INPUT 1 -m mac --mac-source <blacklisted mac 1> -j DROP
iptables -I INPUT 1 -m mac --mac-source <blacklisted mac 2> -j DROP
However, I'm not really sure if this is what you want, the mac-address isn't really a reliable method of filtering your traffic. Most modern NICs allow you to change your mac-address, and if the ip-packet that the ethernet-frame encapsulates has passed through a router, the source-mac-address on the ethernet-frame is going to be the one of the last router it passed through and not the originating computer.
I would suggest looking into mod_auth_basic or something similiar, it's much more forgiving than iptables when making mistakes. And if you do decide to go down the iptables route, I would suggest more of a whitelisting approach where iptables drop certain traffic by default and then allow through what you want.
iptables -A INPUT -p tcp --dport 80 -m mac --source <your mac> -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -m mac --source <your partners mac> -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP