[Résolu] déconnexion toutes les 2 min
Bonjour,
Je poste parce que je n'arrive pas à jouer en ligne avec Frozenway.
J'utilise le réseau par fil de ma résidence universitaire et j'essaie de jouer à des jeu comme The secret world.
Je me connecte à Frozenway avec un compte play-more. Mais, au bout de quelques courtes minutes de jeu, un message in game me dit que la connexion est perdue. Quand je reviens sur le bureau, je vois que Frozenway est en train de se reconnecter automatiquement sans aucun problème. Si, je réessaie cela recommence.
J'essaie en arrêtant mon anti-virus, en bidouillant deux/trois options de Frozenway sans vraiment comprendre ce que je fait, et rien y fait.
Etant nul en informatique, je ne sais pas du tout si c'est la connexion qui trop instable ou trop sécurisée ou si c'est moi qui ne fait pas ceux qu'il faut.
Si cela peut vous aider... Quand je télécharge un gros fichier, la vitesse de téléchargement peut atteindre le 1go/s, mais elle tombe au bout de quelque minutes à 0 jusqu'à ce que je le mette en pause puis le relance. Et là, c'est reparti pour quelque minutes à haute-vitesse.
Je vous remercie pour vos réponses.
Je poste parce que je n'arrive pas à jouer en ligne avec Frozenway.
J'utilise le réseau par fil de ma résidence universitaire et j'essaie de jouer à des jeu comme The secret world.
Je me connecte à Frozenway avec un compte play-more. Mais, au bout de quelques courtes minutes de jeu, un message in game me dit que la connexion est perdue. Quand je reviens sur le bureau, je vois que Frozenway est en train de se reconnecter automatiquement sans aucun problème. Si, je réessaie cela recommence.
J'essaie en arrêtant mon anti-virus, en bidouillant deux/trois options de Frozenway sans vraiment comprendre ce que je fait, et rien y fait.
Etant nul en informatique, je ne sais pas du tout si c'est la connexion qui trop instable ou trop sécurisée ou si c'est moi qui ne fait pas ceux qu'il faut.
Si cela peut vous aider... Quand je télécharge un gros fichier, la vitesse de téléchargement peut atteindre le 1go/s, mais elle tombe au bout de quelque minutes à 0 jusqu'à ce que je le mette en pause puis le relance. Et là, c'est reparti pour quelque minutes à haute-vitesse.
Je vous remercie pour vos réponses.
Cette discussion a été fermée.
Réponses
Peut-être que ton proxy bloque les communications sur chaque connexion TCP qui dépasse X secondes ou Y Mo de transfert... Es-ce que touts les étudiants ont le même problème (téléchargement qui passe à 0 ko/s) ?
As tu essayé de te connecter en http à FrozenWay (menu déroulant sous la liste des serveurs), est-ce que les téléchargements durent plus longtemps ?
Oui, c'est vrai que 1go/s, c'est un peu gros...
Pour les autres étudiants, j'avoue ne jamais avoir posé la question. Mais étant durant le week end, je croise personne dans les couloirs. Je demanderai donc dans les jours à venir.
J'ai essayé le http. J'arrive à jouer quelques minutes de plus, mas je suis encore déconnecté.
Je suis aussi déconnecté toutes les deux minutes, sauf que dans mon cas, frozenway ne tente pas de se reconnecter automatiquement, je dois le faire moi-même et le problème réapparait deux minutes plus tard... Passer en html n'a rien changé... Et tous les étudiants de mon université arrivent très bien à jouer avec frozenway malgré le proxy...
Je suis désespéré!
PREMIERE CONNEXION
FrozenWay version 1.6.5
----------------------------------
Server: public-02-fr-01
Proxy: 129.104.247.2:8080
Protocol: OpenVPN
----------------------------------
Wed Feb 05 17:34:07 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Feb 05 17:34:07 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 05 17:34:07 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:34:07 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:34:07 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 05 17:34:07 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:34:07 2014 TCP connection established with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:34:07 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
Wed Feb 05 17:34:07 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
Wed Feb 05 17:34:09 2014 TCPv4_CLIENT link local: [undef]
Wed Feb 05 17:34:09 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
Wed Feb 05 17:34:09 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=580f4a98 80e2946e
Wed Feb 05 17:34:10 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:34:10 2014 VERIFY OK: nsCertType=SERVER
Wed Feb 05 17:34:10 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:34:10 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:34:10 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:34:10 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:34:10 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:34:10 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 05 17:34:10 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:34:12 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 05 17:34:12 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: route options modified
Wed Feb 05 17:34:12 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 05 17:34:12 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 05 17:34:12 2014 open_tun, tt->ipv6=0
Wed Feb 05 17:34:12 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
Wed Feb 05 17:34:12 2014 TAP-Windows Driver Version 9.9
Wed Feb 05 17:34:12 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
Wed Feb 05 17:34:12 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}
Wed Feb 05 17:34:17 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 05 17:34:17 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229
Wed Feb 05 17:34:17 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Feb 05 17:34:17 2014 Route addition via IPAPI succeeded [adaptive]
Wed Feb 05 17:34:17 2014 Initialization Sequence Completed
Wed Feb 05 17:34:19 2014 C:\WINDOWS\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.5.229
Wed Feb 05 17:34:19 2014 Route deletion via IPAPI succeeded [adaptive]
Wed Feb 05 17:34:19 2014 Closing TUN/TAP interface
Wed Feb 05 17:34:19 2014 SIGTERM[hard,] received, process exiting
RECONNEXION
FrozenWay version 1.6.5
----------------------------------
Server: public-02-fr-01
Proxy: 129.104.247.2:8080
Protocol: OpenVPN
----------------------------------
Wed Feb 05 17:35:02 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Feb 05 17:35:02 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 05 17:35:02 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:35:02 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:35:02 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 05 17:35:02 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:35:02 2014 TCP connection established with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:35:02 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
Wed Feb 05 17:35:02 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
Wed Feb 05 17:35:04 2014 TCPv4_CLIENT link local: [undef]
Wed Feb 05 17:35:04 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
Wed Feb 05 17:35:04 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=17ff1c7e e47b53e5
Wed Feb 05 17:35:04 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:35:04 2014 VERIFY OK: nsCertType=SERVER
Wed Feb 05 17:35:04 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:35:05 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:35:05 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:35:05 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:35:05 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:35:05 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 05 17:35:05 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:35:07 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 05 17:35:07 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: route options modified
Wed Feb 05 17:35:07 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 05 17:35:07 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 05 17:35:07 2014 open_tun, tt->ipv6=0
Wed Feb 05 17:35:07 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
Wed Feb 05 17:35:07 2014 TAP-Windows Driver Version 9.9
Wed Feb 05 17:35:07 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
Wed Feb 05 17:35:07 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}
Wed Feb 05 17:35:12 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 05 17:35:12 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229
Wed Feb 05 17:35:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Feb 05 17:35:12 2014 Route addition via IPAPI succeeded [adaptive]
Wed Feb 05 17:35:12 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 129.104.235.254 129.104.235.23 9999
0.0.0.0 0.0.0.0 10.1.5.229 10.1.5.230 30
10.1.0.1 255.255.255.255 10.1.5.229 10.1.5.230 30
10.1.5.228 255.255.255.252 10.1.5.230 10.1.5.230 286
10.1.5.230 255.255.255.255 10.1.5.230 10.1.5.230 286
10.1.5.231 255.255.255.255 10.1.5.230 10.1.5.230 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
129.104.232.0 255.255.252.0 129.104.235.23 129.104.235.23 276
129.104.235.23 255.255.255.255 129.104.235.23 129.104.235.23 276
129.104.235.255 255.255.255.255 129.104.235.23 129.104.235.23 276
129.104.247.2 255.255.255.255 129.104.235.254 129.104.235.23 20
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 10.1.5.230 10.1.5.230 286
224.0.0.0 240.0.0.0 129.104.235.23 129.104.235.23 276
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 10.1.5.230 10.1.5.230 286
255.255.255.255 255.255.255.255 129.104.235.23 129.104.235.23 276
DEUXIEME RECONNEXION
FrozenWay version 1.6.5
----------------------------------
Server: public-02-fr-01
Proxy: 129.104.247.2:8080
Protocol: OpenVPN
----------------------------------
Wed Feb 05 17:36:32 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Feb 05 17:36:33 2014 Control Channel Authentication: using 'C:/Users/Lucas/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 05 17:36:33 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:36:33 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:36:33 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 05 17:36:33 2014 Attempting to establish TCP connection with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:36:33 2014 TCP connection established with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:36:33 2014 Send to HTTP proxy: 'CONNECT 176.31.6.208:443 HTTP/1.0'
Wed Feb 05 17:36:33 2014 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
Wed Feb 05 17:36:35 2014 TCPv4_CLIENT link local: [undef]
Wed Feb 05 17:36:35 2014 TCPv4_CLIENT link remote: [AF_INET]129.104.247.2:8080
Wed Feb 05 17:36:35 2014 TLS: Initial packet from [AF_INET]129.104.247.2:8080, sid=90cc7b10 fd7d3b75
Wed Feb 05 17:36:35 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:36:35 2014 VERIFY OK: nsCertType=SERVER
Wed Feb 05 17:36:35 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 17:36:35 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:36:35 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:36:35 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 17:36:35 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 17:36:35 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 05 17:36:35 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]129.104.247.2:8080
Wed Feb 05 17:36:37 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 05 17:36:37 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.5.230 10.1.5.229'
Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: route options modified
Wed Feb 05 17:36:37 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 05 17:36:37 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 05 17:36:37 2014 open_tun, tt->ipv6=0
Wed Feb 05 17:36:37 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A0960360-C61B-4DEA-B10F-D65206559CA7}.tap
Wed Feb 05 17:36:37 2014 TAP-Windows Driver Version 9.9
Wed Feb 05 17:36:37 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.5.230/255.255.255.252 on interface {A0960360-C61B-4DEA-B10F-D65206559CA7} [DHCP-serv: 10.1.5.229, lease-time: 31536000]
Wed Feb 05 17:36:37 2014 Successful ARP Flush on interface [20] {A0960360-C61B-4DEA-B10F-D65206559CA7}
Wed Feb 05 17:36:42 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 05 17:36:42 2014 C:\WINDOWS\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.5.229
Wed Feb 05 17:36:42 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Feb 05 17:36:42 2014 Route addition via IPAPI succeeded [adaptive]
Wed Feb 05 17:36:42 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 129.104.235.254 129.104.235.23 9999
0.0.0.0 0.0.0.0 10.1.5.229 10.1.5.230 30
10.1.0.1 255.255.255.255 10.1.5.229 10.1.5.230 30
10.1.5.228 255.255.255.252 10.1.5.230 10.1.5.230 286
10.1.5.230 255.255.255.255 10.1.5.230 10.1.5.230 286
10.1.5.231 255.255.255.255 10.1.5.230 10.1.5.230 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
129.104.232.0 255.255.252.0 129.104.235.23 129.104.235.23 276
129.104.235.23 255.255.255.255 129.104.235.23 129.104.235.23 276
129.104.235.255 255.255.255.255 129.104.235.23 129.104.235.23 276
129.104.247.2 255.255.255.255 129.104.235.254 129.104.235.23 20
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 10.1.5.230 10.1.5.230 286
224.0.0.0 240.0.0.0 129.104.235.23 129.104.235.23 276
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 10.1.5.230 10.1.5.230 286
255.255.255.255 255.255.255.255 129.104.235.23 129.104.235.23 276
Mais depuis hier ça coupe tout le temps. Des fois j'arrive pas à me reconnecter directement je suis obliger de fermer la session puis ré-ouvrir avec ou sans avast.
Pour ma série de test à 20h09 je me suis reconnecte une énième fois, puis à 20h15 ça a coupé x)
Et je n'arrive plus à me connecté sur n'importe quel serveur ^^'
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-03
Protocol: OpenVPN
----------------------------------
Wed Feb 05 20:09:56 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Feb 05 20:09:56 2014 Control Channel Authentication: using 'C:/Users/Aurelie/Downloads/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 05 20:09:56 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:09:56 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:09:56 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Feb 05 20:09:56 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.70:443
Wed Feb 05 20:09:56 2014 TCP connection established with [AF_INET]88.190.203.70:443
Wed Feb 05 20:09:56 2014 TCPv4_CLIENT link local: [undef]
Wed Feb 05 20:09:56 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.70:443
Wed Feb 05 20:09:57 2014 TLS: Initial packet from [AF_INET]88.190.203.70:443, sid=9f5f6cc9 d6036f42
Wed Feb 05 20:10:00 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 20:10:00 2014 VERIFY OK: nsCertType=SERVER
Wed Feb 05 20:10:00 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 20:10:00 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 20:10:00 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:10:00 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 20:10:00 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:10:00 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 05 20:10:00 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.70:443
Wed Feb 05 20:10:02 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 05 20:10:03 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.3.174 10.3.3.173'
Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: route options modified
Wed Feb 05 20:10:03 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 05 20:10:03 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 05 20:10:03 2014 open_tun, tt->ipv6=0
Wed Feb 05 20:10:03 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D6177436-F573-4529-8CE1-A2EA453B922C}.tap
Wed Feb 05 20:10:03 2014 TAP-Windows Driver Version 9.9
Wed Feb 05 20:10:03 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.174/255.255.255.252 on interface {D6177436-F573-4529-8CE1-A2EA453B922C} [DHCP-serv: 10.3.3.173, lease-time: 31536000]
Wed Feb 05 20:10:03 2014 Successful ARP Flush on interface [17] {D6177436-F573-4529-8CE1-A2EA453B922C}
Wed Feb 05 20:10:08 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 05 20:10:08 2014 C:\Windows\system32\route.exe ADD 10.3.0.1 MASK 255.255.255.255 10.3.3.173
Wed Feb 05 20:10:08 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Feb 05 20:10:08 2014 Route addition via IPAPI succeeded [adaptive]
Wed Feb 05 20:10:08 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.2.252.1 10.2.252.239 9999
0.0.0.0 0.0.0.0 10.3.3.173 10.3.3.174 30
10.2.252.0 255.255.254.0 10.2.252.239 10.2.252.239 286
10.2.252.239 255.255.255.255 10.2.252.239 10.2.252.239 286
10.2.253.255 255.255.255.255 10.2.252.239 10.2.252.239 286
10.3.0.1 255.255.255.255 10.3.3.173 10.3.3.174 30
10.3.3.172 255.255.255.252 10.3.3.174 10.3.3.174 286
10.3.3.174 255.255.255.255 10.3.3.174 10.3.3.174 286
10.3.3.175 255.255.255.255 10.3.3.174 10.3.3.174 286
88.190.203.70 255.255.255.255 10.2.252.1 10.2.252.239 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
169.254.0.0 255.255.0.0 169.254.95.100 169.254.95.100 276
169.254.95.100 255.255.255.255 169.254.95.100 169.254.95.100 276
169.254.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 169.254.95.100 169.254.95.100 276
224.0.0.0 240.0.0.0 10.3.3.174 10.3.3.174 286
224.0.0.0 240.0.0.0 10.2.252.239 10.2.252.239 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
255.255.255.255 255.255.255.255 10.3.3.174 10.3.3.174 286
255.255.255.255 255.255.255.255 10.2.252.239 10.2.252.239 286
*****************************************************************************************************************
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-03
Protocol: OpenVPN
----------------------------------
Wed Feb 05 20:16:04 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Wed Feb 05 20:16:04 2014 Control Channel Authentication: using 'C:/Users/Aurelie/Downloads/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Wed Feb 05 20:16:04 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:16:04 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:16:04 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Feb 05 20:16:04 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.70:443
Wed Feb 05 20:16:04 2014 TCP connection established with [AF_INET]88.190.203.70:443
Wed Feb 05 20:16:04 2014 TCPv4_CLIENT link local: [undef]
Wed Feb 05 20:16:04 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.70:443
Wed Feb 05 20:16:09 2014 TLS: Initial packet from [AF_INET]88.190.203.70:443, sid=7a926862 3b7c06ad
Wed Feb 05 20:16:14 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 20:16:14 2014 VERIFY OK: nsCertType=SERVER
Wed Feb 05 20:16:14 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Wed Feb 05 20:16:14 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 20:16:14 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:16:14 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Feb 05 20:16:14 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Feb 05 20:16:14 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Feb 05 20:16:14 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.70:443
Wed Feb 05 20:16:17 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Wed Feb 05 20:16:17 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.3.0.1,dhcp-option WINS 10.3.0.1,route 10.3.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.3.3.174 10.3.3.173'
Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --socket-flags option modified
Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --ifconfig/up options modified
Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: route options modified
Wed Feb 05 20:16:17 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Feb 05 20:16:17 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Feb 05 20:16:17 2014 open_tun, tt->ipv6=0
Wed Feb 05 20:16:17 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{D6177436-F573-4529-8CE1-A2EA453B922C}.tap
Wed Feb 05 20:16:17 2014 TAP-Windows Driver Version 9.9
Wed Feb 05 20:16:17 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.174/255.255.255.252 on interface {D6177436-F573-4529-8CE1-A2EA453B922C} [DHCP-serv: 10.3.3.173, lease-time: 31536000]
Wed Feb 05 20:16:17 2014 Successful ARP Flush on interface [17] {D6177436-F573-4529-8CE1-A2EA453B922C}
Wed Feb 05 20:16:22 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Wed Feb 05 20:16:22 2014 C:\Windows\system32\route.exe ADD 10.3.0.1 MASK 255.255.255.255 10.3.3.173
Wed Feb 05 20:16:22 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Feb 05 20:16:22 2014 Route addition via IPAPI succeeded [adaptive]
Wed Feb 05 20:16:22 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.2.252.1 10.2.252.239 9999
0.0.0.0 0.0.0.0 10.3.3.173 10.3.3.174 30
10.2.252.0 255.255.254.0 10.2.252.239 10.2.252.239 286
10.2.252.239 255.255.255.255 10.2.252.239 10.2.252.239 286
10.2.253.255 255.255.255.255 10.2.252.239 10.2.252.239 286
10.3.0.1 255.255.255.255 10.3.3.173 10.3.3.174 30
10.3.3.172 255.255.255.252 10.3.3.174 10.3.3.174 286
10.3.3.174 255.255.255.255 10.3.3.174 10.3.3.174 286
10.3.3.175 255.255.255.255 10.3.3.174 10.3.3.174 286
88.190.203.70 255.255.255.255 10.2.252.1 10.2.252.239 30
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
169.254.0.0 255.255.0.0 169.254.95.100 169.254.95.100 276
169.254.95.100 255.255.255.255 169.254.95.100 169.254.95.100 276
169.254.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 169.254.95.100 169.254.95.100 276
224.0.0.0 240.0.0.0 10.3.3.174 10.3.3.174 286
224.0.0.0 240.0.0.0 10.2.252.239 10.2.252.239 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 169.254.95.100 169.254.95.100 276
255.255.255.255 255.255.255.255 10.3.3.174 10.3.3.174 286
255.255.255.255 255.255.255.255 10.2.252.239 10.2.252.239 286
Et j'ai également fait un test sur LoL ce soir, en bot débutant pendant les bugs... ça m'a déconnecter souvent. Et mes pings allait de 35 à 9078
@lgrisoni Es-tu sous Windows 8.1 ?
Avez-vous essayé depuis un autre réseau pour voir si ça marchait mieux ?
Sinon voila le journal, après le fait que j'ai pu jouer presque 10 min bizarrement.
FrozenWay version 1.6.5
----------------------------------
Server: premium-01-uk-02
Protocol: HTTP
----------------------------------
Sat Feb 15 10:26:10 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Sat Feb 15 10:26:10 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Sat Feb 15 10:26:10 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:26:10 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:26:10 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Feb 15 10:26:10 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53172
Sat Feb 15 10:26:10 2014 TCP connection established with [AF_INET]127.0.0.1:53172
Sat Feb 15 10:26:10 2014 TCPv4_CLIENT link local: [undef]
Sat Feb 15 10:26:10 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53172
Sat Feb 15 10:26:11 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53172, sid=bf570edc 6bf3bf2f
Sat Feb 15 10:26:11 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:26:11 2014 VERIFY OK: nsCertType=SERVER
Sat Feb 15 10:26:11 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:26:12 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:26:12 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:26:12 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:26:12 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:26:12 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Feb 15 10:26:12 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53172
Sat Feb 15 10:26:14 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Feb 15 10:26:14 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --socket-flags option modified
Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --ifconfig/up options modified
Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: route options modified
Sat Feb 15 10:26:14 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Feb 15 10:26:14 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Feb 15 10:26:14 2014 open_tun, tt->ipv6=0
Sat Feb 15 10:26:14 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
Sat Feb 15 10:26:14 2014 TAP-Windows Driver Version 9.9
Sat Feb 15 10:26:14 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
Sat Feb 15 10:26:14 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}
Sat Feb 15 10:26:19 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Sat Feb 15 10:26:19 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
Sat Feb 15 10:26:19 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Sat Feb 15 10:26:19 2014 Route addition via IPAPI succeeded [adaptive]
Sat Feb 15 10:26:19 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
Sat Feb 15 10:31:25 2014 [FrozenWay] Inactivity timeout (--ping-exit), exiting
Mode http (client) : L'hôte distant a fermé la connexion
Sat Feb 15 10:31:25 2014 C:\Windows\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.177
Sat Feb 15 10:31:25 2014 Route deletion via IPAPI succeeded [adaptive]
Sat Feb 15 10:31:25 2014 Closing TUN/TAP interface
Sat Feb 15 10:31:25 2014 SIGTERM[soft,ping-exit] received, process exiting
FrozenWay version 1.6.5
----------------------------------
Server: premium-01-uk-02
Protocol: HTTP
----------------------------------
Sat Feb 15 10:31:26 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Sat Feb 15 10:31:27 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Sat Feb 15 10:31:27 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:31:27 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:31:27 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Feb 15 10:31:27 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53319
Sat Feb 15 10:31:27 2014 TCP connection established with [AF_INET]127.0.0.1:53319
Sat Feb 15 10:31:27 2014 TCPv4_CLIENT link local: [undef]
Sat Feb 15 10:31:27 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53319
Sat Feb 15 10:31:27 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53319, sid=fe9c75e5 0da92a18
Sat Feb 15 10:31:28 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:31:28 2014 VERIFY OK: nsCertType=SERVER
Sat Feb 15 10:31:28 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:31:28 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:31:28 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:31:28 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:31:28 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:31:28 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Feb 15 10:31:28 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53319
Sat Feb 15 10:31:30 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Feb 15 10:31:30 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --socket-flags option modified
Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --ifconfig/up options modified
Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: route options modified
Sat Feb 15 10:31:30 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Feb 15 10:31:30 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Feb 15 10:31:30 2014 open_tun, tt->ipv6=0
Sat Feb 15 10:31:30 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
Sat Feb 15 10:31:30 2014 TAP-Windows Driver Version 9.9
Sat Feb 15 10:31:30 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
Sat Feb 15 10:31:30 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}
Sat Feb 15 10:31:35 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Sat Feb 15 10:31:35 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
Sat Feb 15 10:31:35 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Sat Feb 15 10:31:35 2014 Route addition via IPAPI succeeded [adaptive]
Sat Feb 15 10:31:35 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
Sat Feb 15 10:42:19 2014 [FrozenWay] Inactivity timeout (--ping-exit), exiting
Mode http (client) : L'hôte distant a fermé la connexion
Sat Feb 15 10:42:19 2014 C:\Windows\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.177
Sat Feb 15 10:42:19 2014 Route deletion via IPAPI succeeded [adaptive]
Sat Feb 15 10:42:19 2014 Closing TUN/TAP interface
Sat Feb 15 10:42:19 2014 SIGTERM[soft,ping-exit] received, process exiting
FrozenWay version 1.6.5
----------------------------------
Server: premium-01-uk-02
Protocol: HTTP
----------------------------------
Sat Feb 15 10:42:22 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Sat Feb 15 10:42:23 2014 Control Channel Authentication: using 'C:/Users/Matémillou/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Sat Feb 15 10:42:23 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:42:23 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:42:23 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Feb 15 10:42:23 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:53543
Sat Feb 15 10:42:23 2014 TCP connection established with [AF_INET]127.0.0.1:53543
Sat Feb 15 10:42:23 2014 TCPv4_CLIENT link local: [undef]
Sat Feb 15 10:42:23 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:53543
Sat Feb 15 10:42:23 2014 TLS: Initial packet from [AF_INET]127.0.0.1:53543, sid=b2e1c33e c37bc9d3
Sat Feb 15 10:42:23 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:42:23 2014 VERIFY OK: nsCertType=SERVER
Sat Feb 15 10:42:23 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Sat Feb 15 10:42:24 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:42:24 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:42:24 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 15 10:42:24 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 15 10:42:24 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Feb 15 10:42:24 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:53543
Sat Feb 15 10:42:26 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Sat Feb 15 10:42:26 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.6.0.1,dhcp-option WINS 10.6.0.1,route 10.6.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.6.1.178 10.6.1.177'
Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --socket-flags option modified
Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --ifconfig/up options modified
Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: route options modified
Sat Feb 15 10:42:26 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Feb 15 10:42:26 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Feb 15 10:42:26 2014 open_tun, tt->ipv6=0
Sat Feb 15 10:42:26 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}.tap
Sat Feb 15 10:42:26 2014 TAP-Windows Driver Version 9.9
Sat Feb 15 10:42:26 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.1.178/255.255.255.252 on interface {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F} [DHCP-serv: 10.6.1.177, lease-time: 31536000]
Sat Feb 15 10:42:26 2014 Successful ARP Flush on interface [22] {E101BC3B-9448-4F4A-B22D-4E5DEE031C8F}
Sat Feb 15 10:42:31 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Sat Feb 15 10:42:31 2014 C:\Windows\system32\route.exe ADD 10.6.0.1 MASK 255.255.255.255 10.6.1.177
Sat Feb 15 10:42:31 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Sat Feb 15 10:42:31 2014 Route addition via IPAPI succeeded [adaptive]
Sat Feb 15 10:42:31 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.118.1 192.168.118.87 9999
0.0.0.0 0.0.0.0 10.6.1.177 10.6.1.178 30
5.135.109.177 255.255.255.255 192.168.118.1 192.168.118.87 10
10.6.0.1 255.255.255.255 10.6.1.177 10.6.1.178 30
10.6.1.176 255.255.255.252 10.6.1.178 10.6.1.178 286
10.6.1.178 255.255.255.255 10.6.1.178 10.6.1.178 286
10.6.1.179 255.255.255.255 10.6.1.178 10.6.1.178 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
192.168.118.0 255.255.255.0 192.168.118.87 192.168.118.87 266
192.168.118.87 255.255.255.255 192.168.118.87 192.168.118.87 266
192.168.118.255 255.255.255.255 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 192.168.118.87 192.168.118.87 266
224.0.0.0 240.0.0.0 10.6.1.178 10.6.1.178 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 192.168.118.87 192.168.118.87 266
255.255.255.255 255.255.255.255 10.6.1.178 10.6.1.178 286
PS : Je suis au CROUS de Lyon
Arrivez-vous à télécharger des gros fichiers (plusieurs 10e de minute de téléchargement) depuis votre réseau sans coupure ?
@Dethane peux tu donner ton journal de connexion aussi stp.
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-01
Protocol: OpenVPN
----------------------------------
Mon Feb 17 17:48:47 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Feb 17 17:48:47 2014 Control Channel Authentication: using 'C:/Users/Benjamin/Desktop/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Feb 17 17:48:47 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 17:48:47 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 17:48:47 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Feb 17 17:48:47 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.60:443
Mon Feb 17 17:48:47 2014 TCP connection established with [AF_INET]88.190.203.60:443
Mon Feb 17 17:48:47 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 17:48:47 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.60:443
Mon Feb 17 17:48:47 2014 TLS: Initial packet from [AF_INET]88.190.203.60:443, sid=32a21973 71925b99
Mon Feb 17 17:48:47 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 17:48:47 2014 VERIFY OK: nsCertType=SERVER
Mon Feb 17 17:48:47 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 17:48:48 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 17:48:48 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 17:48:48 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 17:48:48 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 17:48:48 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Feb 17 17:48:48 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.60:443
Mon Feb 17 17:48:50 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Feb 17 17:48:50 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.10.162 10.1.10.161'
Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --socket-flags option modified
Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: route options modified
Mon Feb 17 17:48:50 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 17 17:48:50 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Feb 17 17:48:50 2014 open_tun, tt->ipv6=0
Mon Feb 17 17:48:50 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{9F720028-807E-4E11-A843-5586B35DE64F}.tap
Mon Feb 17 17:48:50 2014 TAP-Windows Driver Version 9.9
Mon Feb 17 17:48:50 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.10.162/255.255.255.252 on interface {9F720028-807E-4E11-A843-5586B35DE64F} [DHCP-serv: 10.1.10.161, lease-time: 31536000]
Mon Feb 17 17:48:50 2014 Successful ARP Flush on interface [21] {9F720028-807E-4E11-A843-5586B35DE64F}
Mon Feb 17 17:48:55 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Feb 17 17:48:55 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.10.161
Mon Feb 17 17:48:55 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Feb 17 17:48:55 2014 Route addition via IPAPI succeeded [adaptive]
Mon Feb 17 17:48:55 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.0.100.3 10.0.100.164 20
0.0.0.0 128.0.0.0 10.1.10.161 10.1.10.162 30
10.0.100.0 255.255.254.0 10.0.100.164 10.0.100.164 276
10.0.100.164 255.255.255.255 10.0.100.164 10.0.100.164 276
10.0.101.255 255.255.255.255 10.0.100.164 10.0.100.164 276
10.1.0.1 255.255.255.255 10.1.10.161 10.1.10.162 30
10.1.10.160 255.255.255.252 10.1.10.162 10.1.10.162 286
10.1.10.162 255.255.255.255 10.1.10.162 10.1.10.162 286
10.1.10.163 255.255.255.255 10.1.10.162 10.1.10.162 286
88.190.203.60 255.255.255.255 10.0.100.3 10.0.100.164 20
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
128.0.0.0 128.0.0.0 10.1.10.161 10.1.10.162 30
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 10.0.100.164 10.0.100.164 276
224.0.0.0 240.0.0.0 10.1.10.162 10.1.10.162 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 10.0.100.164 10.0.100.164 276
255.255.255.255 255.255.255.255 10.1.10.162 10.1.10.162 286
Mon Feb 17 18:02:49 2014 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
Mon Feb 17 18:02:49 2014 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Mon Feb 17 18:02:49 2014 Connection reset, restarting [-1]
Mon Feb 17 18:02:49 2014 SIGUSR1[soft,connection-reset] received, process restarting
Mon Feb 17 18:02:49 2014 Restart pause, 1 second(s)
Mon Feb 17 18:02:50 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Feb 17 18:02:51 2014 Attempting to establish TCP connection with [AF_INET]88.190.203.60:443
Mon Feb 17 18:02:51 2014 TCP connection established with [AF_INET]88.190.203.60:443
Mon Feb 17 18:02:51 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 18:02:51 2014 TCPv4_CLIENT link remote: [AF_INET]88.190.203.60:443
Mon Feb 17 18:02:51 2014 TLS: Initial packet from [AF_INET]88.190.203.60:443, sid=2d66a2f1 d3d26058
Mon Feb 17 18:02:51 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 18:02:51 2014 VERIFY OK: nsCertType=SERVER
Mon Feb 17 18:02:51 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 18:02:51 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 18:02:51 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 18:02:51 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 18:02:51 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 18:02:51 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Feb 17 18:02:51 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]88.190.203.60:443
Mon Feb 17 18:02:53 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Feb 17 18:02:53 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.10.162 10.1.10.161'
Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --socket-flags option modified
Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: route options modified
Mon Feb 17 18:02:53 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 17 18:02:53 2014 Preserving previous TUN/TAP instance: FrozenWay
Mon Feb 17 18:02:53 2014 Initialization Sequence Completed
Oui j'ai téléchargé un fichier de 2go via mega hier sans soucis. Cette coupure je la ressens seulement quand je joue vu que ça me déco . Et j'ai pas testé d'autres modes pour l'instant, je suis en openvpn, j'essaierai. C'est bizarre pourtant ça fonctionnait très bien avant, et ça me fait ça que depuis peu de temps.. Peut-être ont-ils renforcé le filtrage des proxy ?
Pour les gros téléchargements, je suis obligé de relancer en permanence sinon ils se bloquent à 0 o/s.
FrozenWay version 1.6.5
----------------------------------
Server: premium-03-fr-02
Protocol: OpenVPN
----------------------------------
Mon Feb 17 21:28:05 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Feb 17 21:28:06 2014 Control Channel Authentication: using 'C:/Users/anthony/Downloads/FrozenWay 1.6.5/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Feb 17 21:28:06 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:28:06 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:28:06 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Feb 17 21:28:06 2014 Attempting to establish TCP connection with [AF_INET]176.31.61.21:443
Mon Feb 17 21:28:06 2014 TCP connection established with [AF_INET]176.31.61.21:443
Mon Feb 17 21:28:06 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 21:28:06 2014 TCPv4_CLIENT link remote: [AF_INET]176.31.61.21:443
Mon Feb 17 21:28:06 2014 TLS: Initial packet from [AF_INET]176.31.61.21:443, sid=0c3d74d2 4582714b
Mon Feb 17 21:28:06 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:28:06 2014 VERIFY OK: nsCertType=SERVER
Mon Feb 17 21:28:06 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:28:06 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:28:06 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:28:06 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:28:06 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:28:06 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Feb 17 21:28:06 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]176.31.61.21:443
Mon Feb 17 21:28:08 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Feb 17 21:28:08 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.2.0.1,dhcp-option WINS 10.2.0.1,route 10.2.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.2.4.178 10.2.4.177'
Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --socket-flags option modified
Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: route options modified
Mon Feb 17 21:28:08 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 17 21:28:08 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Feb 17 21:28:08 2014 open_tun, tt->ipv6=0
Mon Feb 17 21:28:08 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{EF7B8000-2ABC-46C9-998A-E428ABE2AD6A}.tap
Mon Feb 17 21:28:08 2014 TAP-Windows Driver Version 9.9
Mon Feb 17 21:28:08 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.2.4.178/255.255.255.252 on interface {EF7B8000-2ABC-46C9-998A-E428ABE2AD6A} [DHCP-serv: 10.2.4.177, lease-time: 31536000]
Mon Feb 17 21:28:08 2014 Successful ARP Flush on interface [23] {EF7B8000-2ABC-46C9-998A-E428ABE2AD6A}
Mon Feb 17 21:28:14 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Feb 17 21:28:14 2014 C:\Windows\system32\route.exe ADD 10.2.0.1 MASK 255.255.255.255 10.2.4.177
Mon Feb 17 21:28:14 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Feb 17 21:28:14 2014 Route addition via IPAPI succeeded [adaptive]
Mon Feb 17 21:28:14 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 10.0.100.3 10.0.100.113 9999
0.0.0.0 0.0.0.0 10.2.4.177 10.2.4.178 30
10.0.100.0 255.255.254.0 10.0.100.113 10.0.100.113 276
10.0.100.113 255.255.255.255 10.0.100.113 10.0.100.113 276
10.0.101.255 255.255.255.255 10.0.100.113 10.0.100.113 276
10.2.0.1 255.255.255.255 10.2.4.177 10.2.4.178 30
10.2.4.176 255.255.255.252 10.2.4.178 10.2.4.178 286
10.2.4.178 255.255.255.255 10.2.4.178 10.2.4.178 286
10.2.4.179 255.255.255.255 10.2.4.178 10.2.4.178 286
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
176.31.61.21 255.255.255.255 10.0.100.3 10.0.100.113 20
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 10.2.4.178 10.2.4.178 286
224.0.0.0 240.0.0.0 10.0.100.113 10.0.100.113 276
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 10.2.4.178 10.2.4.178 286
255.255.255.255 255.255.255.255 10.0.100.113 10.0.100.113 276
Mon Feb 17 21:28:38 2014 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
Mon Feb 17 21:28:38 2014 Connection reset, restarting [-1]
Mon Feb 17 21:28:38 2014 C:\Windows\system32\route.exe DELETE 10.2.0.1 MASK 255.255.255.255 10.2.4.177
Mon Feb 17 21:28:38 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Feb 17 21:28:38 2014 Closing TUN/TAP interface
Mon Feb 17 21:28:38 2014 SIGTERM[soft,connection-reset] received, process exiting
Déconnexion toutes les 2-5 min mais j'ai remarqué, uniquement le soir à partir de 20h jusqu'a 23h minuit. Si je me connecte le matin je peux rester connecté toute la journée presque sans déconnexions.
Voici mon journal, en ayant décocher la case "Augmenter la métrique de la passerelle par défaut."
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-01
Protocol: HTTPS
----------------------------------
Mon Feb 17 21:53:27 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Feb 17 21:53:28 2014 Control Channel Authentication: using 'C:/Users/QuentinGiraud/Documents/Quentin/Divers/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Feb 17 21:53:28 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:53:28 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:53:28 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Feb 17 21:53:28 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55652
Mon Feb 17 21:53:28 2014 TCP connection established with [AF_INET]127.0.0.1:55652
Mon Feb 17 21:53:28 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 21:53:28 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55652
Mon Feb 17 21:53:31 2014 TLS: Initial packet from [AF_INET]127.0.0.1:55652, sid=d3b5901a 758e71a5
Mon Feb 17 21:53:32 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:53:32 2014 VERIFY OK: nsCertType=SERVER
Mon Feb 17 21:53:32 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:53:33 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:53:33 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:53:33 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:53:33 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:53:33 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Feb 17 21:53:33 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:55652
Mon Feb 17 21:53:35 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Feb 17 21:53:35 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.7.30 10.1.7.29'
Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --socket-flags option modified
Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: route options modified
Mon Feb 17 21:53:35 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 17 21:53:35 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Feb 17 21:53:35 2014 open_tun, tt->ipv6=0
Mon Feb 17 21:53:35 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{56762CFF-C5A5-4A0C-932B-A675D744776C}.tap
Mon Feb 17 21:53:35 2014 TAP-Windows Driver Version 9.9
Mon Feb 17 21:53:35 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.7.30/255.255.255.252 on interface {56762CFF-C5A5-4A0C-932B-A675D744776C} [DHCP-serv: 10.1.7.29, lease-time: 31536000]
Mon Feb 17 21:53:35 2014 Successful ARP Flush on interface [24] {56762CFF-C5A5-4A0C-932B-A675D744776C}
Mon Feb 17 21:53:40 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Feb 17 21:53:40 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.7.29
Mon Feb 17 21:53:40 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Feb 17 21:53:40 2014 Route addition via IPAPI succeeded [adaptive]
Mon Feb 17 21:53:40 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.250.2 192.168.251.92 30
0.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
10.1.0.1 255.255.255.255 10.1.7.29 10.1.7.30 30
10.1.7.28 255.255.255.252 10.1.7.30 10.1.7.30 286
10.1.7.30 255.255.255.255 10.1.7.30 10.1.7.30 286
10.1.7.31 255.255.255.255 10.1.7.30 10.1.7.30 286
88.190.203.60 255.255.255.255 192.168.250.2 192.168.251.92 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
128.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
192.168.250.0 255.255.254.0 192.168.251.92 192.168.251.92 281
192.168.251.92 255.255.255.255 192.168.251.92 192.168.251.92 281
192.168.251.255 255.255.255.255 192.168.251.92 192.168.251.92 281
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 192.168.251.92 192.168.251.92 281
224.0.0.0 240.0.0.0 10.1.7.30 10.1.7.30 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 192.168.251.92 192.168.251.92 281
255.255.255.255 255.255.255.255 10.1.7.30 10.1.7.30 286
Mode https (tunnel) : L'hôte distant a fermé la connexion
Mon Feb 17 21:54:16 2014 Connection reset, restarting [0]
Mon Feb 17 21:54:16 2014 SIGUSR1[soft,connection-reset] received, process restarting
Mon Feb 17 21:54:16 2014 Restart pause, 1 second(s)
Mon Feb 17 21:54:17 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Feb 17 21:54:17 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55652
Mon Feb 17 21:54:17 2014 TCP connection established with [AF_INET]127.0.0.1:55652
Mon Feb 17 21:54:17 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 21:54:17 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55652
Mode https (client) : L'hôte distant a fermé la connexion
Mon Feb 17 21:54:47 2014 [UNDEF] Inactivity timeout (--ping-exit), exiting
Mon Feb 17 21:54:47 2014 C:\Windows\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.7.29
Mon Feb 17 21:54:47 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Feb 17 21:54:47 2014 Closing TUN/TAP interface
Mon Feb 17 21:54:47 2014 SIGTERM[soft,ping-exit] received, process exiting
FrozenWay version 1.6.5
----------------------------------
Server: premium-04-fr-01
Protocol: HTTPS
----------------------------------
Mon Feb 17 21:54:57 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Mon Feb 17 21:54:58 2014 Control Channel Authentication: using 'C:/Users/QuentinGiraud/Documents/Quentin/Divers/FrozenWay 1.6.5/etc/keys/auth.key' as a OpenVPN static key file
Mon Feb 17 21:54:58 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:54:58 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:54:58 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Feb 17 21:54:58 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55744
Mon Feb 17 21:54:58 2014 TCP connection established with [AF_INET]127.0.0.1:55744
Mon Feb 17 21:54:58 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 21:54:58 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55744
Mon Feb 17 21:54:58 2014 TLS: Initial packet from [AF_INET]127.0.0.1:55744, sid=cd78f517 ed758996
Mon Feb 17 21:54:59 2014 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:54:59 2014 VERIFY OK: nsCertType=SERVER
Mon Feb 17 21:54:59 2014 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
Mon Feb 17 21:55:00 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:55:00 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:55:00 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Feb 17 21:55:00 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Feb 17 21:55:00 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Feb 17 21:55:00 2014 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:55744
Mon Feb 17 21:55:02 2014 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
Mon Feb 17 21:55:02 2014 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.1.0.1,dhcp-option WINS 10.1.0.1,route 10.1.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.1.7.30 10.1.7.29'
Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --socket-flags option modified
Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: route options modified
Mon Feb 17 21:55:02 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 17 21:55:02 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Feb 17 21:55:02 2014 open_tun, tt->ipv6=0
Mon Feb 17 21:55:02 2014 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{56762CFF-C5A5-4A0C-932B-A675D744776C}.tap
Mon Feb 17 21:55:02 2014 TAP-Windows Driver Version 9.9
Mon Feb 17 21:55:02 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.7.30/255.255.255.252 on interface {56762CFF-C5A5-4A0C-932B-A675D744776C} [DHCP-serv: 10.1.7.29, lease-time: 31536000]
Mon Feb 17 21:55:02 2014 Successful ARP Flush on interface [24] {56762CFF-C5A5-4A0C-932B-A675D744776C}
Mon Feb 17 21:55:07 2014 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Mon Feb 17 21:55:07 2014 C:\Windows\system32\route.exe ADD 10.1.0.1 MASK 255.255.255.255 10.1.7.29
Mon Feb 17 21:55:07 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Feb 17 21:55:07 2014 Route addition via IPAPI succeeded [adaptive]
Mon Feb 17 21:55:07 2014 Initialization Sequence Completed
IPv4 routing table :
0.0.0.0 0.0.0.0 192.168.250.2 192.168.251.92 30
0.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
10.1.0.1 255.255.255.255 10.1.7.29 10.1.7.30 30
10.1.7.28 255.255.255.252 10.1.7.30 10.1.7.30 286
10.1.7.30 255.255.255.255 10.1.7.30 10.1.7.30 286
10.1.7.31 255.255.255.255 10.1.7.30 10.1.7.30 286
88.190.203.60 255.255.255.255 192.168.250.2 192.168.251.92 25
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
128.0.0.0 128.0.0.0 10.1.7.29 10.1.7.30 30
192.168.250.0 255.255.254.0 192.168.251.92 192.168.251.92 281
192.168.251.92 255.255.255.255 192.168.251.92 192.168.251.92 281
192.168.251.255 255.255.255.255 192.168.251.92 192.168.251.92 281
224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
224.0.0.0 240.0.0.0 192.168.251.92 192.168.251.92 281
224.0.0.0 240.0.0.0 10.1.7.30 10.1.7.30 286
255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
255.255.255.255 255.255.255.255 192.168.251.92 192.168.251.92 281
255.255.255.255 255.255.255.255 10.1.7.30 10.1.7.30 286
Mode https (tunnel) : L'hôte distant a fermé la connexion
Mon Feb 17 21:57:36 2014 Connection reset, restarting [0]
Mon Feb 17 21:57:36 2014 SIGUSR1[soft,connection-reset] received, process restarting
Mon Feb 17 21:57:36 2014 Restart pause, 1 second(s)
Mon Feb 17 21:57:37 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Feb 17 21:57:37 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:55744
Mon Feb 17 21:57:37 2014 TCP connection established with [AF_INET]127.0.0.1:55744
Mon Feb 17 21:57:37 2014 TCPv4_CLIENT link local: [undef]
Mon Feb 17 21:57:37 2014 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:55744
Mon Feb 17 21:58:01 2014 C:\Windows\system32\route.exe DELETE 10.1.0.1 MASK 255.255.255.255 10.1.7.29
Mon Feb 17 21:58:01 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Feb 17 21:58:01 2014 Closing TUN/TAP interface
Mon Feb 17 21:58:01 2014 SIGTERM[hard,] received, process exiting
Pour les autres : Vous avez des RST de connexion, sont la cause probable est la saturation du réseau, il faut attendre que les admins réseau fassent quelque chose... Ça peut aussi venir d'un pourcentage de loss (perte de paquet) trop importante dû à une mauvaise connexion Wifi ou un port switch défaillant.