Les DNS ne fonctionnent plus

Bonjour,
Les DNS de toutes mes jeedoms ne fonctionnent plus depuis 8h10… Accès internet OK… En local, les jeedoms sont OK (si accès VPN)

Bonjour,

idem
Et statuts pourtant OK

@Mips Ce n’est pas un problème OpenVPN, ma remarque voulait dire que les box sont accessibles par leur adresse IP en réseau local mais que si l’on dispose d’un accès VPN à ce réseau, la jeedom est OK

C’est reparti ! :ok_hand:

C’est encore moins un problème Discussions Générales

Semble de nouveau tombé à l’instant 22/08 à 8H05… :-((((((((

Bonjour à tous,

Je confirme Idem pour moi.

JM

Bonjour,
Sans log je vois pas comment vous aider, ce n’est pas un soucis général donc le soucis est chez vous et necessite que vous mettiez de la log si vous voulez de l’aide.

Bonjour,

J’ai eu également eu le soucis pas d’accès possible via url en jeedom.link durant 10 minutes vers 8h00 ( on tombait en timeout sur le navigateur) aucun log de visible sur la box jeedom.

Peut être un soucis de résolution de nom ?

Non ca marchait bien sur nos 5 machines de tests + 20 serveurs qui valide toute les 30s que c’est bon.

Bonjour,
Je n’ai pas eu besoin d’accès externe aujourd’hui et donc pas de constat d’échec mais les logs OpenVPN discutent pas mal.
Donc, si ça peut aider…

