Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)

  • État Fermée
  • Pourcentage achevé
    100%
  • Type Anomalie
  • Catégorie Services locaux → Client VPN
  • Assignée à Personne
  • Système d'exploitation Tous
  • Sévérité Moyenne
  • Priorité Très Basse
  • Basée sur la version 3.0.2
  • Due pour la version Non décidée
  • Échéance Non décidée
  • Votes
  • Privée
Concerne le projet: Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)
Ouverte par nicos - 26/01/2015
Dernière modification par mbizon - 26/08/2020

FS#16267 - Client VPN connecté, gestionnaire connecté mais téléchargement impossible

Bonjour,

Depuis quelques jours je tente d’utiliser le service client VPN du server freebox en mode OpenVpn mais je rencontre un problème car les téléchargements ne se lancent pas. Le client VPN semble fonctionner normalement, il affiche la connexion avec le serveur distant (et l’étoile jaune), le gestionnaire de téléchargement est en mode connecté lui aussi mais rien ne se passe. Impossible de se connecter à des pairs et de télécharger. Dès que je désactive le client VPN, les téléchargement reprennent sans soucis. J’ai bien sur activé la connection vpn dans l’onglet dédié et cocher la case pour utiliser le vpn avec le téléchargement.

Infos Techniques :

- Client chez Airvpn j’ai téléchargé leur fichier de configuration .ovpn . Celui-ci comprend les informations d’authentification et fonctionne en protocol UDP sur le port 443. Plusieurs configurations en fonction du système d’exploitation existe (Linux, Win, OSX, Android, Tomato) mais ayant testé avec toute cela ne résoud pas le problème. J’ai aussi essayé à travers le protocol TCP sur le port 443, en UDP avec le port 80... mais même souci. J’ai également entré manuellement mes informations de connexion mais là aussi sans que cela ne solutionne quoi que ce soit.

- Les fichiers de configuration .ovpn marchent sur tunnelblick sans aucun souci.

- Le log suite à la connection du client vpn :

Journal de connexion
2015-01-26 11:11:28 l2 state change ‘l2_down’ ⇒ ‘l2_down’ 2015-01-26 11:11:28 l3 state change ‘l3_down’ ⇒ ‘l3_down’ 2015-01-26 11:11:28 state change ‘down’ ⇒ ‘down’ 2015-01-26 11:11:28 enabling connection
2015-01-26 11:11:28 state change ‘down’ ⇒ ‘wait_l2_up’ 2015-01-26 11:11:28 l2 state change ‘l2_down’ ⇒ ‘l2_up’ 2015-01-26 11:11:28 state change ‘wait_l2_up’ ⇒ ‘l2_up’ 2015-01-26 11:11:28 state change ‘l2_up’ ⇒ ‘wait_l3_up’ 2015-01-26 11:11:28 l3 state change ‘l3_down’ ⇒ ‘l3_start’ 2015-01-26 11:11:28 starting
2015-01-26 11:11:28 calling helper script at ‘/etc/fbxconnman/conn.pre-up’ 2015-01-26 11:11:28 l3 state change ‘l3_start’ ⇒ ‘l3_wait_preup_helper’ 2015-01-26 11:11:28 l3 state change ‘l3_wait_preup_helper’ ⇒ ‘l3_wait_stable’ 2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 OpenVPN 2.3.2 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Dec 3 2014
2015-01-26 11:11:28 openvpn: connected to management interface
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: Connected to management server at unix_mgt.sock
2015-01-26 11:11:28 openvpn: rx: >INFO:OpenVPN Management Interface Version 1 – type ‘help’ for more info
2015-01-26 11:11:28 openvpn: rx: >HOLD:Waiting for hold release
2015-01-26 11:11:28 openvpn: tx: hold release
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: CMD ‘hold release’ 2015-01-26 11:11:28 openvpn: rx: SUCCESS: hold release succeeded
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: CMD ‘state on’ 2015-01-26 11:11:28 openvpn: rx: SUCCESS: real-time state notification set to ON
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: >STATE:1422267088,WILL_CONNECT,37.48.81.11,,,,,0
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Control Channel Authentication: using ‘tls_auth.data.1’ as a OpenVPN static key file
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Socket Buffers: R=[172032→131072] S=[172032→131072]
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 UDPv4 link local: [undef]
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 UDPv4 link remote: [AF_INET]37.48.81.11:443
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: >STATE:1422267088,WAIT,,,,,,0
2015-01-26 11:11:28 openvpn: rx: >STATE:1422267088,WILL_CONNECT,37.48.81.11,,,,,0
2015-01-26 11:11:28 openvpn: rx: >STATE:1422267088,WAIT,,,,,,0
2015-01-26 11:11:28 openvpn: rx: >STATE:1422267088,AUTH,,,,,,0
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 MANAGEMENT: >STATE:1422267088,AUTH,,,,,,0
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 TLS: Initial packet from [AF_INET]37.48.81.11:443, sid=13ccfdbd 6b172a7d
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Validating certificate key usage
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 ++ Certificate has key usage 00a0, expects 00a0
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 VERIFY KU OK
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 Validating certificate extended key usage
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 VERIFY EKU OK
2015-01-26 11:11:28 openvpn: output: Mon Jan 26 11:11:28 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
2015-01-26 11:11:34 openvpn: output: Mon Jan 26 11:11:34 2015 [server] Peer Connection Initiated with [AF_INET]37.48.81.11:443
2015-01-26 11:11:35 openvpn: rx: >STATE:1422267095,GET_CONFIG,,,,,,0
2015-01-26 11:11:35 openvpn: output: Mon Jan 26 11:11:35 2015 MANAGEMENT: >STATE:1422267095,GET_CONFIG,,,,,,0
2015-01-26 11:11:36 openvpn: output: Mon Jan 26 11:11:36 2015 SENT CONTROL [server]: ‘PUSH_REQUEST’ (status=1)
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 PUSH: Received control message: ‘PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.139.190 10.4.139.189’ 2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 OPTIONS IMPORT: timers and/or timeouts modified
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 OPTIONS IMPORT: LZO parms modified
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 OPTIONS IMPORT: –ifconfig/up options modified
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 OPTIONS IMPORT: route options modified
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 OPTIONS IMPORT: –ip-win32 and/or –dhcp-option options modified
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 ROUTE: default_gateway=UNDEF
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 Initialization Sequence Completed
2015-01-26 11:11:37 openvpn: output: Mon Jan 26 11:11:37 2015 MANAGEMENT: >STATE:1422267097,CONNECTED,SUCCESS,10.4.139.190,37.48.81.11,10.4.0.1,,1500
2015-01-26 11:11:37 openvpn: rx: >STATE:1422267097,CONNECTED,SUCCESS,10.4.139.190,37.48.81.11,10.4.0.1,,1500
2015-01-26 11:11:37 l3 is now stable
2015-01-26 11:11:37 calling helper script at ‘/etc/fbxconnman/conn.up’ 2015-01-26 11:11:37 l3 state change ‘l3_wait_stable’ ⇒ ‘l3_wait_up_helper’ 2015-01-26 11:11:37 l3 state change ‘l3_wait_up_helper’ ⇒ ‘l3_up’ 2015-01-26 11:11:37 state is now UP
2015-01-26 11:11:37 state change ‘wait_l3_up’ ⇒ ‘l3_up’

Merci de votre aide.

Fermée par  mbizon
26.08.2020 17:44
Raison de la fermeture :  Absence de réponse
Admin
rfliedel a commenté le 13.02.2015 17:24

ça marche pour un téléchargement http ?
vous êtes sûr que votre provider vpn ne bloque pas bittorrent ?

nicos a commenté le 14.02.2015 15:45

Bonjour,

Oui le http marche et le protocole bittorrent est bien supporté par mon provider VPN.

Après plusieurs essais et en laissant les téléchargement actif pendant de longues périodes je suis en mesure de télécharger quand le client VPN est actif. Par contre les débits sont ridiculement bas (- de 100ko/s) et des messages d'erreur apparaissent concernant la connexion aux trackeurs (status : connexion échouée) et l'authentification des newsgroup.

Je n'ai aucun problème de débit ou de téléchargement P2P sur ma machine dont l'ensemble du traffic est redirigé vers le provider VPN. Je n'ai aucun problème non plus quand j'utilise la seedbox du server en connexion directe.

Merci de votre aide.

nicos a commenté le 14.02.2015 16:10

après quelques heures, les téléchargements échouent avec le message "impossible de s'annoncer sur le traqueur".

Source des torrents : yts (yify-torrent)

Admin
rfliedel a commenté le 16.02.2015 10:35

Vous avez les logs d'une tâche de téléchargement bittorrent qui échoue ?

nicos a commenté le 16.02.2015 19:03

Oui. Voici le log d'un fichier ajouter au hasard.

2015-02-16 19:58:48 files reserved
2015-02-16 19:58:48 enabling dht for this torrent
2015-02-16 19:58:48 announcer failure : 1
2015-02-16 19:58:48 [ann udp] event started open.demonii.com:1337
2015-02-16 19:58:48 torrent stopped
2015-02-16 19:58:48 task_bt_started: Alien Outpost (2014)
2015-02-16 19:59:18 announcer failure : 2
2015-02-16 19:59:18 announce failed: timed out
2015-02-16 19:59:18 announcer failure : 1
2015-02-16 19:59:18 [ann udp] event started exodus.desync.com:6969
2015-02-16 19:59:48 announcer failure : 3
2015-02-16 19:59:48 disable announcer after too many failures
2015-02-16 19:59:48 [ann udp] event started open.demonii.com:1337
2015-02-16 19:59:48 announce failed: timed out
2015-02-16 19:59:48 announcer failure : 1
2015-02-16 20:00:18 announce failed: timed out
2015-02-16 20:00:18 announcer failure : 2
2015-02-16 20:00:18 [ann udp] event started tracker.istole.it:80
2015-02-16 20:00:18 [ann udp] event started exodus.desync.com:6969
2015-02-16 20:00:48 [ann udp] event started open.demonii.com:1337
2015-02-16 20:00:48 announce failed: timed out
2015-02-16 20:00:48 announcer failure : 1
2015-02-16 20:00:48 announce failed: timed out
2015-02-16 20:00:48 announcer failure : 2
2015-02-16 20:01:18 announce failed: timed out
2015-02-16 20:01:18 announcer failure : 3
2015-02-16 20:01:18 disable announcer after too many failures
2015-02-16 20:01:18 [ann udp] event started tracker.publicbt.com:80
2015-02-16 20:01:18 [ann udp] event started tracker.istole.it:80
2015-02-16 20:01:18 [ann udp] event started exodus.desync.com:6969
2015-02-16 20:01:48 announce failed: timed out
2015-02-16 20:01:48 announcer failure : 1
2015-02-16 20:01:48 announce failed: timed out
2015-02-16 20:01:48 announcer failure : 2
2015-02-16 20:01:48 announce failed: timed out
2015-02-16 20:01:48 announcer failure : 3
2015-02-16 20:01:48 disable announcer after too many failures
2015-02-16 20:01:48 [ann udp] event started tracker.openbittorrent.com:80
2015-02-16 20:02:18 [ann udp] event started tracker.publicbt.com:80
2015-02-16 20:02:18 [ann udp] event started tracker.istole.it:80
2015-02-16 20:02:18 announce failed: timed out

Merci

nicos a commenté le 16.02.2015 19:05

voici également la console du client VPN

2015-02-16 18:24:20 openvpn: output: Mon Feb 16 18:24:20 2015 VERIFY KU OK
2015-02-16 18:24:20 openvpn: output: Mon Feb 16 18:24:20 2015 Validating certificate extended key usage
2015-02-16 18:24:20 openvpn: output: Mon Feb 16 18:24:20 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2015-02-16 18:24:20 openvpn: output: Mon Feb 16 18:24:20 2015 VERIFY EKU OK
2015-02-16 18:24:20 openvpn: output: Mon Feb 16 18:24:20 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
2015-02-16 18:24:30 openvpn: output: Mon Feb 16 18:24:30 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2015-02-16 18:24:30 openvpn: output: Mon Feb 16 18:24:30 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-02-16 18:24:30 openvpn: output: Mon Feb 16 18:24:30 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2015-02-16 18:24:30 openvpn: output: Mon Feb 16 18:24:30 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-02-16 18:24:30 openvpn: output: Mon Feb 16 18:24:30 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
2015-02-16 19:24:19 openvpn: output: Mon Feb 16 19:24:19 2015 TLS: tls_process: killed expiring key
2015-02-16 19:24:30 openvpn: output: Mon Feb 16 19:24:30 2015 TLS: soft reset sec=0 bytes=48224/0 pkts=704/0
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 Validating certificate key usage
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 ++ Certificate has key usage 00a0, expects 00a0
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 VERIFY KU OK
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 Validating certificate extended key usage
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 VERIFY EKU OK
2015-02-16 19:24:31 openvpn: output: Mon Feb 16 19:24:31 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
2015-02-16 19:24:37 openvpn: output: Mon Feb 16 19:24:37 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2015-02-16 19:24:37 openvpn: output: Mon Feb 16 19:24:37 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-02-16 19:24:37 openvpn: output: Mon Feb 16 19:24:37 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2015-02-16 19:24:37 openvpn: output: Mon Feb 16 19:24:37 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Admin
rfliedel a commenté le 17.02.2015 09:53

ce qui serait intéressant c'est d'avoir les logs vpn au moment ou il y a les fails d'annonce.
Aussi essayez d'ajouter un tracker http pour voir ce qui se passe.
Quel type d'ip vous attribue votre fournisseur vpn ?

Avez-vous du nouveau depuis l'ouverture du ticket ?

Chargement...

Activer les raccourcis clavier

Liste des tâches

Détails de la tâche

Édition de la tâche