Project Number Date
test_Tails_ISO_devel 3888 26 Jun 2025, 18:12

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 18 5 20 0 0 43 4 5 9 11:8.660 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
1:19.084
Scenario The firewall configuration is very restrictive
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:19.084
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:9:in `Given I have started Tails from DVD and logged in and the network is connected'
Then the firewall's policy is to drop all IPv4 traffic 0.000
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.000
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.000
And the firewall is configured to block all external IPv6 traffic 0.000
After features/support/hooks.rb:330 11.774

SCENARIO FAILED: 'The firewall configuration is very restrictive' (at time 05:37:34)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:37:34_The_firewall_configuration_is_very_restrictive.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:37:34_The_firewall_configuration_is_very_restrictive.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:37:34_The_firewall_configuration_is_very_restrictive.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:37:34_The_firewall_configuration_is_very_restrictive.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:27.421
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.084
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:27.421
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:16:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
When I successfully start the Unsafe Browser 0.000
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.823

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 05:39:14)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:39:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:39:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:39:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:39:14_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:31.985
Scenario Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.010
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:31.985
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:24:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a TCP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.639

SCENARIO FAILED: 'Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector' (at time 05:40:53)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:40:53_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:40:53_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:40:53_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:40:53_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
37.029
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.013
Given I have started Tails from DVD and logged in and the network is connected 35.575
And I capture all network traffic 0.016
And I disable Tails' firewall 0.347
When I do a UDP DNS lookup of "torproject.org" 0.958
Then the firewall leak detector has detected leaks 0.131
After features/support/hooks.rb:330 1.043
After features/support/hooks.rb:100 0.060
Tags: @product
59.702
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.014
Given I have started Tails from DVD and logged in and the network is connected 54.425
And I capture all network traffic 0.035
And I disable Tails' firewall 0.730
When I send some ICMP pings 4.328
Then the firewall leak detector has detected leaks 0.184
After features/support/hooks.rb:330 1.389
After features/support/hooks.rb:100 0.041
1:37.209
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Before features/support/hooks.rb:507 0.009
Given I have started Tails from DVD and logged in and the network is connected 1:35.404
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.662
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.142
After features/support/hooks.rb:515 2.131
After features/support/hooks.rb:330 1.191
After features/support/hooks.rb:100 0.000
1:31.299
Scenario The Tor enforcement is effective at blocking untorified UDP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.031
Before features/support/hooks.rb:507 0.039
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:31.299
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:53:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified UDP connection to 1.2.3.4 on port 42 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:515 0.056
After features/support/hooks.rb:330 7.754

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified UDP connection attempts' (at time 05:45:51)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:45:51_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:45:51_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:45:51_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:45:51_The_Tor_enforcement_is_effective_at_blocking_untorified_UDP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
44.625
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.081
Before features/support/hooks.rb:507 0.182
Given I have started Tails from DVD and logged in and the network is connected 37.734
When I open an untorified ICMP connection to 1.2.3.4 6.027
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.862
After features/support/hooks.rb:515 8.657
After features/support/hooks.rb:330 1.415
After features/support/hooks.rb:100 0.000
Tags: @product
1:20.303
Scenario The system DNS is always set up to use Tor's DNSPort
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.024
Steps
Given I have started Tails from DVD without network and logged in 1:20.303
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ without\ network\ and\ logged\ in$/'
features/tor_enforcement.feature:66:in `Given I have started Tails from DVD without network and logged in'
And the system DNS is using the local DNS resolver 0.000
And the network is plugged 0.000
And I successfully configure Tor 0.000
Then the system DNS is still using the local DNS resolver 0.000
After features/support/hooks.rb:330 6.555

SCENARIO FAILED: 'The system DNS is always set up to use Tor's DNSPort' (at time 05:48:15)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:48:15_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:48:15_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:48:15_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_devel/3888/artifact/build-artifacts/05:48:15_The_system_DNS_is_always_set_up_to_use_Tor_s_DNSPort.journal

After features/support/hooks.rb:100 0.000