Project Number Date
test_Tails_ISO_21014-htpdateerror 13 25 Jun 2025, 23:47

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 43 0 0 0 0 43 6 3 9 3:19.855 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
12.810
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 12.342
Then the firewall's policy is to drop all IPv4 traffic 0.090
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.227
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.071
And the firewall is configured to block all external IPv6 traffic 0.078
After features/support/hooks.rb:330 0.620
After features/support/hooks.rb:100 0.000
Tags: @product
43.928
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 12.904
And I capture all network traffic 0.006
When I successfully start the Unsafe Browser 19.980
And I open the Tails homepage in the Unsafe Browser 9.918
And the Tails homepage loads in the Unsafe Browser 0.585
Then the firewall leak detector has detected leaks 0.533
After features/support/hooks.rb:330 1.070
After features/support/hooks.rb:100 0.059
Tags: @product
13.754
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 12.656
And I capture all network traffic 0.011
And I disable Tails' firewall 0.227
When I do a TCP DNS lookup of "torproject.org" 0.716
Then the firewall leak detector has detected leaks 0.141
After features/support/hooks.rb:330 0.789
After features/support/hooks.rb:100 0.065
Tags: @product
13.811
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 12.884
And I capture all network traffic 0.005
And I disable Tails' firewall 0.204
When I do a UDP DNS lookup of "torproject.org" 0.631
Then the firewall leak detector has detected leaks 0.086
After features/support/hooks.rb:330 0.605
After features/support/hooks.rb:100 0.032
Tags: @product
17.166
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Given I have started Tails from DVD and logged in and the network is connected 12.591
And I capture all network traffic 0.018
And I disable Tails' firewall 0.246
When I send some ICMP pings 4.127
Then the firewall leak detector has detected leaks 0.181
After features/support/hooks.rb:330 0.612
After features/support/hooks.rb:100 0.043
13.633
Scenario The Tor enforcement is effective at blocking untorified TCP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:507 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 12.219
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.351
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.063
Hooks
After features/support/hooks.rb:515 0.187
Unexpected connections were made
  #<OpenStruct mac_saddr="50:54:00:80:d7:66", mac_daddr="52:54:00:00:00:01", protocol="IP::TCP", saddr="10.2.1.208", daddr="8.43.85.67", sport=58574, dport=80> (FirewallAssertionFailedError)
./features/support/helpers/firewall_helper.rb:168:in `assert_all_connections'
./features/support/helpers/firewall_helper.rb:178:in `assert_no_leaks'
./features/support/hooks.rb:524:in `After'
After features/support/hooks.rb:330 5.008
no implicit conversion of nil into String (TypeError)
./features/support/hooks.rb:455:in `exist?'
./features/support/hooks.rb:455:in `block (2 levels) in <top (required)>'
./features/support/hooks.rb:450:in `each'
./features/support/hooks.rb:450:in `After'
Output 1

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified TCP connection attempts' (at time 05:15:37)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:37_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.file_content_var_log_boot.log

Network capture: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:37_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.pcap

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:37_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:37_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.mkv

After features/support/hooks.rb:100 0.000
13.868
Scenario The Tor enforcement is effective at blocking untorified UDP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:507 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 12.471
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.323
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.072
Hooks
After features/support/hooks.rb:515 0.180
Unexpected connections were made
  #<OpenStruct mac_saddr="50:54:00:80:d7:66", mac_daddr="52:54:00:00:00:01", protocol="IP::TCP", saddr="10.2.1.208", daddr="8.43.85.67", sport=58574, dport=80> (FirewallAssertionFailedError)
./features/support/helpers/firewall_helper.rb:168:in `assert_all_connections'
./features/support/helpers/firewall_helper.rb:178:in `assert_no_leaks'
./features/support/hooks.rb:524:in `After'
After features/support/hooks.rb:330 5.149
no implicit conversion of nil into String (TypeError)
./features/support/hooks.rb:455:in `exist?'
./features/support/hooks.rb:455:in `block (2 levels) in <top (required)>'
./features/support/hooks.rb:450:in `each'
./features/support/hooks.rb:450:in `After'
Output 1

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified UDP connection attempts' (at time 05:15:56)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:56_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.file_content_var_log_boot.log

Network capture: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:56_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.pcap

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:56_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:15:56_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.mkv

After features/support/hooks.rb:100 0.000
17.600
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:507 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 12.158
When I open an untorified ICMP connection to 1.2.3.4 5.381
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.060
Hooks
After features/support/hooks.rb:515 0.199
Unexpected connections were made
  #<OpenStruct mac_saddr="50:54:00:80:d7:66", mac_daddr="52:54:00:00:00:01", protocol="IP::TCP", saddr="10.2.1.208", daddr="8.43.85.67", sport=58574, dport=80> (FirewallAssertionFailedError)
./features/support/helpers/firewall_helper.rb:168:in `assert_all_connections'
./features/support/helpers/firewall_helper.rb:178:in `assert_no_leaks'
./features/support/hooks.rb:524:in `After'
After features/support/hooks.rb:330 5.019
no implicit conversion of nil into String (TypeError)
./features/support/hooks.rb:455:in `exist?'
./features/support/hooks.rb:455:in `block (2 levels) in <top (required)>'
./features/support/hooks.rb:450:in `each'
./features/support/hooks.rb:450:in `After'
Output 1

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 05:16:19)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:16:19_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Network capture: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:16:19_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.pcap

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:16:19_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_21014-htpdateerror/13/artifact/build-artifacts/05:16:19_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

After features/support/hooks.rb:100 0.000
Tags: @product
53.282
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD without network and logged in 8.150
And the system DNS is using the local DNS resolver 0.012
And the network is plugged 0.077
And I successfully configure Tor 45.018
Then the system DNS is still using the local DNS resolver 0.023
After features/support/hooks.rb:330 0.766
After features/support/hooks.rb:100 0.000