Project Number Date
test_Tails_ISO_5501-plaintext-locale-greeter 58 15 Jul 2025, 11:39

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 28 4 11 0 0 43 5 4 9 9:40.354 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
39.108
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Given I have started Tails from DVD and logged in and the network is connected 38.018
Then the firewall's policy is to drop all IPv4 traffic 0.279
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.547
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.158
And the firewall is configured to block all external IPv6 traffic 0.104
After features/support/hooks.rb:330 0.703
After features/support/hooks.rb:100 0.000
Tags: @product
2:40.222
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Steps
Given I have started Tails from DVD and logged in and the network is connected 41.242
And I capture all network traffic 0.008
When I successfully start the Unsafe Browser 38.306
And I open the Tails homepage in the Unsafe Browser 20.601
And the Tails homepage loads in the Unsafe Browser 1:0.063
cannot find TailsHomepage.png on the screen (FindFailed)
./features/support/helpers/screen.rb:181:in `rescue in wait'
./features/support/helpers/screen.rb:165:in `wait'
./features/step_definitions/browser.rb:316:in `/^the Tails homepage loads in the Unsafe Browser$/'
features/tor_enforcement.feature:20:in `And the Tails homepage loads in the Unsafe Browser'
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 7.727

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 05:50:39)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:50:39_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:50:39_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:50:39_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:50:39_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.050
Tags: @product
28.518
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.806
Given I have started Tails from DVD and logged in and the network is connected 25.264
And I capture all network traffic 0.384
And I disable Tails' firewall 0.940
When I do a TCP DNS lookup of "torproject.org" 1.131
Then the firewall leak detector has detected leaks 0.796
After features/support/hooks.rb:330 0.996
After features/support/hooks.rb:100 0.060
Tags: @product
42.587
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.017
Given I have started Tails from DVD and logged in and the network is connected 41.600
And I capture all network traffic 0.008
And I disable Tails' firewall 0.273
When I do a UDP DNS lookup of "torproject.org" 0.567
Then the firewall leak detector has detected leaks 0.137
After features/support/hooks.rb:330 1.611
After features/support/hooks.rb:100 0.063
Tags: @product
37.640
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.032
Given I have started Tails from DVD and logged in and the network is connected 32.202
And I capture all network traffic 0.105
And I disable Tails' firewall 0.914
When I send some ICMP pings 4.312
Then the firewall leak detector has detected leaks 0.104
After features/support/hooks.rb:330 0.966
After features/support/hooks.rb:100 0.045
1:11.762
Scenario The Tor enforcement is effective at blocking untorified TCP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.021
Before features/support/hooks.rb:507 0.018
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:11.762
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:46:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified TCP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:515 0.056
After features/support/hooks.rb:330 6.229

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified TCP connection attempts' (at time 05:53:54)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:53:54_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:53:54_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:53:54_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:53:54_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
1:17.553
Scenario The Tor enforcement is effective at blocking untorified UDP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.016
Before features/support/hooks.rb:507 0.021
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:17.553
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:53:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified UDP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:515 0.058
After features/support/hooks.rb:330 6.491

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified UDP connection attempts' (at time 05:55:18)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:55:18_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:55:18_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:55:18_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:55:18_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
45.449
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.028
Before features/support/hooks.rb:507 0.022
Given I have started Tails from DVD and logged in and the network is connected 37.632
When I open an untorified ICMP connection to 1.2.3.4 6.089
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 1.727
After features/support/hooks.rb:515 7.070
After features/support/hooks.rb:330 2.185
After features/support/hooks.rb:100 0.000
Tags: @product
1:17.511
Scenario The system DNS is always set up to use Tor's DNSPort
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.027
Steps
Given I have started Tails from DVD without network and logged in 1:17.511
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ without\ network\ and\ logged\ in$/'
features/tor_enforcement.feature:66:in `Given I have started Tails from DVD without network and logged in'
And the system DNS is using the local DNS resolver 0.000
And the network is plugged 0.000
And I successfully configure Tor 0.000
Then the system DNS is still using the local DNS resolver 0.000
After features/support/hooks.rb:330 6.483

SCENARIO FAILED: 'The system DNS is always set up to use Tor's DNSPort' (at time 05:57:38)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:57:38_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:57:38_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:57:38_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_5501-plaintext-locale-greeter/58/artifact/build-artifacts/05:57:38_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.journal

After features/support/hooks.rb:100 0.000