Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6054
13 Jan 2026, 08:34
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:40.808
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
11.262
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.808
Then
the firewall's policy is to drop all IPv4 traffic
0.085
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.261
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.055
And
the firewall is configured to block all external IPv6 traffic
0.051
Hooks
After
features/support/hooks.rb:331
1.059
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
25.417
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.730
And
I capture all network traffic
0.006
When
I successfully start the Unsafe Browser
5.137
And
I open the Tails homepage in the Unsafe Browser
8.376
And
the Tails homepage loads in the Unsafe Browser
0.460
Then
the firewall leak detector has detected leaks
0.706
Hooks
After
features/support/hooks.rb:331
0.910
After
features/support/hooks.rb:100
0.039
Tags:
@product
11.103
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.579
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.144
When
I do a TCP DNS lookup of "torproject.org"
0.294
Then
the firewall leak detector has detected leaks
0.080
Hooks
After
features/support/hooks.rb:331
0.776
After
features/support/hooks.rb:100
0.053
Tags:
@product
11.076
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.709
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.142
When
I do a UDP DNS lookup of "torproject.org"
0.156
Then
the firewall leak detector has detected leaks
0.062
Hooks
After
features/support/hooks.rb:331
0.762
After
features/support/hooks.rb:100
0.043
Tags:
@product
15.018
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.634
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.143
When
I send some ICMP pings
4.146
Then
the firewall leak detector has detected leaks
0.088
Hooks
After
features/support/hooks.rb:331
0.839
After
features/support/hooks.rb:100
0.041
Tags:
@product
@check_tor_leaks
12.051
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.700
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.261
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.088
Hooks
After
features/support/hooks.rb:527
0.344
After
features/support/hooks.rb:331
0.856
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
12.136
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.758
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.275
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.102
Hooks
After
features/support/hooks.rb:527
0.387
After
features/support/hooks.rb:331
0.800
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
16.250
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.753
When
I open an untorified ICMP connection to 1.2.3.4
5.393
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.103
Hooks
After
features/support/hooks.rb:527
0.371
After
features/support/hooks.rb:331
0.613
After
features/support/hooks.rb:100
0.000
Tags:
@product
46.490
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
7.951
And
the system DNS is using the local DNS resolver
0.011
And
the network is plugged
0.064
And
I successfully configure Tor
38.452
Then
the system DNS is still using the local DNS resolver
0.010
Hooks
After
features/support/hooks.rb:331
0.849
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven