Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6322
22 Apr 2026, 11:45
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:17.797
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.973
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.601
Then
the firewall's policy is to drop all IPv4 traffic
0.106
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.173
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.050
And
the firewall is configured to block all external IPv6 traffic
0.041
Hooks
After
features/support/hooks.rb:331
0.871
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
31.559
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.009
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.535
And
I capture all network traffic
0.005
When
I successfully start the Unsafe Browser
10.854
And
I open the Tails homepage in the Unsafe Browser
9.361
And
the Tails homepage loads in the Unsafe Browser
0.384
Then
the firewall leak detector has detected leaks
0.417
Hooks
After
features/support/hooks.rb:331
0.726
After
features/support/hooks.rb:100
0.045
Tags:
@product
11.005
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.600
And
I capture all network traffic
0.003
And
I disable Tails' firewall
0.125
When
I do a TCP DNS lookup of "torproject.org"
0.235
Then
the firewall leak detector has detected leaks
0.041
Hooks
After
features/support/hooks.rb:331
0.799
After
features/support/hooks.rb:100
0.053
Tags:
@product
10.871
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.414
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.171
When
I do a UDP DNS lookup of "torproject.org"
0.237
Then
the firewall leak detector has detected leaks
0.043
Hooks
After
features/support/hooks.rb:331
0.828
After
features/support/hooks.rb:100
0.080
Tags:
@product
15.043
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.683
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.146
When
I send some ICMP pings
4.089
Then
the firewall leak detector has detected leaks
0.119
Hooks
After
features/support/hooks.rb:331
0.714
After
features/support/hooks.rb:100
0.056
Tags:
@product
@check_tor_leaks
12.014
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.007
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.596
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.347
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.069
Hooks
After
features/support/hooks.rb:527
0.195
After
features/support/hooks.rb:331
1.114
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.779
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.006
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.382
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.277
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.119
Hooks
After
features/support/hooks.rb:527
0.272
After
features/support/hooks.rb:331
0.733
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.927
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Before
features/support/hooks.rb:519
0.011
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.517
When
I open an untorified ICMP connection to 1.2.3.4
5.334
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.075
Hooks
After
features/support/hooks.rb:527
0.186
After
features/support/hooks.rb:331
0.658
After
features/support/hooks.rb:100
0.000
Tags:
@product
18.622
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.006
Steps
Given
I have started Tails from DVD without network and logged in
7.356
And
the system DNS is using the local DNS resolver
0.010
And
the network is plugged
0.056
And
I successfully configure Tor
11.189
Then
the system DNS is still using the local DNS resolver
0.008
Hooks
After
features/support/hooks.rb:331
0.678
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven