Déconnection de voobly apres 10 min
salut voila dons 1à jours que j'utilise Frozenway pour jouer a AGE OF CONQUERORS sur voobly , le probleme en fait c'est que apres disons 10 min de jeux la connection de mon compte voobly se coupe et je me retrouve bloqué dans une partie c'est tres chiant , meme quand je joue pas je laisse mon compte Voobly ouvert et up il se deconnecte tous seul , y a une solution pour ça ou nn merci
Connectez-vous ou Inscrivez-vous pour répondre.
Réponses
FrozenWay version 1.6.5
----------------------------------
Server: public-01-fr-01
Protocol: OpenVPN
----------------------------------
Sat Nov 30 13:37:15 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Sat Nov 30 13:37:15 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Sat Nov 30 13:37:16 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 30 13:37:16 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 30 13:37:16 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Nov 30 13:37:16 2013 Attempting to establish TCP connection with [AF_INET]178.33.255.49:443
Sat Nov 30 13:37:16 2013 TCP connection established with [AF_INET]178.33.255.49:443
Sat Nov 30 13:37:16 2013 TCPv4_CLIENT link local: [undef]
Sat Nov 30 13:37:16 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.255.49:443
Sat Nov 30 13:37:16 2013 TLS: Initial packet from [AF_INET]178.33.255.49:443, sid=de94cc6b a908731d
Sat Nov 30 13:37:16 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Nov 30 13:37:16 2013 VERIFY OK: nsCertType=SERVER
Sat Nov 30 13:37:16 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Nov 30 13:37:16 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Nov 30 13:37:16 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 30 13:37:16 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Nov 30 13:37:16 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 30 13:37:16 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Nov 30 13:37:16 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.255.49:443
Sat Nov 30 13:37:18 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Nov 30 13:37:18 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.30.162 10.1.30.161'
Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --socket-flags option modified
Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --ifconfig/up options modified
Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: route options modified
Sat Nov 30 13:37:18 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Nov 30 13:37:18 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Nov 30 13:37:18 2013 open_tun, tt->ipv6=0
Peux tu donner le journal de connexion complet après une 30e de minute connecté à FrozenWay ?
je suis désolé pour la réponse tardive ,
en fait en plus du problème décrit dans le message précédant , ( deconnection du compte voobly tous seul) il y a un autre problème.
c'est que une fois connecter a voobly et quand je veux rentrer au salon là ou je vais choisir une partie il y a un message qui s'affiche ( impossible de se connecter au salon problème de firewall .
voila le de journal de connexion apres 30 min connecté a FrozenWay comme tu m'a demandé . j'esepere que tu pourras résoudre ce probleme car j'ai trop envie de faire quelques partie.
FrozenWay version 1.6.5
----------------------------------
Server: public-01-fr-01
Protocol: OpenVPN
----------------------------------
Fri Dec 06 17:41:52 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Fri Dec 06 17:41:52 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Fri Dec 06 17:41:52 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 06 17:41:52 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 06 17:41:52 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Dec 06 17:41:52 2013 Attempting to establish TCP connection with [AF_INET]178.33.255.49:443
Fri Dec 06 17:41:52 2013 TCP connection established with [AF_INET]178.33.255.49:443
Fri Dec 06 17:41:52 2013 TCPv4_CLIENT link local: [undef]
Fri Dec 06 17:41:52 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.255.49:443
Fri Dec 06 17:41:53 2013 TLS: Initial packet from [AF_INET]178.33.255.49:443, sid=99475350 a971d3e4
Fri Dec 06 17:41:53 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Dec 06 17:41:53 2013 VERIFY OK: nsCertType=SERVER
Fri Dec 06 17:41:53 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Fri Dec 06 17:41:53 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Dec 06 17:41:53 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 06 17:41:53 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Dec 06 17:41:53 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Dec 06 17:41:53 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Fri Dec 06 17:41:53 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.255.49:443
Fri Dec 06 17:41:55 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Fri Dec 06 17:41:56 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.27.106 10.1.27.105'
Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --socket-flags option modified
Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --ifconfig/up options modified
Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: route options modified
Fri Dec 06 17:41:56 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Dec 06 17:41:56 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Dec 06 17:41:56 2013 open_tun, tt->ipv6=0
Fri Dec 06 17:41:56 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap
Fri Dec 06 17:41:56 2013 TAP-Windows Driver Version 9.9
Fri Dec 06 17:41:56 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.27.106/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.1.27.105, lease-time: 31536000]
Fri Dec 06 17:41:56 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}
Fri Dec 06 17:42:01 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Fri Dec 06 17:42:01 2013 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.27.105
Fri Dec 06 17:42:01 2013 Route addition via IPAPI succeeded [adaptive]
Fri Dec 06 17:42:01 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 9999
0.0.0.0 0.0.0.0 10.1.27.105 10.1.27.106 1
10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
10.1.0.1 255.255.255.255 10.1.27.105 10.1.27.106 1
10.1.27.104 255.255.255.252 10.1.27.106 10.1.27.106 30
10.1.27.106 255.255.255.255 127.0.0.1 127.0.0.1 30
10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
10.255.255.255 255.255.255.255 10.1.27.106 10.1.27.106 30
10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
178.33.255.49 255.255.255.255 10.0.0.254 10.5.0.109 1
224.0.0.0 240.0.0.0 10.1.27.106 10.1.27.106 30
224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
255.255.255.255 255.255.255.255 10.1.27.106 1
255.255.255.255 255.255.255.255 10.1.27.106 10.1.27.106 1
255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 1
merci beaucoup mais
là je viens d'essayer mais ça n'a pas marcher , les deux problèmes décrits avant percistent.
y'aurais pas d'autres solutions stp
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-04
Protocol: OpenVPN
----------------------------------
Mon Dec 09 12:57:27 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Dec 09 12:57:28 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Dec 09 12:57:28 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 12:57:28 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 12:57:28 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Dec 09 12:57:28 2013 Attempting to establish TCP connection with [AF_INET]88.190.203.75:443
Mon Dec 09 12:57:28 2013 TCP connection established with [AF_INET]88.190.203.75:443
Mon Dec 09 12:57:28 2013 TCPv4_CLIENT link local: [undef]
Mon Dec 09 12:57:28 2013 TCPv4_CLIENT link remote: [AF_INET]88.190.203.75:443
Mon Dec 09 12:57:28 2013 TLS: Initial packet from [AF_INET]88.190.203.75:443, sid=dec7266c 966ef6c9
Mon Dec 09 12:57:28 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Dec 09 12:57:28 2013 VERIFY OK: nsCertType=SERVER
Mon Dec 09 12:57:28 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Dec 09 12:57:28 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Dec 09 12:57:28 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 12:57:28 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Dec 09 12:57:28 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 12:57:28 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Dec 09 12:57:28 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.75:443
Mon Dec 09 12:57:31 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Dec 09 12:57:31 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.13.110 10.4.13.109'
Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --socket-flags option modified
Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --ifconfig/up options modified
Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: route options modified
Mon Dec 09 12:57:31 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Dec 09 12:57:31 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Dec 09 12:57:31 2013 open_tun, tt->ipv6=0
Mon Dec 09 12:57:31 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap
Mon Dec 09 12:57:31 2013 TAP-Windows Driver Version 9.9
Mon Dec 09 12:57:31 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.13.110/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.4.13.109, lease-time: 31536000]
Mon Dec 09 12:57:31 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}
Mon Dec 09 12:57:36 2013 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
Mon Dec 09 12:57:36 2013 Route: Waiting for TUN/TAP interface to come up...
Mon Dec 09 12:57:41 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Dec 09 12:57:41 2013 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.13.109
Mon Dec 09 12:57:41 2013 Route addition via IPAPI succeeded [adaptive]
Mon Dec 09 12:57:41 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 9999
0.0.0.0 0.0.0.0 10.4.13.109 10.4.13.110 1
10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
10.4.0.1 255.255.255.255 10.4.13.109 10.4.13.110 1
10.4.13.108 255.255.255.252 10.4.13.110 10.4.13.110 30
10.4.13.110 255.255.255.255 127.0.0.1 127.0.0.1 30
10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
10.255.255.255 255.255.255.255 10.4.13.110 10.4.13.110 30
10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
88.190.203.75 255.255.255.255 10.0.0.254 10.5.0.109 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
224.0.0.0 240.0.0.0 10.4.13.110 10.4.13.110 30
224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
255.255.255.255 255.255.255.255 10.4.13.110 1
255.255.255.255 255.255.255.255 10.4.13.110 10.4.13.110 1
255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109
FrozenWay version 1.6.5
----------------------------------
Server: public-01-fr-02
Protocol: OpenVPN
----------------------------------
Mon Dec 09 18:45:56 2013 OpenVPN 2.3.2 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Dec 09 18:45:57 2013 Control Channel Authentication: using 'D:/Téléchargements/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Dec 09 18:45:57 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 18:45:57 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 18:45:57 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Dec 09 18:45:57 2013 Attempting to establish TCP connection with [AF_INET]178.33.213.212:443
Mon Dec 09 18:45:57 2013 TCP connection established with [AF_INET]178.33.213.212:443
Mon Dec 09 18:45:57 2013 TCPv4_CLIENT link local: [undef]
Mon Dec 09 18:45:57 2013 TCPv4_CLIENT link remote: [AF_INET]178.33.213.212:443
Mon Dec 09 18:45:57 2013 TLS: Initial packet from [AF_INET]178.33.213.212:443, sid=64f2c29a 7cfcae03
Mon Dec 09 18:45:57 2013 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Dec 09 18:45:57 2013 VERIFY OK: nsCertType=SERVER
Mon Dec 09 18:45:57 2013 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Dec 09 18:45:57 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Dec 09 18:45:57 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 18:45:57 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Dec 09 18:45:57 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 09 18:45:57 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Dec 09 18:45:57 2013 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.213.212:443
Mon Dec 09 18:46:00 2013 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Dec 09 18:46:00 2013 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.44.50 10.4.44.49'
Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --socket-flags option modified
Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --ifconfig/up options modified
Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: route options modified
Mon Dec 09 18:46:00 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Dec 09 18:46:00 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Dec 09 18:46:00 2013 open_tun, tt->ipv6=0
Mon Dec 09 18:46:00 2013 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}.tap
Mon Dec 09 18:46:00 2013 TAP-Windows Driver Version 9.9
Mon Dec 09 18:46:00 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.44.50/255.255.255.252 on interface {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613} [DHCP-serv: 10.4.44.49, lease-time: 31536000]
Mon Dec 09 18:46:00 2013 Successful ARP Flush on interface [3] {AF4BB66A-8B71-4AEB-B3D3-0C25ADC5C613}
Mon Dec 09 18:46:05 2013 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Dec 09 18:46:05 2013 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.44.49
Mon Dec 09 18:46:05 2013 Route addition via IPAPI succeeded [adaptive]
Mon Dec 09 18:46:05 2013 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.109 25
0.0.0.0 128.0.0.0 10.4.44.49 10.4.44.50 1
10.0.0.0 255.0.0.0 10.5.0.109 10.5.0.109 25
10.4.0.1 255.255.255.255 10.4.44.49 10.4.44.50 1
10.4.44.48 255.255.255.252 10.4.44.50 10.4.44.50 30
10.4.44.50 255.255.255.255 127.0.0.1 127.0.0.1 30
10.5.0.109 255.255.255.255 127.0.0.1 127.0.0.1 25
10.255.255.255 255.255.255.255 10.4.44.50 10.4.44.50 30
10.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
128.0.0.0 128.0.0.0 10.4.44.49 10.4.44.50 1
178.33.213.212 255.255.255.255 10.0.0.254 10.5.0.109 1
224.0.0.0 240.0.0.0 10.4.44.50 10.4.44.50 30
224.0.0.0 240.0.0.0 10.5.0.109 10.5.0.109 25
255.255.255.255 255.255.255.255 10.4.44.50 1
255.255.255.255 255.255.255.255 10.4.44.50 10.4.44.50 1
255.255.255.255 255.255.255.255 10.5.0.109 10.5.0.109 1
Mon Dec 09 20:39:42 2013 C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.44.49
Mon Dec 09 20:39:42 2013 Route deletion via IPAPI succeeded [adaptive]
Mon Dec 09 20:39:42 2013 Closing TUN/TAP interface
Mon Dec 09 20:39:42 2013 SIGTERM[hard,] received, process exiting
As tu un message d'erreur de Voobly ? FrozenWay ?
