Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_devel
4241
18 Feb 2026, 20:03
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:2.824
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.098
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.780
Then
the firewall's policy is to drop all IPv4 traffic
0.062
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.147
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.042
And
the firewall is configured to block all external IPv6 traffic
0.065
Hooks
After
features/support/hooks.rb:331
0.642
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
23.567
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.948
And
I capture all network traffic
0.004
When
I successfully start the Unsafe Browser
5.810
And
I open the Tails homepage in the Unsafe Browser
7.030
And
the Tails homepage loads in the Unsafe Browser
0.291
Then
the firewall leak detector has detected leaks
0.482
Hooks
After
features/support/hooks.rb:331
0.632
After
features/support/hooks.rb:100
0.040
Tags:
@product
10.443
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.911
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.136
When
I do a TCP DNS lookup of "torproject.org"
0.348
Then
the firewall leak detector has detected leaks
0.042
Hooks
After
features/support/hooks.rb:331
0.705
After
features/support/hooks.rb:100
0.052
Tags:
@product
10.791
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.657
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.155
When
I do a UDP DNS lookup of "torproject.org"
0.850
Then
the firewall leak detector has detected leaks
0.121
Hooks
After
features/support/hooks.rb:331
0.906
After
features/support/hooks.rb:100
0.059
Tags:
@product
14.058
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.634
And
I capture all network traffic
0.010
And
I disable Tails' firewall
0.193
When
I send some ICMP pings
4.080
Then
the firewall leak detector has detected leaks
0.138
Hooks
After
features/support/hooks.rb:331
0.638
After
features/support/hooks.rb:100
0.060
Tags:
@product
@check_tor_leaks
11.001
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.673
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.252
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.075
Hooks
After
features/support/hooks.rb:527
0.191
After
features/support/hooks.rb:331
0.991
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.250
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.902
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.264
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.082
Hooks
After
features/support/hooks.rb:527
0.173
After
features/support/hooks.rb:331
0.747
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.145
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.788
When
I open an untorified ICMP connection to 1.2.3.4
5.289
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.067
Hooks
After
features/support/hooks.rb:527
0.178
After
features/support/hooks.rb:331
0.856
After
features/support/hooks.rb:100
0.000
Tags:
@product
16.469
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD without network and logged in
6.672
And
the system DNS is using the local DNS resolver
0.005
And
the network is plugged
0.014
And
I successfully configure Tor
9.771
Then
the system DNS is still using the local DNS resolver
0.004
Hooks
After
features/support/hooks.rb:331
0.815
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven