Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6259
03 Apr 2026, 07:24
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:14.294
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
11.522
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.189
Then
the firewall's policy is to drop all IPv4 traffic
0.046
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.147
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.086
And
the firewall is configured to block all external IPv6 traffic
0.051
Hooks
After
features/support/hooks.rb:331
0.666
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
30.140
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.198
And
I capture all network traffic
0.008
When
I successfully start the Unsafe Browser
11.263
And
I open the Tails homepage in the Unsafe Browser
7.971
And
the Tails homepage loads in the Unsafe Browser
0.311
Then
the firewall leak detector has detected leaks
0.386
Hooks
After
features/support/hooks.rb:331
0.856
After
features/support/hooks.rb:100
0.057
Tags:
@product
10.732
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.346
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.134
When
I do a TCP DNS lookup of "torproject.org"
0.212
Then
the firewall leak detector has detected leaks
0.035
Hooks
After
features/support/hooks.rb:331
1.057
After
features/support/hooks.rb:100
0.034
Tags:
@product
10.951
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.104
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.144
When
I do a UDP DNS lookup of "torproject.org"
0.661
Then
the firewall leak detector has detected leaks
0.036
Hooks
After
features/support/hooks.rb:331
0.741
After
features/support/hooks.rb:100
0.051
Tags:
@product
14.477
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.227
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.128
When
I send some ICMP pings
4.077
Then
the firewall leak detector has detected leaks
0.039
Hooks
After
features/support/hooks.rb:331
0.659
After
features/support/hooks.rb:100
0.047
Tags:
@product
@check_tor_leaks
11.485
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.013
Before
features/support/hooks.rb:519
0.008
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.162
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.248
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.074
Hooks
After
features/support/hooks.rb:527
0.171
After
features/support/hooks.rb:331
0.534
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.660
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.334
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.253
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.071
Hooks
After
features/support/hooks.rb:527
0.157
After
features/support/hooks.rb:331
0.911
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.691
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.256
When
I open an untorified ICMP connection to 1.2.3.4
5.347
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.086
Hooks
After
features/support/hooks.rb:527
0.175
After
features/support/hooks.rb:331
0.858
After
features/support/hooks.rb:100
0.000
Tags:
@product
17.632
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD without network and logged in
6.856
And
the system DNS is using the local DNS resolver
0.007
And
the network is plugged
0.018
And
I successfully configure Tor
10.741
Then
the system DNS is still using the local DNS resolver
0.009
Hooks
After
features/support/hooks.rb:331
0.636
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven