Project Number Date
test_Tails_ISO_feature-trixie 37 24 Jun 2025, 08:59

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 34 2 7 0 0 43 7 2 9 8:59.332 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
40.483
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Given I have started Tails from DVD and logged in and the network is connected 39.938
Then the firewall's policy is to drop all IPv4 traffic 0.111
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.277
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.071
And the firewall is configured to block all external IPv6 traffic 0.084
After features/support/hooks.rb:330 0.867
After features/support/hooks.rb:100 0.000
Tags: @product
1:58.131
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.003
Given I have started Tails from DVD and logged in and the network is connected 56.391
And I capture all network traffic 0.027
When I successfully start the Unsafe Browser 26.224
And I open the Tails homepage in the Unsafe Browser 31.863
And the Tails homepage loads in the Unsafe Browser 2.854
Then the firewall leak detector has detected leaks 0.770
After features/support/hooks.rb:330 2.922
After features/support/hooks.rb:100 0.052
Tags: @product
36.144
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.005
Given I have started Tails from DVD and logged in and the network is connected 34.222
And I capture all network traffic 0.022
And I disable Tails' firewall 0.699
When I do a TCP DNS lookup of "torproject.org" 0.822
Then the firewall leak detector has detected leaks 0.377
After features/support/hooks.rb:330 1.347
After features/support/hooks.rb:100 0.053
Tags: @product
1:1.934
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD and logged in and the network is connected 1:0.777
And I capture all network traffic 0.007
And I disable Tails' firewall 0.309
When I do a UDP DNS lookup of "torproject.org" 0.721
Then the firewall leak detector has detected leaks 0.118
After features/support/hooks.rb:330 0.881
After features/support/hooks.rb:100 0.059
Tags: @product
1:14.703
Scenario Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.012
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:14.703
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:98:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:38:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I send some ICMP pings 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.653

SCENARIO FAILED: 'Anti test: Detecting ICMP leaks of ping with the firewall leak detector' (at time 08:11:12)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:11:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:11:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:11:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:11:12_Anti_test:_Detecting_ICMP_leaks_of_ping_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
34.138
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Before features/support/hooks.rb:507 0.015
Given I have started Tails from DVD and logged in and the network is connected 31.343
When I open an untorified TCP connection to 1.2.3.4 on port 42 2.571
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.223
After features/support/hooks.rb:515 0.582
After features/support/hooks.rb:330 1.054
After features/support/hooks.rb:100 0.000
38.811
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Before features/support/hooks.rb:507 0.005
Given I have started Tails from DVD and logged in and the network is connected 36.990
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.652
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.168
After features/support/hooks.rb:515 0.574
After features/support/hooks.rb:330 0.780
After features/support/hooks.rb:100 0.000
1:18.198
Scenario The Tor enforcement is effective at blocking untorified ICMP connection attempts
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.004
Before features/support/hooks.rb:507 0.003
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:18.198
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:98:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:104:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:81:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:60:in `Given I have started Tails from DVD and logged in and the network is connected'
When I open an untorified ICMP connection to 1.2.3.4 0.000
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.000
After features/support/hooks.rb:515 0.045
After features/support/hooks.rb:330 7.432

SCENARIO FAILED: 'The Tor enforcement is effective at blocking untorified ICMP connection attempts' (at time 08:13:53)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:13:53_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:13:53_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:13:53_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_feature-trixie/37/artifact/build-artifacts/08:13:53_The_Tor_enforcement_is_effective_at_blocking_untorified_ICMP_connection_attempts.journal

After features/support/hooks.rb:100 0.000
Tags: @product
56.786
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.006
Given I have started Tails from DVD without network and logged in 20.413
And the system DNS is using the local DNS resolver 0.470
And the network is plugged 2.029
And I successfully configure Tor 33.852
Then the system DNS is still using the local DNS resolver 0.020
After features/support/hooks.rb:330 2.072
After features/support/hooks.rb:100 0.000