4 I want to ensure that the automated test suite detects firewall leaks reliably
8 And I capture all network traffic
9 And I start the computer
10 And the computer boots Tails
11 And I log in to a new session
12 And I have a network connection
13 And Tor has built a circuit
14 And Iceweasel has autostarted and is not loading a web page
15 And the time has synced
16 And I have closed all annoying notifications
17 And all Internet traffic has only flowed through Tor
18 And I save the state so the background can be restored next scenario
20 Scenario: Detecting IPv4 TCP leaks from the Unsafe Browser
21 When I start the Unsafe Browser
22 And the Unsafe Browser has started
23 And I open the address "https://check.torproject.org" in the Unsafe Browser
24 And I see "UnsafeBrowserTorCheckFail.png" after at most 60 seconds
25 Then the firewall leak detector has detected IPv4 TCP leaks
27 Scenario: Detecting IPv4 TCP leaks of TCP DNS lookups
28 Given I disable Tails' firewall
29 When I do a TCP DNS lookup of "torproject.org"
30 Then the firewall leak detector has detected IPv4 TCP leaks
32 Scenario: Detecting IPv4 non-TCP leaks (UDP) of UDP DNS lookups
33 Given I disable Tails' firewall
34 When I do a UDP DNS lookup of "torproject.org"
35 Then the firewall leak detector has detected IPv4 non-TCP leaks
37 Scenario: Detecting IPv4 non-TCP (ICMP) leaks of ping
38 Given I disable Tails' firewall
39 When I send some ICMP pings
40 Then the firewall leak detector has detected IPv4 non-TCP leaks