Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6268
06 Apr 2026, 17:56
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:22.815
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.875
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.554
Then
the firewall's policy is to drop all IPv4 traffic
0.064
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.137
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.066
And
the firewall is configured to block all external IPv6 traffic
0.052
Hooks
After
features/support/hooks.rb:331
0.883
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
35.138
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.276
And
I capture all network traffic
0.004
When
I successfully start the Unsafe Browser
15.476
And
I open the Tails homepage in the Unsafe Browser
8.626
And
the Tails homepage loads in the Unsafe Browser
0.302
Then
the firewall leak detector has detected leaks
0.451
Hooks
After
features/support/hooks.rb:331
0.810
After
features/support/hooks.rb:100
0.037
Tags:
@product
11.352
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.934
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.134
When
I do a TCP DNS lookup of "torproject.org"
0.236
Then
the firewall leak detector has detected leaks
0.044
Hooks
After
features/support/hooks.rb:331
0.832
After
features/support/hooks.rb:100
0.050
Tags:
@product
11.261
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.807
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.116
When
I do a UDP DNS lookup of "torproject.org"
0.273
Then
the firewall leak detector has detected leaks
0.060
Hooks
After
features/support/hooks.rb:331
0.927
After
features/support/hooks.rb:100
0.037
Tags:
@product
15.128
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.879
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.120
When
I send some ICMP pings
4.077
Then
the firewall leak detector has detected leaks
0.046
Hooks
After
features/support/hooks.rb:331
0.614
After
features/support/hooks.rb:100
0.039
Tags:
@product
@check_tor_leaks
12.444
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.008
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.322
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.113
Hooks
After
features/support/hooks.rb:527
0.293
After
features/support/hooks.rb:331
1.015
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
12.055
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.686
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.291
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.076
Hooks
After
features/support/hooks.rb:527
0.220
After
features/support/hooks.rb:331
0.923
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
16.106
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.671
When
I open an untorified ICMP connection to 1.2.3.4
5.341
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.092
Hooks
After
features/support/hooks.rb:527
0.200
After
features/support/hooks.rb:331
0.902
After
features/support/hooks.rb:100
0.000
Tags:
@product
18.453
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD without network and logged in
6.929
And
the system DNS is using the local DNS resolver
0.009
And
the network is plugged
0.024
And
I successfully configure Tor
11.484
Then
the system DNS is still using the local DNS resolver
0.005
Hooks
After
features/support/hooks.rb:331
0.770
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven