[Résolu] Bugs occasionnel.
Bonjours,
Voilà j'ai l'abonnement "Highway to freedom" depuis presque un mois et tout marchait à merveille, jusqu'à ses derniers jours, où des bugs se font ressentir. Je m'explique, alors que je suis connecté à un serveur premium, soudainement c'est comme si je n'étais pas connecté à FW (alors que c'est vert sur le petit icone en bas). Les pages deviennent interdite, coupure de la connexion en pleins milieu d'une partie de battlefield etc... Assez dérangent car c'est toute les 20 min.
Il faut alors que je me déconnecte puis reconnecte à un serveur de FW. Tout ça 100 fois dans la journée...
Y'a t-il un solution?
Voici le journal pendant une de ses coupures ;
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-04
Protocol: OpenVPN
----------------------------------
Mon Oct 21 20:56:16 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Oct 21 20:56:16 2013 Control Channel Authentication: using 'C:/Program Files/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Oct 21 20:56:16 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:16 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:16 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 21 20:56:16 2013 Attempting to establish TCP connection with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TCP connection established with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TCPv4_CLIENT link local: [undef]
Mon Oct 21 20:56:16 2013 TCPv4_CLIENT link remote: [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TLS: Initial packet from [AF_INET]88.190.203.75:443, sid=f8c940d3 b78c7350
Mon Oct 21 20:56:17 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Oct 21 20:56:17 2013 VERIFY OK: nsCertType=SERVER
Mon Oct 21 20:56:17 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Oct 21 20:56:17 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 21 20:56:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:17 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 21 20:56:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 21 20:56:17 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:19 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Oct 21 20:56:19 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.12.134 10.4.12.133'
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --socket-flags option modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --ifconfig/up options modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: route options modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Oct 21 20:56:19 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Oct 21 20:56:19 2013 open_tun, tt->ipv6=0
Mon Oct 21 20:56:19 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}.tap
Mon Oct 21 20:56:19 2013 TAP-Windows Driver Version 9.9
Mon Oct 21 20:56:19 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.134/255.255.255.252 on interface {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF} [DHCP-serv: 10.4.12.133, lease-time: 31536000]
Mon Oct 21 20:56:19 2013 Successful ARP Flush on interface [19] {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}
Mon Oct 21 20:56:24 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Oct 21 20:56:24 2013 C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.12.133
Mon Oct 21 20:56:24 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Oct 21 20:56:24 2013 Route addition via IPAPI succeeded [adaptive]
Mon Oct 21 20:56:24 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.9.0.17 10.4.12.134 9999
0.0.0.0 0.0.0.0 172.23.255.254 172.23.6.238 9999
0.0.0.0 0.0.0.0 10.4.12.133 10.4.12.134 30
10.4.0.1 255.255.255.255 10.4.12.133 10.4.12.134 30
10.4.12.132 255.255.255.252 10.4.12.134 10.4.12.134 286
10.4.12.134 255.255.255.255 10.4.12.134 10.4.12.134 286
10.4.12.135 255.255.255.255 10.4.12.134 10.4.12.134 286
88.190.203.75 255.255.255.255 10.9.0.17 10.4.12.134 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
172.23.0.0 255.255.0.0 172.23.6.238 172.23.6.238 286
172.23.6.238 255.255.255.255 172.23.6.238 172.23.6.238 286
172.23.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
176.31.59.141 255.255.255.255 172.23.255.254 172.23.6.238 30
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 10.4.12.134 10.4.12.134 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
255.255.255.255 255.255.255.255 10.4.12.134 10.4.12.134 286
Voilà j'ai l'abonnement "Highway to freedom" depuis presque un mois et tout marchait à merveille, jusqu'à ses derniers jours, où des bugs se font ressentir. Je m'explique, alors que je suis connecté à un serveur premium, soudainement c'est comme si je n'étais pas connecté à FW (alors que c'est vert sur le petit icone en bas). Les pages deviennent interdite, coupure de la connexion en pleins milieu d'une partie de battlefield etc... Assez dérangent car c'est toute les 20 min.
Il faut alors que je me déconnecte puis reconnecte à un serveur de FW. Tout ça 100 fois dans la journée...
Y'a t-il un solution?
Voici le journal pendant une de ses coupures ;
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-04
Protocol: OpenVPN
----------------------------------
Mon Oct 21 20:56:16 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Oct 21 20:56:16 2013 Control Channel Authentication: using 'C:/Program Files/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Oct 21 20:56:16 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:16 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:16 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 21 20:56:16 2013 Attempting to establish TCP connection with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TCP connection established with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TCPv4_CLIENT link local: [undef]
Mon Oct 21 20:56:16 2013 TCPv4_CLIENT link remote: [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:16 2013 TLS: Initial packet from [AF_INET]88.190.203.75:443, sid=f8c940d3 b78c7350
Mon Oct 21 20:56:17 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Oct 21 20:56:17 2013 VERIFY OK: nsCertType=SERVER
Mon Oct 21 20:56:17 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Oct 21 20:56:17 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 21 20:56:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:17 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 21 20:56:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 21 20:56:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 21 20:56:17 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.75:443
Mon Oct 21 20:56:19 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Oct 21 20:56:19 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.12.134 10.4.12.133'
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --socket-flags option modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --ifconfig/up options modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: route options modified
Mon Oct 21 20:56:19 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Oct 21 20:56:19 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Oct 21 20:56:19 2013 open_tun, tt->ipv6=0
Mon Oct 21 20:56:19 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}.tap
Mon Oct 21 20:56:19 2013 TAP-Windows Driver Version 9.9
Mon Oct 21 20:56:19 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.134/255.255.255.252 on interface {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF} [DHCP-serv: 10.4.12.133, lease-time: 31536000]
Mon Oct 21 20:56:19 2013 Successful ARP Flush on interface [19] {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}
Mon Oct 21 20:56:24 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Oct 21 20:56:24 2013 C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.12.133
Mon Oct 21 20:56:24 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Oct 21 20:56:24 2013 Route addition via IPAPI succeeded [adaptive]
Mon Oct 21 20:56:24 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.9.0.17 10.4.12.134 9999
0.0.0.0 0.0.0.0 172.23.255.254 172.23.6.238 9999
0.0.0.0 0.0.0.0 10.4.12.133 10.4.12.134 30
10.4.0.1 255.255.255.255 10.4.12.133 10.4.12.134 30
10.4.12.132 255.255.255.252 10.4.12.134 10.4.12.134 286
10.4.12.134 255.255.255.255 10.4.12.134 10.4.12.134 286
10.4.12.135 255.255.255.255 10.4.12.134 10.4.12.134 286
88.190.203.75 255.255.255.255 10.9.0.17 10.4.12.134 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
172.23.0.0 255.255.0.0 172.23.6.238 172.23.6.238 286
172.23.6.238 255.255.255.255 172.23.6.238 172.23.6.238 286
172.23.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
176.31.59.141 255.255.255.255 172.23.255.254 172.23.6.238 30
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 10.4.12.134 10.4.12.134 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
255.255.255.255 255.255.255.255 10.4.12.134 10.4.12.134 286
Cette discussion a été fermée.
Réponses
Tu as un problème de routes, désactive la connexion réseau "FrozenWay" dans la liste des connexions réseau Windows puis réactive là. Et connecte toi.
FrozenWay version 1.6.5
----------------------------------
Server: Serveur Privé
Protocol: HTTPS
----------------------------------
Tue Oct 22 17:34:33 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Tue Oct 22 17:34:34 2013 Control Channel Authentication: using 'C:/Program Files/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Tue Oct 22 17:34:34 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Oct 22 17:34:34 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Oct 22 17:34:34 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Oct 22 17:34:34 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:54037
Tue Oct 22 17:34:34 2013 TCP connection established with [AF_INET]127.0.0.1:54037
Tue Oct 22 17:34:34 2013 TCPv4_CLIENT link local: [undef]
Tue Oct 22 17:34:34 2013 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:54037
Tue Oct 22 17:34:34 2013 TLS: Initial packet from [AF_INET]127.0.0.1:54037, sid=7804b225 deaf4f9b
Tue Oct 22 17:34:34 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Tue Oct 22 17:34:34 2013 VERIFY OK: nsCertType=SERVER
Tue Oct 22 17:34:34 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Tue Oct 22 17:34:34 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Oct 22 17:34:34 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Oct 22 17:34:34 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Oct 22 17:34:34 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Oct 22 17:34:34 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Oct 22 17:34:34 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:54037