0000|2024-08-22 00:22:44 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
0001|2024-08-22 00:22:44 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
0002|2024-08-22 00:22:44 WARNING: file '/tmp/jeedom/openvpn/openvpn_auth_5qNBau1KVG7v4PiquUhyHJ4tnxRF3q.conf' is group or others accessible
0003|2024-08-22 00:22:44 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
0004|2024-08-22 00:22:44 library versions: OpenSSL 1.1.1w  11 Sep 2023, LZO 2.10
0005|2024-08-22 00:22:44 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0006|2024-08-22 00:22:44 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0007|2024-08-22 00:22:44 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0008|2024-08-22 00:22:44 UDP link local: (not bound)
0009|2024-08-22 00:22:44 UDP link remote: [AF_INET]57.128.63.222:1196
0010|2024-08-22 00:22:45 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0011|2024-08-22 00:22:45 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0012|2024-08-22 00:22:45 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0013|2024-08-22 00:22:45 [server] Peer Connection Initiated with [AF_INET]57.128.63.222:1196
0014|2024-08-22 00:22:45 Data Channel: using negotiated cipher 'AES-256-GCM'
0015|2024-08-22 00:22:45 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0016|2024-08-22 00:22:45 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0017|2024-08-22 00:22:45 TUN/TAP device tun0 opened
0018|2024-08-22 00:22:45 net_iface_mtu_set: mtu 1300 for tun0
0019|2024-08-22 00:22:45 net_iface_up: set tun0 up
0020|2024-08-22 00:22:45 net_addr_ptp_v4_add: 10.11.16.198 peer 10.11.16.197 dev tun0
0021|2024-08-22 00:22:45 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
0022|2024-08-22 00:22:45 Initialization Sequence Completed
0023|2024-08-22 01:22:17 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0024|2024-08-22 01:22:17 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0025|2024-08-22 01:22:17 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0026|2024-08-22 01:22:17 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0027|2024-08-22 01:22:17 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0028|2024-08-22 02:21:49 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0029|2024-08-22 02:21:49 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0030|2024-08-22 02:21:49 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0031|2024-08-22 02:21:49 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0032|2024-08-22 02:21:49 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0033|2024-08-22 03:21:21 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0034|2024-08-22 03:21:21 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0035|2024-08-22 03:21:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0036|2024-08-22 03:21:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0037|2024-08-22 03:21:21 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0038|2024-08-22 04:20:53 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0039|2024-08-22 04:20:53 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0040|2024-08-22 04:20:54 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0041|2024-08-22 04:20:54 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0042|2024-08-22 04:20:54 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0043|2024-08-22 05:20:27 NOTE: --mute triggered...
0044|2024-08-22 08:01:00 15 variation(s) on previous 20 message(s) suppressed by --mute
0045|2024-08-22 08:01:00 [server] Inactivity timeout (--ping-restart), restarting
0046|2024-08-22 08:01:00 SIGUSR1[soft,ping-restart] received, process restarting
0047|2024-08-22 08:01:05 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0048|2024-08-22 08:01:05 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0049|2024-08-22 08:01:05 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0050|2024-08-22 08:01:05 UDP link local: (not bound)
0051|2024-08-22 08:01:05 UDP link remote: [AF_INET]57.128.63.222:1196
0052|2024-08-22 08:01:35 [UNDEF] Inactivity timeout (--ping-restart), restarting
0053|2024-08-22 08:01:35 SIGUSR1[soft,ping-restart] received, process restarting
0054|2024-08-22 08:01:40 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0055|2024-08-22 08:01:40 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0056|2024-08-22 08:01:40 TCP/UDP: Preserving recently used remote address: [AF_INET]163.172.187.40:1196
0057|2024-08-22 08:01:40 UDP link local: (not bound)
0058|2024-08-22 08:01:40 UDP link remote: [AF_INET]163.172.187.40:1196
0059|2024-08-22 08:02:28 [UNDEF] Inactivity timeout (--ping-restart), restarting
0060|2024-08-22 08:02:28 SIGUSR1[soft,ping-restart] received, process restarting
0061|2024-08-22 08:02:33 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0062|2024-08-22 08:02:33 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0063|2024-08-22 08:02:33 TCP/UDP: Preserving recently used remote address: [AF_INET]51.159.170.131:1196
0064|2024-08-22 08:02:33 UDP link local: (not bound)
0065|2024-08-22 08:02:33 UDP link remote: [AF_INET]51.159.170.131:1196
0066|2024-08-22 08:03:03 [UNDEF] Inactivity timeout (--ping-restart), restarting
