Forum d'entraide de la communauté Freedom-IP VPN
Vous n'êtes pas identifié(e).
Pages : 1
Discussion fermée
Thu May 23 19:55:22 2013 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Thu May 23 19:55:22 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu May 23 19:55:23 2013 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Thu May 23 19:55:23 2013 LZO compression initialized
Thu May 23 19:55:23 2013 Attempting to establish TCP connection with 87.98.243.112:443
Thu May 23 19:55:23 2013 TCP connection established with 87.98.243.112:443
Thu May 23 19:55:23 2013 TCPv4_CLIENT link local: [undef]
Thu May 23 19:55:23 2013 TCPv4_CLIENT link remote: 87.98.243.112:443
Thu May 23 19:55:23 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu May 23 19:55:24 2013 [server] Peer Connection Initiated with 87.98.243.112:443
Thu May 23 19:55:27 2013 TAP-WIN32 device [Connexion au réseau local 2] opened: \\.\Global\{D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB}.tap
Thu May 23 19:55:27 2013 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.1.174/255.255.255.252 on interface {D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB} [DHCP-serv: 10.8.1.173, lease-time: 31536000]
Thu May 23 19:55:27 2013 Successful ARP Flush on interface [18] {D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB}
OK!
OK!
OK!
OK!
Thu May 23 19:55:30 2013 Initialization Sequence Completed
OK!
OK!
OK!
OK!
Thu May 23 20:35:09 2013 SIGTERM[hard,] received, process exiting
Hors ligne
Bonsoir ...
Avez-vous supprimé des lignes dans vos log car on y voit une seule connexion à 19h55 et une déconnexion forcé par l'utilisateur à 20h35. Aucune trace de déconnexion intermédiaire !?
Si vous pouviez mettre le fichier de configuration DE, pour savoir s'il a été modifié (ajout de persist-tun par exemple). Aussi augmenter la verbosité des logs en mettant verb à 3 SVP.
Cordialement, David.
Hors ligne
Hors ligne
Bonjour
@terti57
Mon fichier DE.ovpn tel qu'il figure dans mon repertoire C:\Program Files\OpenVPN\config\
voici le mien
client
port 443
proto tcp
dev tun
remote r3.freedom-ip.com
resolv-retry infinite
ca ca.crt
tls-auth ta.key 1
auth-user-pass pass.txt
cipher AES-256-CBC
comp-lzo
verb 1
route-method exe
route-delay 2
nobind
ns-cert-type server
Pourquoi tu as auth-user-pass fip.txt
c'est pas bon il faut auth-user-pass pass.txt
il est surement la ton PB
Hors ligne
Bonjour ...
Si tetris57 a nommé son fichier contenant l'identifiant et le mot de passe "fip" (de type texte ou "fip.txt" avec les extensions d'affichées) son écriture est correcte.
J'attends vos derniers logs avec une verbosité plus élevée pour voir ce qu'il se passe.
Cordialement, David.
Hors ligne
Bonjour
@David
j'ai fait un essai j'ai renommé
auth-user-pass fip.txt
pour la connection login et mp automatique ça ne fonctionne pas (en tout cas chez moi)
voir le log
Options error: --auth-user-pass fails with 'fip.txt': No such file or directory
Options error: Please correct these errors.
Use --help for more information.
je remet
auth-user-pass pass.txt
et la c'est OK
Dernière modification par maldini (2013-05-24 16:10:49)
Hors ligne
Re ...
Normal, vu que pour vous le fichier contenant l'identifiant et le mot de passe est "pass" (de type texte ou "pass.txt" avec les extensions d'affichées).
Si vous renommé votre fichier "pass" (pass.txt) en "fip" (fip.txt) et que vous modifiez dans le fichier de configuration "auth-user-pass pass.txt" en "auth-user-pass fip.txt" cela fonctionnera. Il faut que le contenu de votre répertoire (les noms de fichiers) et ceux contenu dans le(s) fichier(s) de configuration soient cohérents.
Et vous constatez que l'erreur rencontrée par tetris57 n'a rien à voir avec celle que vous avez rencontré en "mal nommant" votre fichier
Cordialement, David.
