JustPaste.it

2020/06/19 13:02:17.244| 1,2| main.cc(1457) SquidMain: Doing post-config initialization

2020/06/19 13:02:17.244| 1,2| main.cc(1459) SquidMain: running RegisteredRunner::finalizeConfig
2020/06/19 13:02:17.244| 1,2| main.cc(1460) SquidMain: running RegisteredRunner::claimMemoryNeeds
2020/06/19 13:02:17.244| 1,2| main.cc(1461) SquidMain: running RegisteredRunner::useConfig
2020/06/19 13:02:17.253 kid1| 1,2| main.cc(1457) SquidMain: Doing post-config initialization

2020/06/19 13:02:17.253 kid1| 1,2| main.cc(1459) SquidMain: running RegisteredRunner::finalizeConfig
2020/06/19 13:02:17.253 kid1| 1,2| main.cc(1460) SquidMain: running RegisteredRunner::claimMemoryNeeds
2020/06/19 13:02:17.253 kid1| 1,2| main.cc(1461) SquidMain: running RegisteredRunner::useConfig
2020/06/19 13:02:17.253 kid1| Set Current Directory to /var/spool/squid
2020/06/19 13:02:17.253 kid1| Starting Squid Cache version 3.5.27 for x86_64-pc-linux-gnu...
2020/06/19 13:02:17.253 kid1| Service Name: squid
2020/06/19 13:02:17.253 kid1| Process ID 11985
2020/06/19 13:02:17.253 kid1| Process Roles: worker
2020/06/19 13:02:17.253 kid1| With 65535 file descriptors available
2020/06/19 13:02:17.253 kid1| Initializing IP Cache...
2020/06/19 13:02:17.258 kid1| 78,2| dns_internal.cc(1525) dnsInit: idnsInit: attempt open DNS socket to: [::]
2020/06/19 13:02:17.258 kid1| 78,2| dns_internal.cc(1534) dnsInit: idnsInit: attempt open DNS socket to: 0.0.0.0
2020/06/19 13:02:17.258 kid1| DNS Socket created at [::], FD 6
2020/06/19 13:02:17.258 kid1| DNS Socket created at 0.0.0.0, FD 8
2020/06/19 13:02:17.258 kid1| Adding nameserver 127.0.0.53 from /etc/resolv.conf
2020/06/19 13:02:17.258 kid1| 46,2| Format.cc(64) parse: got definition '%>a/%>A %un %>rm myip=%la myport=%lp'
2020/06/19 13:02:17.258 kid1| 46,2| Format.cc(64) parse: got definition '%>a/%>A %un %>rm myip=%la myport=%lp'
2020/06/19 13:02:17.258 kid1| helperOpenServers: Starting 0/20 'basic_ncsa_auth' processes
2020/06/19 13:02:17.258 kid1| helperOpenServers: No 'basic_ncsa_auth' processes needed.
2020/06/19 13:02:17.258 kid1| Logfile: opening log daemon:/var/log/squid/access.log
2020/06/19 13:02:17.258 kid1| Logfile Daemon: opening log /var/log/squid/access.log
2020/06/19 13:02:17.262 kid1| 71,2| store_digest.cc(95) storeDigestCalcCap: have: 0, want 0 entries; limits: [1, 0]
2020/06/19 13:02:17.262 kid1| 70,2| CacheDigest.cc(49) cacheDigestInit: cacheDigestInit: capacity: 1 entries, bpe: ; size: 1 bytes
2020/06/19 13:02:17.262 kid1| Local cache digest enabled; rebuild/rewrite every 3600/3600 sec
2020/06/19 13:02:17.262 kid1| Store logging disabled
2020/06/19 13:02:17.262 kid1| Swap maxSize 0 + 262144 KB, estimated 20164 objects
2020/06/19 13:02:17.262 kid1| Target number of buckets: 1008
2020/06/19 13:02:17.262 kid1| Using 8192 Store buckets
2020/06/19 13:02:17.262 kid1| Max Mem size: 262144 KB
2020/06/19 13:02:17.262 kid1| Max Swap size: 0 KB
2020/06/19 13:02:17.262 kid1| Using Least Load store dir selection
2020/06/19 13:02:17.262 kid1| Set Current Directory to /var/spool/squid
2020/06/19 13:02:17.262 kid1| Finished loading MIME types and icons.
2020/06/19 13:02:17.271 kid1| 80,2| wccp.cc(112) wccpConnectionOpen: WCCPv1 disabled.
2020/06/19 13:02:17.271 kid1| 80,2| wccp2.cc(960) wccp2ConnectionOpen: WCCPv2 Disabled. No IPv4 Router(s) configured.
2020/06/19 13:02:17.271 kid1| 33,2| AsyncCall.cc(26) AsyncCall: The AsyncCall clientListenerConnectionOpened constructed, this=0x557412a88c00 [call3]
2020/06/19 13:02:17.271 kid1| 33,2| AsyncCall.cc(93) ScheduleCall: StartListening.cc(59) will call clientListenerConnectionOpened(local=[::]:3128 remote=[::] FD 11 flags=9, err=0, HTTP Socket port=0x557412a88c60) [call3]
2020/06/19 13:02:17.271 kid1| HTCP Disabled.
2020/06/19 13:02:17.271 kid1| Pinger socket opened on FD 13
2020/06/19 13:02:17.271 kid1| 37,2| IcmpSquid.cc(90) SendEcho: to [::1], opcode 1, len 13
2020/06/19 13:02:17.272 kid1| 37,2| IcmpSquid.cc(90) SendEcho: to 127.0.0.1, opcode 1, len 9
2020/06/19 13:02:17.272 kid1| Squid plugin modules loaded: 0
2020/06/19 13:02:17.272 kid1| Adaptation support is on
2020/06/19 13:02:17.272 kid1| 93,2| Config.cc(211) FinalizeEach: Initialized 1 message adaptation services
2020/06/19 13:02:17.273 kid1| 93,2| Config.cc(211) FinalizeEach: Initialized 0 message adaptation service groups
2020/06/19 13:02:17.273 kid1| 93,2| Config.cc(211) FinalizeEach: Initialized 0 message adaptation access rules
2020/06/19 13:02:17.273 kid1| 33,2| AsyncCallQueue.cc(55) fireNext: entering clientListenerConnectionOpened(local=[::]:3128 remote=[::] FD 11 flags=9, err=0, HTTP Socket port=0x557412a88c60)
2020/06/19 13:02:17.273 kid1| 33,2| AsyncCall.cc(38) make: make call clientListenerConnectionOpened [call3]
2020/06/19 13:02:17.273 kid1| Accepting HTTP Socket connections at local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:17.273 kid1| 33,2| AsyncCallQueue.cc(57) fireNext: leaving clientListenerConnectionOpened(local=[::]:3128 remote=[::] FD 11 flags=9, err=0, HTTP Socket port=0x557412a88c60)
2020/06/19 13:02:17| pinger: Initialising ICMP pinger ...
2020/06/19 13:02:17| pinger: ICMP socket opened.
2020/06/19 13:02:17| pinger: ICMPv6 socket opened
2020/06/19 13:02:17.295| 42,2| IcmpPinger.cc(189) Recv: Pass [::1] off to ICMPv6 module.
2020/06/19 13:02:17.295| 42,2| Icmp.cc(95) Log: pingerLog: 1592551937.295641 [::1] 0
2020/06/19 13:02:17.295| 42,2| IcmpPinger.cc(198) Recv: Pass 127.0.0.1 off to ICMPv4 module.
2020/06/19 13:02:17.295| 42,2| Icmp.cc(95) Log: pingerLog: 1592551937.295719 127.0.0.1 32
2020/06/19 13:02:17.295| 42,2| Icmp.cc(95) Log: pingerLog: 1592551937.295781 [::1] 129 Echo Reply 0ms 1 hops
2020/06/19 13:02:17.295| 42,2| IcmpPinger.cc(211) SendResult: return result to squid. len=76
2020/06/19 13:02:17.295| 42,2| IcmpPinger.cc(211) SendResult: return result to squid. len=7990
2020/06/19 13:02:17.295| 42,2| Icmp.cc(95) Log: pingerLog: 1592551937.295819 127.0.0.1 0 Echo Reply 0ms 1 hops
2020/06/19 13:02:18 kid1| storeLateRelease: released 0 objects
2020/06/19 13:02:23.889 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:23.889 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:23.889 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:43992 FD 10 flags=1
2020/06/19 13:02:23.889 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT www.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: www.google.com:443


----------
2020/06/19 13:02:23.889 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.google.com:443 is AUTH_REQUIRED; last ACL checked: authenticated
2020/06/19 13:02:23.889 kid1| 4,2| errorpage.cc(1261) BuildContent: No existing error page language negotiated for ERR_CACHE_ACCESS_DENIED. Using default error file.
2020/06/19 13:02:23.889 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:23.889 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:23.889 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for CONNECT www.google.com:443 is ALLOWED, because it matched authenticated
2020/06/19 13:02:23.889 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:43992 FD 10 flags=1
2020/06/19 13:02:23.889 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 407 Proxy Authentication Required
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:32:23 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3658
X-Squid-Error: ERR_CACHE_ACCESS_DENIED 0
Vary: Accept-Language
Content-Language: en
Proxy-Authenticate: Basic realm="proxy"
X-Cache: MISS from prillo
X-Cache-Lookup: NONE from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:23.890 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:25.941 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:25.941 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:25.942 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:43994 FD 12 flags=1
2020/06/19 13:02:25.942 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT 0.client-channel.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: 0.client-channel.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:25.942 kid1| Starting new basicauthenticator helpers...
2020/06/19 13:02:25.942 kid1| helperOpenServers: Starting 1/20 'basic_ncsa_auth' processes
2020/06/19 13:02:25.980 kid1| 29,2| User.cc(310) addIp: user 'user1' has been seen at a new IP address (127.0.0.1:43994)
2020/06/19 13:02:25.981 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT 0.client-channel.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:25.981 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:25.981 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT 0.client-channel.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:25.981 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: 0.client-channel.google.com:443' via 0.client-channel.google.com
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for '0.client-channel.google.com:443'
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4003:c04::bd]:443 flags=1
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.194.189:443 flags=1
2020/06/19 13:02:25.994 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:28.569 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:43992 FD 10 flags=1
2020/06/19 13:02:28.569 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT www.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: www.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:28.569 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:28.569 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:28.569 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:28.569 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: www.google.com:443' via www.google.com
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'www.google.com:443'
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:812::2004]:443 flags=1
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=216.58.200.196:443 flags=1
2020/06/19 13:02:28.581 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:29.048 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:29.049 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:29.049 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44000 FD 17 flags=1
2020/06/19 13:02:29.049 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT ssl.gstatic.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: ssl.gstatic.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:29.049 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ssl.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.049 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:29.049 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ssl.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.049 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: ssl.gstatic.com:443' via ssl.gstatic.com
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'ssl.gstatic.com:443'
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:80c::2003]:443 flags=1
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.166.3:443 flags=1
2020/06/19 13:02:29.062 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:29.452 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:29.452 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:29.453 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44004 FD 19 flags=1
2020/06/19 13:02:29.453 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT www.gstatic.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: www.gstatic.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:29.453 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.453 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:29.453 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.453 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: www.gstatic.com:443' via www.gstatic.com
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'www.gstatic.com:443'
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:80a::2003]:443 flags=1
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.167.3:443 flags=1
2020/06/19 13:02:29.466 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:29.654 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:29.654 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:29.654 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44008 FD 21 flags=1
2020/06/19 13:02:29.654 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT apis.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: apis.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:29.654 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT apis.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.654 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:29.654 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT apis.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:29.654 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: apis.google.com:443' via apis.google.com
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'apis.google.com:443'
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:806::200e]:443 flags=1
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=216.58.221.46:443 flags=1
2020/06/19 13:02:29.666 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:35.415 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:35.415 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:35.415 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:35.415 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.faecbook.com/ HTTP/1.1
Host: www.faecbook.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Upgrade-Insecure-Requests: 1


