Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6180
02 Mar 2026, 08:04
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:13.370
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.463
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.193
Then
the firewall's policy is to drop all IPv4 traffic
0.060
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.111
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.045
And
the firewall is configured to block all external IPv6 traffic
0.052
Hooks
After
features/support/hooks.rb:331
0.698
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
27.476
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.016
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.356
And
I capture all network traffic
0.003
When
I successfully start the Unsafe Browser
8.897
And
I open the Tails homepage in the Unsafe Browser
7.585
And
the Tails homepage loads in the Unsafe Browser
0.297
Then
the firewall leak detector has detected leaks
0.335
Hooks
After
features/support/hooks.rb:331
0.743
After
features/support/hooks.rb:100
0.029
Tags:
@product
11.743
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.254
And
I capture all network traffic
0.013
And
I disable Tails' firewall
0.152
When
I do a TCP DNS lookup of "torproject.org"
1.229
Then
the firewall leak detector has detected leaks
0.093
Hooks
After
features/support/hooks.rb:331
0.998
After
features/support/hooks.rb:100
0.043
Tags:
@product
11.524
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.129
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.136
When
I do a UDP DNS lookup of "torproject.org"
1.152
Then
the firewall leak detector has detected leaks
0.102
Hooks
After
features/support/hooks.rb:331
0.611
After
features/support/hooks.rb:100
0.068
Tags:
@product
14.381
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.085
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.126
When
I send some ICMP pings
4.076
Then
the firewall leak detector has detected leaks
0.086
Hooks
After
features/support/hooks.rb:331
0.781
After
features/support/hooks.rb:100
0.053
Tags:
@product
@check_tor_leaks
11.797
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.355
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.331
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.110
Hooks
After
features/support/hooks.rb:527
0.162
After
features/support/hooks.rb:331
0.733
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.659
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.355
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.223
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.080
Hooks
After
features/support/hooks.rb:527
0.171
After
features/support/hooks.rb:331
1.051
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
16.063
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.624
When
I open an untorified ICMP connection to 1.2.3.4
5.361
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.076
Hooks
After
features/support/hooks.rb:527
0.160
After
features/support/hooks.rb:331
0.945
After
features/support/hooks.rb:100
0.000
Tags:
@product
18.259
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD without network and logged in
6.690
And
the system DNS is using the local DNS resolver
0.007
And
the network is plugged
0.026
And
I successfully configure Tor
11.530
Then
the system DNS is still using the local DNS resolver
0.004
Hooks
After
features/support/hooks.rb:331
0.949
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven