[Résolu] déconnexion toutes les 2 min

février 2014 modifié dans Support technique
Bonjour,
Je poste parce que je n'arrive pas à jouer en ligne avec Frozenway.
J'utilise le réseau par fil de ma résidence universitaire et j'essaie de jouer à des jeu comme The secret world.

Je me connecte à Frozenway avec un compte play-more. Mais, au bout de quelques courtes minutes de jeu, un message in game me dit que la connexion est perdue. Quand je reviens sur le bureau, je vois que Frozenway est en train de se reconnecter automatiquement sans aucun problème. Si, je réessaie cela recommence.

J'essaie en arrêtant mon anti-virus, en bidouillant deux/trois options de Frozenway sans vraiment comprendre ce que je fait, et rien y fait.

Etant nul en informatique, je ne sais pas du tout si c'est la connexion qui trop instable ou trop sécurisée ou si c'est moi qui ne fait pas ceux qu'il faut.

Si cela peut vous aider... Quand je télécharge un gros fichier, la vitesse de téléchargement peut atteindre le 1go/s, mais elle tombe au bout de quelque minutes à 0 jusqu'à ce que je le mette en pause puis le relance. Et là, c'est reparti pour quelque minutes à haute-vitesse.

Je vous remercie pour vos réponses.

Réponses

  • Salut,
    la vitesse de téléchargement peut atteindre le 1go/s
    1 Mo/s plutôt non ? ^^

    Peut-être que ton proxy bloque les communications sur chaque connexion TCP qui dépasse X secondes ou Y Mo de transfert... Es-ce que touts les étudiants ont le même problème (téléchargement qui passe à 0 ko/s) ?

    As tu essayé de te connecter en http à FrozenWay (menu déroulant sous la liste des serveurs), est-ce que les téléchargements durent plus longtemps ?
  • Je te remercie de mon prendre mon cas en main.^^
    Oui, c'est vrai que 1go/s, c'est un peu gros...

    Pour les autres étudiants, j'avoue ne jamais avoir posé la question. Mais étant durant le week end, je croise personne dans les couloirs. Je demanderai donc dans les jours à venir.

    J'ai essayé le http. J'arrive à jouer quelques minutes de plus, mas je suis encore déconnecté.
  • Au risque de m'insérer dans la discussion, je laisse ce message pour signaler que j'ai exactement le même problème. Je suis à l'université et joue à League of Legends avec mon ordinateur Windows 8 qui utilise le pare-feu windows (le problème est toujours présent lorsque je le désactive) et l'antivirus avast.

    Je suis aussi déconnecté toutes les deux minutes, sauf que dans mon cas, frozenway ne tente pas de se reconnecter automatiquement, je dois le faire moi-même et le problème réapparait deux minutes plus tard... Passer en html n'a rien changé... Et tous les étudiants de mon université arrivent très bien à jouer avec frozenway malgré le proxy...

    Je suis désespéré!
  • @lgrisoni As tu essayé de couper Avast aussi ? Peux tu donner le journal de connexion après une déconnexion stp ?
  • J'ai essayé mais le problème est toujours présent... Voilà le journal lors de deux déco successives en jouant, la première à 17h34/17h35 la deuxième à 17h36. A chaque fois frozenway semble toujours en route tandis que la partie plante, et je relance une connexion dans frozenway, ce qui résout temporairement le problème... J'ai indiqué quand avait lieu les reconnexions, désolé si c'est un peu long...

    PREMIERE CONNEXION

    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-02-fr-01
    Proxy: 129.104.247.2:8080
    Protocol: OpenVPN
    ----------------------------------
    Wed Feb 05 17:34:07 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Wed Feb 05 17:34:07 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Wed Feb 05 17:34:07 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:34:07 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

    Wed Feb 05 17:34:07 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Wed Feb 05 17:34:07 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:34:07 2014 TCP connection established with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:34:07 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
    Wed Feb 05 17:34:07 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'

    Wed Feb 05 17:34:09 2014 TCPv4_CLIENT link local: [undef]
    Wed Feb 05 17:34:09 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:34:09 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=580f4a98 80e2946e

    Wed Feb 05 17:34:10 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Wed Feb 05 17:34:10 2014 VERIFY OK: nsCertType=SERVER
    Wed Feb 05 17:34:10 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Wed Feb 05 17:34:10 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:34:10 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:34:10 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:34:10 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:34:10 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 05 17:34:10 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080

    Wed Feb 05 17:34:12 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Wed Feb 05 17:34:12 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
    Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --socket-flags option modified
    Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: route options modified
    Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

    Wed Feb 05 17:34:12 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Feb 05 17:34:12 2014 open_tun, tt->ipv6=0
    Wed Feb 05 17:34:12 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
    Wed Feb 05 17:34:12 2014 TAP-Windows Driver Version 9.9
    Wed Feb 05 17:34:12 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
    Wed Feb 05 17:34:12 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}

    Wed Feb 05 17:34:17 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Wed Feb 05 17:34:17 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229

    Wed Feb 05 17:34:17 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Wed Feb 05 17:34:17 2014 Route addition via IPAPI succeeded [adaptive]
    Wed Feb 05 17:34:17 2014 Initialization Sequence Completed

    Wed Feb 05 17:34:19 2014 C:\WINDOWS\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.5.229
    Wed Feb 05 17:34:19 2014 Route deletion via IPAPI succeeded [adaptive]
    Wed Feb 05 17:34:19 2014 Closing TUN/TAP interface
    Wed Feb 05 17:34:19 2014 SIGTERM[hard,] received, process exiting


    RECONNEXION

    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-02-fr-01
    Proxy: 129.104.247.2:8080
    Protocol: OpenVPN
    ----------------------------------
    Wed Feb 05 17:35:02 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Wed Feb 05 17:35:02 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Wed Feb 05 17:35:02 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:35:02 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

    Wed Feb 05 17:35:02 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Wed Feb 05 17:35:02 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:35:02 2014 TCP connection established with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:35:02 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
    Wed Feb 05 17:35:02 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'

    Wed Feb 05 17:35:04 2014 TCPv4_CLIENT link local: [undef]
    Wed Feb 05 17:35:04 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:35:04 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=17ff1c7e e47b53e5

    Wed Feb 05 17:35:04 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Wed Feb 05 17:35:04 2014 VERIFY OK: nsCertType=SERVER
    Wed Feb 05 17:35:04 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Wed Feb 05 17:35:05 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:35:05 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:35:05 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:35:05 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:35:05 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 05 17:35:05 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080

    Wed Feb 05 17:35:07 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Wed Feb 05 17:35:07 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
    Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --socket-flags option modified
    Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: route options modified
    Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Wed Feb 05 17:35:07 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Feb 05 17:35:07 2014 open_tun, tt->ipv6=0
    Wed Feb 05 17:35:07 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
    Wed Feb 05 17:35:07 2014 TAP-Windows Driver Version 9.9
    Wed Feb 05 17:35:07 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
    Wed Feb 05 17:35:07 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}

    Wed Feb 05 17:35:12 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Wed Feb 05 17:35:12 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229
    Wed Feb 05 17:35:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Wed Feb 05 17:35:12 2014 Route addition via IPAPI succeeded [adaptive]
    Wed Feb 05 17:35:12 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 129.104.235.254 129.104.235.23 9999
    0.0.0.0 0.0.0.0 10.1.5.229 10.1.5.230 30
    10.1.0.1 255.255.255.255 10.1.5.229 10.1.5.230 30
    10.1.5.228 255.255.255.252 10.1.5.230 10.1.5.230 286
    10.1.5.230 255.255.255.255 10.1.5.230 10.1.5.230 286
    10.1.5.231 255.255.255.255 10.1.5.230 10.1.5.230 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    129.104.232.0 255.255.252.0 129.104.235.23 129.104.235.23 276
    129.104.235.23 255.255.255.255 129.104.235.23 129.104.235.23 276
    129.104.235.255 255.255.255.255 129.104.235.23 129.104.235.23 276
    129.104.247.2 255.255.255.255 129.104.235.254 129.104.235.23 20
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 10.1.5.230 10.1.5.230 286
    224.0.0.0 240.0.0.0 129.104.235.23 129.104.235.23 276
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 10.1.5.230 10.1.5.230 286
    255.255.255.255 255.255.255.255 129.104.235.23 129.104.235.23 276


    DEUXIEME RECONNEXION

    FrozenWay version 1.6.5
    ----------------------------------
    Server: public-02-fr-01
    Proxy: 129.104.247.2:8080
    Protocol: OpenVPN
    ----------------------------------
    Wed Feb 05 17:36:32 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Wed Feb 05 17:36:33 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Wed Feb 05 17:36:33 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:36:33 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:36:33 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Wed Feb 05 17:36:33 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:36:33 2014 TCP connection established with [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:36:33 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
    Wed Feb 05 17:36:33 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'

    Wed Feb 05 17:36:35 2014 TCPv4_CLIENT link local: [undef]
    Wed Feb 05 17:36:35 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
    Wed Feb 05 17:36:35 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=90cc7b10 fd7d3b75

    Wed Feb 05 17:36:35 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Wed Feb 05 17:36:35 2014 VERIFY OK: nsCertType=SERVER
    Wed Feb 05 17:36:35 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Wed Feb 05 17:36:35 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:36:35 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:36:35 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 17:36:35 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 17:36:35 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 05 17:36:35 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080

    Wed Feb 05 17:36:37 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Wed Feb 05 17:36:37 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
    Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --socket-flags option modified
    Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: route options modified
    Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Wed Feb 05 17:36:37 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Feb 05 17:36:37 2014 open_tun, tt->ipv6=0
    Wed Feb 05 17:36:37 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
    Wed Feb 05 17:36:37 2014 TAP-Windows Driver Version 9.9

    Wed Feb 05 17:36:37 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
    Wed Feb 05 17:36:37 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}

    Wed Feb 05 17:36:42 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Wed Feb 05 17:36:42 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229
    Wed Feb 05 17:36:42 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Wed Feb 05 17:36:42 2014 Route addition via IPAPI succeeded [adaptive]
    Wed Feb 05 17:36:42 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 129.104.235.254 129.104.235.23 9999
    0.0.0.0 0.0.0.0 10.1.5.229 10.1.5.230 30
    10.1.0.1 255.255.255.255 10.1.5.229 10.1.5.230 30
    10.1.5.228 255.255.255.252 10.1.5.230 10.1.5.230 286
    10.1.5.230 255.255.255.255 10.1.5.230 10.1.5.230 286
    10.1.5.231 255.255.255.255 10.1.5.230 10.1.5.230 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    129.104.232.0 255.255.252.0 129.104.235.23 129.104.235.23 276
    129.104.235.23 255.255.255.255 129.104.235.23 129.104.235.23 276
    129.104.235.255 255.255.255.255 129.104.235.23 129.104.235.23 276
    129.104.247.2 255.255.255.255 129.104.235.254 129.104.235.23 20
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 10.1.5.230 10.1.5.230 286
    224.0.0.0 240.0.0.0 129.104.235.23 129.104.235.23 276
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 10.1.5.230 10.1.5.230 286
    255.255.255.255 255.255.255.255 129.104.235.23 129.104.235.23 276
  • février 2014 modifié
    Il m'arrive la même chose depuis hier ^^' .... jusqu'à Lundi j'avais aucun soucis je pouvais jouer à LoL tranquille ( et d'autres jeux ). Aller sur IMVU car avec la connexion de ma résidence sans frozenway je peux rien faire de tout ça.

    Mais depuis hier ça coupe tout le temps. Des fois j'arrive pas à me reconnecter directement je suis obliger de fermer la session puis ré-ouvrir avec ou sans avast.

    Pour ma série de test à 20h09 je me suis reconnecte une énième fois, puis à 20h15 ça a coupé x)

    Et je n'arrive plus à me connecté sur n'importe quel serveur ^^'


    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-03
    Protocol: OpenVPN
    ----------------------------------
    Wed Feb 05 20:09:56 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Wed Feb 05 20:09:56 2014 Control Channel Authentication: using 'C:/Users/Aurelie/Downloads/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Wed Feb 05 20:09:56 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:09:56 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:09:56 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Wed Feb 05 20:09:56 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.70:443
    Wed Feb 05 20:09:56 2014 TCP connection established with [AF_INET]88.190.203.70:443
    Wed Feb 05 20:09:56 2014 TCPv4_CLIENT link local: [undef]
    Wed Feb 05 20:09:56 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.70:443

    Wed Feb 05 20:09:57 2014 TLS: Initial packet from [AF_INET]88.190.203.70:443, sid=9f5f6cc9 d6036f42

    Wed Feb 05 20:10:00 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Wed Feb 05 20:10:00 2014 VERIFY OK: nsCertType=SERVER
    Wed Feb 05 20:10:00 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Wed Feb 05 20:10:00 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 20:10:00 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:10:00 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 20:10:00 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:10:00 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 05 20:10:00 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.70:443

    Wed Feb 05 20:10:02 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Wed Feb 05 20:10:03 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.3.174 10.3.3.173'
    Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --socket-flags option modified
    Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: route options modified
    Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Wed Feb 05 20:10:03 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Feb 05 20:10:03 2014 open_tun, tt->ipv6=0
    Wed Feb 05 20:10:03 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D6177436-F573-4529-8CE1-A2EA453B922C}.tap
    Wed Feb 05 20:10:03 2014 TAP-Windows Driver Version 9.9
    Wed Feb 05 20:10:03 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.174/255.255.255.252 on interface {D6177436-F573-4529-8CE1-A2EA453B922C} [DHCP-serv: 10.3.3.173, lease-time: 31536000]
    Wed Feb 05 20:10:03 2014 Successful ARP Flush on interface [17] {D6177436-F573-4529-8CE1-A2EA453B922C}

    Wed Feb 05 20:10:08 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Wed Feb 05 20:10:08 2014 C:\Windows\system32\route.exe ADD 10.3.0.1 MASK 255.255.255.255 10.3.3.173
    Wed Feb 05 20:10:08 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Wed Feb 05 20:10:08 2014 Route addition via IPAPI succeeded [adaptive]
    Wed Feb 05 20:10:08 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.2.252.1 10.2.252.239 9999
    0.0.0.0 0.0.0.0 10.3.3.173 10.3.3.174 30
    10.2.252.0 255.255.254.0 10.2.252.239 10.2.252.239 286
    10.2.252.239 255.255.255.255 10.2.252.239 10.2.252.239 286
    10.2.253.255 255.255.255.255 10.2.252.239 10.2.252.239 286
    10.3.0.1 255.255.255.255 10.3.3.173 10.3.3.174 30
    10.3.3.172 255.255.255.252 10.3.3.174 10.3.3.174 286
    10.3.3.174 255.255.255.255 10.3.3.174 10.3.3.174 286
    10.3.3.175 255.255.255.255 10.3.3.174 10.3.3.174 286
    88.190.203.70 255.255.255.255 10.2.252.1 10.2.252.239 30
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    169.254.0.0 255.255.0.0 169.254.95.100 169.254.95.100 276
    169.254.95.100 255.255.255.255 169.254.95.100 169.254.95.100 276
    169.254.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 169.254.95.100 169.254.95.100 276
    224.0.0.0 240.0.0.0 10.3.3.174 10.3.3.174 286
    224.0.0.0 240.0.0.0 10.2.252.239 10.2.252.239 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
    255.255.255.255 255.255.255.255 10.3.3.174 10.3.3.174 286
    255.255.255.255 255.255.255.255 10.2.252.239 10.2.252.239 286


    *****************************************************************************************************************

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-03
    Protocol: OpenVPN
    ----------------------------------
    Wed Feb 05 20:16:04 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Wed Feb 05 20:16:04 2014 Control Channel Authentication: using 'C:/Users/Aurelie/Downloads/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Wed Feb 05 20:16:04 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:16:04 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:16:04 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Wed Feb 05 20:16:04 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.70:443
    Wed Feb 05 20:16:04 2014 TCP connection established with [AF_INET]88.190.203.70:443
    Wed Feb 05 20:16:04 2014 TCPv4_CLIENT link local: [undef]
    Wed Feb 05 20:16:04 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.70:443

    Wed Feb 05 20:16:09 2014 TLS: Initial packet from [AF_INET]88.190.203.70:443, sid=7a926862 3b7c06ad

    Wed Feb 05 20:16:14 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Wed Feb 05 20:16:14 2014 VERIFY OK: nsCertType=SERVER
    Wed Feb 05 20:16:14 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Wed Feb 05 20:16:14 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 20:16:14 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:16:14 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Wed Feb 05 20:16:14 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Wed Feb 05 20:16:14 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Wed Feb 05 20:16:14 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.70:443

    Wed Feb 05 20:16:17 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Wed Feb 05 20:16:17 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.3.174 10.3.3.173'
    Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --socket-flags option modified
    Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: route options modified
    Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Wed Feb 05 20:16:17 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Wed Feb 05 20:16:17 2014 open_tun, tt->ipv6=0
    Wed Feb 05 20:16:17 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D6177436-F573-4529-8CE1-A2EA453B922C}.tap
    Wed Feb 05 20:16:17 2014 TAP-Windows Driver Version 9.9
    Wed Feb 05 20:16:17 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.174/255.255.255.252 on interface {D6177436-F573-4529-8CE1-A2EA453B922C} [DHCP-serv: 10.3.3.173, lease-time: 31536000]
    Wed Feb 05 20:16:17 2014 Successful ARP Flush on interface [17] {D6177436-F573-4529-8CE1-A2EA453B922C}

    Wed Feb 05 20:16:22 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Wed Feb 05 20:16:22 2014 C:\Windows\system32\route.exe ADD 10.3.0.1 MASK 255.255.255.255 10.3.3.173
    Wed Feb 05 20:16:22 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Wed Feb 05 20:16:22 2014 Route addition via IPAPI succeeded [adaptive]
    Wed Feb 05 20:16:22 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.2.252.1 10.2.252.239 9999
    0.0.0.0 0.0.0.0 10.3.3.173 10.3.3.174 30
    10.2.252.0 255.255.254.0 10.2.252.239 10.2.252.239 286
    10.2.252.239 255.255.255.255 10.2.252.239 10.2.252.239 286
    10.2.253.255 255.255.255.255 10.2.252.239 10.2.252.239 286
    10.3.0.1 255.255.255.255 10.3.3.173 10.3.3.174 30
    10.3.3.172 255.255.255.252 10.3.3.174 10.3.3.174 286
    10.3.3.174 255.255.255.255 10.3.3.174 10.3.3.174 286
    10.3.3.175 255.255.255.255 10.3.3.174 10.3.3.174 286
    88.190.203.70 255.255.255.255 10.2.252.1 10.2.252.239 30
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    169.254.0.0 255.255.0.0 169.254.95.100 169.254.95.100 276
    169.254.95.100 255.255.255.255 169.254.95.100 169.254.95.100 276
    169.254.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 169.254.95.100 169.254.95.100 276
    224.0.0.0 240.0.0.0 10.3.3.174 10.3.3.174 286
    224.0.0.0 240.0.0.0 10.2.252.239 10.2.252.239 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
    255.255.255.255 255.255.255.255 10.3.3.174 10.3.3.174 286
    255.255.255.255 255.255.255.255 10.2.252.239 10.2.252.239 286
  • février 2014 modifié
    Bug le message c'est doublé, involontairement.

    Et j'ai également fait un test sur LoL ce soir, en bot débutant pendant les bugs... ça m'a déconnecter souvent. Et mes pings allait de 35 à 9078
  • @urdandy Tu as un problème de routes. Va dans les connexion réseau de Windows et désactive la connexion "FrozenWay" puis réactive là.

    @lgrisoni Es-tu sous Windows 8.1 ?
  • Après chronométrage, j'ai remarqué que Frozenway se déco au bout de temps aléatoires de connexions (allant de 2 à 5 min) même si je laisse la connexion s'en rien faire sur internet.
  • J'étais sur windows 8.1 et avais ce problème, j'ai donc reformaté mon ordinateur il y a une semaine pour voir si ça changeait quelque chose et je suis maintenant de nouveau sur Windows 8 professionnel. Le problème n'a pas changé!
  • Avez-vous essayé de décocher la case "Augmenter la métrique de la passerelle par défaut" dans les options réseau de FrozenWay ?
  • Personnellement je suis sous windows 7
  • @Emilien14 Peux tu donner ton journal de connexion après une déconnexion inopinée stp ?
  • J'ai le même problème depuis 5/6jours pourtant je n'ai modifier aucun paramètre et en 6mois d'utilisation je n'ai jamais eu ce problème
  • Vous êtes peut-être tous sur le même réseau ? Vous êtes où ? Cité U ? Si oui, laquelle ?

    Avez-vous essayé depuis un autre réseau pour voir si ça marchait mieux ?
  • Je suis à la cité de lébisey à Caen, je crois me souvenir avoir déjà un topique dessus, mais cela ne semblait pas être le même problème.

    Sinon voila le journal, après le fait que j'ai pu jouer presque 10 min bizarrement.
    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-01-uk-02
    Protocol: HTTP
    ----------------------------------
    Sat Feb 15 10:26:10 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Sat Feb 15 10:26:10 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Sat Feb 15 10:26:10 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:26:10 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:26:10 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Feb 15 10:26:10 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53172
    Sat Feb 15 10:26:10 2014 TCP connection established with [AF_INET]127.0.0.1:53172
    Sat Feb 15 10:26:10 2014 TCPv4_CLIENT link local: [undef]
    Sat Feb 15 10:26:10 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53172

    Sat Feb 15 10:26:11 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53172, sid=bf570edc 6bf3bf2f

    Sat Feb 15 10:26:11 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sat Feb 15 10:26:11 2014 VERIFY OK: nsCertType=SERVER
    Sat Feb 15 10:26:11 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sat Feb 15 10:26:12 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:26:12 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:26:12 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:26:12 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:26:12 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Sat Feb 15 10:26:12 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53172

    Sat Feb 15 10:26:14 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Sat Feb 15 10:26:14 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
    Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --socket-flags option modified
    Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: route options modified
    Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Feb 15 10:26:14 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Feb 15 10:26:14 2014 open_tun, tt->ipv6=0
    Sat Feb 15 10:26:14 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
    Sat Feb 15 10:26:14 2014 TAP-Windows Driver Version 9.9
    Sat Feb 15 10:26:14 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
    Sat Feb 15 10:26:14 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}

    Sat Feb 15 10:26:19 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up

    Sat Feb 15 10:26:19 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
    Sat Feb 15 10:26:19 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Sat Feb 15 10:26:19 2014 Route addition via IPAPI succeeded [adaptive]
    Sat Feb 15 10:26:19 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
    0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
    5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
    10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
    10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
    10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
    10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
    192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
    192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
    Sat Feb 15 10:31:25 2014 [FrozenWay] Inactivity timeout (--ping-exit), exiting

    Mode http (client) : L'hôte distant a fermé la connexion
    Sat Feb 15 10:31:25 2014 C:\Windows\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.177
    Sat Feb 15 10:31:25 2014 Route deletion via IPAPI succeeded [adaptive]
    Sat Feb 15 10:31:25 2014 Closing TUN/TAP interface
    Sat Feb 15 10:31:25 2014 SIGTERM[soft,ping-exit] received, process exiting

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-01-uk-02
    Protocol: HTTP
    ----------------------------------
    Sat Feb 15 10:31:26 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Sat Feb 15 10:31:27 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Sat Feb 15 10:31:27 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:31:27 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:31:27 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Feb 15 10:31:27 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53319
    Sat Feb 15 10:31:27 2014 TCP connection established with [AF_INET]127.0.0.1:53319
    Sat Feb 15 10:31:27 2014 TCPv4_CLIENT link local: [undef]
    Sat Feb 15 10:31:27 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53319

    Sat Feb 15 10:31:27 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53319, sid=fe9c75e5 0da92a18

    Sat Feb 15 10:31:28 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sat Feb 15 10:31:28 2014 VERIFY OK: nsCertType=SERVER
    Sat Feb 15 10:31:28 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sat Feb 15 10:31:28 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:31:28 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:31:28 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:31:28 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:31:28 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Sat Feb 15 10:31:28 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53319

    Sat Feb 15 10:31:30 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Sat Feb 15 10:31:30 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
    Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --socket-flags option modified
    Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: route options modified
    Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Feb 15 10:31:30 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Feb 15 10:31:30 2014 open_tun, tt->ipv6=0
    Sat Feb 15 10:31:30 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
    Sat Feb 15 10:31:30 2014 TAP-Windows Driver Version 9.9
    Sat Feb 15 10:31:30 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
    Sat Feb 15 10:31:30 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}

    Sat Feb 15 10:31:35 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Sat Feb 15 10:31:35 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
    Sat Feb 15 10:31:35 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Sat Feb 15 10:31:35 2014 Route addition via IPAPI succeeded [adaptive]
    Sat Feb 15 10:31:35 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
    0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
    5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
    10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
    10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
    10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
    10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
    192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
    192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
    Sat Feb 15 10:42:19 2014 [FrozenWay] Inactivity timeout (--ping-exit), exiting

    Mode http (client) : L'hôte distant a fermé la connexion
    Sat Feb 15 10:42:19 2014 C:\Windows\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.177
    Sat Feb 15 10:42:19 2014 Route deletion via IPAPI succeeded [adaptive]
    Sat Feb 15 10:42:19 2014 Closing TUN/TAP interface
    Sat Feb 15 10:42:19 2014 SIGTERM[soft,ping-exit] received, process exiting

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-01-uk-02
    Protocol: HTTP
    ----------------------------------
    Sat Feb 15 10:42:22 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Sat Feb 15 10:42:23 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Sat Feb 15 10:42:23 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:42:23 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:42:23 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Sat Feb 15 10:42:23 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53543
    Sat Feb 15 10:42:23 2014 TCP connection established with [AF_INET]127.0.0.1:53543
    Sat Feb 15 10:42:23 2014 TCPv4_CLIENT link local: [undef]
    Sat Feb 15 10:42:23 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53543

    Sat Feb 15 10:42:23 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53543, sid=b2e1c33e c37bc9d3

    Sat Feb 15 10:42:23 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Sat Feb 15 10:42:23 2014 VERIFY OK: nsCertType=SERVER
    Sat Feb 15 10:42:23 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Sat Feb 15 10:42:24 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:42:24 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:42:24 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Feb 15 10:42:24 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Feb 15 10:42:24 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Sat Feb 15 10:42:24 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53543

    Sat Feb 15 10:42:26 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Sat Feb 15 10:42:26 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
    Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --socket-flags option modified
    Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: route options modified
    Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Sat Feb 15 10:42:26 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Sat Feb 15 10:42:26 2014 open_tun, tt->ipv6=0
    Sat Feb 15 10:42:26 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
    Sat Feb 15 10:42:26 2014 TAP-Windows Driver Version 9.9
    Sat Feb 15 10:42:26 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
    Sat Feb 15 10:42:26 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}

    Sat Feb 15 10:42:31 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Sat Feb 15 10:42:31 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
    Sat Feb 15 10:42:31 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Sat Feb 15 10:42:31 2014 Route addition via IPAPI succeeded [adaptive]
    Sat Feb 15 10:42:31 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
    0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
    5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
    10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
    10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
    10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
    10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
    192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
    192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
    224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
    255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
  • février 2014 modifié
    J'ai exactement le même problème et j'ai décoché "Augmenter la métrique de la passerelle par défaut", frozenway se déco toutes les 5 minutes et se reco ensuite, ce qui me déco tout le temps en jeu, impossible de jouer correctement :/ , j'ai ce problème que depuis récemment, avant ça marchait nickel et j'ai rien touché ^^.
    PS : Je suis au CROUS de Lyon
  • Ça le fait dans les 3 modes de connexion ? (OpenVPN / https / http).

    Arrivez-vous à télécharger des gros fichiers (plusieurs 10e de minute de téléchargement) depuis votre réseau sans coupure ?

    @Dethane peux tu donner ton journal de connexion aussi stp.
  • février 2014 modifié
    Une des fréquentes déco :

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-01
    Protocol: OpenVPN
    ----------------------------------
    Mon Feb 17 17:48:47 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Feb 17 17:48:47 2014 Control Channel Authentication: using 'C:/Users/Benjamin/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Feb 17 17:48:47 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 17:48:47 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 17:48:47 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
    Mon Feb 17 17:48:47 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.60:443
    Mon Feb 17 17:48:47 2014 TCP connection established with [AF_INET]88.190.203.60:443
    Mon Feb 17 17:48:47 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 17:48:47 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.60:443
    Mon Feb 17 17:48:47 2014 TLS: Initial packet from [AF_INET]88.190.203.60:443, sid=32a21973 71925b99

    Mon Feb 17 17:48:47 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Feb 17 17:48:47 2014 VERIFY OK: nsCertType=SERVER
    Mon Feb 17 17:48:47 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Feb 17 17:48:48 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 17:48:48 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 17:48:48 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 17:48:48 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 17:48:48 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Feb 17 17:48:48 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.60:443

    Mon Feb 17 17:48:50 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Feb 17 17:48:50 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.10.162 10.1.10.161'
    Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --socket-flags option modified
    Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: route options modified
    Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Feb 17 17:48:50 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Feb 17 17:48:50 2014 open_tun, tt->ipv6=0
    Mon Feb 17 17:48:50 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{9F720028-807E-4E11-A843-5586B35DE64F}.tap
    Mon Feb 17 17:48:50 2014 TAP-Windows Driver Version 9.9
    Mon Feb 17 17:48:50 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.10.162/255.255.255.252 on interface {9F720028-807E-4E11-A843-5586B35DE64F} [DHCP-serv: 10.1.10.161, lease-time: 31536000]
    Mon Feb 17 17:48:50 2014 Successful ARP Flush on interface [21] {9F720028-807E-4E11-A843-5586B35DE64F}

