From a5d56e3b5443263b53b0487c81125123411bd0cf Mon Sep 17 00:00:00 2001 From: Philip Hands Date: Wed, 11 May 2016 17:11:01 +0200 Subject: move cucumber things under cucumber/ --- features/mac_spoofing.feature | 71 ------------------------------------------- 1 file changed, 71 deletions(-) delete mode 100644 features/mac_spoofing.feature (limited to 'features/mac_spoofing.feature') diff --git a/features/mac_spoofing.feature b/features/mac_spoofing.feature deleted file mode 100644 index 57773721..00000000 --- a/features/mac_spoofing.feature +++ /dev/null @@ -1,71 +0,0 @@ -@product -Feature: Spoofing MAC addresses - In order to not reveal information about the physical location - As a Tails user - I want to be able to control whether my network devices MAC addresses should be spoofed - And I want this feature to fail safe and notify me in case of errors - - Background: - Given I have started Tails from DVD without network and stopped at Tails Greeter's login screen - And I capture all network traffic - And the network is plugged - - @fragile - Scenario: MAC address spoofing is disabled - When I enable more Tails Greeter options - And I disable MAC spoofing in Tails Greeter - And I log in to a new session - And the Tails desktop is ready - And Tor is ready - Then 1 network interface is enabled - And the network device has its default MAC address configured - And the real MAC address was leaked - - @fragile - Scenario: MAC address spoofing is successful - When I log in to a new session - And the Tails desktop is ready - And Tor is ready - Then 1 network interface is enabled - And the network device has a spoofed MAC address configured - And the real MAC address was not leaked - - #10774 - @fragile - Scenario: MAC address spoofing fails and macchanger returns false - Given macchanger will fail by not spoofing and always returns false - When I log in to a new session - And see the "Network card disabled" notification - And the Tails desktop is ready - Then no network interfaces are enabled - And the real MAC address was not leaked - - #10774 - @fragile - Scenario: MAC address spoofing fails and macchanger returns true - Given macchanger will fail by not spoofing and always returns true - When I log in to a new session - And see the "Network card disabled" notification - And the Tails desktop is ready - Then no network interfaces are enabled - And the real MAC address was not leaked - - #10774 - @fragile - Scenario: MAC address spoofing fails and the module is not removed - Given macchanger will fail by not spoofing and always returns true - And no network interface modules can be unloaded - When I log in to a new session - And see the "All networking disabled" notification - And the Tails desktop is ready - Then 1 network interface is enabled - But the MAC spoofing panic mode disabled networking - And the real MAC address was not leaked - - Scenario: The MAC address is not leaked when booting Tails - Given a computer - And I capture all network traffic - When I start the computer - Then the computer boots Tails - And no network interfaces are enabled - And the real MAC address was not leaked -- cgit v1.2.3-70-g09d2