Project Number Date
test_Tails_ISO_21548-flatpak-install 1 12 May 2026, 13:06

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 38 2 3 0 0 43 7 2 9 2:10.202 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
10.796
Scenario The firewall configuration is very restrictive
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.006
Steps
Given I have started Tails from DVD and logged in and the network is connected 10.540
Then the firewall's policy is to drop all IPv4 traffic 0.078
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.177
The
The following rule has an unexpected destination:
<rule byte-count='0' packet-count='0'>
       <conditions>
        <match>
          <d>127.0.0.1/32</d>
          <o invert='1'>lo</o>
          <p>tcp</p>
        </match>
        <tcp>
          <dport>9040</dport>
        </tcp>
        <owner>
          <uid-owner>1000</uid-owner>
        </owner>
       </conditions>
       <actions>
        <ACCEPT/>
       </actions>

      </rule>.
<false> is not true. (Test::Unit::AssertionFailedError)
./features/step_definitions/tor.rb:100:in `block (3 levels) in <top (required)>'
./features/step_definitions/tor.rb:96:in `block (2 levels) in <top (required)>'
./features/step_definitions/tor.rb:95:in `each'
./features/step_definitions/tor.rb:95:in `/^the firewall is configured to only allow the (.+) users? to connect directly to the Internet over IPv4$/'
features/tor_enforcement.feature:11:in `And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4'
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.000
And the firewall is configured to block all external IPv6 traffic 0.000
After features/support/hooks.rb:335 5.106

SCENARIO FAILED: 'The firewall configuration is very restrictive' (at time 02:50:38)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:50:38_The_firewall_configuration_is_very_restrictive.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:50:38_The_firewall_configuration_is_very_restrictive.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:50:38_The_firewall_configuration_is_very_restrictive.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:50:38_The_firewall_configuration_is_very_restrictive.journal

After features/support/hooks.rb:104 0.000
Tags: @product @doc
26.388
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.005
Given I have started Tails from DVD and logged in and the network is connected 10.117
And I capture all network traffic 0.004
When I successfully start the Unsafe Browser 7.799
And I open the Tails homepage in the Unsafe Browser 7.735
And the Tails homepage loads in the Unsafe Browser 0.335
Then the firewall leak detector has detected leaks 0.395
After features/support/hooks.rb:335 0.992
After features/support/hooks.rb:104 0.042
Tags: @product
11.196
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.006
Given I have started Tails from DVD and logged in and the network is connected 10.730
And I capture all network traffic 0.009
And I disable Tails' firewall 0.135
When I do a TCP DNS lookup of "torproject.org" 0.277
Then the firewall leak detector has detected leaks 0.043
After features/support/hooks.rb:335 1.068
After features/support/hooks.rb:104 0.043
Tags: @product
10.800
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.004
Given I have started Tails from DVD and logged in and the network is connected 10.344
And I capture all network traffic 0.017
And I disable Tails' firewall 0.141
When I do a UDP DNS lookup of "torproject.org" 0.257
Then the firewall leak detector has detected leaks 0.039
After features/support/hooks.rb:335 0.911
After features/support/hooks.rb:104 0.072
Tags: @product
15.888
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.009
Given I have started Tails from DVD and logged in and the network is connected 11.506
And I capture all network traffic 0.003
And I disable Tails' firewall 0.141
When I send some ICMP pings 4.086
Then the firewall leak detector has detected leaks 0.149
After features/support/hooks.rb:335 0.905
After features/support/hooks.rb:104 0.058
10.741
Scenario The Tor enforcement is effective at blocking untorified TCP connection attempts
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.004
Before features/support/hooks.rb:523 0.002
Steps
Given I have started Tails from DVD and logged in and the network is connected 10.321
When I open an untorified TCP connection to 1.2.3.4 on port 42 0.420
Then the untorified connection fails 0.000
The
The untorified TCP connection didn't fail as expected:
Return status: 0
STDOUT:
STDERR:
1.2.3.4: inverse host lookup failed: Unknown host
(UNKNOWN) [1.2.3.4] 42 (?) open
.
<false> is not true. (Test::Unit::AssertionFailedError)
./features/step_definitions/tor.rb:255:in `/^the untorified connection fails$/'
features/tor_enforcement.feature:49:in `Then the untorified connection fails'
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:531 0.031
After features/support/hooks.rb:335 5.069

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified TCP connection attempts' (at time 02:52:02)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:52:02_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:52:02_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:52:02_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_21548-flatpak-install/1/artifact/build-artifacts/02:52:02_The_Tor_enforcement_is_effective_at_blocking_untorified_TCP_connection_attempts.journal

After features/support/hooks.rb:104 0.000
11.121
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.004
Before features/support/hooks.rb:523 0.004
Given I have started Tails from DVD and logged in and the network is connected 10.750
When I open an untorified UDP connection to 1.2.3.4 on port 42 0.291
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.079
After features/support/hooks.rb:531 0.213
After features/support/hooks.rb:335 0.958
After features/support/hooks.rb:104 0.000
15.871
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.005
Before features/support/hooks.rb:523 0.005
Given I have started Tails from DVD and logged in and the network is connected 10.376
When I open an untorified ICMP connection to 1.2.3.4 5.386
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.108
After features/support/hooks.rb:531 0.266
After features/support/hooks.rb:335 0.778
After features/support/hooks.rb:104 0.000
Tags: @product
17.397
Before features/support/hooks.rb:270 0.000
Before features/support/hooks.rb:277 0.013
Given I have started Tails from DVD without network and logged in 7.427
And the system DNS is using the local DNS resolver 0.007
And the network is plugged 0.042
And I successfully configure Tor 9.914
Then the system DNS is still using the local DNS resolver 0.005
After features/support/hooks.rb:335 1.135
After features/support/hooks.rb:104 0.000