Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6036
05 Jan 2026, 17:19
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:14.102
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.982
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.534
Then
the firewall's policy is to drop all IPv4 traffic
0.120
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.216
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.048
And
the firewall is configured to block all external IPv6 traffic
0.063
Hooks
After
features/support/hooks.rb:331
0.845
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
27.707
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.946
And
I capture all network traffic
0.004
When
I successfully start the Unsafe Browser
7.579
And
I open the Tails homepage in the Unsafe Browser
7.871
And
the Tails homepage loads in the Unsafe Browser
0.594
Then
the firewall leak detector has detected leaks
0.710
Hooks
After
features/support/hooks.rb:331
1.091
After
features/support/hooks.rb:100
0.042
Tags:
@product
11.060
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.365
And
I capture all network traffic
0.009
And
I disable Tails' firewall
0.229
When
I do a TCP DNS lookup of "torproject.org"
0.396
Then
the firewall leak detector has detected leaks
0.058
Hooks
After
features/support/hooks.rb:331
0.700
After
features/support/hooks.rb:100
0.042
Tags:
@product
11.757
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.010
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.821
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.133
When
I do a UDP DNS lookup of "torproject.org"
0.739
Then
the firewall leak detector has detected leaks
0.056
Hooks
After
features/support/hooks.rb:331
1.158
After
features/support/hooks.rb:100
0.074
Tags:
@product
15.301
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.943
And
I capture all network traffic
0.008
And
I disable Tails' firewall
0.176
When
I send some ICMP pings
4.056
Then
the firewall leak detector has detected leaks
0.116
Hooks
After
features/support/hooks.rb:331
0.952
After
features/support/hooks.rb:100
0.071
Tags:
@product
@check_tor_leaks
11.924
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.497
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.286
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.141
Hooks
After
features/support/hooks.rb:527
0.463
After
features/support/hooks.rb:331
0.918
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.829
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.442
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.264
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.122
Hooks
After
features/support/hooks.rb:527
0.250
After
features/support/hooks.rb:331
0.690
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
16.052
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.590
When
I open an untorified ICMP connection to 1.2.3.4
5.392
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.069
Hooks
After
features/support/hooks.rb:527
0.215
After
features/support/hooks.rb:331
1.058
After
features/support/hooks.rb:100
0.000
Tags:
@product
17.485
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD without network and logged in
7.328
And
the system DNS is using the local DNS resolver
0.014
And
the network is plugged
0.051
And
I successfully configure Tor
10.085
Then
the system DNS is still using the local DNS resolver
0.005
Hooks
After
features/support/hooks.rb:331
0.722
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven