Frozenway redémarre tout seul

Bonjour j'ai un soucis depuis qques heures, frozenway redémarre en permanence, je joue à un jeu en ligne et la co se perds d'un coup, quand je regarde dans le journal il y a plein de répétitions de ma même séquence se terminant par "complete" et contenant des mots comme "restart" etc, j'imagine que frozenway redémarre donc mais je ne sais pas pourquoi, voilà la partie du journal ;

(c'est tout le temps le même code de timeout : 10060)


Sat Apr 28 01:07:23 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Sat Apr 28 01:07:23 2018 Connection reset, restarting [-1]
Sat Apr 28 01:07:23 2018 SIGUSR1[soft,connection-reset] received, process restarting
Sat Apr 28 01:07:23 2018 Restart pause, 1 second(s)

Sat Apr 28 01:07:24 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Apr 28 01:07:24 2018 Attempting to establish TCP connection with [AF_INET]212.129.61.121:443 [nonblock]

Sat Apr 28 01:07:25 2018 TCP connection established with [AF_INET]212.129.61.121:443
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link local: [undef]
Sat Apr 28 01:07:25 2018 TCPv4_CLIENT link remote: [AF_INET]212.129.61.121:443

Sat Apr 28 01:07:25 2018 TLS: Initial packet from [AF_INET]212.129.61.121:443, sid=40682522 6164e346

Sat Apr 28 01:07:25 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Apr 28 01:07:25 2018 VERIFY OK: nsCertType=SERVER
Sat Apr 28 01:07:25 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 28 01:07:26 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 28 01:07:26 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Sat Apr 28 01:07:26 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]212.129.61.121:443

Sat Apr 28 01:07:28 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Apr 28 01:07:28 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.1.2 10.3.1.1'
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --socket-flags option modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: route options modified
Sat Apr 28 01:07:28 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 28 01:07:28 2018 Preserving previous TUN/TAP instance: FrozenWay
Sat Apr 28 01:07:28 2018 Initialization Sequence Completed

Réponses

  • avril 2018 modifié
    J'ai oublié de dire que j'ai fouiné un petit peu sur le forum avant de poster en utilisant le code d'erreur dans la barre de recherche et j'ai déjà rentré les commandes proposé, quand internet bug d'habitude je rentre ces commandes ci ;
    ipconfig/flushdns
    netsh winsock reset
    netsh winhttp reset proxy
    netsh winhttp reset tracing
    netsh winsock reset catalog
    netsh int ipv4 reset catalog
    netsh int ipv6 reset catalog

    Est-ce qu'il y aurai une commande qui ferait l'effet inverse et que je ne devrais pas entrer ?

    edit : désolé d'avoir rajouter ça en commentaire j'avais pas vu le bouton "modifié"
  • Salut,

    Peux-tu me donner un journal complet après plusieurs deco/reco successive stp ? Pour voir la fréquence.

    Tu te co en WiFi ? Si oui, le signal est-il bon ?
    As-tu essayé de couper ton antivirus/pare-feu ?
  • mai 2018 modifié
    Salut, j'avais oublié ce post, le problème c'était reglé par lui même pendant qques jours puis j'ai passé une semaine chez mes parents donc sans le vpn, mais maintenant que je viens de revenir avec le CROUS ça me le refait mais encore plus violent, avant la fréquence était de 20mn la c'est quelques secondes, je suis co avec un câble et j'avais déjà essayé oui de désactiver windows defender etc, je met le journal dans un autre comm car il dépasse la limite de caractères
  • FrozenWay version 1.6.6
    ----------------------------------
    Server: premium-01-fr-02
    Protocol: OpenVPN
    ----------------------------------
    Mon May 14 10:35:20 2018 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
    Mon May 14 10:35:20 2018 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

    Mon May 14 10:35:20 2018 Control Channel Authentication: using 'C:/Users/Ryu/Desktop/Nouveau dossier/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
    Mon May 14 10:35:20 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:35:20 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:35:20 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon May 14 10:35:20 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]

    Mon May 14 10:35:22 2018 TCP connection established with [AF_INET]217.182.34.221:443
    Mon May 14 10:35:22 2018 TCPv4_CLIENT link local: [undef]
    Mon May 14 10:35:22 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
    Mon May 14 10:35:22 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=34477fd8 33af5952

    Mon May 14 10:35:22 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:35:22 2018 VERIFY OK: nsCertType=SERVER
    Mon May 14 10:35:22 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon May 14 10:35:22 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:35:22 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:35:22 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:35:22 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:35:22 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Mon May 14 10:35:22 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443

    Mon May 14 10:35:24 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon May 14 10:35:24 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
    Mon May 14 10:35:24 2018 OPTIONS IMPORT: --socket-flags option modified
    Mon May 14 10:35:24 2018 OPTIONS IMPORT: --ifconfig/up options modified
    Mon May 14 10:35:24 2018 OPTIONS IMPORT: route options modified
    Mon May 14 10:35:24 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon May 14 10:35:24 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon May 14 10:35:24 2018 open_tun, tt->ipv6=0
    Mon May 14 10:35:24 2018 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{788D4080-2E3C-4481-A7B4-6C1B8603E7B2}.tap
    Mon May 14 10:35:24 2018 TAP-Windows Driver Version 9.21
    Mon May 14 10:35:24 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.1.158/255.255.255.252 on interface {788D4080-2E3C-4481-A7B4-6C1B8603E7B2} [DHCP-serv: 10.2.1.157, lease-time: 31536000]
    Mon May 14 10:35:24 2018 Successful ARP Flush on interface [10] {788D4080-2E3C-4481-A7B4-6C1B8603E7B2}

    Mon May 14 10:35:29 2018 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon May 14 10:35:29 2018 C:\WINDOWS\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.1.157
    Mon May 14 10:35:29 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
    Mon May 14 10:35:29 2018 Route addition via IPAPI succeeded [adaptive]
    Mon May 14 10:35:29 2018 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 172.17.88.2 172.17.88.232 36
    0.0.0.0 128.0.0.0 10.2.1.157 10.2.1.158 35
    10.2.0.1 255.255.255.255 10.2.1.157 10.2.1.158 35
    10.2.1.156 255.255.255.252 10.2.1.158 10.2.1.158 291
    10.2.1.158 255.255.255.255 10.2.1.158 10.2.1.158 291
    10.2.1.159 255.255.255.255 10.2.1.158 10.2.1.158 291
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    128.0.0.0 128.0.0.0 10.2.1.157 10.2.1.158 35
    172.17.80.0 255.255.240.0 172.17.88.232 172.17.88.232 291
    172.17.88.232 255.255.255.255 172.17.88.232 172.17.88.232 291
    172.17.95.255 255.255.255.255 172.17.88.232 172.17.88.232 291
    217.182.34.221 255.255.255.255 172.17.88.2 172.17.88.232 35
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
    224.0.0.0 240.0.0.0 10.2.1.158 10.2.1.158 291
    224.0.0.0 240.0.0.0 172.17.88.232 172.17.88.232 291
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
    255.255.255.255 255.255.255.255 10.2.1.158 10.2.1.158 291
    255.255.255.255 255.255.255.255 172.17.88.232 172.17.88.232 291
    Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:36:36 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:36:36 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Mon May 14 10:36:36 2018 Connection reset, restarting [-1]
    Mon May 14 10:36:36 2018 SIGUSR1[soft,connection-reset] received, process restarting
    Mon May 14 10:36:36 2018 Restart pause, 1 second(s)

    Mon May 14 10:36:37 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon May 14 10:36:37 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]

    Mon May 14 10:36:38 2018 TCP connection established with [AF_INET]217.182.34.221:443
    Mon May 14 10:36:38 2018 TCPv4_CLIENT link local: [undef]
    Mon May 14 10:36:38 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
    Mon May 14 10:36:38 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=3a70cabb f6b77d9a

    Mon May 14 10:36:38 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:36:38 2018 VERIFY OK: nsCertType=SERVER
    Mon May 14 10:36:38 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon May 14 10:36:38 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:36:38 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:36:38 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:36:38 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:36:38 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Mon May 14 10:36:38 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443

    Mon May 14 10:36:40 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon May 14 10:36:40 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
    Mon May 14 10:36:40 2018 OPTIONS IMPORT: --socket-flags option modified
    Mon May 14 10:36:40 2018 OPTIONS IMPORT: --ifconfig/up options modified
    Mon May 14 10:36:40 2018 OPTIONS IMPORT: route options modified
    Mon May 14 10:36:40 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon May 14 10:36:40 2018 Preserving previous TUN/TAP instance: FrozenWay
    Mon May 14 10:36:40 2018 Initialization Sequence Completed

  • Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:37:35 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:37:35 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Mon May 14 10:37:35 2018 Connection reset, restarting [-1]
    Mon May 14 10:37:35 2018 SIGUSR1[soft,connection-reset] received, process restarting
    Mon May 14 10:37:35 2018 Restart pause, 1 second(s)

    Mon May 14 10:37:36 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon May 14 10:37:36 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]

    Mon May 14 10:37:37 2018 TCP connection established with [AF_INET]217.182.34.221:443
    Mon May 14 10:37:37 2018 TCPv4_CLIENT link local: [undef]
    Mon May 14 10:37:37 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
    Mon May 14 10:37:37 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=c9c71e48 863b14c4

    Mon May 14 10:37:38 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:37:38 2018 VERIFY OK: nsCertType=SERVER
    Mon May 14 10:37:38 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:37:38 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:37:38 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:37:38 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:37:38 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:37:38 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Mon May 14 10:37:38 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443

    Mon May 14 10:37:40 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon May 14 10:37:40 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
    Mon May 14 10:37:40 2018 OPTIONS IMPORT: --socket-flags option modified
    Mon May 14 10:37:40 2018 OPTIONS IMPORT: --ifconfig/up options modified
    Mon May 14 10:37:40 2018 OPTIONS IMPORT: route options modified
    Mon May 14 10:37:40 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon May 14 10:37:40 2018 Preserving previous TUN/TAP instance: FrozenWay
    Mon May 14 10:37:40 2018 Initialization Sequence Completed

    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon May 14 10:38:13 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Mon May 14 10:38:13 2018 Connection reset, restarting [-1]
    Mon May 14 10:38:13 2018 SIGUSR1[soft,connection-reset] received, process restarting
    Mon May 14 10:38:13 2018 Restart pause, 1 second(s)

    Mon May 14 10:38:14 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon May 14 10:38:14 2018 Attempting to establish TCP connection with [AF_INET]217.182.34.221:443 [nonblock]

    Mon May 14 10:38:15 2018 TCP connection established with [AF_INET]217.182.34.221:443
    Mon May 14 10:38:15 2018 TCPv4_CLIENT link local: [undef]
    Mon May 14 10:38:15 2018 TCPv4_CLIENT link remote: [AF_INET]217.182.34.221:443
    Mon May 14 10:38:15 2018 TLS: Initial packet from [AF_INET]217.182.34.221:443, sid=2be3234e e466f1f8

    Mon May 14 10:38:15 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:38:15 2018 VERIFY OK: nsCertType=SERVER
    Mon May 14 10:38:15 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon May 14 10:38:15 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:38:15 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon May 14 10:38:15 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon May 14 10:38:15 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

    Mon May 14 10:38:15 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
    Mon May 14 10:38:15 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]217.182.34.221:443

    Mon May 14 10:38:17 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon May 14 10:38:17 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.1.158 10.2.1.157'
    Mon May 14 10:38:17 2018 OPTIONS IMPORT: --socket-flags option modified
    Mon May 14 10:38:17 2018 OPTIONS IMPORT: --ifconfig/up options modified
    Mon May 14 10:38:17 2018 OPTIONS IMPORT: route options modified
    Mon May 14 10:38:17 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon May 14 10:38:17 2018 Preserving previous TUN/TAP instance: FrozenWay
    Mon May 14 10:38:17 2018 Initialization Sequence Completed
  • Ha oui... Je pense que le soucis vient d'un logiciel incompatible. Il faudrait s'en assurer en essayant depuis un autre PC sur le même réseau. Tu connaitrais pas quelqu'un qui a un PC dans ton université et qui pourrait tester ?
  • Arf non pas vraiment, si le problème viens d'un logiciel sur le PC, le réinitialiser devrait fonctionner non ? ou est-ce que ça peux être un logiciel intégré à windows ? :/
  • Oui, tester avec une nouvelle installation de Windows sans aucun logiciel d'installé serait bien mais par contre, si le soucis vient du réseau, tu auras perdu beaucoup de temps... Ça peut aussi venir d'un faible signal WiFi, ou des interférences.

    Lance un http://speedof.me avec ET sans FrozenWay de connecté et à la fin des tests, clic sur le bouton Share et copie/colle ici l'url des résultats stp.
  • Très bien je ferais ça, j'ai envoyé une demande au support de ma résidence pour vérifier l'état de ma connexion, je suis co par ethernet donc ça ne viens pas d'un signal faible pour l'instant je suis rentré chez mes parents les examens sont finis donc j'essaierais tout ça la semaine prochaine, merci de ton aide !
Connectez-vous ou Inscrivez-vous pour répondre.