Frozenway redémarre tout seul
Bonjour j'ai un soucis depuis qques heures, frozenway redémarre en permanence, je joue à un jeu en ligne et la co se perds d'un coup, quand je regarde dans le journal il y a plein de répétitions de ma même séquence se terminant par "complete" et contenant des mots comme "restart" etc, j'imagine que frozenway redémarre donc mais je ne sais pas pourquoi, voilà la partie du journal ;
(c'est tout le temps le même code de timeout : 10060)
Sat Apr 28 01:07:23 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Sat Apr 28 01:07:23 2018 Connection reset, restarting [-1]
Sat Apr 28 01:07:23 2018 SIGUSR1[soft,connection-reset] received, process restarting
Sat Apr 28 01:07:23 2018 Restart pause, 1 second(s)
Sat Apr 28 01:07:24 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Apr 28 01:07:24 2018 Attempting to establish TCP connection with [AF_INET]212.129.61.121:443 [nonblock]
Sat Apr 28 01:07:25 2018 TCP connection established with [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link local: [undef]
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link remote: [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:25 2018 TLS: Initial packet from [AF_INET]212.129.61.121:443, sid=40682522 6164e346
Sat Apr 28 01:07:25 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Apr 28 01:07:25 2018 VERIFY OK: nsCertType=SERVER
Sat Apr 28 01:07:25 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Sat Apr 28 01:07:26 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:28 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Apr 28 01:07:28 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.1.2 10.3.1.1'
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --socket-flags option modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: route options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 28 01:07:28 2018 Preserving previous TUN/TAP instance: FrozenWay
Sat Apr 28 01:07:28 2018 Initialization Sequence Completed
(c'est tout le temps le même code de timeout : 10060)
Sat Apr 28 01:07:23 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Sat Apr 28 01:07:23 2018 Connection reset, restarting [-1]
Sat Apr 28 01:07:23 2018 SIGUSR1[soft,connection-reset] received, process restarting
Sat Apr 28 01:07:23 2018 Restart pause, 1 second(s)
Sat Apr 28 01:07:24 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Apr 28 01:07:24 2018 Attempting to establish TCP connection with [AF_INET]212.129.61.121:443 [nonblock]
Sat Apr 28 01:07:25 2018 TCP connection established with [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link local: [undef]
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link remote: [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:25 2018 TLS: Initial packet from [AF_INET]212.129.61.121:443, sid=40682522 6164e346
Sat Apr 28 01:07:25 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Apr 28 01:07:25 2018 VERIFY OK: nsCertType=SERVER
Sat Apr 28 01:07:25 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Sat Apr 28 01:07:26 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:28 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Apr 28 01:07:28 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.1.2 10.3.1.1'
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --socket-flags option modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: route options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 28 01:07:28 2018 Preserving previous TUN/TAP instance: FrozenWay
Sat Apr 28 01:07:28 2018 Initialization Sequence Completed
Connectez-vous ou Inscrivez-vous pour répondre.
Réponses
ipconfig/flushdns
netsh winsock reset
netsh winhttp reset proxy
netsh winhttp reset tracing
netsh winsock reset catalog
netsh int ipv4 reset catalog
netsh int ipv6 reset catalog
Est-ce qu'il y aurai une commande qui ferait l'effet inverse et que je ne devrais pas entrer ?
edit : désolé d'avoir rajouter ça en commentaire j'avais pas vu le bouton "modifié"
Peux-tu me donner un journal complet après plusieurs deco/reco successive stp ? Pour voir la fréquence.
Tu te co en WiFi ? Si oui, le signal est-il bon ?
As-tu essayé de couper ton antivirus/pare-feu ?