Tue Oct 22 17:34:36 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Tue Oct 22 17:34:36 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.9.0.1,dhcp-option WINS 10.9.0.1,route 10.9.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.9.0.18 10.9.0.17'
Tue Oct 22 17:34:36 2013 OPTIONS IMPORT: --socket-flags option modified
Tue Oct 22 17:34:36 2013 OPTIONS IMPORT: --ifconfig/up options modified
Tue Oct 22 17:34:36 2013 OPTIONS IMPORT: route options modified
Tue Oct 22 17:34:36 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Oct 22 17:34:37 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Oct 22 17:34:37 2013 open_tun, tt->ipv6=0
Tue Oct 22 17:34:37 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}.tap
Tue Oct 22 17:34:37 2013 TAP-Windows Driver Version 9.9
Tue Oct 22 17:34:37 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.18/255.255.255.252 on interface {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF} [DHCP-serv: 10.9.0.17, lease-time: 31536000]
Tue Oct 22 17:34:37 2013 Successful ARP Flush on interface [19] {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}
Tue Oct 22 17:34:42 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Tue Oct 22 17:34:42 2013 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.17
Tue Oct 22 17:34:42 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Tue Oct 22 17:34:42 2013 Route addition via IPAPI succeeded [adaptive]
Tue Oct 22 17:34:42 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 172.23.255.254 172.23.6.238 9999
0.0.0.0 0.0.0.0 10.9.0.17 10.9.0.18 30
10.9.0.1 255.255.255.255 10.9.0.17 10.9.0.18 30
10.9.0.16 255.255.255.252 10.9.0.18 10.9.0.18 286
10.9.0.18 255.255.255.255 10.9.0.18 10.9.0.18 286
10.9.0.19 255.255.255.255 10.9.0.18 10.9.0.18 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
172.23.0.0 255.255.0.0 172.23.6.238 172.23.6.238 286
172.23.6.238 255.255.255.255 172.23.6.238 172.23.6.238 286
172.23.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
176.31.59.141 255.255.255.255 172.23.255.254 172.23.6.238 30
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 10.9.0.18 10.9.0.18 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
255.255.255.255 255.255.255.255 10.9.0.18 10.9.0.18 286
Peux tu le donner plus de 30 secondes après une déconnexion stp ? (car il y a un timeout de 30 secondes avant que FrozenWay ne déconnecte si aucune donnée n'est reçue/envoyée).
3-4 mins après ;
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-01
Protocol: HTTPS
----------------------------------
Fri Oct 25 13:36:59 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Fri Oct 25 13:37:00 2013 Control Channel Authentication: using 'C:/Program Files/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Fri Oct 25 13:37:00 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:00 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:00 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
Fri Oct 25 13:37:00 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TCP connection established with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TCPv4_CLIENT link local: [undef]
Fri Oct 25 13:37:00 2013 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TLS: Initial packet from [AF_INET]127.0.0.1:53611, sid=d1413d8d ecb85b35
Fri Oct 25 13:37:00 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Oct 25 13:37:00 2013 VERIFY OK: nsCertType=SERVER
Fri Oct 25 13:37:00 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Oct 25 13:37:01 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 25 13:37:01 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:01 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 25 13:37:01 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:01 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Fri Oct 25 13:37:01 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:03 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Fri Oct 25 13:37:03 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.6.238 10.1.6.237'
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --socket-flags option modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --ifconfig/up options modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: route options modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Oct 25 13:37:03 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Oct 25 13:37:03 2013 open_tun, tt->ipv6=0
Fri Oct 25 13:37:03 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}.tap
Fri Oct 25 13:37:03 2013 TAP-Windows Driver Version 9.9
Fri Oct 25 13:37:03 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.6.238/255.255.255.252 on interface {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF} [DHCP-serv: 10.1.6.237, lease-time: 31536000]
Fri Oct 25 13:37:03 2013 Successful ARP Flush on interface [19] {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}
Fri Oct 25 13:37:08 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Fri Oct 25 13:37:08 2013 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.6.237
Fri Oct 25 13:37:08 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Fri Oct 25 13:37:08 2013 Route addition via IPAPI succeeded [adaptive]
Fri Oct 25 13:37:08 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.4.5.53 10.1.6.238 9999
0.0.0.0 0.0.0.0 172.23.255.254 172.23.6.238 9999
0.0.0.0 0.0.0.0 10.1.6.237 10.1.6.238 30
10.1.0.1 255.255.255.255 10.1.6.237 10.1.6.238 30
10.1.6.236 255.255.255.252 10.1.6.238 10.1.6.238 286
10.1.6.238 255.255.255.255 10.1.6.238 10.1.6.238 286
10.1.6.239 255.255.255.255 10.1.6.238 10.1.6.238 286
10.4.0.1 255.255.255.255 10.4.5.53 10.1.6.238 30
88.190.203.60 255.255.255.255 10.4.5.53 10.1.6.238 30
88.190.203.75 255.255.255.255 172.23.255.254 172.23.6.238 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
172.23.0.0 255.255.0.0 172.23.6.238 172.23.6.238 286
172.23.6.238 255.255.255.255 172.23.6.238 172.23.6.238 286
172.23.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 10.1.6.238 10.1.6.238 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
255.255.255.255 255.255.255.255 10.1.6.238 10.1.6.238 286
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-01
Protocol: HTTPS
----------------------------------
Fri Oct 25 13:36:59 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Fri Oct 25 13:37:00 2013 Control Channel Authentication: using 'C:/Program Files/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Fri Oct 25 13:37:00 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:00 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:00 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
Fri Oct 25 13:37:00 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TCP connection established with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TCPv4_CLIENT link local: [undef]
Fri Oct 25 13:37:00 2013 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:00 2013 TLS: Initial packet from [AF_INET]127.0.0.1:53611, sid=d1413d8d ecb85b35
Fri Oct 25 13:37:00 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Oct 25 13:37:00 2013 VERIFY OK: nsCertType=SERVER
Fri Oct 25 13:37:00 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Oct 25 13:37:01 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 25 13:37:01 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:01 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 25 13:37:01 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 25 13:37:01 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Fri Oct 25 13:37:01 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53611
Fri Oct 25 13:37:03 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Fri Oct 25 13:37:03 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.6.238 10.1.6.237'
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --socket-flags option modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --ifconfig/up options modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: route options modified
Fri Oct 25 13:37:03 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Oct 25 13:37:03 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Oct 25 13:37:03 2013 open_tun, tt->ipv6=0
Fri Oct 25 13:37:03 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}.tap
Fri Oct 25 13:37:03 2013 TAP-Windows Driver Version 9.9
Fri Oct 25 13:37:03 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.6.238/255.255.255.252 on interface {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF} [DHCP-serv: 10.1.6.237, lease-time: 31536000]
Fri Oct 25 13:37:03 2013 Successful ARP Flush on interface [19] {EA0913F4-F9CA-4DE3-A8F1-3ADA7F9D97DF}
Fri Oct 25 13:37:08 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Fri Oct 25 13:37:08 2013 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.6.237
Fri Oct 25 13:37:08 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Fri Oct 25 13:37:08 2013 Route addition via IPAPI succeeded [adaptive]
Fri Oct 25 13:37:08 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.4.5.53 10.1.6.238 9999
0.0.0.0 0.0.0.0 172.23.255.254 172.23.6.238 9999
0.0.0.0 0.0.0.0 10.1.6.237 10.1.6.238 30
10.1.0.1 255.255.255.255 10.1.6.237 10.1.6.238 30
10.1.6.236 255.255.255.252 10.1.6.238 10.1.6.238 286
10.1.6.238 255.255.255.255 10.1.6.238 10.1.6.238 286
10.1.6.239 255.255.255.255 10.1.6.238 10.1.6.238 286
10.4.0.1 255.255.255.255 10.4.5.53 10.1.6.238 30
88.190.203.60 255.255.255.255 10.4.5.53 10.1.6.238 30
88.190.203.75 255.255.255.255 172.23.255.254 172.23.6.238 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
172.23.0.0 255.255.0.0 172.23.6.238 172.23.6.238 286
172.23.6.238 255.255.255.255 172.23.6.238 172.23.6.238 286
172.23.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 172.23.6.238 172.23.6.238 286
224.0.0.0 240.0.0.0 10.1.6.238 10.1.6.238 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 172.23.6.238 172.23.6.238 286
255.255.255.255 255.255.255.255 10.1.6.238 10.1.6.238 286
Et après un reboot de l'ordinateur, est-ce que la première connexion à FrozenWay se passe mieux ?
Il n'y a pas une politique de sécurité particulière sur ton PC ? Est-ce que tu perds ta connexion Wifi des fois ?
ca : "Mode https (client) : L'hôte distant a fermé la connexion", c'est comme si ton proxy se bloque pendant quelques dizaines de secondes et que du coup FW se coupe. En tout cas c'est un problème de stabilité du réseau chez moi lorsque trop d'étudiants sont connectés le soir.
A 3h du matin quand le réseau est vide j'ai 0 soucis. Essaie de te lever à 3H la nuit et fais un test .
Et j'ai sûrement dit une bêtise en fait car t'as connexion n'est même pas établie quand tu as ce problème.
4tomik sera ton sauveur mais je ne sais pas s'il est présent le samedi.
Bref un vrai bordel ^^
Niveau réseau, même entre 18-20h j'atteint les 1Mo/s en téléchargement donc ça m'étonnerais franchement que ça vienne de là ^^
La solution temporaire, c'est de choisir un serveur manuellement et de s'y tenir (ne plus changer de serveur) comme ça même en cas de déco, les routes seront remplacées à la reco et pas ajoutées en plus comme c'est le cas actuellement.
Pour choisir un serveur manuellement, déroule un Pays (petite flèche à gauche d'un drapeau) et connecte toi directement à un serveur (public-01-fr-01 par exemple).
Bon je ferme le sujet, tu pourras en ouvrir un autre si ça revient, même si je ne vois pas d'où ça pouvait venir : /