Hors ligne
Thu May 23 23:23:06 2013 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Thu May 23 23:23:06 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu May 23 23:23:07 2013 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Thu May 23 23:23:07 2013 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu May 23 23:23:07 2013 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu May 23 23:23:07 2013 LZO compression initialized
Thu May 23 23:23:07 2013 Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu May 23 23:23:07 2013 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu May 23 23:23:07 2013 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
Thu May 23 23:23:07 2013 Local Options hash (VER=V4): '2f2c6498'
Thu May 23 23:23:07 2013 Expected Remote Options hash (VER=V4): '9915e4a2'
Thu May 23 23:23:07 2013 Attempting to establish TCP connection with 87.98.243.112:443
Thu May 23 23:23:07 2013 TCP connection established with 87.98.243.112:443
Thu May 23 23:23:07 2013 TCPv4_CLIENT link local: [undef]
Thu May 23 23:23:07 2013 TCPv4_CLIENT link remote: 87.98.243.112:443
Thu May 23 23:23:07 2013 TLS: Initial packet from 87.98.243.112:443, sid=5251db51 469e3e32
Thu May 23 23:23:07 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu May 23 23:23:08 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Thu May 23 23:23:08 2013 VERIFY OK: nsCertType=SERVER
Thu May 23 23:23:08 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Thu May 23 23:23:09 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu May 23 23:23:09 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu May 23 23:23:09 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu May 23 23:23:09 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu May 23 23:23:09 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu May 23 23:23:09 2013 [server] Peer Connection Initiated with 87.98.243.112:443
Thu May 23 23:23:11 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu May 23 23:23:11 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.1.174 10.8.1.173'
Thu May 23 23:23:11 2013 OPTIONS IMPORT: timers and/or timeouts modified
Thu May 23 23:23:11 2013 OPTIONS IMPORT: --ifconfig/up options modified
Thu May 23 23:23:11 2013 OPTIONS IMPORT: route options modified
Thu May 23 23:23:11 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu May 23 23:23:11 2013 ROUTE default_gateway=192.168.0.254
Thu May 23 23:23:11 2013 TAP-WIN32 device [Connexion au réseau local 2] opened: \\.\Global\{D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB}.tap
Thu May 23 23:23:11 2013 TAP-Win32 Driver Version 9.9
Thu May 23 23:23:11 2013 TAP-Win32 MTU=1500
Thu May 23 23:23:11 2013 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.1.174/255.255.255.252 on interface {D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB} [DHCP-serv: 10.8.1.173, lease-time: 31536000]
Thu May 23 23:23:11 2013 Successful ARP Flush on interface [18] {D7C3AF9D-A6C4-4A0C-85CC-04AA386732EB}
Thu May 23 23:23:13 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Thu May 23 23:23:13 2013 C:\WINDOWS\system32\route.exe ADD 87.98.243.112 MASK 255.255.255.255 192.168.0.254
OK!
Thu May 23 23:23:13 2013 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.1.173
OK!
Thu May 23 23:23:13 2013 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.1.173
OK!
Thu May 23 23:23:14 2013 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.1.173
OK!
Thu May 23 23:23:14 2013 Initialization Sequence Completed
Fri May 24 00:23:08 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 00:23:08 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 00:23:08 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 00:23:09 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 00:23:09 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 00:23:09 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 00:23:09 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 00:23:09 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 01:23:08 2013 TLS: tls_process: killed expiring key
Fri May 24 01:23:09 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 01:23:09 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 01:23:09 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 01:23:10 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 01:23:10 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 01:23:10 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 01:23:10 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 01:23:10 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 02:23:08 2013 TLS: tls_process: killed expiring key
Fri May 24 02:23:10 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 02:23:10 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 02:23:10 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 02:23:11 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 02:23:11 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 02:23:11 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 02:23:11 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 02:23:11 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 03:23:09 2013 TLS: tls_process: killed expiring key
Fri May 24 03:23:11 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 03:23:11 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 03:23:11 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 03:23:12 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 03:23:12 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 03:23:12 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 03:23:12 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 03:23:12 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 04:23:10 2013 TLS: tls_process: killed expiring key
Fri May 24 04:23:12 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 04:23:12 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 04:23:12 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 04:23:13 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 04:23:13 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 04:23:13 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 04:23:13 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 04:23:13 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 05:23:11 2013 TLS: tls_process: killed expiring key
Fri May 24 05:23:12 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 05:23:12 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 05:23:12 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 05:23:13 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 05:23:13 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 05:23:13 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 05:23:13 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 05:23:13 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 06:23:11 2013 TLS: tls_process: killed expiring key
Fri May 24 06:23:13 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 06:23:13 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 06:23:13 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 06:23:13 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 06:23:13 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 06:23:13 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 06:23:13 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 06:23:13 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 07:23:12 2013 TLS: tls_process: killed expiring key
Fri May 24 07:23:13 2013 TLS: soft reset sec=0 bytes=1131137862/0 pkts=1293481/0
Fri May 24 07:23:13 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 07:23:13 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 07:23:13 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 07:23:14 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 07:23:14 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 07:23:14 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 07:23:14 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 07:23:14 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 08:23:13 2013 TLS: tls_process: killed expiring key
Fri May 24 08:23:13 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 08:23:13 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 08:23:13 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 08:23:14 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 08:23:14 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 08:23:14 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 08:23:14 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 08:23:14 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 09:23:13 2013 TLS: tls_process: killed expiring key
Fri May 24 09:23:14 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 09:23:14 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 09:23:14 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 09:23:15 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 09:23:15 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 09:23:15 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 09:23:15 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 09:23:15 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 10:23:13 2013 TLS: tls_process: killed expiring key
Fri May 24 10:23:15 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 10:23:15 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 10:23:15 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 10:23:15 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 10:23:15 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 10:23:15 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 10:23:15 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 10:23:15 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 11:23:14 2013 TLS: tls_process: killed expiring key
Fri May 24 11:23:15 2013 TLS: soft reset sec=0 bytes=567639320/0 pkts=688344/0
Fri May 24 11:23:15 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 11:23:15 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 11:23:15 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 11:23:15 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 11:23:15 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 11:23:15 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 11:23:15 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 11:23:15 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 12:23:15 2013 TLS: soft reset sec=0 bytes=503580607/0 pkts=628466/0
Fri May 24 12:23:15 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 12:23:15 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 12:23:15 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 12:23:15 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 12:23:15 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 12:23:15 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 12:23:15 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 12:23:15 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 13:23:15 2013 TLS: soft reset sec=0 bytes=642432320/0 pkts=760179/0
Fri May 24 13:23:15 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 13:23:15 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 13:23:15 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 13:23:16 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 13:23:16 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 13:23:16 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 13:23:16 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 13:23:16 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 14:23:15 2013 TLS: tls_process: killed expiring key
Fri May 24 14:23:16 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 14:23:16 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 14:23:16 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 14:23:16 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 14:23:16 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 14:23:16 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 14:23:16 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 14:23:16 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 15:23:15 2013 TLS: tls_process: killed expiring key
Fri May 24 15:23:16 2013 TLS: soft reset sec=0 bytes=1364586727/0 pkts=1415250/0
Fri May 24 15:23:16 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 15:23:16 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 15:23:16 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 15:23:17 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 15:23:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 15:23:17 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 15:23:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 15:23:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 16:23:16 2013 TLS: tls_process: killed expiring key
Fri May 24 16:23:16 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 16:23:16 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 16:23:16 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 16:23:17 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 16:23:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 16:23:17 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 16:23:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 16:23:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 17:23:16 2013 TLS: tls_process: killed expiring key
Fri May 24 17:23:17 2013 TLS: soft reset sec=0 bytes=653334182/0 pkts=800617/0
Fri May 24 17:23:17 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 17:23:17 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 17:23:17 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 17:23:18 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 17:23:18 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 17:23:18 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 17:23:18 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 17:23:18 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 18:23:17 2013 TLS: tls_process: killed expiring key
Fri May 24 18:23:18 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 18:23:18 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 18:23:18 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 18:23:19 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 18:23:19 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 18:23:19 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 18:23:19 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 18:23:19 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 19:23:17 2013 TLS: tls_process: killed expiring key
Fri May 24 19:23:19 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 19:23:19 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 19:23:19 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 19:23:19 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 19:23:19 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 19:23:19 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 19:23:19 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 19:23:19 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 20:23:18 2013 TLS: tls_process: killed expiring key
Fri May 24 20:23:19 2013 TLS: soft reset sec=0 bytes=963480575/0 pkts=1091054/0
Fri May 24 20:23:19 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 20:23:19 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 20:23:19 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 20:23:20 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 20:23:20 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 20:23:20 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 20:23:20 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 20:23:20 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 24 21:23:19 2013 TLS: tls_process: killed expiring key
Fri May 24 21:23:20 2013 TLS: soft reset sec=0 bytes=619202622/0 pkts=817354/0
Fri May 24 21:23:20 2013 VERIFY OK: depth=1, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=FreedomIP_CA/emailAddress=freedom@freedom-ip.com
Fri May 24 21:23:20 2013 VERIFY OK: nsCertType=SERVER
Fri May 24 21:23:20 2013 VERIFY OK: depth=0, /C=NL/ST=CA/L=Amsterdam/O=FreedomIP/CN=server/emailAddress=freedom@freedom-ip.com
Fri May 24 21:23:20 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 21:23:20 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 21:23:20 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri May 24 21:23:20 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri May 24 21:23:21 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Dernière modification par David (2013-05-25 00:11:01)
Hors ligne
En tout cas sur ton log, je vois pas vraiment de problème.