----------------------------------
Server: premium-01-fr-02
Protocol: OpenVPN
----------------------------------
Mon May 14 10:35:20 2018 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Mon May 14 10:35:20 2018 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Mon May 14 10:35:20 2018 Control Channel Authentication: using 'C:/Users/Ryu/Desktop/Nouveau dossier/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Mon May 14 10:35:20 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:35:20 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:35:20 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon May 14 10:35:20 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]
Mon May 14 10:35:22 2018 TCP connection established with [AF_INET]217.182.34.221:443
Mon May 14 10:35:22 2018 TCPv4_CLIENT link local: [undef]
Mon May 14 10:35:22 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
Mon May 14 10:35:22 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=34477fd8 33af5952
Mon May 14 10:35:22 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:35:22 2018 VERIFY OK: nsCertType=SERVER
Mon May 14 10:35:22 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:35:22 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:35:22 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:35:22 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:35:22 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:35:22 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon May 14 10:35:22 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443
Mon May 14 10:35:24 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon May 14 10:35:24 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
Mon May 14 10:35:24 2018 OPTIONS IMPORT: --socket-flags option modified
Mon May 14 10:35:24 2018 OPTIONS IMPORT: --ifconfig/up options modified
Mon May 14 10:35:24 2018 OPTIONS IMPORT: route options modified
Mon May 14 10:35:24 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon May 14 10:35:24 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon May 14 10:35:24 2018 open_tun, tt->ipv6=0
Mon May 14 10:35:24 2018 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{788D4080-2E3C-4481-A7B4-6C1B8603E7B2}.tap
Mon May 14 10:35:24 2018 TAP-Windows Driver Version 9.21
Mon May 14 10:35:24 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.1.158/255.255.255.252 on interface {788D4080-2E3C-4481-A7B4-6C1B8603E7B2} [DHCP-serv: 10.2.1.157, lease-time: 31536000]
Mon May 14 10:35:24 2018 Successful ARP Flush on interface [10] {788D4080-2E3C-4481-A7B4-6C1B8603E7B2}
Mon May 14 10:35:29 2018 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon May 14 10:35:29 2018 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.1.157
Mon May 14 10:35:29 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Mon May 14 10:35:29 2018 Route addition via IPAPI succeeded [adaptive]
Mon May 14 10:35:29 2018 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 172.17.88.2 172.17.88.232 36
0.0.0.0 128.0.0.0 10.2.1.157 10.2.1.158 35
10.2.0.1 255.255.255.255 10.2.1.157 10.2.1.158 35
10.2.1.156 255.255.255.252 10.2.1.158 10.2.1.158 291
10.2.1.158 255.255.255.255 10.2.1.158 10.2.1.158 291
10.2.1.159 255.255.255.255 10.2.1.158 10.2.1.158 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.2.1.157 10.2.1.158 35
172.17.80.0 255.255.240.0 172.17.88.232 172.17.88.232 291
172.17.88.232 255.255.255.255 172.17.88.232 172.17.88.232 291
172.17.95.255 255.255.255.255 172.17.88.232 172.17.88.232 291
217.182.34.221 255.255.255.255 172.17.88.2 172.17.88.232 35
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 10.2.1.158 10.2.1.158 291
224.0.0.0 240.0.0.0 172.17.88.232 172.17.88.232 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 10.2.1.158 10.2.1.158 291
255.255.255.255 255.255.255.255 172.17.88.232 172.17.88.232 291
Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:36:36 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Mon May 14 10:36:36 2018 Connection reset, restarting [-1]
Mon May 14 10:36:36 2018 SIGUSR1[soft,connection-reset] received, process restarting
Mon May 14 10:36:36 2018 Restart pause, 1 second(s)
Mon May 14 10:36:37 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon May 14 10:36:37 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]
Mon May 14 10:36:38 2018 TCP connection established with [AF_INET]217.182.34.221:443
Mon May 14 10:36:38 2018 TCPv4_CLIENT link local: [undef]
Mon May 14 10:36:38 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
Mon May 14 10:36:38 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=3a70cabb f6b77d9a
Mon May 14 10:36:38 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:36:38 2018 VERIFY OK: nsCertType=SERVER
Mon May 14 10:36:38 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:36:38 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:36:38 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:36:38 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:36:38 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:36:38 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon May 14 10:36:38 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443
Mon May 14 10:36:40 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon May 14 10:36:40 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
Mon May 14 10:36:40 2018 OPTIONS IMPORT: --socket-flags option modified
Mon May 14 10:36:40 2018 OPTIONS IMPORT: --ifconfig/up options modified
Mon May 14 10:36:40 2018 OPTIONS IMPORT: route options modified
Mon May 14 10:36:40 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon May 14 10:36:40 2018 Preserving previous TUN/TAP instance: FrozenWay
Mon May 14 10:36:40 2018 Initialization Sequence Completed
Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:37:35 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Mon May 14 10:37:35 2018 Connection reset, restarting [-1]
Mon May 14 10:37:35 2018 SIGUSR1[soft,connection-reset] received, process restarting
Mon May 14 10:37:35 2018 Restart pause, 1 second(s)
Mon May 14 10:37:36 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon May 14 10:37:36 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]
Mon May 14 10:37:37 2018 TCP connection established with [AF_INET]217.182.34.221:443
Mon May 14 10:37:37 2018 TCPv4_CLIENT link local: [undef]
Mon May 14 10:37:37 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
Mon May 14 10:37:37 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=c9c71e48 863b14c4
Mon May 14 10:37:38 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:37:38 2018 VERIFY OK: nsCertType=SERVER
Mon May 14 10:37:38 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:37:38 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:37:38 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:37:38 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:37:38 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:37:38 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon May 14 10:37:38 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443
Mon May 14 10:37:40 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon May 14 10:37:40 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
Mon May 14 10:37:40 2018 OPTIONS IMPORT: --socket-flags option modified
Mon May 14 10:37:40 2018 OPTIONS IMPORT: --ifconfig/up options modified
Mon May 14 10:37:40 2018 OPTIONS IMPORT: route options modified
Mon May 14 10:37:40 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon May 14 10:37:40 2018 Preserving previous TUN/TAP instance: FrozenWay
Mon May 14 10:37:40 2018 Initialization Sequence Completed
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon May 14 10:38:13 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Mon May 14 10:38:13 2018 Connection reset, restarting [-1]
Mon May 14 10:38:13 2018 SIGUSR1[soft,connection-reset] received, process restarting
Mon May 14 10:38:13 2018 Restart pause, 1 second(s)
Mon May 14 10:38:14 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon May 14 10:38:14 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]
Mon May 14 10:38:15 2018 TCP connection established with [AF_INET]217.182.34.221:443
Mon May 14 10:38:15 2018 TCPv4_CLIENT link local: [undef]
Mon May 14 10:38:15 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
Mon May 14 10:38:15 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=2be3234e e466f1f8
Mon May 14 10:38:15 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:38:15 2018 VERIFY OK: nsCertType=SERVER
Mon May 14 10:38:15 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon May 14 10:38:15 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:38:15 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:38:15 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon May 14 10:38:15 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon May 14 10:38:15 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon May 14 10:38:15 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443
Mon May 14 10:38:17 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon May 14 10:38:17 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
Mon May 14 10:38:17 2018 OPTIONS IMPORT: --socket-flags option modified
Mon May 14 10:38:17 2018 OPTIONS IMPORT: --ifconfig/up options modified
Mon May 14 10:38:17 2018 OPTIONS IMPORT: route options modified
Mon May 14 10:38:17 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon May 14 10:38:17 2018 Preserving previous TUN/TAP instance: FrozenWay
Mon May 14 10:38:17 2018 Initialization Sequence Completed
Lance un http://speedof.me avec ET sans FrozenWay de connecté et à la fin des tests, clic sur le bouton
Share
et copie/colle ici l'url des résultats stp.