Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_devel
4133
21 Dec 2025, 12:31
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:0.631
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
9.875
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.611
Then
the firewall's policy is to drop all IPv4 traffic
0.038
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.135
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.047
And
the firewall is configured to block all external IPv6 traffic
0.042
Hooks
After
features/support/hooks.rb:331
0.865
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
23.642
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.764
And
I capture all network traffic
0.003
When
I successfully start the Unsafe Browser
5.801
And
I open the Tails homepage in the Unsafe Browser
7.281
And
the Tails homepage loads in the Unsafe Browser
0.363
Then
the firewall leak detector has detected leaks
0.428
Hooks
After
features/support/hooks.rb:331
0.620
After
features/support/hooks.rb:100
0.041
Tags:
@product
10.282
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.927
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.111
When
I do a TCP DNS lookup of "torproject.org"
0.201
Then
the firewall leak detector has detected leaks
0.037
Hooks
After
features/support/hooks.rb:331
0.892
After
features/support/hooks.rb:100
0.067
Tags:
@product
10.177
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.518
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.122
When
I do a UDP DNS lookup of "torproject.org"
0.477
Then
the firewall leak detector has detected leaks
0.055
Hooks
After
features/support/hooks.rb:331
1.065
After
features/support/hooks.rb:100
0.046
Tags:
@product
13.779
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.549
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.113
When
I send some ICMP pings
4.068
Then
the firewall leak detector has detected leaks
0.045
Hooks
After
features/support/hooks.rb:331
0.912
After
features/support/hooks.rb:100
0.046
Tags:
@product
@check_tor_leaks
10.944
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.633
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.240
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.071
Hooks
After
features/support/hooks.rb:527
0.168
After
features/support/hooks.rb:331
0.566
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
10.886
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.587
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.229
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.069
Hooks
After
features/support/hooks.rb:527
0.161
After
features/support/hooks.rb:331
0.738
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
14.954
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.554
When
I open an untorified ICMP connection to 1.2.3.4
5.326
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.073
Hooks
After
features/support/hooks.rb:527
0.157
After
features/support/hooks.rb:331
0.585
After
features/support/hooks.rb:100
0.000
Tags:
@product
16.088
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.002
Steps
Given
I have started Tails from DVD without network and logged in
6.597
And
the system DNS is using the local DNS resolver
0.005
And
the network is plugged
0.015
And
I successfully configure Tor
9.464
Then
the system DNS is still using the local DNS resolver
0.005
Hooks
After
features/support/hooks.rb:331
0.630
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven