Project Number Date
test_Tails_ISO_5501-plaintext-locale-greeter 35 24 Jun 2025, 17:01

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 32 2 9 0 0 43 7 2 9 7:35.843 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
37.750
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Given I have started Tails from DVD and logged in and the network is connected 35.676
Then the firewall's policy is to drop all IPv4 traffic 0.698
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.746
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.289
And the firewall is configured to block all external IPv6 traffic 0.339
After features/support/hooks.rb:330 1.617
After features/support/hooks.rb:100 0.000
Tags: @product
1:18.619
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.016
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:18.619
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:16:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
When I successfully start the Unsafe Browser 0.000
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 5.773

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 05:28:14)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:28:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:28:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:28:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:28:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
39.330
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Given I have started Tails from DVD and logged in and the network is connected 37.506
And I capture all network traffic 0.009
And I disable Tails' firewall 0.320
When I do a TCP DNS lookup of "torproject.org" 1.215
Then the firewall leak detector has detected leaks 0.279
After features/support/hooks.rb:330 1.260
After features/support/hooks.rb:100 0.038
Tags: @product
1:11.543
Scenario Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:11.543
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:31:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a UDP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 5.787

SCENARIO FAILED: 'Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector' (at time 05:30:12)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:30:12_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:30:12_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:30:12_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/35/artifact/build-artifacts/05:30:12_Anti_test:_Detecting_UDP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
24.275
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Given I have started Tails from DVD and logged in and the network is connected 19.719
And I capture all network traffic 0.007
And I disable Tails' firewall 0.283
When I send some ICMP pings 4.146
Then the firewall leak detector has detected leaks 0.117
After features/support/hooks.rb:330 0.797
After features/support/hooks.rb:100 0.059
33.278
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.031
Before features/support/hooks.rb:507 0.035
Given I have started Tails from DVD and logged in and the network is connected 28.429
When I open an untorified TCP connection to 1.2.3.4 on port 42 4.765
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.083
After features/support/hooks.rb:515 0.314
After features/support/hooks.rb:330 0.650
After features/support/hooks.rb:100 0.000
55.881
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.003
Before features/support/hooks.rb:507 0.003
Given I have started Tails from DVD and logged in and the network is connected 53.177
When I open an untorified UDP connection to 1.2.3.4 on port 42 2.429
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.275
After features/support/hooks.rb:515 1.507
After features/support/hooks.rb:330 0.932
After features/support/hooks.rb:100 0.000
29.123
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Before features/support/hooks.rb:507 0.014
Given I have started Tails from DVD and logged in and the network is connected 23.204
When I open an untorified ICMP connection to 1.2.3.4 5.549
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.368
After features/support/hooks.rb:515 3.122
After features/support/hooks.rb:330 2.456
After features/support/hooks.rb:100 0.000
Tags: @product
1:26.040
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.024
Given I have started Tails from DVD without network and logged in 59.932
And the system DNS is using the local DNS resolver 0.391
And the network is plugged 1.392
And I successfully configure Tor 24.312
Then the system DNS is still using the local DNS resolver 0.012
After features/support/hooks.rb:330 2.617
After features/support/hooks.rb:100 0.000