0067|2024-08-22 08:03:03 SIGUSR1[soft,ping-restart] received, process restarting
0068|2024-08-22 08:03:08 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0069|2024-08-22 08:03:08 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0070|2024-08-22 08:03:08 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.60.24:1196
0071|2024-08-22 08:03:08 UDP link local: (not bound)
0072|2024-08-22 08:03:08 UDP link remote: [AF_INET]57.128.60.24:1196
0073|2024-08-22 08:03:38 [UNDEF] Inactivity timeout (--ping-restart), restarting
0074|2024-08-22 08:03:38 SIGUSR1[soft,ping-restart] received, process restarting
0075|2024-08-22 08:03:43 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0076|2024-08-22 08:03:43 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0077|2024-08-22 08:03:43 TCP/UDP: Preserving recently used remote address: [AF_INET]51.159.177.9:1196
0078|2024-08-22 08:03:43 UDP link local: (not bound)
0079|2024-08-22 08:03:43 UDP link remote: [AF_INET]51.159.177.9:1196
0080|2024-08-22 08:04:14 [UNDEF] Inactivity timeout (--ping-restart), restarting
0081|2024-08-22 08:04:14 SIGUSR1[soft,ping-restart] received, process restarting
0082|2024-08-22 08:04:19 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0083|2024-08-22 08:04:19 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0084|2024-08-22 08:04:19 TCP/UDP: Preserving recently used remote address: [AF_INET]141.95.151.216:1196
0085|2024-08-22 08:04:19 UDP link local: (not bound)
0086|2024-08-22 08:04:19 UDP link remote: [AF_INET]141.95.151.216:1196
0087|2024-08-22 08:04:24 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0088|2024-08-22 08:04:24 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0089|2024-08-22 08:04:29 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0090|2024-08-22 08:04:29 [server] Peer Connection Initiated with [AF_INET]141.95.151.216:1196
0091|2024-08-22 08:04:52 Data Channel: using negotiated cipher 'AES-256-GCM'
0092|2024-08-22 08:04:52 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0093|2024-08-22 08:04:52 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0094|2024-08-22 08:04:52 Preserving previous TUN/TAP instance: tun0
0095|2024-08-22 08:04:52 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
0096|2024-08-22 08:04:52 Closing TUN/TAP interface
0097|2024-08-22 08:04:52 net_addr_ptp_v4_del: 10.11.16.198 dev tun0
0098|2024-08-22 08:04:53 TUN/TAP device tun0 opened
0099|2024-08-22 08:04:53 net_iface_mtu_set: mtu 1300 for tun0
0100|2024-08-22 08:04:53 net_iface_up: set tun0 up
0101|2024-08-22 08:04:53 net_addr_ptp_v4_add: 10.11.10.18 peer 10.11.10.17 dev tun0
0102|2024-08-22 08:04:53 Initialization Sequence Completed
0103|2024-08-22 08:06:41 [server] Inactivity timeout (--ping-restart), restarting
0104|2024-08-22 08:06:41 SIGUSR1[soft,ping-restart] received, process restarting
0105|2024-08-22 08:06:46 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0106|2024-08-22 08:06:46 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0107|2024-08-22 08:06:46 TCP/UDP: Preserving recently used remote address: [AF_INET]141.95.151.216:1196
0108|2024-08-22 08:06:46 UDP link local: (not bound)
0109|2024-08-22 08:06:46 UDP link remote: [AF_INET]141.95.151.216:1196
0110|2024-08-22 08:07:16 [UNDEF] Inactivity timeout (--ping-restart), restarting
0111|2024-08-22 08:07:16 SIGUSR1[soft,ping-restart] received, process restarting
0112|2024-08-22 08:07:21 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0113|2024-08-22 08:07:21 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0114|2024-08-22 08:07:21 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0115|2024-08-22 08:07:21 UDP link local: (not bound)
0116|2024-08-22 08:07:21 UDP link remote: [AF_INET]57.128.63.222:1196
0117|2024-08-22 08:07:30 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0118|2024-08-22 08:07:30 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0119|2024-08-22 08:07:34 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0120|2024-08-22 08:07:34 [server] Peer Connection Initiated with [AF_INET]57.128.63.222:1196
0121|2024-08-22 08:07:42 Data Channel: using negotiated cipher 'AES-256-GCM'
0122|2024-08-22 08:07:42 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0123|2024-08-22 08:07:42 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0124|2024-08-22 08:07:42 Preserving previous TUN/TAP instance: tun0
0125|2024-08-22 08:07:42 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
0126|2024-08-22 08:07:42 Closing TUN/TAP interface
0127|2024-08-22 08:07:42 net_addr_ptp_v4_del: 10.11.10.18 dev tun0
0128|2024-08-22 08:07:43 TUN/TAP device tun0 opened
0129|2024-08-22 08:07:43 net_iface_mtu_set: mtu 1300 for tun0
0130|2024-08-22 08:07:43 net_iface_up: set tun0 up
0131|2024-08-22 08:07:43 net_addr_ptp_v4_add: 10.11.16.198 peer 10.11.16.197 dev tun0
0132|2024-08-22 08:07:43 Initialization Sequence Completed
0133|2024-08-22 08:08:42 [server] Inactivity timeout (--ping-restart), restarting
0134|2024-08-22 08:08:42 SIGUSR1[soft,ping-restart] received, process restarting
0135|2024-08-22 08:08:47 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0136|2024-08-22 08:08:47 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0137|2024-08-22 08:08:47 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0138|2024-08-22 08:08:47 UDP link local: (not bound)
0139|2024-08-22 08:08:47 UDP link remote: [AF_INET]57.128.63.222:1196
0140|2024-08-22 08:09:10 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0141|2024-08-22 08:09:10 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0142|2024-08-22 08:09:17 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0143|2024-08-22 08:09:17 [server] Peer Connection Initiated with [AF_INET]57.128.63.222:1196
0144|2024-08-22 08:09:22 Data Channel: using negotiated cipher 'AES-256-GCM'
0145|2024-08-22 08:09:22 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0146|2024-08-22 08:09:22 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0147|2024-08-22 08:09:22 Preserving previous TUN/TAP instance: tun0
0148|2024-08-22 08:09:22 Initialization Sequence Completed
0149|2024-08-22 08:09:52 [server] Inactivity timeout (--ping-restart), restarting
0150|2024-08-22 08:09:52 SIGUSR1[soft,ping-restart] received, process restarting
0151|2024-08-22 08:09:57 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0152|2024-08-22 08:09:57 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0153|2024-08-22 08:09:57 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0154|2024-08-22 08:09:57 UDP link local: (not bound)
0155|2024-08-22 08:09:57 UDP link remote: [AF_INET]57.128.63.222:1196
0156|2024-08-22 08:10:08 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0157|2024-08-22 08:10:08 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0158|2024-08-22 08:10:11 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0159|2024-08-22 08:10:11 [server] Peer Connection Initiated with [AF_INET]57.128.63.222:1196
0160|2024-08-22 08:10:40 Data Channel: using negotiated cipher 'AES-256-GCM'
0161|2024-08-22 08:10:40 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0162|2024-08-22 08:10:40 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0163|2024-08-22 08:10:40 Preserving previous TUN/TAP instance: tun0
0164|2024-08-22 08:10:40 Initialization Sequence Completed
0165|2024-08-22 08:11:13 [server] Inactivity timeout (--ping-restart), restarting
0166|2024-08-22 08:11:13 SIGUSR1[soft,ping-restart] received, process restarting
0167|2024-08-22 08:11:18 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
0168|2024-08-22 08:11:18 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0169|2024-08-22 08:11:18 TCP/UDP: Preserving recently used remote address: [AF_INET]57.128.63.222:1196
0170|2024-08-22 08:11:18 UDP link local: (not bound)
0171|2024-08-22 08:11:18 UDP link remote: [AF_INET]57.128.63.222:1196
0172|2024-08-22 08:11:33 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0173|2024-08-22 08:11:33 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0174|2024-08-22 08:11:38 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0175|2024-08-22 08:11:38 [server] Peer Connection Initiated with [AF_INET]57.128.63.222:1196
0176|2024-08-22 08:11:53 Data Channel: using negotiated cipher 'AES-256-GCM'
0177|2024-08-22 08:11:53 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0178|2024-08-22 08:11:53 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0179|2024-08-22 08:11:53 Preserving previous TUN/TAP instance: tun0
0180|2024-08-22 08:11:53 Initialization Sequence Completed
0181|2024-08-22 09:09:32 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0182|2024-08-22 09:09:32 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0183|2024-08-22 09:09:32 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0184|2024-08-22 09:09:32 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0185|2024-08-22 09:09:32 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0186|2024-08-22 10:07:14 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0187|2024-08-22 10:07:14 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0188|2024-08-22 10:07:14 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0189|2024-08-22 10:07:14 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0190|2024-08-22 10:07:14 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0191|2024-08-22 11:04:56 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0192|2024-08-22 11:04:56 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0193|2024-08-22 11:04:56 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0194|2024-08-22 11:04:56 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0195|2024-08-22 11:04:56 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0196|2024-08-22 12:02:38 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0197|2024-08-22 12:02:38 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0198|2024-08-22 12:02:38 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0199|2024-08-22 12:02:38 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0200|2024-08-22 12:02:38 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA

Je vois une reconnexion de ton jeedom a 8h donc ca peut expliqué pourquoi il a été indispo quelques minutes.

Ce sujet a été automatiquement fermé après 24 heures suivant le dernier commentaire. Aucune réponse n’est permise dorénavant.