Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6292
14 Apr 2026, 11:45
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:15.664
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
11.421
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.008
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.080
Then
the firewall's policy is to drop all IPv4 traffic
0.063
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.176
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.054
And
the firewall is configured to block all external IPv6 traffic
0.046
Hooks
After
features/support/hooks.rb:331
0.780
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
28.915
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
11.254
And
I capture all network traffic
0.004
When
I successfully start the Unsafe Browser
8.302
And
I open the Tails homepage in the Unsafe Browser
8.475
And
the Tails homepage loads in the Unsafe Browser
0.379
Then
the firewall leak detector has detected leaks
0.499
Hooks
After
features/support/hooks.rb:331
1.061
After
features/support/hooks.rb:100
0.055
Tags:
@product
11.131
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.399
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.152
When
I do a TCP DNS lookup of "torproject.org"
0.407
Then
the firewall leak detector has detected leaks
0.166
Hooks
After
features/support/hooks.rb:331
0.647
After
features/support/hooks.rb:100
0.056
Tags:
@product
11.021
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.460
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.126
When
I do a UDP DNS lookup of "torproject.org"
0.316
Then
the firewall leak detector has detected leaks
0.113
Hooks
After
features/support/hooks.rb:331
0.712
After
features/support/hooks.rb:100
0.028
Tags:
@product
14.882
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.522
And
I capture all network traffic
0.008
And
I disable Tails' firewall
0.152
When
I send some ICMP pings
4.083
Then
the firewall leak detector has detected leaks
0.115
Hooks
After
features/support/hooks.rb:331
0.886
After
features/support/hooks.rb:100
0.048
Tags:
@product
@check_tor_leaks
12.381
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.008
Before
features/support/hooks.rb:519
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.538
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.749
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.093
Hooks
After
features/support/hooks.rb:527
0.264
After
features/support/hooks.rb:331
0.819
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
12.107
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.012
Before
features/support/hooks.rb:519
0.012
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.730
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.284
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.093
Hooks
After
features/support/hooks.rb:527
0.195
After
features/support/hooks.rb:331
0.938
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
16.109
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.641
When
I open an untorified ICMP connection to 1.2.3.4
5.372
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.095
Hooks
After
features/support/hooks.rb:527
0.208
After
features/support/hooks.rb:331
0.875
After
features/support/hooks.rb:100
0.000
Tags:
@product
17.693
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
6.935
And
the system DNS is using the local DNS resolver
0.008
And
the network is plugged
0.050
And
I successfully configure Tor
10.687
Then
the system DNS is still using the local DNS resolver
0.011
Hooks
After
features/support/hooks.rb:331
0.687
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven