Project Number Date
test_Tails_ISO_feature-arti 98 26 Jun 2025, 18:32

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 18 6 19 0 0 43 3 6 9 11:49.702 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
1:17.862
Scenario The firewall configuration is very restrictive
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:17.862
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:91:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:9:in `Given I have started Tails from DVD and logged in and the network is connected'
Then the firewall's policy is to drop all IPv4 traffic 0.000
And the firewall is configured to only allow the arti, clearnet and debian-tor users to connect directly to the Internet over IPv4 0.000
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.000
And the firewall is configured to block all external IPv6 traffic 0.000
After features/support/hooks.rb:330 6.235

SCENARIO FAILED: 'The firewall configuration is very restrictive' (at time 06:29:58)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:29:58_The_firewall_configuration_is_very_restrictive.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:29:58_The_firewall_configuration_is_very_restrictive.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:29:58_The_firewall_configuration_is_very_restrictive.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:29:58_The_firewall_configuration_is_very_restrictive.journal

After features/support/hooks.rb:100 0.000
Tags: @product
2:44.552
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.029
Steps
Given I have started Tails from DVD and logged in and the network is connected 33.756
And I capture all network traffic 0.086
When I successfully start the Unsafe Browser 42.227
And I open the Tails homepage in the Unsafe Browser 27.848
And the Tails homepage loads in the Unsafe Browser 1:0.632
cannot find TailsHomepage.png on the screen (FindFailed)
./features/support/helpers/screen.rb:181:in `rescue in wait'
./features/support/helpers/screen.rb:165:in `wait'
./features/step_definitions/browser.rb:316:in `/^the Tails homepage loads in the Unsafe Browser$/'
features/tor_enforcement.feature:20:in `And the Tails homepage loads in the Unsafe Browser'
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 11.732

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 06:32:54)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:32:54_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:32:54_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:32:54_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:32:54_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.042
Tags: @product
1:16.198
Scenario Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.016
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:16.198
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:91:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:24:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a TCP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 5.944

SCENARIO FAILED: 'Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector' (at time 06:34:17)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:34:17_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:34:17_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:34:17_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:34:17_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
57.231
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.023
Given I have started Tails from DVD and logged in and the network is connected 55.977
And I capture all network traffic 0.015
And I disable Tails' firewall 0.312
When I do a UDP DNS lookup of "torproject.org" 0.792
Then the firewall leak detector has detected leaks 0.134
After features/support/hooks.rb:330 0.765
After features/support/hooks.rb:100 0.048
Tags: @product
1:11.733
Scenario Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.015
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:11.733
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:91:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:38:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I send some ICMP pings 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.732

SCENARIO FAILED: 'Anti test: Detecting ICMP leaks of ping with the firewall leak detector' (at time 06:36:33)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:36:33_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:36:33_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:36:33_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:36:33_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
1:17.955
Scenario The Tor enforcement is effective at blocking untorified TCP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Before features/support/hooks.rb:509 0.008
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:17.955
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:91:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:46:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified TCP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:517 0.038
After features/support/hooks.rb:330 6.474

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified TCP connection attempts' (at time 06:37:58)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:37:58_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:37:58_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:37:58_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:37:58_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
48.226
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Before features/support/hooks.rb:509 0.012
Given I have started Tails from DVD and logged in and the network is connected 33.838
When I open an untorified UDP connection to 1.2.3.4 on port 42 11.862
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 2.526
After features/support/hooks.rb:517 3.740
After features/support/hooks.rb:330 1.773
After features/support/hooks.rb:100 0.000
1:18.300
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.031
Before features/support/hooks.rb:509 0.031
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:18.300
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:91:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:97:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:74:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:60:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified ICMP connection to 1.2.3.4 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:517 0.044
After features/support/hooks.rb:330 6.274

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 06:40:17)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:40:17_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:40:17_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:40:17_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-arti/98/artifact/build-artifacts/06:40:17_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
Tags: @product
57.642
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.053
Given I have started Tails from DVD without network and logged in 24.164
And the system DNS is using the local DNS resolver 1.490
And the network is plugged 2.125
And I successfully configure Tor 29.830
Then the system DNS is still using the local DNS resolver 0.030
After features/support/hooks.rb:330 1.588
After features/support/hooks.rb:100 0.000