Project Number Date
test_Tails_ISO_devel 3908 15 Jul 2025, 22:54

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 37 2 4 0 0 43 7 2 9 9:6.094 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
32.662
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Given I have started Tails from DVD and logged in and the network is connected 30.003
Then the firewall's policy is to drop all IPv4 traffic 1.869
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.560
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.097
And the firewall is configured to block all external IPv6 traffic 0.131
After features/support/hooks.rb:330 0.790
After features/support/hooks.rb:100 0.000
Tags: @product
2:24.089
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.013
Steps
Given I have started Tails from DVD and logged in and the network is connected 22.691
And I capture all network traffic 0.034
When I successfully start the Unsafe Browser 38.376
And I open the Tails homepage in the Unsafe Browser 22.845
And the Tails homepage loads in the Unsafe Browser 1:0.142
cannot find TailsHomepage.png on the screen (FindFailed)
./features/support/helpers/screen.rb:181:in `rescue in wait'
./features/support/helpers/screen.rb:165:in `wait'
./features/step_definitions/browser.rb:316:in `/^the Tails homepage loads in the Unsafe Browser$/'
features/tor_enforcement.feature:20:in `And the Tails homepage loads in the Unsafe Browser'
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 9.712

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 07:10:16)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:10:16_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:10:16_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:10:16_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:10:16_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.052
Tags: @product
26.954
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.030
Given I have started Tails from DVD and logged in and the network is connected 24.945
And I capture all network traffic 0.198
And I disable Tails' firewall 0.818
When I do a TCP DNS lookup of "torproject.org" 0.844
Then the firewall leak detector has detected leaks 0.145
After features/support/hooks.rb:330 0.764
After features/support/hooks.rb:100 0.064
Tags: @product
39.264
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Given I have started Tails from DVD and logged in and the network is connected 37.994
And I capture all network traffic 0.034
And I disable Tails' firewall 0.400
When I do a UDP DNS lookup of "torproject.org" 0.692
Then the firewall leak detector has detected leaks 0.143
After features/support/hooks.rb:330 0.854
After features/support/hooks.rb:100 0.043
Tags: @product
27.769
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Given I have started Tails from DVD and logged in and the network is connected 21.438
And I capture all network traffic 0.094
And I disable Tails' firewall 0.395
When I send some ICMP pings 4.137
Then the firewall leak detector has detected leaks 1.703
After features/support/hooks.rb:330 3.893
After features/support/hooks.rb:100 0.035
1:24.547
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.119
Before features/support/hooks.rb:509 0.106
Given I have started Tails from DVD and logged in and the network is connected 1:21.185
When I open an untorified TCP connection to 1.2.3.4 on port 42 2.963
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.398
After features/support/hooks.rb:517 1.692
After features/support/hooks.rb:330 2.411
After features/support/hooks.rb:100 0.000
39.817
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Before features/support/hooks.rb:509 0.012
Given I have started Tails from DVD and logged in and the network is connected 38.277
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.407
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.133
After features/support/hooks.rb:517 0.455
After features/support/hooks.rb:330 0.770
After features/support/hooks.rb:100 0.000
1:15.098
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Before features/support/hooks.rb:509 0.008
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:15.098
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:60:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified ICMP connection to 1.2.3.4 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:517 0.060
After features/support/hooks.rb:330 6.567

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 07:15:31)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:15:31_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:15:31_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:15:31_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3908/artifact/build-artifacts/07:15:31_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:15.890
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.009
Given I have started Tails from DVD without network and logged in 44.779
And the system DNS is using the local DNS resolver 1.063
And the network is plugged 1.920
And I successfully configure Tor 28.102
Then the system DNS is still using the local DNS resolver 0.025
After features/support/hooks.rb:330 0.742
After features/support/hooks.rb:100 0.000