Commit 967731d1 authored by bertagaz's avatar bertagaz
Browse files

Merge branch 'devel' into test/10359-force-utf-8

parents 50c660cb a804982a
......@@ -33,7 +33,7 @@ install_torbrowser_AppArmor_profile() {
tmpdir="$(mktemp -d)"
(
cd "$tmpdir"
apt-get source torbrowser-launcher/sid
apt-get source torbrowser-launcher/testing
install -m 0644 \
torbrowser-launcher-*/apparmor/torbrowser.Browser.firefox \
"$PROFILE"
......
......@@ -47,7 +47,7 @@ fi
# To work around this we restart Tor, in various ways, no matter the
# case below.
if [ "$(tails_netconf)" = "obstacle" ]; then
# We do not use retart-tor since it validates that bootstraping
# We do not use restart-tor since it validates that bootstraping
# succeeds. That cannot happen until Tor Launcher has started
# (below) and the user is done configuring it.
service tor restart
......
......@@ -6,17 +6,7 @@ Feature: Installing packages through APT
and all Internet traffic should flow only through Tor.
Background:
Given a computer
And I start the computer
And the computer boots Tails
And I enable more Tails Greeter options
And I set sudo password "asdf"
And I log in to a new session
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
And I save the state so the background can be restored next scenario
Given I have started Tails from DVD and logged in with an administration password and the network is connected
Scenario: APT sources are configured correctly
Then the only hosts in APT sources are "ftp.us.debian.org,security.debian.org,backports.debian.org,deb.tails.boum.org,deb.torproject.org,mozilla.debian.net"
......
@product
Feature: Various checks
Background:
Given a computer
And I start Tails from DVD with network unplugged and I login
And I save the state so the background can be restored next scenario
Scenario: AppArmor is enabled and has enforced profiles
Given I have started Tails from DVD without network and logged in
Then AppArmor is enabled
And some AppArmor profiles are enforced
Scenario: GNOME Screenshot has a sane default save directory
Given I have started Tails from DVD without network and logged in
Then GNOME Screenshot is configured to save files to the live user's home directory
Scenario: GNOME Screenshot takes a screenshot when the PRINTSCREEN key is pressed
Given there is no screenshot in the live user's home directory
Given I have started Tails from DVD without network and logged in
And there is no screenshot in the live user's home directory
When I press the "PRINTSCREEN" key
Then a screenshot is saved to the live user's home directory
Scenario: VirtualBox guest modules are available
Given I have started Tails from DVD without network and logged in
When Tails has booted a 64-bit kernel
Then the VirtualBox guest modules are available
Scenario: The shipped Tails OpenPGP keys are up-to-date
Given I have started Tails from DVD without network and logged in
Then the OpenPGP keys shipped with Tails will be valid for the next 3 months
Scenario: The Tails Debian repository key is up-to-date
Given I have started Tails from DVD without network and logged in
Then the shipped Debian repository key will be valid for the next 3 months
Scenario: The "Report an Error" launcher will open the support documentation
Given the network is plugged
Given I have started Tails from DVD without network and logged in
And the network is plugged
And Tor is ready
And all notifications have disappeared
When I double-click the Report an Error launcher on the desktop
Then the support documentation page opens in Tor Browser
Scenario: The live user is setup correctly
Given I have started Tails from DVD without network and logged in
Then the live user has been setup by live-boot
And the live user is a member of only its own group and "audio cdrom dialout floppy video plugdev netdev fuse scanner lp lpadmin vboxsf"
And the live user owns its home dir and it has normal permissions
Scenario: No initial network
Given I wait between 30 and 60 seconds
Given I have started Tails from DVD without network and logged in
And I wait between 30 and 60 seconds
When the network is plugged
And Tor is ready
And all notifications have disappeared
......@@ -49,45 +53,29 @@ Feature: Various checks
And process "vidalia" is running within 30 seconds
Scenario: The 'Tor is ready' notification is shown when Tor has bootstrapped
Given the network is plugged
Given I have started Tails from DVD without network and logged in
And the network is plugged
When I see the 'Tor is ready' notification
Then Tor is ready
Scenario: The tor process should be confined with Seccomp
Given the network is plugged
Given I have started Tails from DVD without network and logged in
And the network is plugged
And Tor is ready
Then the running process "tor" is confined with Seccomp in filter mode
Scenario: No unexpected network services
Given I have started Tails from DVD without network and logged in
When the network is plugged
And Tor is ready
Then no unexpected services are listening for network connections
Scenario: The emergency shutdown applet can shutdown Tails
Given I have started Tails from DVD without network and logged in
When I request a shutdown using the emergency shutdown applet
Then Tails eventually shuts down
Scenario: The emergency shutdown applet can reboot Tails
Given I have started Tails from DVD without network and logged in
When I request a reboot using the emergency shutdown applet
Then Tails eventually restarts
# We ditch the background snapshot for this scenario since we cannot
# add a filesystem share to a live VM so it would have to be in the
# background above. However, there's a bug that seems to make shares
# impossible to have after a snapshot restore.
Scenario: MAT can clean a PDF file
Given a computer
And I setup a filesystem share containing a sample PDF
And I start Tails from DVD with network unplugged and I login
Then MAT can clean some sample PDF file
Scenario: The Report an Error launcher will open the support documentation in supported non-English locales
Given a computer
And the network is plugged
And I start the computer
And the computer boots Tails
And I log in to a new session in German
And Tails seems to have booted normally
And Tor is ready
When I double-click the Report an Error launcher on the desktop
Then the support documentation page opens in Tor Browser
CAPTURE: false
CAPTURE_ALL: false
MAX_NEW_TOR_CIRCUIT_RETRIES: 5
PAUSE_ON_FAIL: false
SIKULI_RETRY_FINDFAILED: false
MAX_NEW_TOR_CIRCUIT_RETRIES: 5
TMPDIR: "/tmp/TailsToaster"
Unsafe_SSH_private_key: |
......
......@@ -5,28 +5,18 @@ Feature: Getting a DHCP lease without leaking too much information
I should be able to connect to the Internet
and the hostname should not have been leaked on the network.
Scenario: Getting a DHCP lease with the default NetworkManager connection
Given a computer
Background:
Given I have started Tails from DVD without network and logged in
And I capture all network traffic
And I start the computer
And the computer boots Tails
And I log in to a new session
And the Tails desktop is ready
And the network is plugged
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
Scenario: Getting a DHCP lease with the default NetworkManager connection
Then the hostname should not have been leaked on the network
Scenario: Getting a DHCP lease with a manually configured NetworkManager connection
Given a computer
And I capture all network traffic
And I start the computer
And the computer boots Tails
And I log in to a new session
And the Tails desktop is ready
And Tor is ready
And all notifications have disappeared
And available upgrades have been checked
And I add a wired DHCP NetworkManager connection called "manually-added-con"
When I add a wired DHCP NetworkManager connection called "manually-added-con"
And I switch to the "manually-added-con" NetworkManager connection
Then the hostname should not have been leaked on the network
<domain type='kvm' xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0'>
<name>TailsToaster</name>
<memory unit='KiB'>2097152</memory>
<currentMemory unit='KiB'>2097152</currentMemory>
<vcpu>1</vcpu>
......@@ -23,26 +22,17 @@
<source file=''/>
