Project Number Date
test_Tails_ISO_devel 3903 08 Jul 2025, 18:12

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 32 2 9 0 0 43 7 2 9 9:6.901 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
1:19.206
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 1:18.039
Then the firewall's policy is to drop all IPv4 traffic 0.106
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.849
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.121
And the firewall is configured to block all external IPv6 traffic 0.089
After features/support/hooks.rb:330 1.208
After features/support/hooks.rb:100 0.000
Tags: @product
1:8.432
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.013
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:8.432
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:16:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
When I successfully start the Unsafe Browser 0.000
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 7.431

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 07:10:12)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:10:12_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:10:12_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:10:12_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:10:12_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
38.677
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Given I have started Tails from DVD and logged in and the network is connected 36.174
And I capture all network traffic 0.121
And I disable Tails' firewall 0.651
When I do a TCP DNS lookup of "torproject.org" 1.271
Then the firewall leak detector has detected leaks 0.458
After features/support/hooks.rb:330 0.933
After features/support/hooks.rb:100 0.045
Tags: @product
59.280
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.017
Given I have started Tails from DVD and logged in and the network is connected 57.197
And I capture all network traffic 0.118
And I disable Tails' firewall 0.759
When I do a UDP DNS lookup of "torproject.org" 1.051
Then the firewall leak detector has detected leaks 0.153
After features/support/hooks.rb:330 1.362
After features/support/hooks.rb:100 0.041
Tags: @product
1:13.418
Scenario Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:13.418
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:38:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I send some ICMP pings 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.376

SCENARIO FAILED: 'Anti test: Detecting ICMP leaks of ping with the firewall leak detector' (at time 07:13:12)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:13:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:13:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:13:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3903/artifact/build-artifacts/07:13:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
41.066
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.009
Before features/support/hooks.rb:507 0.009
Given I have started Tails from DVD and logged in and the network is connected 39.581
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.417
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.068
After features/support/hooks.rb:515 0.658
After features/support/hooks.rb:330 0.781
After features/support/hooks.rb:100 0.000
58.194
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.018
Before features/support/hooks.rb:507 0.028
Given I have started Tails from DVD and logged in and the network is connected 56.682
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.403
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.108
After features/support/hooks.rb:515 1.351
After features/support/hooks.rb:330 1.487
After features/support/hooks.rb:100 0.000
1:19.321
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.009
Before features/support/hooks.rb:507 0.007
Given I have started Tails from DVD and logged in and the network is connected 1:13.338
When I open an untorified ICMP connection to 1.2.3.4 5.805
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.177
After features/support/hooks.rb:515 0.736
After features/support/hooks.rb:330 0.871
After features/support/hooks.rb:100 0.000
Tags: @product
49.302
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Given I have started Tails from DVD without network and logged in 19.398
And the system DNS is using the local DNS resolver 0.102
And the network is plugged 0.178
And I successfully configure Tor 28.629
Then the system DNS is still using the local DNS resolver 0.993
After features/support/hooks.rb:330 4.509
After features/support/hooks.rb:100 0.000