Project Number Date
test_Tails_ISO_stable 5721 18 Jun 2025, 15:38

Feature Report

Steps Scenarios Features
Feature Passed Failed Skipped Pending Undefined Total Passed Failed Total Duration Status
The Tor enforcement is effective 27 3 13 0 0 43 6 3 9 9:5.600 Failed
Tags: @product
Feature The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags: @product
1:29.408
Scenario The firewall configuration is very restrictive
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:29.408
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:9:in `Given I have started Tails from DVD and logged in and the network is connected'
Then the firewall's policy is to drop all IPv4 traffic 0.000
And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4 0.000
And the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort 0.000
And the firewall is configured to block all external IPv6 traffic 0.000
After features/support/hooks.rb:330 5.993

SCENARIO FAILED: 'The firewall configuration is very restrictive' (at time 06:17:55)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:17:55_The_firewall_configuration_is_very_restrictive.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:17:55_The_firewall_configuration_is_very_restrictive.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:17:55_The_firewall_configuration_is_very_restrictive.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:17:55_The_firewall_configuration_is_very_restrictive.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:12.521
Scenario Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.013
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:12.521
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:16:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
When I successfully start the Unsafe Browser 0.000
And I open the Tails homepage in the Unsafe Browser 0.000
And the Tails homepage loads in the Unsafe Browser 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.278

SCENARIO FAILED: 'Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector' (at time 06:19:15)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:19:15_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:19:15_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:19:15_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:19:15_Anti_test:_Detecting_TCP_leaks_from_the_Unsafe_Browser_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
1:15.991
Scenario Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.027
Steps
Given I have started Tails from DVD and logged in and the network is connected 1:15.991
Failed to restore snapshot (RuntimeError)
./features/step_definitions/common_steps.rb:89:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/common_steps.rb:95:in `rescue in post_snapshot_restore_hook'
./features/step_definitions/common_steps.rb:72:in `post_snapshot_restore_hook'
./features/step_definitions/snapshots.rb:167:in `reach_checkpoint'
./features/step_definitions/snapshots.rb:173:in `/^I\ have\ started\ Tails\ from\ DVD\ and\ logged\ in\ and\ the\ network\ is\ connected$/'
features/tor_enforcement.feature:24:in `Given I have started Tails from DVD and logged in and the network is connected'
And I capture all network traffic 0.000
And I disable Tails' firewall 0.000
When I do a TCP DNS lookup of "torproject.org" 0.000
Then the firewall leak detector has detected leaks 0.000
After features/support/hooks.rb:330 6.111

SCENARIO FAILED: 'Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector' (at time 06:20:37)

Boot log: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:20:37_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.file_content_var_log_boot.log

Screenshot: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:20:37_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.png

Video: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:20:37_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.mkv

Systemd journal: https://jenkins.tails.boum.org/job/test_Tails_ISO_stable/5721/artifact/build-artifacts/06:20:37_Anti_test:_Detecting_TCP_leaks_of_DNS_lookups_with_the_firewall_leak_detector.journal

After features/support/hooks.rb:100 0.000
Tags: @product
33.803
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.056
Given I have started Tails from DVD and logged in and the network is connected 27.172
And I capture all network traffic 0.411
And I disable Tails' firewall 3.026
When I do a UDP DNS lookup of "torproject.org" 2.591
Then the firewall leak detector has detected leaks 0.601
After features/support/hooks.rb:330 1.212
After features/support/hooks.rb:100 0.042
Tags: @product
51.414
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.011
Given I have started Tails from DVD and logged in and the network is connected 43.317
And I capture all network traffic 0.013
And I disable Tails' firewall 0.291
When I send some ICMP pings 4.134
Then the firewall leak detector has detected leaks 3.656
After features/support/hooks.rb:330 2.786
After features/support/hooks.rb:100 0.040
27.622
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.305
Before features/support/hooks.rb:507 0.333
Given I have started Tails from DVD and logged in and the network is connected 26.023
When I open an untorified TCP connection to 1.2.3.4 on port 42 1.442
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.155
After features/support/hooks.rb:515 0.792
After features/support/hooks.rb:330 1.160
After features/support/hooks.rb:100 0.000
56.007
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.007
Before features/support/hooks.rb:507 0.008
Given I have started Tails from DVD and logged in and the network is connected 54.198
When I open an untorified UDP connection to 1.2.3.4 on port 42 1.713
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.095
After features/support/hooks.rb:515 0.641
After features/support/hooks.rb:330 0.746
After features/support/hooks.rb:100 0.000
1:22.813
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.008
Before features/support/hooks.rb:507 0.008
Given I have started Tails from DVD and logged in and the network is connected 1:16.651
When I open an untorified ICMP connection to 1.2.3.4 5.937
Then the untorified connection fails 0.000
And the untorified connection is logged as dropped by the firewall 0.223
After features/support/hooks.rb:515 1.032
After features/support/hooks.rb:330 0.987
After features/support/hooks.rb:100 0.000
Tags: @product
56.017
Before features/support/hooks.rb:266 0.000
Before features/support/hooks.rb:273 0.025
Given I have started Tails from DVD without network and logged in 21.665
And the system DNS is using the local DNS resolver 1.639
And the network is plugged 2.585
And I successfully configure Tor 30.105
Then the system DNS is still using the local DNS resolver 0.021
After features/support/hooks.rb:330 1.086
After features/support/hooks.rb:100 0.000