Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6009
15 Dec 2025, 17:27
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:35.958
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
13.066
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.007
Steps
Given
I have started Tails from DVD and logged in and the network is connected
12.605
Then
the firewall's policy is to drop all IPv4 traffic
0.074
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.223
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.057
And
the firewall is configured to block all external IPv6 traffic
0.106
Hooks
After
features/support/hooks.rb:331
0.797
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
33.417
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.999
And
I capture all network traffic
0.005
When
I successfully start the Unsafe Browser
9.293
And
I open the Tails homepage in the Unsafe Browser
10.608
And
the Tails homepage loads in the Unsafe Browser
0.549
Then
the firewall leak detector has detected leaks
0.960
Hooks
After
features/support/hooks.rb:331
3.134
After
features/support/hooks.rb:100
0.055
Tags:
@product
14.953
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
14.328
And
I capture all network traffic
0.008
And
I disable Tails' firewall
0.153
When
I do a TCP DNS lookup of "torproject.org"
0.318
Then
the firewall leak detector has detected leaks
0.144
Hooks
After
features/support/hooks.rb:331
1.178
After
features/support/hooks.rb:100
0.041
Tags:
@product
12.406
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.007
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.819
And
I capture all network traffic
0.009
And
I disable Tails' firewall
0.187
When
I do a UDP DNS lookup of "torproject.org"
0.298
Then
the firewall leak detector has detected leaks
0.091
Hooks
After
features/support/hooks.rb:331
1.004
After
features/support/hooks.rb:100
0.076
Tags:
@product
16.313
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.014
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.729
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.234
When
I send some ICMP pings
4.121
Then
the firewall leak detector has detected leaks
0.222
Hooks
After
features/support/hooks.rb:331
1.465
After
features/support/hooks.rb:100
0.048
Tags:
@product
@check_tor_leaks
13.401
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Before
features/support/hooks.rb:519
0.007
Steps
Given
I have started Tails from DVD and logged in and the network is connected
12.032
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.262
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.106
Hooks
After
features/support/hooks.rb:527
0.374
After
features/support/hooks.rb:331
1.271
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
12.917
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.469
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.316
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.130
Hooks
After
features/support/hooks.rb:527
0.349
After
features/support/hooks.rb:331
1.243
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
17.571
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.905
When
I open an untorified ICMP connection to 1.2.3.4
5.517
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.148
Hooks
After
features/support/hooks.rb:527
0.332
After
features/support/hooks.rb:331
1.180
After
features/support/hooks.rb:100
0.000
Tags:
@product
21.909
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
9.322
And
the system DNS is using the local DNS resolver
0.016
And
the network is plugged
0.068
And
I successfully configure Tor
12.492
Then
the system DNS is still using the local DNS resolver
0.009
Hooks
After
features/support/hooks.rb:331
0.958
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven