Micro déconnexion
dans Support technique
Bonjour depuis la prise de mon abonnement je subis des micros déconnexion, je ne sais pas si ça vient de la connexion du crous du Toulouse, ou bien d'une mauvaise configuration de frozenway.
Merci de votre aide
Merci de votre aide
FrozenWay version 1.6.6
----------------------------------
Server: premium-02-fr-04
Protocol: HTTP
----------------------------------
Tue Sep 25 21:08:12 2018 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
Tue Sep 25 21:08:12 2018 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Tue Sep 25 21:08:12 2018 Control Channel Authentication: using 'C:/Users/Baptou/Downloads/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
Tue Sep 25 21:08:12 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 25 21:08:12 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 25 21:08:12 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Sep 25 21:08:12 2018 Attempting to establish TCP connection with [AF_INET]127.0.0.1:60638 [nonblock]
Tue Sep 25 21:08:12 2018 TCP connection established with [AF_INET]127.0.0.1:60638
Tue Sep 25 21:08:12 2018 TCPv4_CLIENT link local: [undef]
Tue Sep 25 21:08:12 2018 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:60638
Tue Sep 25 21:08:12 2018 TLS: Initial packet from [AF_INET]127.0.0.1:60638, sid=2be0a6fe 7ba33e5f
Tue Sep 25 21:08:13 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Tue Sep 25 21:08:13 2018 VERIFY OK: nsCertType=SERVER
Tue Sep 25 21:08:13 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Tue Sep 25 21:08:13 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 25 21:08:13 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 25 21:08:13 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 25 21:08:13 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 25 21:08:13 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Tue Sep 25 21:08:13 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:60638
Tue Sep 25 21:08:15 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Tue Sep 25 21:08:15 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.4.0.1,dhcp-option WINS 10.4.0.1,route 10.4.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.4.1.46 10.4.1.45'
Tue Sep 25 21:08:15 2018 OPTIONS IMPORT: --socket-flags option modified
Tue Sep 25 21:08:15 2018 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 25 21:08:15 2018 OPTIONS IMPORT: route options modified
Tue Sep 25 21:08:15 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 25 21:08:15 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Sep 25 21:08:15 2018 open_tun, tt->ipv6=0
Tue Sep 25 21:08:15 2018 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{8C23613C-1534-4095-991E-9E49AAC571A4}.tap
Tue Sep 25 21:08:15 2018 TAP-Windows Driver Version 9.21
Tue Sep 25 21:08:15 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.46/255.255.255.252 on interface {8C23613C-1534-4095-991E-9E49AAC571A4} [DHCP-serv: 10.4.1.45, lease-time: 31536000]
Tue Sep 25 21:08:15 2018 Successful ARP Flush on interface [16] {8C23613C-1534-4095-991E-9E49AAC571A4}
Tue Sep 25 21:08:20 2018 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Tue Sep 25 21:08:20 2018 C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.1.45
Tue Sep 25 21:08:20 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Tue Sep 25 21:08:20 2018 Route addition via IPAPI succeeded [adaptive]
Tue Sep 25 21:08:20 2018 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 172.17.144.2 172.17.144.83 35
0.0.0.0 128.0.0.0 10.4.1.45 10.4.1.46 35
10.4.0.1 255.255.255.255 10.4.1.45 10.4.1.46 35
10.4.1.44 255.255.255.252 10.4.1.46 10.4.1.46 291
10.4.1.46 255.255.255.255 10.4.1.46 10.4.1.46 291
10.4.1.47 255.255.255.255 10.4.1.46 10.4.1.46 291
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.4.1.45 10.4.1.46 35
172.17.144.0 255.255.240.0 172.17.144.83 172.17.144.83 291
172.17.144.83 255.255.255.255 172.17.144.83 172.17.144.83 291
172.17.159.255 255.255.255.255 172.17.144.83 172.17.144.83 291
217.182.36.63 255.255.255.255 172.17.144.2 172.17.144.83 35
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 172.17.144.83 172.17.144.83 291
224.0.0.0 240.0.0.0 10.4.1.46 10.4.1.46 291
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 172.17.144.83 172.17.144.83 291
255.255.255.255 255.255.255.255 10.4.1.46 10.4.1.46 291
Connectez-vous ou Inscrivez-vous pour répondre.
Réponses
Le journal de connexion ne montre pas de déconnexion, pouvez-vous le copier/coller après une déconnexion svp ?
Il est plus probable que les soucis d'instabilité proviennent du CROUS (c'est assez fréquent malheureusement en période de forte affluence).
Lancez un http://speedof.me avec ET sans FrozenWay de connecté et à la fin des tests, cliquez sur le bouton
Share
et copiez/collez ici l'url des résultats svp. Cela permettra de voir la stabilité du réseau.sans FrozenWay : https://speedof.me/show.php?img=180926222318-6604.png
Avec FrozenWay : https://speedof.me/show.php?img=180926222518-5765.png
Et les logs où j'ai eu une déco :
FrozenWay version 1.6.6 ---------------------------------- Server: public-02-fr-01 Protocol: OpenVPN ---------------------------------- Wed Sep 26 21:03:38 2018 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015 Wed Sep 26 21:03:38 2018 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08 Wed Sep 26 21:03:39 2018 Control Channel Authentication: using 'C:/Users/Baptou/Downloads/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file Wed Sep 26 21:03:39 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:03:39 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:03:39 2018 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Sep 26 21:03:39 2018 Attempting to establish TCP connection with [AF_INET]87.98.174.100:443 [nonblock] Wed Sep 26 21:03:40 2018 TCP connection established with [AF_INET]87.98.174.100:443 Wed Sep 26 21:03:40 2018 TCPv4_CLIENT link local: [undef] Wed Sep 26 21:03:40 2018 TCPv4_CLIENT link remote: [AF_INET]87.98.174.100:443 Wed Sep 26 21:03:40 2018 TLS: Initial packet from [AF_INET]87.98.174.100:443, sid=5490f323 edeb8152 Wed Sep 26 21:03:40 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com Wed Sep 26 21:03:40 2018 VERIFY OK: nsCertType=SERVER Wed Sep 26 21:03:40 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com Wed Sep 26 21:03:40 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Sep 26 21:03:40 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:03:40 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Sep 26 21:03:40 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:03:40 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Sep 26 21:03:40 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]87.98.174.100:443 Wed Sep 26 21:03:43 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1) Wed Sep 26 21:03:43 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.5.0.1,dhcp-option WINS 10.5.0.1,route 10.5.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.5.0.162 10.5.0.161' Wed Sep 26 21:03:43 2018 OPTIONS IMPORT: --socket-flags option modified Wed Sep 26 21:03:43 2018 OPTIONS IMPORT: --ifconfig/up options modified Wed Sep 26 21:03:43 2018 OPTIONS IMPORT: route options modified Wed Sep 26 21:03:43 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Sep 26 21:03:43 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed Sep 26 21:03:43 2018 open_tun, tt->ipv6=0 Wed Sep 26 21:03:43 2018 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{8C23613C-1534-4095-991E-9E49AAC571A4}.tap Wed Sep 26 21:03:43 2018 TAP-Windows Driver Version 9.21 Wed Sep 26 21:03:43 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.162/255.255.255.252 on interface {8C23613C-1534-4095-991E-9E49AAC571A4} [DHCP-serv: 10.5.0.161, lease-time: 31536000] Wed Sep 26 21:03:43 2018 Successful ARP Flush on interface [16] {8C23613C-1534-4095-991E-9E49AAC571A4} Wed Sep 26 21:03:48 2018 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up Wed Sep 26 21:03:48 2018 C:\Windows\system32\route.exe ADD 10.5.0.1 MASK 255.255.255.255 10.5.0.161 Wed Sep 26 21:03:48 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Wed Sep 26 21:03:48 2018 Route addition via IPAPI succeeded [adaptive] Wed Sep 26 21:03:48 2018 Initialization Sequence Completed IPv4 routing table : 0.0.0.0 0.0.0.0 172.17.176.2 172.17.176.206 35 0.0.0.0 128.0.0.0 10.5.0.161 10.5.0.162 35 10.5.0.1 255.255.255.255 10.5.0.161 10.5.0.162 35 10.5.0.160 255.255.255.252 10.5.0.162 10.5.0.162 291 10.5.0.162 255.255.255.255 10.5.0.162 10.5.0.162 291 10.5.0.163 255.255.255.255 10.5.0.162 10.5.0.162 291 87.98.174.100 255.255.255.255 172.17.176.2 172.17.176.206 35 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331 128.0.0.0 128.0.0.0 10.5.0.161 10.5.0.162 35 172.17.176.0 255.255.240.0 172.17.176.206 172.17.176.206 291 172.17.176.206 255.255.255.255 172.17.176.206 172.17.176.206 291 172.17.191.255 255.255.255.255 172.17.176.206 172.17.176.206 291 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331 224.0.0.0 240.0.0.0 172.17.176.206 172.17.176.206 291 224.0.0.0 240.0.0.0 10.5.0.162 10.5.0.162 291 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331 255.255.255.255 255.255.255.255 172.17.176.206 172.17.176.206 291 255.255.255.255 255.255.255.255 10.5.0.162 10.5.0.162 291 Wed Sep 26 21:23:37 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060) Wed Sep 26 21:23:37 2018 Connection reset, restarting [-1] Wed Sep 26 21:23:37 2018 SIGUSR1[soft,connection-reset] received, process restarting Wed Sep 26 21:23:37 2018 Restart pause, 1 second(s) Wed Sep 26 21:23:38 2018 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Sep 26 21:23:38 2018 Attempting to establish TCP connection with [AF_INET]87.98.174.100:443 [nonblock] Wed Sep 26 21:23:39 2018 TCP connection established with [AF_INET]87.98.174.100:443 Wed Sep 26 21:23:39 2018 TCPv4_CLIENT link local: [undef] Wed Sep 26 21:23:39 2018 TCPv4_CLIENT link remote: [AF_INET]87.98.174.100:443 Wed Sep 26 21:23:39 2018 TLS: Initial packet from [AF_INET]87.98.174.100:443, sid=3bef5c75 4f8c2758 Wed Sep 26 21:23:39 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com Wed Sep 26 21:23:39 2018 VERIFY OK: nsCertType=SERVER Wed Sep 26 21:23:39 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com Wed Sep 26 21:23:39 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Sep 26 21:23:39 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:23:39 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Wed Sep 26 21:23:39 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Sep 26 21:23:39 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Sep 26 21:23:39 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]87.98.174.100:443 Wed Sep 26 21:23:41 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1) Wed Sep 26 21:23:41 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.5.0.1,dhcp-option WINS 10.5.0.1,route 10.5.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.5.0.162 10.5.0.161' Wed Sep 26 21:23:41 2018 OPTIONS IMPORT: --socket-flags option modified Wed Sep 26 21:23:41 2018 OPTIONS IMPORT: --ifconfig/up options modified Wed Sep 26 21:23:41 2018 OPTIONS IMPORT: route options modified Wed Sep 26 21:23:41 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Sep 26 21:23:41 2018 Preserving previous TUN/TAP instance: FrozenWay Wed Sep 26 21:23:41 2018 Initialization Sequence Completed Wed Sep 26 21:24:01 2018 C:\Windows\system32\route.exe DELETE 10.5.0.1 MASK 255.255.255.255 10.5.0.161 Wed Sep 26 21:24:01 2018 Route deletion via IPAPI succeeded [adaptive] Wed Sep 26 21:24:01 2018 Closing TUN/TAP interface Wed Sep 26 21:24:01 2018 SIGTERM[hard,] received, process exiting
Sinon, pouvez-vous me donner de nouveau les résultats d'un speedof.me avec ET sans FrozenWay de connecté svp ?