Project Number Date
test_Tails_ISO_20904-tor-browser-14.5-force-all-tests 1 22 Apr 2025, 21:43

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 39 1 3 0 0 43 8 1 9 3:16.232 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
12.491
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Given I have started Tails from DVD and logged in and the network is connected 11.878
Then the firewall's policy is to drop all IPv4 traffic 0.182
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.262
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.078
And the firewall is configured to block all external IPv6 traffic 0.089
After features/support/hooks.rb:330 0.626
After features/support/hooks.rb:100 0.000
Tags: @product
1:12.371
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.007
Steps
Given I have started Tails from DVD and logged in and the network is connected 12.190
And I capture all network traffic 0.006
When I successfully start the Unsafe Browser 1:0.174
try_for() timeout expired
Last ignored exception was: Dogtail::Failure: The Dogtail init script raised: SearchError: child of [desktop frame | main]: "Firefox" application
STDOUT:

STDERR:


./features/support/helpers/dogtail.rb:93:in `run'
./features/support/helpers/dogtail.rb:70:in `initialize'
./features/step_definitions/common_steps.rb:1046:in `new'
./features/step_definitions/common_steps.rb:1046:in `block in launch_app'
./features/support/helpers/misc_helpers.rb:78:in `block (2 levels) in try_for'
./features/support/helpers/misc_helpers.rb:66:in `loop'
./features/support/helpers/misc_helpers.rb:66:in `block in try_for'
./features/support/helpers/misc_helpers.rb:65:in `try_for'
./features/step_definitions/common_steps.rb:1045:in `launch_app'
./features/step_definitions/common_steps.rb:1117:in `launch_unsafe_browser'
./features/step_definitions/browser.rb:69:in `block in <top (required)>'
./features/step_definitions/browser.rb:73:in `block in <top (required)>' (Timeout::Error)
./features/support/helpers/misc_helpers.rb:145:in `rescue in try_for'
./features/support/helpers/misc_helpers.rb:51:in `try_for'
./features/step_definitions/common_steps.rb:1045:in `launch_app'
./features/step_definitions/common_steps.rb:1117:in `launch_unsafe_browser'
./features/step_definitions/browser.rb:69:in `/^I (try to )?start the Unsafe Browser$/'
./features/step_definitions/browser.rb:73:in `/^I successfully start the Unsafe Browser(?: in "([^"]+)")?$/'
features/tor_enforcement.feature:18:in `When I successfully start the Unsafe Browser'
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 8.092

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 04:41:43)

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_20904-tor-browser-14.5-force-all-tests/1/artifact/build-artifacts/04:41:43_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_20904-tor-browser-14.5-force-all-tests/1/artifact/build-artifacts/04:41:43_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_20904-tor-browser-14.5-force-all-tests/1/artifact/build-artifacts/04:41:43_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.051
Tags: @product
14.365
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 11.746
And I capture all network traffic 0.007
And I disable Tails' firewall 0.265
When I do a TCP DNS lookup of "torproject.org" 2.249
Then the firewall leak detector has detected leaks 0.096
After features/support/hooks.rb:330 0.640
After features/support/hooks.rb:100 0.055
Tags: @product
13.139
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 12.095
And I capture all network traffic 0.005
And I disable Tails' firewall 0.231
When I do a UDP DNS lookup of "torproject.org" 0.719
Then the firewall leak detector has detected leaks 0.087
After features/support/hooks.rb:330 0.607
After features/support/hooks.rb:100 0.055
Tags: @product
16.253
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 11.664
And I capture all network traffic 0.005
And I disable Tails' firewall 0.244
When I send some ICMP pings 4.154
Then the firewall leak detector has detected leaks 0.184
After features/support/hooks.rb:330 0.658
After features/support/hooks.rb:100 0.055
13.076
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:511 0.006
Given I have started Tails from DVD and logged in and the network is connected 11.706
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.293
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.076
After features/support/hooks.rb:519 0.189
After features/support/hooks.rb:330 0.614
After features/support/hooks.rb:100 0.000
13.447
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:511 0.005
Given I have started Tails from DVD and logged in and the network is connected 12.001
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.372
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.073
After features/support/hooks.rb:519 0.190
After features/support/hooks.rb:330 0.672
After features/support/hooks.rb:100 0.000
17.207
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Before features/support/hooks.rb:511 0.006
Given I have started Tails from DVD and logged in and the network is connected 11.762
When I open an untorified ICMP connection to 1.2.3.4 5.384
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.060
After features/support/hooks.rb:519 0.187
After features/support/hooks.rb:330 0.772
After features/support/hooks.rb:100 0.000
Tags: @product
23.879
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD without network and logged in 8.891
And the system DNS is using the local DNS resolver 0.027
And the network is plugged 0.083
And I successfully configure Tor 14.864
Then the system DNS is still using the local DNS resolver 0.011
After features/support/hooks.rb:330 0.701
After features/support/hooks.rb:100 0.000