Peux tu envoyer le résultat de la commande suivante dans l'invite de commande dès que Voobly déconnecte toute seul ?
route print
voila le resultat de route print apres deconnecxion de voobly merci
Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
\Documents and Settings\A136783>route print
===========================================================================
Liste d'Interfaces
0x1 ........................... MS TCP Loopback interface
0x2 ...00 1b 77 a8 23 6b ...... Intel(R) PRO/Wireless 3945ABG Network Connection
- McAfee NDIS Intermediate Filter Miniport
0x3 ...00 ff af 4b b6 6a ...... TAP-Windows Adapter V9 - McAfee NDIS Intermediat
e Filter Miniport
0x10005 ...00 1c 23 02 e7 14 ...... Broadcom NetXtreme 57xx Gigabit Controller
===========================================================================
===========================================================================
Itinéraires actifs :
Destination réseau Masque réseau Adr. passerelle Adr. interface Métrique
0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.54 25
0.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
10.0.0.0 255.0.0.0 10.5.0.54 10.5.0.54 25
10.5.0.1 255.255.255.255 10.5.3.5 10.5.3.6 1
10.5.0.54 255.255.255.255 127.0.0.1 127.0.0.1 25
10.5.3.4 255.255.255.252 10.5.3.6 10.5.3.6 30
10.5.3.6 255.255.255.255 127.0.0.1 127.0.0.1 30
10.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 25
10.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 30
88.190.203.80 255.255.255.255 10.0.0.254 10.5.0.54 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
128.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
224.0.0.0 240.0.0.0 10.5.0.54 10.5.0.54 25
224.0.0.0 240.0.0.0 10.5.3.6 10.5.3.6 30
255.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 1
255.255.255.255 255.255.255.255 10.5.3.6 10005 1
255.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 1
Passerelle par défaut : 10.5.3.5
===========================================================================
Itinéraires persistants :
Aucun
\Documents and Settings\A136783>
Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
\Documents and Settings\A136783>route print
===========================================================================
Liste d'Interfaces
0x1 ........................... MS TCP Loopback interface
0x2 ...00 1b 77 a8 23 6b ...... Intel(R) PRO/Wireless 3945ABG Network Connection
- McAfee NDIS Intermediate Filter Miniport
0x3 ...00 ff af 4b b6 6a ...... TAP-Windows Adapter V9 - McAfee NDIS Intermediat
e Filter Miniport
0x10005 ...00 1c 23 02 e7 14 ...... Broadcom NetXtreme 57xx Gigabit Controller
===========================================================================
===========================================================================
Itinéraires actifs :
Destination réseau Masque réseau Adr. passerelle Adr. interface Métrique
0.0.0.0 0.0.0.0 10.0.0.254 10.5.0.54 25
0.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
10.0.0.0 255.0.0.0 10.5.0.54 10.5.0.54 25
10.5.0.1 255.255.255.255 10.5.3.5 10.5.3.6 1
10.5.0.54 255.255.255.255 127.0.0.1 127.0.0.1 25
10.5.3.4 255.255.255.252 10.5.3.6 10.5.3.6 30
10.5.3.6 255.255.255.255 127.0.0.1 127.0.0.1 30
10.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 25
10.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 30
88.190.203.80 255.255.255.255 10.0.0.254 10.5.0.54 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
128.0.0.0 128.0.0.0 10.5.3.5 10.5.3.6 1
224.0.0.0 240.0.0.0 10.5.0.54 10.5.0.54 25
224.0.0.0 240.0.0.0 10.5.3.6 10.5.3.6 30
255.255.255.255 255.255.255.255 10.5.0.54 10.5.0.54 1
255.255.255.255 255.255.255.255 10.5.3.6 10005 1
255.255.255.255 255.255.255.255 10.5.3.6 10.5.3.6 1
Passerelle par défaut : 10.5.3.5
===========================================================================
Itinéraires persistants :