Je vois même pas de déco, je dois surement pas avoir les yeux en face des trous ce soir
Hors ligne
Bonsoir ...
Pareil que PortoG ... Il n'y a pas de déconnexion du serveur ... tout comme les traces du premier message.
Pour le moment, je sèche, ou alors nous n'avons pas la même définition du terme "Déconnexion" !
Cordialement, David.
Hors ligne
Bonjour David, bonjour PortoG,
Ma définition de déconnexion est des plus classiques : une rupture de la connexion ...
Maintenant, comme je le disais dans mon premier post, j'ai eu 7 déconnexions en l'espace de 40 minutes jeudi soir sans qu'aucune trace n'apparaisse dans les logs (oui je les ai étudiées avant de poster). Il est donc possible que le problème ne viennent d'ailleurs pas du VPN.
Affaire à suivre
Bon weekend à tous
Hors ligne
Bonjour ...
Je pense pas que ce soit réellement une déconnexion mais plutôt à une rupture d'échange entre le client et le serveur VPN, car la connexion au serveur est toujours active mais aucune donnée ne passe. Serait-ce une définition plus proche des symptômes que vous rencontrez !?
Bon Week-End à vous aussi.
Cordialement, David.
Hors ligne
Dernière modification par tetris57 (2013-05-26 20:23:28)
Hors ligne
Pour moi, plus aucun server fonctionne!
Hors ligne
Idem pour moi vers18h00
Hors ligne
Bonsoir ...
@Tetris, je n'arrive pas à voir votre image !?
@Nathalie et Zx80, Évitez de polluer les posts, car l'impossibilité de vous connecter n'a aucun rapport avec le problème rencontré dans cette discussion. Ici, il y a bien connexion mais le flux n'est pas stable. Donc, ouvrez votre propre discussion en expliquant votre problème et donnant vos logs de connexion.
Cordialement, David.
Hors ligne
visiblement, le format png n'est pas pris en charge par le forum ... je l'ai réencodé en jpeg et reposté sur le message concerné
Hors ligne
Re ...
Effectivement, c'est visiblement parlant
Avec vos retours, Freedom-IP ajuste les serveurs pour comprendre d'où vient le problème.
Donc voir si durant les prochaines 24 heures vous rencontrez toujours le problème
Cordialement, David.
Hors ligne
Serveur Suisse à 10h
Mon May 27 10:10:20 2013 OpenVPN 2.3.1 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Mar 28 2013
Enter Management Password:
Mon May 27 10:10:20 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Mon May 27 10:10:20 2013 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Mon May 27 10:10:20 2013 Attempting to establish TCP connection with [AF_INET]94.23.145.125:4444
Mon May 27 10:10:29 2013 TCP: connect to [AF_INET]94.23.145.125:4444 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED)
Mon May 27 10:10:36 2013 TCP: connect to [AF_INET]94.23.145.125:4444 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED)
Mon May 27 10:10:39 2013 SIGTERM[hard,init_instance] received, process exiting
Hors ligne
Hors ligne
Hors ligne
Hors ligne
Pages : 1
Discussion fermée