Commit 6f1a8f11 authored by anonym's avatar anonym
Browse files

Remove test of the removed restricted network detector.

parent 05089fa8
......@@ -54,13 +54,6 @@ Feature: Spoofing MAC addresses
But the MAC spoofing panic mode disabled networking
And the real MAC address was not leaked
Scenario: MAC address spoofing causes a network failure
Given the network is unplugged
When I log in to a new session
Then the Tails desktop is ready
Given a wireless NIC's MAC address is blocked by the network
Then I see the "Network connection blocked?" notification
Scenario: The MAC address is not leaked when booting Tails
Given a computer
And I capture all network traffic
......
......@@ -84,10 +84,6 @@ When /^see the "All networking disabled" notification$/ do
robust_notification_wait("MACSpoofNetworkingDisabled.png", 60)
end
Then /^I see the "Network connection blocked\?" notification$/ do
robust_notification_wait("MACSpoofNetworkBlocked.png", 60)
end
Then /^(\d+|no) network interface(?:s)? (?:is|are) enabled$/ do |expected_nr_nics|
# note that "no".to_i => 0 in Ruby.
expected_nr_nics = expected_nr_nics.to_i
......@@ -108,51 +104,3 @@ Then /^the MAC spoofing panic mode disabled networking$/ do
end
end
end
Given /^a wireless NIC's MAC address is blocked by the network$/ do
device = 'wlan0'
test_ssid = 'test-ssid'
# The below log was recorded from Tails based on Debian Wheezy. We
# should update it and this comment whenever we rebase Tails on a
# different version of Debian, or install a new version of
# NetworkManager.
network_manager_info_log_entries = <<-EOF
Activation (#{device}) starting connection '#{test_ssid}'
(#{device}): device state change: disconnected -> prepare (reason 'none') [30 40 0]
Activation (#{device}) Stage 1 of 5 (Device Prepare) scheduled...
Activation (#{device}) Stage 1 of 5 (Device Prepare) started...
Activation (#{device}) Stage 2 of 5 (Device Configure) scheduled...
Activation (#{device}) Stage 1 of 5 (Device Prepare) complete.
Activation (#{device}) Stage 2 of 5 (Device Configure) starting...
(#{device}): device state change: prepare -> config (reason 'none') [40 50 0]
Activation (#{device}/wireless): access point '#{test_ssid}' has security, but secrets are required.
(#{device}): device state change: config -> need-auth (reason 'none') [50 60 0]
Activation (#{device}) Stage 2 of 5 (Device Configure) complete.
get_secret_flags: assertion `is_secret_prop (setting, secret_name, error)' failed
Activation (#{device}) Stage 1 of 5 (Device Prepare) scheduled...
Activation (#{device}) Stage 1 of 5 (Device Prepare) started...
(#{device}): device state change: need-auth -> prepare (reason 'none') [60 40 0]
Activation (#{device}) Stage 2 of 5 (Device Configure) scheduled...
Activation (#{device}) Stage 1 of 5 (Device Prepare) complete.
Activation (#{device}) Stage 2 of 5 (Device Configure) starting...
(#{device}): device state change: prepare -> config (reason 'none') [40 50 0]
Activation (#{device}/wireless): connection '#{test_ssid}' has security, and secrets exist. No new secrets needed.
Config: added 'ssid' value '#{test_ssid}'
Config: added 'scan_ssid' value '1'
Config: added 'key_mgmt' value 'WPA-PSK'
Config: added 'auth_alg' value 'OPEN'
Config: added 'psk' value '<omitted>'
Activation (#{device}) Stage 2 of 5 (Device Configure) complete.
Config: set interface ap_scan to 1
(#{device}): supplicant interface state: inactive -> scanning
(#{device}): supplicant interface state: scanning -> authenticating
(#{device}): supplicant interface state: authenticating -> associating #{device}: link becomes ready
Activation (#{device}/wireless): association took too long.
EOF
tag = 'NetworkManager[666]'
network_manager_info_log_entries.split("\n").each do |line|
line.lstrip!
line.gsub!(/(\"|\`)/) { |match| "\\" + match }
$vm.execute_successfully("logger -t \"#{tag}\" \"<info> #{line}\"")
end
end
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment