Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
5971
27 Nov 2025, 08:15
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:20.244
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
11.688
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.276
Then
the firewall's policy is to drop all IPv4 traffic
0.093
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.179
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.078
And
the firewall is configured to block all external IPv6 traffic
0.060
Hooks
After
features/support/hooks.rb:331
0.909
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
29.106
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.707
And
I capture all network traffic
0.005
When
I successfully start the Unsafe Browser
5.751
And
I open the Tails homepage in the Unsafe Browser
10.181
And
the Tails homepage loads in the Unsafe Browser
0.517
Then
the firewall leak detector has detected leaks
0.943
Hooks
After
features/support/hooks.rb:331
1.281
After
features/support/hooks.rb:100
0.038
Tags:
@product
11.495
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.936
And
I capture all network traffic
0.029
And
I disable Tails' firewall
0.290
When
I do a TCP DNS lookup of "torproject.org"
0.149
Then
the firewall leak detector has detected leaks
0.088
Hooks
After
features/support/hooks.rb:331
0.876
After
features/support/hooks.rb:100
0.047
Tags:
@product
11.576
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.234
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.136
When
I do a UDP DNS lookup of "torproject.org"
0.135
Then
the firewall leak detector has detected leaks
0.063
Hooks
After
features/support/hooks.rb:331
0.733
After
features/support/hooks.rb:100
0.034
Tags:
@product
15.948
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.484
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.154
When
I send some ICMP pings
4.214
Then
the firewall leak detector has detected leaks
0.090
Hooks
After
features/support/hooks.rb:331
0.916
After
features/support/hooks.rb:100
0.030
Tags:
@product
@check_tor_leaks
12.497
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.065
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.303
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.127
Hooks
After
features/support/hooks.rb:527
0.364
After
features/support/hooks.rb:331
1.005
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
12.400
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Before
features/support/hooks.rb:519
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.064
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.275
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.061
Hooks
After
features/support/hooks.rb:527
0.413
After
features/support/hooks.rb:331
1.051
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
17.227
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.839
When
I open an untorified ICMP connection to 1.2.3.4
5.344
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.043
Hooks
After
features/support/hooks.rb:527
0.369
After
features/support/hooks.rb:331
0.738
After
features/support/hooks.rb:100
0.000
Tags:
@product
18.301
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
8.514
And
the system DNS is using the local DNS resolver
0.022
And
the network is plugged
0.068
And
I successfully configure Tor
9.683
Then
the system DNS is still using the local DNS resolver
0.012
Hooks
After
features/support/hooks.rb:331
1.122
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven