Hello,
@Furaxworld : Ce problème existe depuis plus longtemps.
Voici les Logs, ils ont été vidés hier lorsque le DNS fonctionnait. Les entrée du log correspondent au moment ou j’ai du le relancer car il c’est arrété cette nuit. (Donc rien dans le log concernant la coupure)
0000|2024-01-09 07:34:58 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
0001|2024-01-09 07:34:58 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
0002|2024-01-09 07:34:58 WARNING: file '/tmp/jeedom/openvpn/openvpn_auth_n28LOLFsdpyHtsXnjAHsC3iUhI3MTv.conf' is group or others accessible
0003|2024-01-09 07:34:58 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
0004|2024-01-09 07:34:58 library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10
0005|2024-01-09 07:34:58 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
0006|2024-01-09 07:34:58 TCP/UDP: Preserving recently used remote address: [AF_INET]135.125.10.213:1195
0007|2024-01-09 07:34:58 UDP link local: (not bound)
0008|2024-01-09 07:34:58 UDP link remote: [AF_INET]135.125.10.213:1195
0009|2024-01-09 07:34:58 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0010|2024-01-09 07:34:58 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0011|2024-01-09 07:34:58 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1342'
0012|2024-01-09 07:34:58 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1300'
0013|2024-01-09 07:34:58 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0014|2024-01-09 07:34:58 [server] Peer Connection Initiated with [AF_INET]135.125.10.213:1195
0015|2024-01-09 07:34:59 Data Channel: using negotiated cipher 'AES-256-GCM'
0016|2024-01-09 07:34:59 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0017|2024-01-09 07:34:59 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0018|2024-01-09 07:34:59 TUN/TAP device tun0 opened
0019|2024-01-09 07:34:59 net_iface_mtu_set: mtu 1500 for tun0
0020|2024-01-09 07:34:59 net_iface_up: set tun0 up
0021|2024-01-09 07:34:59 net_addr_ptp_v4_add: 10.10.39.30 peer 10.10.39.29 dev tun0
0022|2024-01-09 07:34:59 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
0023|2024-01-09 07:34:59 Initialization Sequence Completed
0024|2024-01-09 08:34:59 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0025|2024-01-09 08:34:59 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0026|2024-01-09 08:34:59 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1342'
0027|2024-01-09 08:34:59 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1300'
0028|2024-01-09 08:34:59 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0029|2024-01-09 08:34:59 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0030|2024-01-09 08:34:59 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
Merci
Vincnet68