2 Feature: The Tor enforcement is effective
4 I want all direct Internet connections I do by mistake or applications do by misconfiguration or buggy leaks to be blocked
5 And as a Tails developer
6 I want to ensure that the automated test suite detects firewall leaks reliably
8 Scenario: The firewall configuration is very restrictive
9 Given I have started Tails from DVD and logged in and the network is connected
10 Then the firewall's policy is to drop all IPv4 traffic
11 And the firewall is configured to only allow the clearnet and debian-tor users to connect directly to the Internet over IPv4
12 And the firewall's NAT rules only redirect traffic for Tor's TransPort and DNSPort
13 And the firewall is configured to block all external IPv6 traffic
15 Scenario: Anti test: Detecting TCP leaks from the Unsafe Browser with the firewall leak detector
16 Given I have started Tails from DVD and logged in and the network is connected
17 And I capture all network traffic
18 And I magically allow the Unsafe Browser to be started
19 When I successfully start the Unsafe Browser
20 And I open the Tails homepage in the Unsafe Browser
21 And the Tails homepage loads in the Unsafe Browser
22 Then the firewall leak detector has detected leaks
24 Scenario: Anti test: Detecting TCP leaks of DNS lookups with the firewall leak detector
25 Given I have started Tails from DVD and logged in and the network is connected
26 And I capture all network traffic
27 And I disable Tails' firewall
28 When I do a TCP DNS lookup of "torproject.org"
29 Then the firewall leak detector has detected leaks
31 Scenario: Anti test: Detecting UDP leaks of DNS lookups with the firewall leak detector
32 Given I have started Tails from DVD and logged in and the network is connected
33 And I capture all network traffic
34 And I disable Tails' firewall
35 When I do a UDP DNS lookup of "torproject.org"
36 Then the firewall leak detector has detected leaks
38 Scenario: Anti test: Detecting ICMP leaks of ping with the firewall leak detector
39 Given I have started Tails from DVD and logged in and the network is connected
40 And I capture all network traffic
41 And I disable Tails' firewall
42 When I send some ICMP pings
43 Then the firewall leak detector has detected leaks
46 Scenario: The Tor enforcement is effective at blocking untorified TCP connection attempts
47 Given I have started Tails from DVD and logged in and the network is connected
48 When I open an untorified TCP connection to 1.2.3.4 on port 42
49 Then the untorified connection fails
50 And the untorified connection is logged as dropped by the firewall
53 Scenario: The Tor enforcement is effective at blocking untorified UDP connection attempts
54 Given I have started Tails from DVD and logged in and the network is connected
55 When I open an untorified UDP connection to 1.2.3.4 on port 42
56 And the untorified connection is logged as dropped by the firewall
59 Scenario: The Tor enforcement is effective at blocking untorified ICMP connection attempts
60 Given I have started Tails from DVD and logged in and the network is connected
61 When I open an untorified ICMP connection to 1.2.3.4
62 Then the untorified connection fails
63 And the untorified connection is logged as dropped by the firewall
65 Scenario: The system DNS is always set up to use Tor's DNSPort
66 Given I have started Tails from DVD without network and logged in
67 And the system DNS is using the local DNS resolver
68 And the network is plugged
70 Then the system DNS is still using the local DNS resolver