<target dev='hdc' bus='ide'/>
<readonly/>
<address type='drive' controller='0' bus='1' target='0' unit='0'/>
</disk>
<controller type='usb' index='0' model='ich9-ehci1'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x05' function='0x7'/>
</controller>
<controller type='usb' index='0' model='ich9-ehci1'/>
<controller type='usb' index='0' model='ich9-uhci1'>
<master startport='0'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x05' function='0x0' multifunction='on'/>
</controller>
<controller type='ide' index='0'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x01' function='0x1'/>
</controller>
<controller type='virtio-serial' index='0'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x07' function='0x0'/>
</controller>
<controller type='ide' index='0'/>
<controller type='virtio-serial' index='0'/>
<interface type='network'>
<mac address='52:54:00:ac:dd:ee'/>
<source network='TailsToasterNet'/>
<model type='virtio'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>
<link state='up'/>
</interface>
<serial type='tcp'>
......@@ -52,21 +42,15 @@
<input type='tablet' bus='usb'/>
<channel type='spicevmc'>
<target type='virtio' name='com.redhat.spice.0'/>
<address type='virtio-serial' controller='0' bus='0' port='1'/>
</channel>
<graphics type='spice' port='-1' tlsPort='-1' autoport='yes'>
<mouse mode='client'/>
</graphics>
<sound model='ich6'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x04' function='0x0'/>
</sound>
<sound model='ich6'/>
<video>
<model type='qxl' vram='9216' heads='1'/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x02' function='0x0'/>
</video>
<memballoon model='virtio'>
<address type='pci' domain='0x0000' bus='0x00' slot='0x06' function='0x0'/>
</memballoon>
<memballoon model='virtio'/>
</devices>
</domain>
<network>
<name>TailsToasterNet</name>
<forward mode='nat'/>
<bridge name='virbr10' stp='on' delay='0' />
<ip address='10.2.1.1' netmask='255.255.255.0'>
......
......@@ -5,24 +5,18 @@ Feature: Electrum Bitcoin client
And all Internet traffic should flow only through Tor
Scenario: A warning will be displayed if Electrum is not persistent
Given a computer
And I capture all network traffic
And I start the computer
And the computer boots Tails
And I log in to a new session
And the Tails desktop is ready
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
Given I have started Tails from DVD and logged in and the network is connected
When I start Electrum through the GNOME menu
But persistence for "electrum" is not enabled
Then I see a warning that Electrum is not persistent
Scenario: Using a persistent Electrum configuration
Given the USB drive "current" contains Tails with persistence configured and password "asdf"
And a computer
And I start Tails from USB drive "current" and I login with persistence password "asdf"
And persistence for "electrum" is enabled
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And the network is plugged
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
Then persistence for "electrum" is enabled
When I start Electrum through the GNOME menu
But a bitcoin wallet is not present
Then I am prompted to create a new wallet
......@@ -30,8 +24,7 @@ Feature: Electrum Bitcoin client
Then a bitcoin wallet is present
And I see the main Electrum client window
And I shutdown Tails and wait for the computer to power off
Given a computer
And I start Tails from USB drive "current" and I login with persistence password "asdf"
Given I start Tails from USB drive "current" and I login with persistence enabled
When I start Electrum through the GNOME menu
And a bitcoin wallet is present
And I see the main Electrum client window
......
......@@ -5,10 +5,8 @@ Feature: Encryption and verification using GnuPG
And decrypt and verify GnuPG blocks
Background:
Given a computer
And I start Tails from DVD with network unplugged and I login
Given I have started Tails from DVD without network and logged in
And I generate an OpenPGP key named "test" with password "asdf"
And I save the state so the background can be restored next scenario
Scenario: Encryption and decryption using Tails OpenPGP Applet
When I type a message into gedit
......
......@@ -4,24 +4,22 @@ Feature: Using Evince
I want to view and print PDF files in Evince
And AppArmor should prevent Evince from doing dangerous things
Background:
Given a computer
And I start Tails from DVD with network unplugged and I login
And I save the state so the background can be restored next scenario
Scenario: I can view and print a PDF file stored in /usr/share
Given I have started Tails from DVD without network and logged in
When I open "/usr/share/cups/data/default-testpage.pdf" with Evince
Then I see "CupsTestPage.png" after at most 10 seconds
And I can print the current document to "/home/amnesia/output.pdf"
Scenario: I can view and print a PDF file stored in non-persistent /home/amnesia
Given I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia" as user "amnesia"
Given I have started Tails from DVD without network and logged in
And I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia" as user "amnesia"
When I open "/home/amnesia/default-testpage.pdf" with Evince
Then I see "CupsTestPage.png" after at most 10 seconds
And I can print the current document to "/home/amnesia/output.pdf"
Scenario: I cannot view a PDF file stored in non-persistent /home/amnesia/.gnupg
Given I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia/.gnupg" as user "amnesia"
Given I have started Tails from DVD without network and logged in
And I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia/.gnupg" as user "amnesia"
Then the file "/home/amnesia/.gnupg/default-testpage.pdf" exists
And the file "/lib/live/mount/overlay/home/amnesia/.gnupg/default-testpage.pdf" exists
And the file "/live/overlay/home/amnesia/.gnupg/default-testpage.pdf" exists
......@@ -42,30 +40,22 @@ Feature: Using Evince
# as /lib/live/mount/overlay.
And AppArmor has denied "/usr/bin/evince" from opening "/lib/live/mount/overlay/home/amnesia/.gnupg/default-testpage.pdf"
@keep_volumes
Scenario: Installing Tails on a USB drive, creating a persistent partition, copying PDF files to it
Given the USB drive "current" contains Tails with persistence configured and password "asdf"
And a computer
And I start Tails from USB drive "current" with network unplugged and I login with persistence password "asdf"
Scenario: I can view and print a PDF file stored in persistent /home/amnesia/Persistent but not /home/amnesia/.gnupg
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia/Persistent" as user "amnesia"
Then the file "/home/amnesia/Persistent/default-testpage.pdf" exists
And I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia/.gnupg" as user "amnesia"
Then the file "/home/amnesia/.gnupg/default-testpage.pdf" exists
And I shutdown Tails and wait for the computer to power off
@keep_volumes
Scenario: I can view and print a PDF file stored in persistent /home/amnesia/Persistent
Given a computer
And I start Tails from USB drive "current" with network unplugged and I login with persistence password "asdf"
And I start Tails from USB drive "current" with network unplugged and I login with persistence enabled
When I open "/home/amnesia/Persistent/default-testpage.pdf" with Evince
Then I see "CupsTestPage.png" after at most 10 seconds
And I can print the current document to "/home/amnesia/Persistent/output.pdf"
@keep_volumes
Scenario: I cannot view a PDF file stored in persistent /home/amnesia/.gnupg
Given a computer
When I start Tails from USB drive "current" with network unplugged and I login with persistence password "asdf"
Then the file "/home/amnesia/Persistent/default-testpage.pdf" exists
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And I copy "/usr/share/cups/data/default-testpage.pdf" to "/home/amnesia/.gnupg" as user "amnesia"
Then the file "/home/amnesia/.gnupg/default-testpage.pdf" exists
Given I start monitoring the AppArmor log of "/usr/bin/evince"
And I try to open "/home/amnesia/.gnupg/default-testpage.pdf" with Evince
Then I see "EvinceUnableToOpen.png" after at most 10 seconds
......
features/images/USBCloneAndInstall.png

2.02 KB | W: | H:

features/images/USBCloneAndInstall.png

2.18 KB | W: | H:

features/images/USBCloneAndInstall.png
features/images/USBCloneAndInstall.png
features/images/USBCloneAndInstall.png
features/images/USBCloneAndInstall.png
  • 2-up
  • Swipe
  • Onion skin
features/images/USBCloneAndUpgrade.png

2.33 KB | W: | H:

features/images/USBCloneAndUpgrade.png

2.36 KB | W: | H:

features/images/USBCloneAndUpgrade.png
features/images/USBCloneAndUpgrade.png
features/images/USBCloneAndUpgrade.png
features/images/USBCloneAndUpgrade.png
  • 2-up
  • Swipe
  • Onion skin
features/images/USBUpgradeFromISO.png

2.09 KB | W: | H:

features/images/USBUpgradeFromISO.png

2.45 KB | W: | H:

features/images/USBUpgradeFromISO.png
features/images/USBUpgradeFromISO.png
features/images/USBUpgradeFromISO.png
features/images/USBUpgradeFromISO.png
  • 2-up
  • Swipe
  • Onion skin
@product
Feature: Localization
As a Tails user
I want Tails to be localized in my native language
And various Tails features should still work
Scenario: The Report an Error launcher will open the support documentation in supported non-English locales
Given I have started Tails from DVD without network and stopped at Tails Greeter's login screen
And the network is plugged
And I log in to a new session in German
And Tails seems to have booted normally
And Tor is ready
When I double-click the Report an Error launcher on the desktop
Then the support documentation page opens in Tor Browser
Scenario: The Unsafe Browser can be used in all languages supported in Tails
Given I have started Tails from DVD and logged in and the network is connected
Then the Unsafe Browser works in all supported languages
@product
Feature: Metadata Anonymization Toolkit
As a Tails user
I want to be able to remove leaky metadata from documents and media files
# In this feature we cannot restore from snapshots since it's
# incompatible with filesystem shares.
Scenario: MAT can clean a PDF file
Given a computer
And I setup a filesystem share containing a sample PDF
And I start Tails from DVD with network unplugged and I login
Then MAT can clean some sample PDF file
@product
Feature: Tails persistence
As a Tails user
I want to use Tails persistence feature
Scenario: Booting Tails from a USB drive with a disabled persistent partition
Given I have started Tails without network from a USB drive with a persistent partition and stopped at Tails Greeter's login screen
When I log in to a new session
Then Tails seems to have booted normally
And Tails is running from USB drive "current"
And persistence is disabled
But a Tails persistence partition exists on USB drive "current"
Scenario: Booting Tails from a USB drive with an enabled persistent partition
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And Tails is running from USB drive "current"
And all persistence presets are enabled
And all persistent directories have safe access rights
Scenario: Writing files first to a read/write-enabled persistent partition, and then to a read-only-enabled persistent partition
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And I take note of which persistence presets are available
When I write some files expected to persist
And I shutdown Tails and wait for the computer to power off
# XXX: The next step succeeds (and the --debug output confirms that it's actually looking for the files) but will fail in a subsequent scenario restoring the same snapshot. This exactly what we want, but why does it work? What is guestfs's behaviour when qcow2 internal snapshots are involved?
Then only the expected files are present on the persistence partition on USB drive "current"
Given I start Tails from USB drive "current" with network unplugged and I login with read-only persistence enabled
Then Tails is running from USB drive "current"
And the boot device has safe access rights
And all persistence presets are enabled
And there is no GNOME bookmark for the persistent Tor Browser directory
And I write some files not expected to persist
And I remove some files expected to persist
And I take note of which persistence presets are available
And I shutdown Tails and wait for the computer to power off
Then only the expected files are present on the persistence partition on USB drive "current"
Scenario: Deleting a Tails persistent partition
Given I have started Tails without network from a USB drive with a persistent partition and stopped at Tails Greeter's login screen
And I log in to a new session
Then Tails is running from USB drive "current"
And the boot device has safe access rights
And persistence is disabled
But a Tails persistence partition exists on USB drive "current"
And all notifications have disappeared
When I delete the persistent partition
Then there is no persistence partition on USB drive "current"
......@@ -7,26 +7,22 @@ Feature: Chatting anonymously using Pidgin
And AppArmor should prevent Pidgin from doing dangerous things
And all Internet traffic should flow only through Tor
Background:
Given a computer
When I start Tails from DVD and I login
Then Pidgin has the expected accounts configured with random nicknames
