FrozenWay version 1.6.6 ---------------------------------- Server: premium-01-be-04 Protocol: OpenVPN ---------------------------------- Wed Feb 22 22:26:40 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015 Wed Feb 22 22:26:40 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Feb 22 22:26:41 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.123/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file Wed Feb 22 22:26:41 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Feb 22 22:26:41 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Feb 22 22:26:41 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Feb 22 22:26:41 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
Wed Feb 22 22:26:42 2017 TCP connection established with [AF_INET]5.135.109.187:443 Wed Feb 22 22:26:42 2017 TCPv4_CLIENT link local: [undef] Wed Feb 22 22:26:42 2017 TCPv4_CLIENT link remote: [AF_INET]5.135.109.187:443
Wed Feb 22 22:26:42 2017 TLS: Initial packet from [AF_INET]5.135.109.187:443, sid=5c925201 47338ce6
Wed Feb 22 22:26:44 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Feb 22 22:26:44 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Feb 22 22:26:44 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Feb 22 22:26:44 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Feb 22 22:26:44 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Feb 22 22:26:44 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.187:443
Wed Feb 22 22:26:46 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 22 22:26:46 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,dhcp-option WINS 10.8.0.1,route 10.8.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.8.0.106 10.8.0.105' Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --socket-flags option modified Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --ifconfig/up options modified Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: route options modified Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Feb 22 22:26:46 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed Feb 22 22:26:46 2017 open_tun, tt->ipv6=0 Wed Feb 22 22:26:46 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap Wed Feb 22 22:26:46 2017 TAP-Windows Driver Version 9.21 Wed Feb 22 22:26:46 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.106/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.8.0.105, lease-time: 31536000] Wed Feb 22 22:26:46 2017 Successful ARP Flush on interface [7] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Wed Feb 22 22:26:51 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up Wed Feb 22 22:26:51 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.105 Wed Feb 22 22:26:51 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Wed Feb 22 22:26:51 2017 Route addition via IPAPI succeeded [adaptive] Wed Feb 22 22:26:51 2017 Initialization Sequence Completed
Wed Feb 22 22:29:49 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Feb 22 22:29:49 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
Wed Feb 22 22:29:50 2017 TCP connection established with [AF_INET]5.135.109.187:443 Wed Feb 22 22:29:50 2017 TCPv4_CLIENT link local: [undef] Wed Feb 22 22:29:50 2017 TCPv4_CLIENT link remote: [AF_INET]5.135.109.187:443 Wed Feb 22 22:29:50 2017 Connection reset, restarting [0] Wed Feb 22 22:29:50 2017 SIGUSR1[soft,connection-reset] received, process restarting Wed Feb 22 22:29:50 2017 Restart pause, 1 second(s)
Wed Feb 22 22:29:51 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Feb 22 22:29:51 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
FrozenWay version 1.6.6 ---------------------------------- Server: premium-03-fr-02 Protocol: OpenVPN ---------------------------------- Thu Feb 23 10:56:46 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015 Thu Feb 23 10:56:46 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Thu Feb 23 10:56:46 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.109/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file Thu Feb 23 10:56:46 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 10:56:46 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 10:56:46 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Feb 23 10:56:46 2017 Attempting to establish TCP connection with [AF_INET]178.33.86.13:443 [nonblock]
Thu Feb 23 10:56:47 2017 TCP connection established with [AF_INET]178.33.86.13:443 Thu Feb 23 10:56:47 2017 TCPv4_CLIENT link local: [undef] Thu Feb 23 10:56:47 2017 TCPv4_CLIENT link remote: [AF_INET]178.33.86.13:443 Thu Feb 23 10:56:47 2017 TLS: Initial packet from [AF_INET]178.33.86.13:443, sid=83f10f3e b25c3d94
Thu Feb 23 10:56:49 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Feb 23 10:56:49 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 10:56:49 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Feb 23 10:56:49 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 10:56:49 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Thu Feb 23 10:56:49 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.86.13:443
Thu Feb 23 10:56:51 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Thu Feb 23 10:56:52 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.0.198 10.2.0.197' Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --socket-flags option modified Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --ifconfig/up options modified Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: route options modified Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Feb 23 10:56:52 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Thu Feb 23 10:56:52 2017 open_tun, tt->ipv6=0 Thu Feb 23 10:56:52 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap Thu Feb 23 10:56:52 2017 TAP-Windows Driver Version 9.21 Thu Feb 23 10:56:52 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.0.198/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.2.0.197, lease-time: 31536000] Thu Feb 23 10:56:52 2017 Successful ARP Flush on interface [7] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Thu Feb 23 10:56:57 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up Thu Feb 23 10:56:57 2017 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.0.197 Thu Feb 23 10:56:57 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Thu Feb 23 10:56:57 2017 Route addition via IPAPI succeeded [adaptive] Thu Feb 23 10:56:57 2017 Initialization Sequence Completed
j'ai taper les commande et redemarer mon pc FrozenWay version 1.6.6 ---------------------------------- Server: premium-01-fr-02 Protocol: OpenVPN ---------------------------------- Thu Feb 23 14:42:36 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015 Thu Feb 23 14:42:36 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Thu Feb 23 14:42:37 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.886/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file Thu Feb 23 14:42:37 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 14:42:37 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 14:42:37 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Feb 23 14:42:37 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:42:38 2017 TCP connection established with [AF_INET]176.31.8.117:443 Thu Feb 23 14:42:38 2017 TCPv4_CLIENT link local: [undef] Thu Feb 23 14:42:38 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:42:38 2017 TLS: Initial packet from [AF_INET]176.31.8.117:443, sid=0f2a2128 2e6e1098
Thu Feb 23 14:42:40 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Feb 23 14:42:40 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 14:42:40 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Feb 23 14:42:40 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Feb 23 14:42:40 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Thu Feb 23 14:42:40 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]176.31.8.117:443
Thu Feb 23 14:42:43 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Thu Feb 23 14:42:43 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.78 10.2.1.77' Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --socket-flags option modified Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --ifconfig/up options modified Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: route options modified Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Feb 23 14:42:43 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Thu Feb 23 14:42:43 2017 open_tun, tt->ipv6=0 Thu Feb 23 14:42:43 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap Thu Feb 23 14:42:43 2017 TAP-Windows Driver Version 9.21 Thu Feb 23 14:42:43 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.1.78/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.2.1.77, lease-time: 31536000] Thu Feb 23 14:42:43 2017 Successful ARP Flush on interface [8] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Thu Feb 23 14:42:48 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up Thu Feb 23 14:42:48 2017 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.1.77 Thu Feb 23 14:42:48 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Thu Feb 23 14:42:48 2017 Route addition via IPAPI succeeded [adaptive] Thu Feb 23 14:42:48 2017 Initialization Sequence Completed
Thu Feb 23 14:44:20 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Feb 23 14:44:20 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:21 2017 TCP connection established with [AF_INET]176.31.8.117:443 Thu Feb 23 14:44:21 2017 TCPv4_CLIENT link local: [undef] Thu Feb 23 14:44:21 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443 Thu Feb 23 14:44:21 2017 Connection reset, restarting [0] Thu Feb 23 14:44:21 2017 SIGUSR1[soft,connection-reset] received, process restarting Thu Feb 23 14:44:21 2017 Restart pause, 1 second(s)
Thu Feb 23 14:44:22 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Feb 23 14:44:22 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:23 2017 TCP connection established with [AF_INET]176.31.8.117:443 Thu Feb 23 14:44:23 2017 TCPv4_CLIENT link local: [undef] Thu Feb 23 14:44:23 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443 Thu Feb 23 14:44:23 2017 Connection reset, restarting [0] Thu Feb 23 14:44:23 2017 SIGUSR1[soft,connection-reset] received, process restarting Thu Feb 23 14:44:23 2017 Restart pause, 1 second(s)
Thu Feb 23 14:44:24 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Feb 23 14:44:24 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:25 2017 TCP connection established with [AF_INET]176.31.8.117:443 Thu Feb 23 14:44:25 2017 TCPv4_CLIENT link local: [undef] Thu Feb 23 14:44:25 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:25 2017 Connection reset, restarting [0] Thu Feb 23 14:44:25 2017 SIGUSR1[soft,connection-reset] received, process restarting Thu Feb 23 14:44:25 2017 Restart pause, 1 second(s)
ok, donc le soucis vient du fait que ton système ne respecte pas la table de routage... C'est bizarre, les commandes que je t'ai donné plus haut auraient dû résoudre ce genre de problème. Quel est le résutat d'un route print dans l'invite de commande Windows stp ? Peux-tu retapper les commandes que je t'ai donné plus haut et m'envoyer la capture d'écran de la fenêtre de l'invite de commande une fois lancées stp ?
Réponses
Donne le journal de connexion à FrozenWay stp.
----------------------------------
Server: premium-01-be-04
Protocol: OpenVPN
----------------------------------
Wed Feb 22 22:26:40 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Wed Feb 22 22:26:40 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Feb 22 22:26:41 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.123/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 22 22:26:41 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 22 22:26:41 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 22 22:26:41 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 22 22:26:41 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
Wed Feb 22 22:26:42 2017 TCP connection established with [AF_INET]5.135.109.187:443
Wed Feb 22 22:26:42 2017 TCPv4_CLIENT link local: [undef]
Wed Feb 22 22:26:42 2017 TCPv4_CLIENT link remote: [AF_INET]5.135.109.187:443
Wed Feb 22 22:26:42 2017 TLS: Initial packet from [AF_INET]5.135.109.187:443, sid=5c925201 47338ce6
Wed Feb 22 22:26:43 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 22 22:26:43 2017 VERIFY OK: nsCertType=SERVER
Wed Feb 22 22:26:43 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 22 22:26:44 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 22 22:26:44 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 22 22:26:44 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 22 22:26:44 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 22 22:26:44 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Feb 22 22:26:44 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.187:443
Wed Feb 22 22:26:46 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 22 22:26:46 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,dhcp-option WINS 10.8.0.1,route 10.8.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.8.0.106 10.8.0.105'
Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: route options modified
Wed Feb 22 22:26:46 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 22 22:26:46 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 22 22:26:46 2017 open_tun, tt->ipv6=0
Wed Feb 22 22:26:46 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap
Wed Feb 22 22:26:46 2017 TAP-Windows Driver Version 9.21
Wed Feb 22 22:26:46 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.106/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.8.0.105, lease-time: 31536000]
Wed Feb 22 22:26:46 2017 Successful ARP Flush on interface [7] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Wed Feb 22 22:26:51 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 22 22:26:51 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.105
Wed Feb 22 22:26:51 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Wed Feb 22 22:26:51 2017 Route addition via IPAPI succeeded [adaptive]
Wed Feb 22 22:26:51 2017 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.4.2 192.168.4.81 55
0.0.0.0 128.0.0.0 10.8.0.105 10.8.0.106 35
5.135.109.187 255.255.255.255 192.168.4.2 192.168.4.81 55
10.8.0.1 255.255.255.255 10.8.0.105 10.8.0.106 35
10.8.0.104 255.255.255.252 10.8.0.106 10.8.0.106 291
10.8.0.106 255.255.255.255 10.8.0.106 10.8.0.106 291
10.8.0.107 255.255.255.255 10.8.0.106 10.8.0.106 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.8.0.105 10.8.0.106 35
192.168.4.0 255.255.255.0 192.168.4.81 192.168.4.81 311
192.168.4.81 255.255.255.255 192.168.4.81 192.168.4.81 311
192.168.4.255 255.255.255.255 192.168.4.81 192.168.4.81 311
192.168.137.0 255.255.255.0 192.168.137.1 192.168.137.1 311
192.168.137.1 255.255.255.255 192.168.137.1 192.168.137.1 311
192.168.137.255 255.255.255.255 192.168.137.1 192.168.137.1 311
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 10.8.0.106 10.8.0.106 291
224.0.0.0 240.0.0.0 192.168.4.81 192.168.4.81 311
224.0.0.0 240.0.0.0 192.168.137.1 192.168.137.1 311
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 10.8.0.106 10.8.0.106 291
255.255.255.255 255.255.255.255 192.168.4.81 192.168.4.81 311
255.255.255.255 255.255.255.255 192.168.137.1 192.168.137.1 311
Wed Feb 22 22:29:48 2017 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Wed Feb 22 22:29:48 2017 Connection reset, restarting [-1]
Wed Feb 22 22:29:48 2017 SIGUSR1[soft,connection-reset] received, process restarting
Wed Feb 22 22:29:48 2017 Restart pause, 1 second(s)
Wed Feb 22 22:29:49 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 22 22:29:49 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
Wed Feb 22 22:29:50 2017 TCP connection established with [AF_INET]5.135.109.187:443
Wed Feb 22 22:29:50 2017 TCPv4_CLIENT link local: [undef]
Wed Feb 22 22:29:50 2017 TCPv4_CLIENT link remote: [AF_INET]5.135.109.187:443
Wed Feb 22 22:29:50 2017 Connection reset, restarting [0]
Wed Feb 22 22:29:50 2017 SIGUSR1[soft,connection-reset] received, process restarting
Wed Feb 22 22:29:50 2017 Restart pause, 1 second(s)
Wed Feb 22 22:29:51 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 22 22:29:51 2017 Attempting to establish TCP connection with [AF_INET]5.135.109.187:443 [nonblock]
----------------------------------
Server: premium-03-fr-02
Protocol: OpenVPN
----------------------------------
Thu Feb 23 10:56:46 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Thu Feb 23 10:56:46 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Thu Feb 23 10:56:46 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.109/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Thu Feb 23 10:56:46 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 10:56:46 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 10:56:46 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Feb 23 10:56:46 2017 Attempting to establish TCP connection with [AF_INET]178.33.86.13:443 [nonblock]
Thu Feb 23 10:56:47 2017 TCP connection established with [AF_INET]178.33.86.13:443
Thu Feb 23 10:56:47 2017 TCPv4_CLIENT link local: [undef]
Thu Feb 23 10:56:47 2017 TCPv4_CLIENT link remote: [AF_INET]178.33.86.13:443
Thu Feb 23 10:56:47 2017 TLS: Initial packet from [AF_INET]178.33.86.13:443, sid=83f10f3e b25c3d94
Thu Feb 23 10:56:48 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Thu Feb 23 10:56:48 2017 VERIFY OK: nsCertType=SERVER
Thu Feb 23 10:56:48 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Thu Feb 23 10:56:49 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Feb 23 10:56:49 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 10:56:49 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Feb 23 10:56:49 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 10:56:49 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Thu Feb 23 10:56:49 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]178.33.86.13:443
Thu Feb 23 10:56:51 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Thu Feb 23 10:56:52 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.0.198 10.2.0.197'
Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --socket-flags option modified
Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --ifconfig/up options modified
Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: route options modified
Thu Feb 23 10:56:52 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Feb 23 10:56:52 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Feb 23 10:56:52 2017 open_tun, tt->ipv6=0
Thu Feb 23 10:56:52 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap
Thu Feb 23 10:56:52 2017 TAP-Windows Driver Version 9.21
Thu Feb 23 10:56:52 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.0.198/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.2.0.197, lease-time: 31536000]
Thu Feb 23 10:56:52 2017 Successful ARP Flush on interface [7] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Thu Feb 23 10:56:57 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Thu Feb 23 10:56:57 2017 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.0.197
Thu Feb 23 10:56:57 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Thu Feb 23 10:56:57 2017 Route addition via IPAPI succeeded [adaptive]
Thu Feb 23 10:56:57 2017 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.4.2 192.168.4.81 55
0.0.0.0 128.0.0.0 10.2.0.197 10.2.0.198 35
10.2.0.1 255.255.255.255 10.2.0.197 10.2.0.198 35
10.2.0.196 255.255.255.252 10.2.0.198 10.2.0.198 291
10.2.0.198 255.255.255.255 10.2.0.198 10.2.0.198 291
10.2.0.199 255.255.255.255 10.2.0.198 10.2.0.198 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.2.0.197 10.2.0.198 35
178.33.86.13 255.255.255.255 192.168.4.2 192.168.4.81 55
192.168.4.0 255.255.255.0 192.168.4.81 192.168.4.81 311
192.168.4.81 255.255.255.255 192.168.4.81 192.168.4.81 311
192.168.4.255 255.255.255.255 192.168.4.81 192.168.4.81 311
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 10.2.0.198 10.2.0.198 291
224.0.0.0 240.0.0.0 192.168.4.81 192.168.4.81 311
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 10.2.0.198 10.2.0.198 291
255.255.255.255 255.255.255.255 192.168.4.81 192.168.4.81 311
Thu Feb 23 10:59:01 2017 [FrozenWay] Inactivity timeout (--ping-exit), exiting
Thu Feb 23 10:59:01 2017 C:\WINDOWS\system32\route.exe DELETE 10.2.0.1 MASK 255.255.255.255 10.2.0.197
Thu Feb 23 10:59:01 2017 Route deletion via IPAPI succeeded [adaptive]
Thu Feb 23 10:59:01 2017 Closing TUN/TAP interface
Thu Feb 23 10:59:01 2017 SIGTERM[soft,ping-exit] received, process exiting
FrozenWay version 1.6.6
----------------------------------
Server: premium-01-fr-02
Protocol: OpenVPN
----------------------------------
Thu Feb 23 14:42:36 2017 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Thu Feb 23 14:42:36 2017 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Thu Feb 23 14:42:37 2017 Control Channel Authentication: using 'C:/Users/free-man/AppData/Local/Temp/Rar$EXa0.886/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Thu Feb 23 14:42:37 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 14:42:37 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 14:42:37 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Feb 23 14:42:37 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:42:38 2017 TCP connection established with [AF_INET]176.31.8.117:443
Thu Feb 23 14:42:38 2017 TCPv4_CLIENT link local: [undef]
Thu Feb 23 14:42:38 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:42:38 2017 TLS: Initial packet from [AF_INET]176.31.8.117:443, sid=0f2a2128 2e6e1098
Thu Feb 23 14:42:39 2017 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Thu Feb 23 14:42:39 2017 VERIFY OK: nsCertType=SERVER
Thu Feb 23 14:42:39 2017 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Thu Feb 23 14:42:40 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Feb 23 14:42:40 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 14:42:40 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Feb 23 14:42:40 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Feb 23 14:42:40 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Thu Feb 23 14:42:40 2017 [FrozenWay] Peer Connection Initiated with [AF_INET]176.31.8.117:443
Thu Feb 23 14:42:43 2017 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Thu Feb 23 14:42:43 2017 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.78 10.2.1.77'
Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --socket-flags option modified
Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --ifconfig/up options modified
Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: route options modified
Thu Feb 23 14:42:43 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Feb 23 14:42:43 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Feb 23 14:42:43 2017 open_tun, tt->ipv6=0
Thu Feb 23 14:42:43 2017 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{4F44F4DB-29F3-4640-9933-7C7410F2296A}.tap
Thu Feb 23 14:42:43 2017 TAP-Windows Driver Version 9.21
Thu Feb 23 14:42:43 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.1.78/255.255.255.252 on interface {4F44F4DB-29F3-4640-9933-7C7410F2296A} [DHCP-serv: 10.2.1.77, lease-time: 31536000]
Thu Feb 23 14:42:43 2017 Successful ARP Flush on interface [8] {4F44F4DB-29F3-4640-9933-7C7410F2296A}
Thu Feb 23 14:42:48 2017 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Thu Feb 23 14:42:48 2017 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.1.77
Thu Feb 23 14:42:48 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Thu Feb 23 14:42:48 2017 Route addition via IPAPI succeeded [adaptive]
Thu Feb 23 14:42:48 2017 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.4.2 192.168.4.81 60
0.0.0.0 128.0.0.0 10.2.1.77 10.2.1.78 35
10.2.0.1 255.255.255.255 10.2.1.77 10.2.1.78 35
10.2.1.76 255.255.255.252 10.2.1.78 10.2.1.78 291
10.2.1.78 255.255.255.255 10.2.1.78 10.2.1.78 291
10.2.1.79 255.255.255.255 10.2.1.78 10.2.1.78 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.2.1.77 10.2.1.78 35
176.31.8.117 255.255.255.255 192.168.4.2 192.168.4.81 60
192.168.4.0 255.255.255.0 192.168.4.81 192.168.4.81 316
192.168.4.81 255.255.255.255 192.168.4.81 192.168.4.81 316
192.168.4.255 255.255.255.255 192.168.4.81 192.168.4.81 316
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 10.2.1.78 10.2.1.78 291
224.0.0.0 240.0.0.0 192.168.4.81 192.168.4.81 316
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 10.2.1.78 10.2.1.78 291
255.255.255.255 255.255.255.255 192.168.4.81 192.168.4.81 316
Thu Feb 23 14:44:19 2017 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Thu Feb 23 14:44:19 2017 Connection reset, restarting [-1]
Thu Feb 23 14:44:19 2017 SIGUSR1[soft,connection-reset] received, process restarting
Thu Feb 23 14:44:19 2017 Restart pause, 1 second(s)
Thu Feb 23 14:44:20 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Feb 23 14:44:20 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:21 2017 TCP connection established with [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:21 2017 TCPv4_CLIENT link local: [undef]
Thu Feb 23 14:44:21 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:21 2017 Connection reset, restarting [0]
Thu Feb 23 14:44:21 2017 SIGUSR1[soft,connection-reset] received, process restarting
Thu Feb 23 14:44:21 2017 Restart pause, 1 second(s)
Thu Feb 23 14:44:22 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Feb 23 14:44:22 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:23 2017 TCP connection established with [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:23 2017 TCPv4_CLIENT link local: [undef]
Thu Feb 23 14:44:23 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:23 2017 Connection reset, restarting [0]
Thu Feb 23 14:44:23 2017 SIGUSR1[soft,connection-reset] received, process restarting
Thu Feb 23 14:44:23 2017 Restart pause, 1 second(s)
Thu Feb 23 14:44:24 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Feb 23 14:44:24 2017 Attempting to establish TCP connection with [AF_INET]176.31.8.117:443 [nonblock]
Thu Feb 23 14:44:25 2017 TCP connection established with [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:25 2017 TCPv4_CLIENT link local: [undef]
Thu Feb 23 14:44:25 2017 TCPv4_CLIENT link remote: [AF_INET]176.31.8.117:443
Thu Feb 23 14:44:25 2017 Connection reset, restarting [0]
Thu Feb 23 14:44:25 2017 SIGUSR1[soft,connection-reset] received, process restarting
Thu Feb 23 14:44:25 2017 Restart pause, 1 second(s)
mais sa ce déconnecte plus en tout cas
route print
dans l'invite de commande Windows stp ? Peux-tu retapper les commandes que je t'ai donné plus haut et m'envoyer la capture d'écran de la fenêtre de l'invite de commande une fois lancées stp ?