    Mon Feb 17 17:48:55 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Feb 17 17:48:55 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.10.161
    Mon Feb 17 17:48:55 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Mon Feb 17 17:48:55 2014 Route addition via IPAPI succeeded [adaptive]
    Mon Feb 17 17:48:55 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.0.100.3 10.0.100.164 20
    0.0.0.0 128.0.0.0 10.1.10.161 10.1.10.162 30
    10.0.100.0 255.255.254.0 10.0.100.164 10.0.100.164 276
    10.0.100.164 255.255.255.255 10.0.100.164 10.0.100.164 276
    10.0.101.255 255.255.255.255 10.0.100.164 10.0.100.164 276
    10.1.0.1 255.255.255.255 10.1.10.161 10.1.10.162 30
    10.1.10.160 255.255.255.252 10.1.10.162 10.1.10.162 286
    10.1.10.162 255.255.255.255 10.1.10.162 10.1.10.162 286
    10.1.10.163 255.255.255.255 10.1.10.162 10.1.10.162 286
    88.190.203.60 255.255.255.255 10.0.100.3 10.0.100.164 20
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    128.0.0.0 128.0.0.0 10.1.10.161 10.1.10.162 30
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 10.0.100.164 10.0.100.164 276
    224.0.0.0 240.0.0.0 10.1.10.162 10.1.10.162 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 10.0.100.164 10.0.100.164 276
    255.255.255.255 255.255.255.255 10.1.10.162 10.1.10.162 286
    Mon Feb 17 18:02:49 2014 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Feb 17 18:02:49 2014 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Mon Feb 17 18:02:49 2014 Connection reset, restarting [-1]
    Mon Feb 17 18:02:49 2014 SIGUSR1[soft,connection-reset] received, process restarting
    Mon Feb 17 18:02:49 2014 Restart pause, 1 second(s)

    Mon Feb 17 18:02:50 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]

    Mon Feb 17 18:02:51 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.60:443
    Mon Feb 17 18:02:51 2014 TCP connection established with [AF_INET]88.190.203.60:443
    Mon Feb 17 18:02:51 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 18:02:51 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.60:443
    Mon Feb 17 18:02:51 2014 TLS: Initial packet from [AF_INET]88.190.203.60:443, sid=2d66a2f1 d3d26058

    Mon Feb 17 18:02:51 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Feb 17 18:02:51 2014 VERIFY OK: nsCertType=SERVER
    Mon Feb 17 18:02:51 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Feb 17 18:02:51 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 18:02:51 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 18:02:51 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 18:02:51 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 18:02:51 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Feb 17 18:02:51 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.60:443

    Mon Feb 17 18:02:53 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Feb 17 18:02:53 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.10.162 10.1.10.161'
    Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --socket-flags option modified
    Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: route options modified
    Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Feb 17 18:02:53 2014 Preserving previous TUN/TAP instance: FrozenWay
    Mon Feb 17 18:02:53 2014 Initialization Sequence Completed

    Oui j'ai téléchargé un fichier de 2go via mega hier sans soucis. Cette coupure je la ressens seulement quand je joue vu que ça me déco :/. Et j'ai pas testé d'autres modes pour l'instant, je suis en openvpn, j'essaierai. C'est bizarre pourtant ça fonctionnait très bien avant, et ça me fait ça que depuis peu de temps.. Peut-être ont-ils renforcé le filtrage des proxy ?
  • Oui, j'ai essayé avec les trois mods, et globalement la finalité est la même; je suis déconnecté trop tôt pour jouer correctement.
    Pour les gros téléchargements, je suis obligé de relancer en permanence sinon ils se bloquent à 0 o/s.
  • février 2014 modifié
    Je suis également au crous de Lyon aucun soucis pendant6mois , les problèmes ont survenu il y a une semaine environ , voici mon journal de co .

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-03-fr-02
    Protocol: OpenVPN
    ----------------------------------
    Mon Feb 17 21:28:05 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Feb 17 21:28:06 2014 Control Channel Authentication: using 'C:/Users/anthony/Downloads/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Feb 17 21:28:06 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:28:06 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:28:06 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon Feb 17 21:28:06 2014 Attempting to establish TCP connection with [AF_INET]176.31.61.21:443
    Mon Feb 17 21:28:06 2014 TCP connection established with [AF_INET]176.31.61.21:443
    Mon Feb 17 21:28:06 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 21:28:06 2014 TCPv4_CLIENT link remote: [AF_INET]176.31.61.21:443

    Mon Feb 17 21:28:06 2014 TLS: Initial packet from [AF_INET]176.31.61.21:443, sid=0c3d74d2 4582714b

    Mon Feb 17 21:28:06 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Feb 17 21:28:06 2014 VERIFY OK: nsCertType=SERVER
    Mon Feb 17 21:28:06 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Feb 17 21:28:06 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:28:06 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:28:06 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:28:06 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:28:06 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Feb 17 21:28:06 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]176.31.61.21:443

    Mon Feb 17 21:28:08 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Feb 17 21:28:08 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.4.178 10.2.4.177'
    Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --socket-flags option modified
    Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: route options modified
    Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Feb 17 21:28:08 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Feb 17 21:28:08 2014 open_tun, tt->ipv6=0
    Mon Feb 17 21:28:08 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EF7B8000-2ABC-46C9-998A-E428ABE2AD6A}.tap
    Mon Feb 17 21:28:08 2014 TAP-Windows Driver Version 9.9
    Mon Feb 17 21:28:08 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.4.178/255.255.255.252 on interface {EF7B8000-2ABC-46C9-998A-E428ABE2AD6A} [DHCP-serv: 10.2.4.177, lease-time: 31536000]
    Mon Feb 17 21:28:08 2014 Successful ARP Flush on interface [23] {EF7B8000-2ABC-46C9-998A-E428ABE2AD6A}

    Mon Feb 17 21:28:14 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Feb 17 21:28:14 2014 C:\Windows\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.4.177
    Mon Feb 17 21:28:14 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Mon Feb 17 21:28:14 2014 Route addition via IPAPI succeeded [adaptive]
    Mon Feb 17 21:28:14 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 10.0.100.3 10.0.100.113 9999
    0.0.0.0 0.0.0.0 10.2.4.177 10.2.4.178 30
    10.0.100.0 255.255.254.0 10.0.100.113 10.0.100.113 276
    10.0.100.113 255.255.255.255 10.0.100.113 10.0.100.113 276
    10.0.101.255 255.255.255.255 10.0.100.113 10.0.100.113 276
    10.2.0.1 255.255.255.255 10.2.4.177 10.2.4.178 30
    10.2.4.176 255.255.255.252 10.2.4.178 10.2.4.178 286
    10.2.4.178 255.255.255.255 10.2.4.178 10.2.4.178 286
    10.2.4.179 255.255.255.255 10.2.4.178 10.2.4.178 286
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    176.31.61.21 255.255.255.255 10.0.100.3 10.0.100.113 20
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 10.2.4.178 10.2.4.178 286
    224.0.0.0 240.0.0.0 10.0.100.113 10.0.100.113 276
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 10.2.4.178 10.2.4.178 286
    255.255.255.255 255.255.255.255 10.0.100.113 10.0.100.113 276
    Mon Feb 17 21:28:38 2014 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Mon Feb 17 21:28:38 2014 Connection reset, restarting [-1]
    Mon Feb 17 21:28:38 2014 C:\Windows\system32\route.exe DELETE 10.2.0.1 MASK 255.255.255.255 10.2.4.177
    Mon Feb 17 21:28:38 2014 Route deletion via IPAPI succeeded [adaptive]
    Mon Feb 17 21:28:38 2014 Closing TUN/TAP interface
    Mon Feb 17 21:28:38 2014 SIGTERM[soft,connection-reset] received, process exiting
  • Bonsoir, en espérant que mon cas puisse aussi faire avancer les choses.

    Déconnexion toutes les 2-5 min mais j'ai remarqué, uniquement le soir à partir de 20h jusqu'a 23h minuit. Si je me connecte le matin je peux rester connecté toute la journée presque sans déconnexions.

    Voici mon journal, en ayant décocher la case "Augmenter la métrique de la passerelle par défaut."







    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-01
    Protocol: HTTPS
    ----------------------------------
    Mon Feb 17 21:53:27 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Feb 17 21:53:28 2014 Control Channel Authentication: using 'C:/Users/QuentinGiraud/Documents/Quentin/Divers/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Feb 17 21:53:28 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:53:28 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:53:28 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon Feb 17 21:53:28 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55652
    Mon Feb 17 21:53:28 2014 TCP connection established with [AF_INET]127.0.0.1:55652
    Mon Feb 17 21:53:28 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 21:53:28 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55652

    Mon Feb 17 21:53:31 2014 TLS: Initial packet from [AF_INET]127.0.0.1:55652, sid=d3b5901a 758e71a5

    Mon Feb 17 21:53:32 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Feb 17 21:53:32 2014 VERIFY OK: nsCertType=SERVER
    Mon Feb 17 21:53:32 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Feb 17 21:53:33 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:53:33 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:53:33 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:53:33 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:53:33 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Feb 17 21:53:33 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:55652

    Mon Feb 17 21:53:35 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)

    Mon Feb 17 21:53:35 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.7.30 10.1.7.29'
    Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --socket-flags option modified
    Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: route options modified
    Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Feb 17 21:53:35 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Feb 17 21:53:35 2014 open_tun, tt->ipv6=0
    Mon Feb 17 21:53:35 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{56762CFF-C5A5-4A0C-932B-A675D744776C}.tap
    Mon Feb 17 21:53:35 2014 TAP-Windows Driver Version 9.9
    Mon Feb 17 21:53:35 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.7.30/255.255.255.252 on interface {56762CFF-C5A5-4A0C-932B-A675D744776C} [DHCP-serv: 10.1.7.29, lease-time: 31536000]
    Mon Feb 17 21:53:35 2014 Successful ARP Flush on interface [24] {56762CFF-C5A5-4A0C-932B-A675D744776C}

    Mon Feb 17 21:53:40 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Feb 17 21:53:40 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.7.29

    Mon Feb 17 21:53:40 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Mon Feb 17 21:53:40 2014 Route addition via IPAPI succeeded [adaptive]
    Mon Feb 17 21:53:40 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.250.2 192.168.251.92 30
    0.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
    10.1.0.1 255.255.255.255 10.1.7.29 10.1.7.30 30
    10.1.7.28 255.255.255.252 10.1.7.30 10.1.7.30 286
    10.1.7.30 255.255.255.255 10.1.7.30 10.1.7.30 286
    10.1.7.31 255.255.255.255 10.1.7.30 10.1.7.30 286
    88.190.203.60 255.255.255.255 192.168.250.2 192.168.251.92 25
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    128.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
    192.168.250.0 255.255.254.0 192.168.251.92 192.168.251.92 281
    192.168.251.92 255.255.255.255 192.168.251.92 192.168.251.92 281
    192.168.251.255 255.255.255.255 192.168.251.92 192.168.251.92 281
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.251.92 192.168.251.92 281
    224.0.0.0 240.0.0.0 10.1.7.30 10.1.7.30 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.251.92 192.168.251.92 281
    255.255.255.255 255.255.255.255 10.1.7.30 10.1.7.30 286
    Mode https (tunnel) : L'hôte distant a fermé la connexion
    Mon Feb 17 21:54:16 2014 Connection reset, restarting [0]
    Mon Feb 17 21:54:16 2014 SIGUSR1[soft,connection-reset] received, process restarting
    Mon Feb 17 21:54:16 2014 Restart pause, 1 second(s)

    Mon Feb 17 21:54:17 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon Feb 17 21:54:17 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55652
    Mon Feb 17 21:54:17 2014 TCP connection established with [AF_INET]127.0.0.1:55652
    Mon Feb 17 21:54:17 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 21:54:17 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55652

    Mode https (client) : L'hôte distant a fermé la connexion
    Mon Feb 17 21:54:47 2014 [UNDEF] Inactivity timeout (--ping-exit), exiting
    Mon Feb 17 21:54:47 2014 C:\Windows\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.7.29
    Mon Feb 17 21:54:47 2014 Route deletion via IPAPI succeeded [adaptive]
    Mon Feb 17 21:54:47 2014 Closing TUN/TAP interface
    Mon Feb 17 21:54:47 2014 SIGTERM[soft,ping-exit] received, process exiting

    FrozenWay version 1.6.5
    ----------------------------------
    Server: premium-04-fr-01
    Protocol: HTTPS
    ----------------------------------
    Mon Feb 17 21:54:57 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013

    Mon Feb 17 21:54:58 2014 Control Channel Authentication: using 'C:/Users/QuentinGiraud/Documents/Quentin/Divers/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
    Mon Feb 17 21:54:58 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:54:58 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:54:58 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon Feb 17 21:54:58 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55744
    Mon Feb 17 21:54:58 2014 TCP connection established with [AF_INET]127.0.0.1:55744
    Mon Feb 17 21:54:58 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 21:54:58 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55744

    Mon Feb 17 21:54:58 2014 TLS: Initial packet from [AF_INET]127.0.0.1:55744, sid=cd78f517 ed758996

    Mon Feb 17 21:54:59 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Mon Feb 17 21:54:59 2014 VERIFY OK: nsCertType=SERVER
    Mon Feb 17 21:54:59 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Mon Feb 17 21:55:00 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:55:00 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:55:00 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Feb 17 21:55:00 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Feb 17 21:55:00 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Mon Feb 17 21:55:00 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:55744

    Mon Feb 17 21:55:02 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Mon Feb 17 21:55:02 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.7.30 10.1.7.29'
    Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --socket-flags option modified
    Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: route options modified
    Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Feb 17 21:55:02 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Mon Feb 17 21:55:02 2014 open_tun, tt->ipv6=0
    Mon Feb 17 21:55:02 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{56762CFF-C5A5-4A0C-932B-A675D744776C}.tap
    Mon Feb 17 21:55:02 2014 TAP-Windows Driver Version 9.9
    Mon Feb 17 21:55:02 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.7.30/255.255.255.252 on interface {56762CFF-C5A5-4A0C-932B-A675D744776C} [DHCP-serv: 10.1.7.29, lease-time: 31536000]
    Mon Feb 17 21:55:02 2014 Successful ARP Flush on interface [24] {56762CFF-C5A5-4A0C-932B-A675D744776C}

    Mon Feb 17 21:55:07 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Mon Feb 17 21:55:07 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.7.29

    Mon Feb 17 21:55:07 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Mon Feb 17 21:55:07 2014 Route addition via IPAPI succeeded [adaptive]
    Mon Feb 17 21:55:07 2014 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.250.2 192.168.251.92 30
    0.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
    10.1.0.1 255.255.255.255 10.1.7.29 10.1.7.30 30
    10.1.7.28 255.255.255.252 10.1.7.30 10.1.7.30 286
    10.1.7.30 255.255.255.255 10.1.7.30 10.1.7.30 286
    10.1.7.31 255.255.255.255 10.1.7.30 10.1.7.30 286
    88.190.203.60 255.255.255.255 192.168.250.2 192.168.251.92 25
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    128.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
    192.168.250.0 255.255.254.0 192.168.251.92 192.168.251.92 281
    192.168.251.92 255.255.255.255 192.168.251.92 192.168.251.92 281
    192.168.251.255 255.255.255.255 192.168.251.92 192.168.251.92 281
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.251.92 192.168.251.92 281
    224.0.0.0 240.0.0.0 10.1.7.30 10.1.7.30 286
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.251.92 192.168.251.92 281
    255.255.255.255 255.255.255.255 10.1.7.30 10.1.7.30 286

    Mode https (tunnel) : L'hôte distant a fermé la connexion
    Mon Feb 17 21:57:36 2014 Connection reset, restarting [0]
    Mon Feb 17 21:57:36 2014 SIGUSR1[soft,connection-reset] received, process restarting
    Mon Feb 17 21:57:36 2014 Restart pause, 1 second(s)

    Mon Feb 17 21:57:37 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Mon Feb 17 21:57:37 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55744
    Mon Feb 17 21:57:37 2014 TCP connection established with [AF_INET]127.0.0.1:55744
    Mon Feb 17 21:57:37 2014 TCPv4_CLIENT link local: [undef]
    Mon Feb 17 21:57:37 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55744

    Mon Feb 17 21:58:01 2014 C:\Windows\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.7.29
    Mon Feb 17 21:58:01 2014 Route deletion via IPAPI succeeded [adaptive]
    Mon Feb 17 21:58:01 2014 Closing TUN/TAP interface
    Mon Feb 17 21:58:01 2014 SIGTERM[hard,] received, process exiting



  • J'ai essayé avec les autres protocoles (HTTPS/HTTP) et c'est toujours le même problème, ça ne change rien ^^
  • @Emilien14 Quand tes téléchargements arrivent à 0 o/s, c'est que plus aucune donnée de passe. FrozenWay fonctionne comme un téléchargement, c'est une simple connexion TCP, mais quand plus aucune donnée ne passe pendant 30 seconde, il déconnecte d'où la ligne dans ton journal de connexion : Inactivity timeout (--ping-exit), exiting. Ce problème peut être dû à beaucoup de chose. Ça peut être une technique de bride du proxy mais c'est très peu probable, le plus souvent c'est que ton système a un soucis, ou bien les équipements réseau ont un dysfonctionnement (coupure du Wifi / port ethernet bloqué).

    Pour les autres : Vous avez des RST de connexion, sont la cause probable est la saturation du réseau, il faut attendre que les admins réseau fassent quelque chose... Ça peut aussi venir d'un pourcentage de loss (perte de paquet) trop importante dû à une mauvaise connexion Wifi ou un port switch défaillant.
  • février 2014 modifié
    Je suis en ethernet, ça doit sûrement être la cause de la saturation du réseau alors. Tant pis j'ferai avec en espérant que ça s'arrange avec le temps...
  • C'est peut-être idiot, mais est ce que cela peut venir du fait que j'utilise un câble de 20m pour une distance d'1m ? Ou de la prise internet qui serait mal mise ?
  • C'est sûr que c'est pas le top 20 m de câble surtout si il côtoie d'autres câbles ou si il est enroulé, enfin ça dépend du blindage...
  • Visiblement, le problème était le câble. J'ai déboursé 7€ pour un câble de 3m, et mon téléchargement sur steam se stabilise à 1.8mb/s . Merci pour ton aide.
Cette discussion a été fermée.