And I save the state so the background can be restored next scenario
@check_tor_leaks
Scenario: Chatting with some friend over XMPP
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
When I create my XMPP account
And I close Pidgin's account manager window
Then Pidgin automatically enables my XMPP account
Given my XMPP friend goes online
When I start a conversation with my friend
And I say something to my friend
Then I receive a response from my friend
@check_tor_leaks
Scenario: Chatting with some friend over XMPP
Given I have started Tails from DVD and logged in and the network is connected
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
When I create my XMPP account
And I close Pidgin's account manager window
Then Pidgin automatically enables my XMPP account
Given my XMPP friend goes online
When I start a conversation with my friend
And I say something to my friend
Then I receive a response from my friend
@check_tor_leaks
Scenario: Chatting with some friend over XMPP in a multi-user chat
Given I have started Tails from DVD and logged in and the network is connected
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
When I create my XMPP account
......@@ -41,6 +37,7 @@ Feature: Chatting anonymously using Pidgin
@check_tor_leaks
Scenario: Chatting with some friend over XMPP and with OTR
Given I have started Tails from DVD and logged in and the network is connected
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
When I create my XMPP account
......@@ -56,6 +53,8 @@ Feature: Chatting anonymously using Pidgin
@check_tor_leaks
Scenario: Connecting to the #tails IRC channel with the pre-configured account
Given I have started Tails from DVD and logged in and the network is connected
And Pidgin has the expected accounts configured with random nicknames
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
When I activate the "irc.oftc.net" Pidgin account
......@@ -70,13 +69,15 @@ Feature: Chatting anonymously using Pidgin
And the "irc.oftc.net" account only responds to PING and VERSION CTCP requests
Scenario: Adding a certificate to Pidgin
Given I have started Tails from DVD and logged in and the network is connected
And I start Pidgin through the GNOME menu
And I see Pidgin's account manager window
And I close Pidgin's account manager window
Then I can add a certificate from the "/home/amnesia" directory to Pidgin
Scenario: Failing to add a certificate to Pidgin
And I start Pidgin through the GNOME menu
Given I have started Tails from DVD and logged in and the network is connected
When I start Pidgin through the GNOME menu
And I see Pidgin's account manager window
And I close Pidgin's account manager window
Then I cannot add a certificate from the "/home/amnesia/.gnupg" directory to Pidgin
......@@ -87,11 +88,14 @@ Feature: Chatting anonymously using Pidgin
And I close Pidgin's certificate manager
Then I cannot add a certificate from the "/live/overlay/home/amnesia/.gnupg" directory to Pidgin
@keep_volumes @check_tor_leaks
@check_tor_leaks
Scenario: Using a persistent Pidgin configuration
Given the USB drive "current" contains Tails with persistence configured and password "asdf"
And a computer
And I start Tails from USB drive "current" and I login with persistence password "asdf"
Given I have started Tails without network from a USB drive with a persistent partition enabled and logged in
And Pidgin has the expected accounts configured with random nicknames
And the network is plugged
And Tor is ready
And available upgrades have been checked
And all notifications have disappeared
When I start Pidgin through the GNOME menu
Then I see Pidgin's account manager window
# And I generate an OTR key for the default Pidgin account
......@@ -99,7 +103,7 @@ Feature: Chatting anonymously using Pidgin
# And I take note of the OTR key for Pidgin's "irc.oftc.net" account
And I shutdown Tails and wait for the computer to power off
Given a computer
And I start Tails from USB drive "current" and I login with persistence password "asdf"
And I start Tails from USB drive "current" and I login with persistence enabled
And Pidgin has the expected persistent accounts configured
# And Pidgin has the expected persistent OTR keys
When I start Pidgin through the GNOME menu
......
......@@ -6,39 +6,23 @@ Feature: Root access control enforcement
But when I do not set an administration password
I should not be able to attain administration privileges at all.
Background:
Given a computer
And the network is unplugged
And I start the computer
And the computer boots Tails
And I save the state so the background can be restored next scenario
Scenario: If an administrative password is set in Tails Greeter the live user should be able to run arbitrary commands with administrative privileges.
Given I enable more Tails Greeter options
And I set sudo password "asdf"
And I log in to a new session
And Tails Greeter has dealt with the sudo password
Given I have started Tails from DVD without network and logged in with an administration password
Then I should be able to run administration commands as the live user