Cucumber Report
Jenkins
Previous results
Latest results
Features
Tags
Steps
Trends
Failures
Project
Number
Date
test_Tails_ISO_stable
6350
04 May 2026, 18:15
Feature Report
Steps
Scenarios
Features
Feature
Passed
Failed
Skipped
Pending
Undefined
Total
Passed
Failed
Total
Duration
Status
The Tor enforcement is effective
43
0
0
0
0
43
9
0
9
2:1.315
Passed
Tags:
@product
Feature
The Tor enforcement is effective
As a Tails user I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked And as a Tails developer I want to ensure that the automated test suite detects firewall leaks reliably
Tags:
@product
9.990
Scenario
The firewall configuration is very restrictive
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.670
Then
the firewall's policy is to drop all IPv4 traffic
0.056
And
the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
0.163
And
the firewall's NAT rules only redirect traffic for the Unsafe Browser, Tor's TransPort, and DNSPort
0.049
And
the firewall is configured to block all external IPv6 traffic
0.050
Hooks
After
features/support/hooks.rb:331
0.733
After
features/support/hooks.rb:100
0.000
Tags:
@product
@doc
23.481
Scenario
Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.539
And
I capture all network traffic
0.004
When
I successfully start the Unsafe Browser
5.917
And
I open the Tails homepage in the Unsafe Browser
7.384
And
the Tails homepage loads in the Unsafe Browser
0.283
Then
the firewall leak detector has detected leaks
0.352
Hooks
After
features/support/hooks.rb:331
0.751
After
features/support/hooks.rb:100
0.047
Tags:
@product
9.995
Scenario
Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.575
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.111
When
I do a TCP DNS lookup of "torproject.org"
0.266
Then
the firewall leak detector has detected leaks
0.035
Hooks
After
features/support/hooks.rb:331
0.704
After
features/support/hooks.rb:100
0.039
Tags:
@product
10.137
Scenario
Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.765
And
I capture all network traffic
0.006
And
I disable Tails' firewall
0.142
When
I do a UDP DNS lookup of "torproject.org"
0.189
Then
the firewall leak detector has detected leaks
0.032
Hooks
After
features/support/hooks.rb:331
0.567
After
features/support/hooks.rb:100
0.035
Tags:
@product
13.960
Scenario
Anti test: Detecting ICMP leaks of ping with the firewall leak detector
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.656
And
I capture all network traffic
0.005
And
I disable Tails' firewall
0.125
When
I send some ICMP pings
4.061
Then
the firewall leak detector has detected leaks
0.112
Hooks
After
features/support/hooks.rb:331
0.737
After
features/support/hooks.rb:100
0.033
Tags:
@product
@check_tor_leaks
11.070
Scenario
The Tor enforcement is effective at blocking untorified TCP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.003
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.582
When
I open an untorified TCP connection to 1.2.3.4 on port 42
1.428
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.059
Hooks
After
features/support/hooks.rb:527
0.183
After
features/support/hooks.rb:331
0.974
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
11.109
Scenario
The Tor enforcement is effective at blocking untorified UDP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.802
When
I open an untorified UDP connection to 1.2.3.4 on port 42
1.229
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.076
Hooks
After
features/support/hooks.rb:527
0.176
After
features/support/hooks.rb:331
0.898
After
features/support/hooks.rb:100
0.000
Tags:
@product
@check_tor_leaks
15.202
Scenario
The Tor enforcement is effective at blocking untorified ICMP connection attempts
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.004
Before
features/support/hooks.rb:519
0.002
Steps
Given
I have started Tails from DVD and logged in and the network is connected
9.761
When
I open an untorified ICMP connection to 1.2.3.4
5.365
Then
the untorified connection fails
0.000
And
the untorified connection is logged as dropped by the firewall
0.074
Hooks
After
features/support/hooks.rb:527
0.219
After
features/support/hooks.rb:331
0.782
After
features/support/hooks.rb:100
0.000
Tags:
@product
16.367
Scenario
The system DNS is always set up to use Tor's DNSPort
Hooks
Before
features/support/hooks.rb:266
0.000
Before
features/support/hooks.rb:273
0.003
Steps
Given
I have started Tails from DVD without network and logged in
6.633
And
the system DNS is using the local DNS resolver
0.007
And
the network is plugged
0.017
And
I successfully configure Tor
9.701
Then
the system DNS is still using the local DNS resolver
0.006
Hooks
After
features/support/hooks.rb:331
0.820
After
features/support/hooks.rb:100
0.000
generate Cucumber HTML reports via:
Jenkins Plugin
|
Standalone
|
Sandwich
|
Maven