Project

General

Profile

Bug #16560

MAC spoofing failure sometimes does not disable networking

Added by intrigeri 2 months ago. Updated about 2 months ago.

Status:
Confirmed
Priority:
High
Assignee:
-
Category:
Spoof MAC
Target version:
-
Start date:
03/15/2019
Due date:
% Done:

0%

QA Check:
Feature Branch:
Type of work:
Research
Blueprint:
Starter:
Affected tool:

Description

In some of our most constrived test suite scenarios ("MAC address spoofing fails and macchanger returns true" and "MAC address spoofing fails and the module is not removed") I've recently seen failures: the network interface or NetworkManager is left enabled.

I've seen this happen with both systemd v240 and v241, and both Linux 4.19.20 and 4.19.28.

In passing, I wonder if we should give MACAddressPolicy= a try (systemd.link(5)), let udev set a random MAC address, and keep only our code that detects whether the MAC address was successfully spoofed and if not, switches to "panic mode".

01_45_10_MAC_address_spoofing_fails_and_macchanger_returns_true.journal (245 KB) intrigeri, 03/15/2019 07:44 AM

01_45_27_MAC_address_spoofing_fails_and_the_module_is_not_removed.journal (252 KB) intrigeri, 03/15/2019 07:44 AM

debug.log View (13.2 KB) intrigeri, 03/15/2019 07:44 AM


Related issues

Blocks Tails - Feature #16209: Core work: Foundations Team Confirmed 03/22/2019

History

#1 Updated by intrigeri 2 months ago

#2 Updated by intrigeri about 2 months ago

  • Priority changed from Elevated to High
  • Target version deleted (Tails_3.14)

Also available in: Atom PDF