Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_devel
4185
23 Jan 2026, 08:49
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:3.336
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.290
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.998
Then
the firewall's policy is to drop all IPv4 traffic
0.060
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.147
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.040
And
the firewall is configured to block all external IPv6 traffic
0.043
Hooks
After
features/support/hooks.rb:331
0.897
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
24.363
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.624
And
I capture all network traffic
0.003
When
I successfully start the Unsafe Browser
6.811
And
I open the Tails homepage in the Unsafe Browser
7.203
And
the Tails homepage loads in the Unsafe Browser
0.315
Then
the firewall leak detector has detected leaks
0.405
Hooks
After
features/support/hooks.rb:331
0.860
After
features/support/hooks.rb:100
0.062
Tags:
@product
10.281
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.924
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.126
When
I do a TCP DNS lookup of "torproject.org"
0.184
Then
the firewall leak detector has detected leaks
0.040
Hooks
After
features/support/hooks.rb:331
0.874
After
features/support/hooks.rb:100
0.029
Tags:
@product
10.003
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.625
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.130
When
I do a UDP DNS lookup of "torproject.org"
0.207
Then
the firewall leak detector has detected leaks
0.036
Hooks
After
features/support/hooks.rb:331
0.804
After
features/support/hooks.rb:100
0.034
Tags:
@product
13.998
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.665
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.147
When
I send some ICMP pings
4.086
Then
the firewall leak detector has detected leaks
0.094
Hooks
After
features/support/hooks.rb:331
0.724
After
features/support/hooks.rb:100
0.063
Tags:
@product
@check_tor_leaks
10.945
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.620
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.222
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.102
Hooks
After
features/support/hooks.rb:527
0.244
After
features/support/hooks.rb:331
1.004
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
10.890
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.638
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.192
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.059
Hooks
After
features/support/hooks.rb:527
0.152
After
features/support/hooks.rb:331
0.639
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.193
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.794
When
I open an untorified ICMP connection to 1.2.3.4
5.313
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.085
Hooks
After
features/support/hooks.rb:527
0.173
After
features/support/hooks.rb:331
0.784
After
features/support/hooks.rb:100
0.000
Tags:
@product
17.369
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD without network and logged in
6.534
And
the system DNS is using the local DNS resolver
0.005
And
the network is plugged
0.019
And
I successfully configure Tor
10.796
Then
the system DNS is still using the local DNS resolver
0.013
Hooks
After
features/support/hooks.rb:331
0.796
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven