Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_devel
4380
07 May 2026, 07:30
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:2.252
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
10.011
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.720
Then
the firewall's policy is to drop all IPv4 traffic
0.055
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.144
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.044
And
the firewall is configured to block all external IPv6 traffic
0.045
Hooks
After
features/support/hooks.rb:331
0.732
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
23.913
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.774
And
I capture all network traffic
0.005
When
I successfully start the Unsafe Browser
6.562
And
I open the Tails homepage in the Unsafe Browser
6.939
And
the Tails homepage loads in the Unsafe Browser
0.286
Then
the firewall leak detector has detected leaks
0.343
Hooks
After
features/support/hooks.rb:331
0.826
After
features/support/hooks.rb:100
0.034
Tags:
@product
10.189
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.800
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.117
When
I do a TCP DNS lookup of "torproject.org"
0.223
Then
the firewall leak detector has detected leaks
0.041
Hooks
After
features/support/hooks.rb:331
0.980
After
features/support/hooks.rb:100
0.076
Tags:
@product
10.005
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.647
And
I capture all network traffic
0.004
And
I disable Tails' firewall
0.129
When
I do a UDP DNS lookup of "torproject.org"
0.190
Then
the firewall leak detector has detected leaks
0.034
Hooks
After
features/support/hooks.rb:331
0.693
After
features/support/hooks.rb:100
0.030
Tags:
@product
14.043
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.727
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.145
When
I send some ICMP pings
4.071
Then
the firewall leak detector has detected leaks
0.093
Hooks
After
features/support/hooks.rb:331
0.663
After
features/support/hooks.rb:100
0.046
Tags:
@product
@check_tor_leaks
11.095
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.722
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.276
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.096
Hooks
After
features/support/hooks.rb:527
0.224
After
features/support/hooks.rb:331
0.926
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.025
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.001
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.678
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.263
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.083
Hooks
After
features/support/hooks.rb:527
0.180
After
features/support/hooks.rb:331
0.971
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.436
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
10.007
When
I open an untorified ICMP connection to 1.2.3.4
5.358
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.070
Hooks
After
features/support/hooks.rb:527
0.228
After
features/support/hooks.rb:331
0.610
After
features/support/hooks.rb:100
0.000
Tags:
@product
16.532
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.005
Steps
Given
I have started Tails from DVD without network and logged in
6.677
And
the system DNS is using the local DNS resolver
0.006
And
the network is plugged
0.100
And
I successfully configure Tor
9.742
Then
the system DNS is still using the local DNS resolver
0.006
Hooks
After
features/support/hooks.rb:331
0.779
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven