Project Number Date
test_Tails_ISO_stable 5732 24 Jun 2025, 12:08

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 39 1 3 0 0 43 8 1 9 8:42.871 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
22.855
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.021
Given I have started Tails from DVD and logged in and the network is connected 22.327
Then the firewall's policy is to drop all IPv4 traffic 0.107
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.268
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.074
And the firewall is configured to block all external IPv6 traffic 0.077
After features/support/hooks.rb:330 0.846
After features/support/hooks.rb:100 0.000
Tags: @product
1:37.477
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.020
Given I have started Tails from DVD and logged in and the network is connected 35.269
And I capture all network traffic 0.238
When I successfully start the Unsafe Browser 40.863
And I open the Tails homepage in the Unsafe Browser 17.515
And the Tails homepage loads in the Unsafe Browser 3.127
Then the firewall leak detector has detected leaks 0.462
After features/support/hooks.rb:330 2.088
After features/support/hooks.rb:100 0.034
Tags: @product
57.990
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.016
Given I have started Tails from DVD and logged in and the network is connected 56.738
And I capture all network traffic 0.017
And I disable Tails' firewall 0.334
When I do a TCP DNS lookup of "torproject.org" 0.728
Then the firewall leak detector has detected leaks 0.171
After features/support/hooks.rb:330 0.703
After features/support/hooks.rb:100 0.039
Tags: @product
55.406
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Given I have started Tails from DVD and logged in and the network is connected 50.911
And I capture all network traffic 0.295
And I disable Tails' firewall 0.986
When I do a UDP DNS lookup of "torproject.org" 2.138
Then the firewall leak detector has detected leaks 1.074
After features/support/hooks.rb:330 2.807
After features/support/hooks.rb:100 0.047
Tags: @product
33.188
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.015
Given I have started Tails from DVD and logged in and the network is connected 24.135
And I capture all network traffic 0.058
And I disable Tails' firewall 0.298
When I send some ICMP pings 4.140
Then the firewall leak detector has detected leaks 4.555
After features/support/hooks.rb:330 4.580
After features/support/hooks.rb:100 0.051
1:23.749
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.031
Before features/support/hooks.rb:507 0.035
Given I have started Tails from DVD and logged in and the network is connected 1:22.285
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.390
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.074
After features/support/hooks.rb:515 0.535
After features/support/hooks.rb:330 0.641
After features/support/hooks.rb:100 0.000
38.418
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.019
Before features/support/hooks.rb:507 0.028
Given I have started Tails from DVD and logged in and the network is connected 36.595
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.741
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.081
After features/support/hooks.rb:515 0.464
After features/support/hooks.rb:330 0.763
After features/support/hooks.rb:100 0.000
1:16.606
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Before features/support/hooks.rb:507 0.007
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:16.606
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:60:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified ICMP connection to 1.2.3.4 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:515 0.055
After features/support/hooks.rb:330 6.552

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 06:54:46)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5732/artifact/build-artifacts/06:54:46_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5732/artifact/build-artifacts/06:54:46_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5732/artifact/build-artifacts/06:54:46_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5732/artifact/build-artifacts/06:54:46_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
Tags: @product
57.178
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Given I have started Tails from DVD without network and logged in 21.632
And the system DNS is using the local DNS resolver 0.017
And the network is plugged 0.094
And I successfully configure Tor 35.412
Then the system DNS is still using the local DNS resolver 0.021
After features/support/hooks.rb:330 1.098
After features/support/hooks.rb:100 0.000