summaryrefslogtreecommitdiffstats
path: root/features/firewall_leaks.feature
blob: 775c6e135615bbeeefa018e9d8a9483cbc3b21f5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
@product
Feature:
  As a Tails developer
  I want to ensure that the automated test suite detects firewall leaks reliably

  Background:
    Given a computer
    And I capture all network traffic
    And I start the computer
    And the computer boots Tails
    And I log in to a new session
    And Tor is ready
    And all notifications have disappeared
    And available upgrades have been checked
    And all Internet traffic has only flowed through Tor
    And I save the state so the background can be restored next scenario

  Scenario: Detecting IPv4 TCP leaks from the Unsafe Browser
    When I successfully start the Unsafe Browser
    And I open the address "https://check.torproject.org" in the Unsafe Browser
    And I see "UnsafeBrowserTorCheckFail.png" after at most 60 seconds
    Then the firewall leak detector has detected IPv4 TCP leaks

  Scenario: Detecting IPv4 TCP leaks of TCP DNS lookups
    Given I disable Tails' firewall
    When I do a TCP DNS lookup of "torproject.org"
    Then the firewall leak detector has detected IPv4 TCP leaks

  Scenario: Detecting IPv4 non-TCP leaks (UDP) of UDP DNS lookups
    Given I disable Tails' firewall
    When I do a UDP DNS lookup of "torproject.org"
    Then the firewall leak detector has detected IPv4 non-TCP leaks

  Scenario: Detecting IPv4 non-TCP (ICMP) leaks of ping
    Given I disable Tails' firewall
    When I send some ICMP pings
    Then the firewall leak detector has detected IPv4 non-TCP leaks