Ne fonctionne pas
Bonjour, je viens tout juste de prendre un abonnement d'un an et il ne fonctionne pas, je ne peut ni ouvrir de page web ni utiliser un quelconque service requérant internet, pourtant l'application ne me met pas de message d'erreur et affiche bien une pastille verte comme si tout fonctionnait normalement. Je suis sur une connexion du CROUS. Merci d'avance pour votre aide !
Cette discussion a été fermée.
Réponses
Pouvez-vous copier/coller ici le journal de connexion à FrozenWay svp ?
Tue Sep 14 21:06:19 2021 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Sep 14 21:06:19 2021 library versions: OpenSSL 1.0.2o 27 Mar 2018
Tue Sep 14 21:06:19 2021 MANAGEMENT: Connected to management server at [AF_INET]127.0.0.1:62071
Tue Sep 14 21:06:20 2021 MANAGEMENT: CMD 'username "Auth" sortique'
Tue Sep 14 21:06:20 2021 MANAGEMENT: CMD 'password [...]'
Tue Sep 14 21:06:20 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]178.33.23.180:443
Tue Sep 14 21:06:20 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Sep 14 21:06:20 2021 Attempting to establish TCP connection with [AF_INET]178.33.23.180:443 [nonblock]
Tue Sep 14 21:06:21 2021 TCP connection established with [AF_INET]178.33.23.180:443
Tue Sep 14 21:06:21 2021 TCP_CLIENT link local: (not bound)
Tue Sep 14 21:06:21 2021 TCP_CLIENT link remote: [AF_INET]178.33.23.180:443
Tue Sep 14 21:06:21 2021 TLS: Initial packet from [AF_INET]178.33.23.180:443, sid=0aeb183b 1792b63d
Tue Sep 14 21:06:21 2021 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
Tue Sep 14 21:06:21 2021 VERIFY KU OK
Tue Sep 14 21:06:21 2021 Validating certificate extended key usage
Tue Sep 14 21:06:21 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 14 21:06:21 2021 VERIFY EKU OK
Tue Sep 14 21:06:21 2021 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
Tue Sep 14 21:06:21 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
Tue Sep 14 21:06:21 2021 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Tue Sep 14 21:06:21 2021 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Sep 14 21:06:21 2021 [server] Peer Connection Initiated with [AF_INET]178.33.23.180:443
Tue Sep 14 21:06:22 2021 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Tue Sep 14 21:06:23 2021 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.15 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: compression parms modified
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: --socket-flags option modified
Tue Sep 14 21:06:23 2021 Socket flags: TCP_NODELAY=1 succeeded
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: route-related options modified
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: peer-id set
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: adjusting link_mtu to 1627
Tue Sep 14 21:06:23 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Sep 14 21:06:23 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Sep 14 21:06:23 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 14 21:06:23 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 14 21:06:23 2021 interactive service msg_channel=0
Tue Sep 14 21:06:23 2021 open_tun
Tue Sep 14 21:06:23 2021 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D560D224-AD1C-4983-B693-F84975DD9662}.tap
Tue Sep 14 21:06:23 2021 TAP-Windows Driver Version 9.22
Tue Sep 14 21:06:23 2021 Set TAP-Windows TUN subnet mode network/local/netmask = 10.51.1.0/10.51.1.15/255.255.255.0 [SUCCEEDED]
Tue Sep 14 21:06:23 2021 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.51.1.15/255.255.255.0 on interface {D560D224-AD1C-4983-B693-F84975DD9662} [DHCP-serv: 10.51.1.254, lease-time: 31536000]
Tue Sep 14 21:06:23 2021 Successful ARP Flush on interface [15] {D560D224-AD1C-4983-B693-F84975DD9662}
Tue Sep 14 21:06:23 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Tue Sep 14 21:06:28 2021 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Tue Sep 14 21:06:28 2021 Initialization Sequence Completed
Il manque la liste des routes à la fin du journal de connexion et la version de FrozenWay au début du journal.
Si vous utilisez un client tiers, pouvez-vous copier/coller ici le résultat d'un
route print
dans l'invite de commande Windows une fois connecté à FrozenWay svp ?----------------------------------
Server: premium-02-fr-04
Protocol: HTTP
----------------------------------
C:/Program Files/FrozenWay/openvpn.exe --client --dev tun --dev-node {D560D224-AD1C-4983-B693-F84975DD9662} --proto tcp-client --remote 127.0.0.1 59411 --management 127.0.0.1 59412 --management-client --management-query-passwords --ca C:/Program Files/FrozenWay/ca.crt --remote-cert-tls server --reneg-sec 0 --auth-user-pass --auth-nocache --compress --resolv-retry 0 --ping 10 --ping-exit 30 --persist-tun --persist-key --persist-local-ip --connect-retry 1 --ip-win32 dynamic --verb 3
Wed Sep 15 09:53:54 2021 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Wed Sep 15 09:53:54 2021 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZ4] [AEAD] built on Sep 24 2018
Wed Sep 15 09:53:54 2021 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Sep 15 09:53:54 2021 library versions: OpenSSL 1.0.2o 27 Mar 2018
Wed Sep 15 09:53:54 2021 MANAGEMENT: Connected to management server at [AF_INET]127.0.0.1:59412
Wed Sep 15 09:53:54 2021 MANAGEMENT: CMD 'username "Auth" sortique'
Wed Sep 15 09:53:54 2021 MANAGEMENT: CMD 'password [...]'
Wed Sep 15 09:53:54 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:59411
Wed Sep 15 09:53:54 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Sep 15 09:53:54 2021 Attempting to establish TCP connection with [AF_INET]127.0.0.1:59411 [nonblock]
Wed Sep 15 09:53:54 2021 TCP connection established with [AF_INET]127.0.0.1:59411
Wed Sep 15 09:53:54 2021 TCP_CLIENT link local: (not bound)
Wed Sep 15 09:53:54 2021 TCP_CLIENT link remote: [AF_INET]127.0.0.1:59411
Wed Sep 15 09:53:54 2021 TLS: Initial packet from [AF_INET]127.0.0.1:59411, sid=5c05167d 056cf34f
Wed Sep 15 09:53:54 2021 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
Wed Sep 15 09:53:54 2021 VERIFY KU OK
Wed Sep 15 09:53:54 2021 Validating certificate extended key usage
Wed Sep 15 09:53:54 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 15 09:53:54 2021 VERIFY EKU OK
Wed Sep 15 09:53:54 2021 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
Wed Sep 15 09:53:54 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
Wed Sep 15 09:53:54 2021 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Wed Sep 15 09:53:54 2021 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Sep 15 09:53:54 2021 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:59411
Wed Sep 15 09:53:55 2021 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Sep 15 09:53:55 2021 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.3.1,dhcp-option WINS 10.51.3.1,route-gateway 10.51.3.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.3.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: compression parms modified
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: --socket-flags option modified
Wed Sep 15 09:53:55 2021 Socket flags: TCP_NODELAY=1 succeeded
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: --ifconfig/up options modified
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: route-related options modified
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: peer-id set
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: adjusting link_mtu to 1627
Wed Sep 15 09:53:55 2021 OPTIONS IMPORT: data channel crypto options modified
Wed Sep 15 09:53:55 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Sep 15 09:53:55 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 15 09:53:55 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 15 09:53:55 2021 interactive service msg_channel=0
Wed Sep 15 09:53:55 2021 open_tun
Wed Sep 15 09:53:55 2021 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D560D224-AD1C-4983-B693-F84975DD9662}.tap
Wed Sep 15 09:53:55 2021 TAP-Windows Driver Version 9.22
Wed Sep 15 09:53:55 2021 Set TAP-Windows TUN subnet mode network/local/netmask = 10.51.3.0/10.51.3.4/255.255.255.0 [SUCCEEDED]
Wed Sep 15 09:53:55 2021 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.51.3.4/255.255.255.0 on interface {D560D224-AD1C-4983-B693-F84975DD9662} [DHCP-serv: 10.51.3.254, lease-time: 31536000]
Wed Sep 15 09:53:55 2021 Successful ARP Flush on interface [15] {D560D224-AD1C-4983-B693-F84975DD9662}
Wed Sep 15 09:53:55 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Wed Sep 15 09:54:00 2021 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Wed Sep 15 09:54:00 2021 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 172.16.175.254 172.16.160.156 55
0.0.0.0 128.0.0.0 10.51.3.1 10.51.3.4 25
10.51.3.0 255.255.255.0 10.51.3.4 10.51.3.4 281
10.51.3.4 255.255.255.255 10.51.3.4 10.51.3.4 281
10.51.3.255 255.255.255.255 10.51.3.4 10.51.3.4 281
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
128.0.0.0 128.0.0.0 10.51.3.1 10.51.3.4 25
172.16.160.0 255.255.240.0 172.16.160.156 172.16.160.156 311
172.16.160.156 255.255.255.255 172.16.160.156 172.16.160.156 311
172.16.175.255 255.255.255.255 172.16.160.156 172.16.160.156 311
212.83.133.124 255.255.255.255 172.16.175.254 172.16.160.156 55
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
224.0.0.0 240.0.0.0 10.51.3.4 10.51.3.4 281
224.0.0.0 240.0.0.0 172.16.160.156 172.16.160.156 311
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
255.255.255.255 255.255.255.255 10.51.3.4 10.51.3.4 281
255.255.255.255 255.255.255.255 172.16.160.156 172.16.160.156 311