Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6183
04 Mar 2026, 08:24
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:25.731
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
12.329
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.010
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.938
Then
the firewall's policy is to drop all IPv4 traffic
0.074
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.200
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.057
And
the firewall is configured to block all external IPv6 traffic
0.058
Hooks
After
features/support/hooks.rb:331
1.029
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
29.745
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.651
And
I capture all network traffic
0.006
When
I successfully start the Unsafe Browser
8.721
And
I open the Tails homepage in the Unsafe Browser
8.210
And
the Tails homepage loads in the Unsafe Browser
0.421
Then
the firewall leak detector has detected leaks
0.734
Hooks
After
features/support/hooks.rb:331
1.143
After
features/support/hooks.rb:100
0.035
Tags:
@product
12.249
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.570
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.161
When
I do a TCP DNS lookup of "torproject.org"
0.440
Then
the firewall leak detector has detected leaks
0.072
Hooks
After
features/support/hooks.rb:331
1.053
After
features/support/hooks.rb:100
0.060
Tags:
@product
12.331
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.030
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.823
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.145
When
I do a UDP DNS lookup of "torproject.org"
0.285
Then
the firewall leak detector has detected leaks
0.069
Hooks
After
features/support/hooks.rb:331
1.030
After
features/support/hooks.rb:100
0.063
Tags:
@product
15.821
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.506
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.135
When
I send some ICMP pings
4.092
Then
the firewall leak detector has detected leaks
0.079
Hooks
After
features/support/hooks.rb:331
1.225
After
features/support/hooks.rb:100
0.047
Tags:
@product
@check_tor_leaks
13.073
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.007
Before
features/support/hooks.rb:519
0.017
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.684
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.288
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.101
Hooks
After
features/support/hooks.rb:527
0.412
After
features/support/hooks.rb:331
0.883
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
13.031
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.628
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.296
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.105
Hooks
After
features/support/hooks.rb:527
0.412
After
features/support/hooks.rb:331
0.863
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
17.195
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.743
When
I open an untorified ICMP connection to 1.2.3.4
5.353
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.098
Hooks
After
features/support/hooks.rb:527
0.363
After
features/support/hooks.rb:331
0.698
After
features/support/hooks.rb:100
0.000
Tags:
@product
19.952
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
8.471
And
the system DNS is using the local DNS resolver
0.010
And
the network is plugged
0.075
And
I successfully configure Tor
11.384
Then
the system DNS is still using the local DNS resolver
0.009
Hooks
After
features/support/hooks.rb:331
1.009
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven