[Solved] Frozenway Error

novembre 2015 modifié dans Support technique
It says 'unable to find a server automatically with the selected protocol' even though I have specifically clicked on a server, any ideas on how to fix this?

Réponses

  • Hi,

    Try to choose a server manually, by clicking the little arrow on the left of a flag, then choose a server like public-01-fr-01. And give me the connection logs with the protocols OpenVPN, https and http please.
  • Ooooh okay, I didn't click the arrow after chosing a country, I thought that was it. The connection logs are as follows:

    OpenVPN:
    FrozenWay version 1.6.6
    ----------------------------------
    Server: public-01-fr-01
    Proxy: 192.168.145.1:8080
    Protocol: OpenVPN
    ----------------------------------
    Thu Nov 05 20:29:40 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
    Thu Nov 05 20:29:40 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

    Thu Nov 05 20:29:41 2015 Control Channel Authentication: using 'C:/Users/Dave/Desktop/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
    Thu Nov 05 20:29:41 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:29:41 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:29:41 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Thu Nov 05 20:29:41 2015 Attempting to establish TCP connection with [AF_INET]192.168.145.1:8080 [nonblock]

    Thu Nov 05 20:29:42 2015 TCP connection established with [AF_INET]192.168.145.1:8080
    Thu Nov 05 20:29:42 2015 Send to HTTP proxy: 'CONNECT 51.254.57.137:443 HTTP/1.0'
    Thu Nov 05 20:29:42 2015 HTTP proxy returned: 'HTTP/1.1 407 Proxy Authentication Required'
    Thu Nov 05 20:29:42 2015 Proxy requires authentication
    Thu Nov 05 20:29:42 2015 PROXY AUTH HTLM: 'Proxy-Authenticate: NTLM'
    Thu Nov 05 20:29:42 2015 Attempting to establish TCP connection with [AF_INET]192.168.145.1:8080 [nonblock]

    Thu Nov 05 20:29:43 2015 TCP connection established with [AF_INET]192.168.145.1:8080

    Thu Nov 05 20:29:43 2015 Send to HTTP proxy: 'CONNECT 51.254.57.137:443 HTTP/1.0'
    Thu Nov 05 20:29:43 2015 Attempting NTLM Proxy-Authorization phase 1
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'HTTP/1.1 407 Proxy Authentication Required'
    Thu Nov 05 20:29:43 2015 Proxy requires authentication
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Server: squid'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Mime-Version: 1.0'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Date: Thu, 05 Nov 2015 20:29:38 GMT'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Content-Type: text/html'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Content-Length: 1935'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'X-Squid-Error: ERR_BLOXX_ACCESS_DENIED 0'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Vary: Accept-Language'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Content-Language: en'
    Thu Nov 05 20:29:43 2015 HTTP proxy returned: 'Proxy-Authenticate: NTLM TlRMTVNTUAACAAAAAAAAADAAAAACAgAAGnPEG/RYWfMAAAAAAAAAAAAAAAAwAAAA'
    Thu Nov 05 20:29:43 2015 auth string: 'TlRMTVNTUAACAAAAAAAAADAAAAACAgAAGnPEG/RYWfMAAAAAAAAAAAAAAAAwAAAA'
    Thu Nov 05 20:29:43 2015 Received NTLM Proxy-Authorization phase 2 response

    Thu Nov 05 20:29:45 2015 recv_line: TCP port read timeout expired
    Thu Nov 05 20:29:45 2015 Send to HTTP proxy: 'CONNECT 51.254.57.137:443 HTTP/1.0'
    Thu Nov 05 20:29:45 2015 Send to HTTP proxy: 'Host: 51.254.57.137'
    Thu Nov 05 20:29:45 2015 Attempting NTLM Proxy-Authorization phase 3
    Thu Nov 05 20:29:45 2015 Send to HTTP proxy: 'Proxy-Authorization: NTLM TlRMTVNTUAADAAAAAAAAAGUAAAAYABgAQAAAAAAAAABlAAAADQANAFgAAAAAAAAAZQAAAAAAAABlAAAAAgIAAMRoT1xk6j5pHZvfk6oYFfGN/HZ2pihNhXNoYWZpcm92aWNoZGo='
    Thu Nov 05 20:29:45 2015 HTTP proxy returned: 'HTTP/1.1 200 Connection established'

    Thu Nov 05 20:29:47 2015 TCPv4_CLIENT link local: [undef]
    Thu Nov 05 20:29:47 2015 TCPv4_CLIENT link remote: [AF_INET]192.168.145.1:8080
    Thu Nov 05 20:29:47 2015 TLS: Initial packet from [AF_INET]192.168.145.1:8080, sid=0d20889a e91277db

    Thu Nov 05 20:29:48 2015 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Thu Nov 05 20:29:48 2015 VERIFY OK: nsCertType=SERVER
    Thu Nov 05 20:29:48 2015 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Thu Nov 05 20:29:48 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Nov 05 20:29:48 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:29:48 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Nov 05 20:29:48 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:29:48 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Thu Nov 05 20:29:48 2015 [FrozenWay] Peer Connection Initiated with [AF_INET]192.168.145.1:8080

    Thu Nov 05 20:29:50 2015 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Thu Nov 05 20:29:50 2015 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.13.0.1,dhcp-option WINS 10.13.0.1,route 10.13.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.13.25.234 10.13.25.233'
    Thu Nov 05 20:29:50 2015 OPTIONS IMPORT: --socket-flags option modified
    Thu Nov 05 20:29:50 2015 OPTIONS IMPORT: --ifconfig/up options modified
    Thu Nov 05 20:29:50 2015 OPTIONS IMPORT: route options modified
    Thu Nov 05 20:29:50 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Thu Nov 05 20:29:50 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Thu Nov 05 20:29:50 2015 open_tun, tt->ipv6=0
    Thu Nov 05 20:29:50 2015 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A488837D-D2CB-40B7-812C-76D966D28715}.tap
    Thu Nov 05 20:29:50 2015 TAP-Windows Driver Version 9.21
    Thu Nov 05 20:29:50 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.13.25.234/255.255.255.252 on interface {A488837D-D2CB-40B7-812C-76D966D28715} [DHCP-serv: 10.13.25.233, lease-time: 31536000]

    Thu Nov 05 20:29:50 2015 Successful ARP Flush on interface [16] {A488837D-D2CB-40B7-812C-76D966D28715}

    Thu Nov 05 20:29:55 2015 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Thu Nov 05 20:29:55 2015 C:\WINDOWS\system32\route.exe ADD 10.13.0.1 MASK 255.255.255.255 10.13.25.233
    Thu Nov 05 20:29:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Thu Nov 05 20:29:55 2015 Route addition via IPAPI succeeded [adaptive]
    Thu Nov 05 20:29:55 2015 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.23.254 192.168.22.132 10
    0.0.0.0 128.0.0.0 10.13.25.233 10.13.25.234 20
    10.13.0.1 255.255.255.255 10.13.25.233 10.13.25.234 20
    10.13.25.232 255.255.255.252 10.13.25.234 10.13.25.234 276
    10.13.25.234 255.255.255.255 10.13.25.234 10.13.25.234 276
    10.13.25.235 255.255.255.255 10.13.25.234 10.13.25.234 276
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    128.0.0.0 128.0.0.0 10.13.25.233 10.13.25.234 20
    192.168.22.0 255.255.254.0 192.168.22.132 192.168.22.132 266
    192.168.22.132 255.255.255.255 192.168.22.132 192.168.22.132 266
    192.168.23.255 255.255.255.255 192.168.22.132 192.168.22.132 266
    192.168.145.1 255.255.255.255 192.168.23.254 192.168.22.132 10
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.22.132 192.168.22.132 266
    224.0.0.0 240.0.0.0 10.13.25.234 10.13.25.234 276
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.22.132 192.168.22.132 266
    255.255.255.255 255.255.255.255 10.13.25.234 10.13.25.234 276

  • Https:

    FrozenWay version 1.6.6
    ----------------------------------
    Server: public-01-fr-01
    Proxy: 192.168.145.2:8080
    Protocol: HTTPS
    ----------------------------------
    Thu Nov 05 20:30:41 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 27 2015
    Thu Nov 05 20:30:41 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08

    Thu Nov 05 20:30:42 2015 Control Channel Authentication: using 'C:/Users/Dave/Desktop/FrozenWay 1.6.6/etc/keys/auth.key' as a OpenVPN static key file
    Thu Nov 05 20:30:42 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:30:42 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:30:42 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Thu Nov 05 20:30:42 2015 Attempting to establish TCP connection with [AF_INET]127.0.0.1:65408 [nonblock]
    Thu Nov 05 20:30:42 2015 TCP connection established with [AF_INET]127.0.0.1:65408
    Thu Nov 05 20:30:42 2015 TCPv4_CLIENT link local: [undef]
    Thu Nov 05 20:30:42 2015 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:65408

    Thu Nov 05 20:30:42 2015 TLS: Initial packet from [AF_INET]127.0.0.1:65408, sid=e7cd2732 7d90ca5c
    Thu Nov 05 20:30:42 2015 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
    Thu Nov 05 20:30:42 2015 VERIFY OK: nsCertType=SERVER
    Thu Nov 05 20:30:42 2015 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com

    Thu Nov 05 20:30:42 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Nov 05 20:30:42 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:30:42 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Nov 05 20:30:42 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Nov 05 20:30:42 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Thu Nov 05 20:30:42 2015 [FrozenWay] Peer Connection Initiated with [AF_INET]127.0.0.1:65408

    Thu Nov 05 20:30:44 2015 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
    Thu Nov 05 20:30:44 2015 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.13.0.1,dhcp-option WINS 10.13.0.1,route 10.13.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.13.25.234 10.13.25.233'
    Thu Nov 05 20:30:44 2015 OPTIONS IMPORT: --socket-flags option modified
    Thu Nov 05 20:30:44 2015 OPTIONS IMPORT: --ifconfig/up options modified
    Thu Nov 05 20:30:44 2015 OPTIONS IMPORT: route options modified
    Thu Nov 05 20:30:44 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Thu Nov 05 20:30:44 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    Thu Nov 05 20:30:44 2015 open_tun, tt->ipv6=0
    Thu Nov 05 20:30:44 2015 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{A488837D-D2CB-40B7-812C-76D966D28715}.tap
    Thu Nov 05 20:30:44 2015 TAP-Windows Driver Version 9.21
    Thu Nov 05 20:30:44 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.13.25.234/255.255.255.252 on interface {A488837D-D2CB-40B7-812C-76D966D28715} [DHCP-serv: 10.13.25.233, lease-time: 31536000]
    Thu Nov 05 20:30:44 2015 Successful ARP Flush on interface [16] {A488837D-D2CB-40B7-812C-76D966D28715}

    Thu Nov 05 20:30:49 2015 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
    Thu Nov 05 20:30:49 2015 C:\WINDOWS\system32\route.exe ADD 10.13.0.1 MASK 255.255.255.255 10.13.25.233
    Thu Nov 05 20:30:49 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    Thu Nov 05 20:30:49 2015 Route addition via IPAPI succeeded [adaptive]
    Thu Nov 05 20:30:49 2015 Initialization Sequence Completed

    IPv4 routing table :
    0.0.0.0 0.0.0.0 192.168.23.254 192.168.22.132 10
    0.0.0.0 128.0.0.0 10.13.25.233 10.13.25.234 20
    10.13.0.1 255.255.255.255 10.13.25.233 10.13.25.234 20
    10.13.25.232 255.255.255.252 10.13.25.234 10.13.25.234 276
    10.13.25.234 255.255.255.255 10.13.25.234 10.13.25.234 276
    10.13.25.235 255.255.255.255 10.13.25.234 10.13.25.234 276
    127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 306
    127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 306
    127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    128.0.0.0 128.0.0.0 10.13.25.233 10.13.25.234 20
    192.168.22.0 255.255.254.0 192.168.22.132 192.168.22.132 266
    192.168.22.132 255.255.255.255 192.168.22.132 192.168.22.132 266
    192.168.23.255 255.255.255.255 192.168.22.132 192.168.22.132 266
    192.168.145.2 255.255.255.255 192.168.23.254 192.168.22.132 10
    224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 306
    224.0.0.0 240.0.0.0 192.168.22.132 192.168.22.132 266
    224.0.0.0 240.0.0.0 10.13.25.234 10.13.25.234 276
    255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 306
    255.255.255.255 255.255.255.255 192.168.22.132 192.168.22.132 266
    255.255.255.255 255.255.255.255 10.13.25.234 10.13.25.234 276

    Http: "Unable to connect to server. Please try another server or another Protocol'.

    Not having the automatic server connection isn't a big issue, but just a little bug I hope you guys can address to improve the service, thanks so much for all this, I might actually get a £4 plan!
  • Yeah that's because our latency checking system doesn't support the NTLM proxy authentication yet. It will be the case in a further update Thanks for your feedback !
Cette discussion a été fermée.