Справочник Пользователя для your-freedom user guide
Your Freedom User Guide
Page 51 of 52
4.2 Creating a “dump” file
Depending on how you start Your Freedom, there are different ways how to start it in
dump mode. All of them have in common that they use a command line option, but
this may be hidden from you by your desktop environment. The Windows installer
version can be run in dump mode from the Start menu; they create a file called
“dump.log” in the installation directory. If you are running the client from the
command line, use the option –dump=somefile to activate the dump mode. Note
that there is a drop in performance when you activate this mode, and the dump file
may grow pretty big over time.
dump mode. All of them have in common that they use a command line option, but
this may be hidden from you by your desktop environment. The Windows installer
version can be run in dump mode from the Start menu; they create a file called
“dump.log” in the installation directory. If you are running the client from the
command line, use the option –dump=somefile to activate the dump mode. Note
that there is a drop in performance when you activate this mode, and the dump file
may grow pretty big over time.
Normally, the client does not dump any actual packet data; if that’s needed we’ll
provide a modified client on request that does.
provide a modified client on request that does.
Don’t hesitate to have a look at the file, some of it probably makes sense to you,
some of it will only make sense to the developers. If you mail us a big dump, please
compress it! Put it in a ZIP or 7z or whatever archive file, but please avoid any
proprietary features (e.g. WinZIP 10’s AES encryption mode).
some of it will only make sense to the developers. If you mail us a big dump, please
compress it! Put it in a ZIP or 7z or whatever archive file, but please avoid any
proprietary features (e.g. WinZIP 10’s AES encryption mode).
If you are having connection problems, it helps if you run the Wizard in dump mode
as well.
as well.
4.3 Using a packet sniffer
This is bare metal debugging and not for the faint-hearted. There may be situations
where our support staff asks you if you can use a packet sniffer to troubleshoot
connection or application problems. If you can, we recommend using Wireshark
(available from www.wireshark.org or www.ethereal.org – Ethereal is the historical
name of Wireshark). In most cases you should run Wireshark on the same PC as the
YF client, and you should either capture on the interface that connects the YF client
to the YF server or on the interface that connects other PCs to the YF client PC,
depending on the nature of your problem. Let the capture run, then re-create the
problem, then stop the capture. Save the capture to a file and mail it to us (again, we
like it if you compress it).
where our support staff asks you if you can use a packet sniffer to troubleshoot
connection or application problems. If you can, we recommend using Wireshark
(available from www.wireshark.org or www.ethereal.org – Ethereal is the historical
name of Wireshark). In most cases you should run Wireshark on the same PC as the
YF client, and you should either capture on the interface that connects the YF client
to the YF server or on the interface that connects other PCs to the YF client PC,
depending on the nature of your problem. Let the capture run, then re-create the
problem, then stop the capture. Save the capture to a file and mail it to us (again, we
like it if you compress it).
4.4 Using encrypted email to contact us
If you are concerned that someone may be spying on you or that your dumps reveal
details that you would rather keep confidential, we recommend that you use PGP
when contacting us. This public key belongs to
details that you would rather keep confidential, we recommend that you use PGP
when contacting us. This public key belongs to
available from many key servers):
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.3 (MingW32)
mQGiBEVlp18RBAD6ZFqJn/hhdpwsI6P/yFVt8XaBVDbQXRRrgoDiquszCxpr3GeR
5T5RgE7/0cJQaUjq5vqTm7cto2d/NMwkNeOONnOucnDuooRujzkb3JdptuL0eR0n
FUMH28QCkQBL3Er0o7cUORff34tPjI+LmvMhqAqSuBdx51swgh4RXDAJ1wCgp0St
CC23WL/CSXAnhjPZcapgUR8EAOykbSfcqJALW6EnbqYOsXtVv8A8aoZbagQQxvBw
0Doc6rcg7eEF5Bn0QJVKy11Jnz1fjNcflP+1NxdlBNN+COBEBQiJmLVEEE5VkxK7
GOWgvaDLRSDoWTL0lT2p+FGh91TNp0QSmxQ15+2c3HbOKwVFgoozkr1dRaD6XNPv
r3iCA/9BtU70ZXHVFb8yjcG03maMNTyA+MMtsKQ77dULOdAYii8GDQ8SdLgr1gAk
B3O9IYupa9X/uojLx4jNuq7/zXmTw8z1+dok9rBT8fMxn5nF/IOcIbgAgqN1Kx0U
EP6O6iIti5Vkmwh6LW6ZwlF8Hz0LNxMc5BITH2e2oLiL59e7LrQvWW91ciBGcmVl
Version: GnuPG v1.4.3 (MingW32)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