----------
2020/06/19 13:02:35.415 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.faecbook.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:35.415 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:35.415 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.faecbook.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:35.415 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.faecbook.com/
2020/06/19 13:02:35.415 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.faecbook.com/' via www.faecbook.com
2020/06/19 13:02:37.812 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Failed to select source for 'http://www.faecbook.com/'
2020/06/19 13:02:37.812 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:37.812 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:37.812 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:37.923 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.faecbook.com/ is ALLOWED, because it matched localhost
2020/06/19 13:02:37.923 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:37.924 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 503 Service Unavailable
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:32:37 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 4008
X-Squid-Error: ERR_DNS_FAIL 0
Vary: Accept-Language
Content-Language: en-us
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:37.924 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:37.924 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:38.444 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:38.444 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.faecbook.com/squid-internal-static/icons/SN.png HTTP/1.1
Host: www.faecbook.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Referer: http://www.faecbook.com/


----------
2020/06/19 13:02:38.444 kid1| 33,2| client_side.cc(2766) clientProcessRequest: internal URL found: http://www.faecbook.com:80 (global_internal_static on)
2020/06/19 13:02:38.445 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.faecbook.com/squid-internal-static/icons/SN.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:38.445 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:38.445 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://prillo:3128/squid-internal-static/icons/SN.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:38.445 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://prillo:3128/squid-internal-static/icons/SN.png is ALLOWED, because it matched localhost
2020/06/19 13:02:38.445 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:38.445 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Date: Fri, 19 Jun 2020 07:32:38 GMT
Server: squid/3.5.27
Mime-Version: 1.0
Content-Type: image/png
Content-Length: 11366
Last-Modified: Thu, 07 May 2020 14:03:32 GMT
Cache-Control: max-age=86400
X-Cache: HIT from prillo
X-Cache-Lookup: HIT from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:38.462 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:38.462 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.faecbook.com/favicon.ico HTTP/1.1
Host: www.faecbook.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:38.462 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.faecbook.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:38.462 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:38.463 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.faecbook.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:38.463 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.faecbook.com/favicon.ico
2020/06/19 13:02:38.463 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.faecbook.com/favicon.ico' via www.faecbook.com
2020/06/19 13:02:38.463 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Failed to select source for 'http://www.faecbook.com/favicon.ico'
2020/06/19 13:02:38.463 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:38.463 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:38.463 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:38.464 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.faecbook.com/favicon.ico is ALLOWED, because it matched localhost
2020/06/19 13:02:38.464 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:38.464 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 503 Service Unavailable
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:32:38 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3929
X-Squid-Error: ERR_DNS_FAIL 0
Vary: Accept-Language
Content-Language: en-us
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:38.464 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:38.464 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:40.047 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:40.047 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:40.048 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44014 FD 24 flags=1
2020/06/19 13:02:40.048 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT www.facebook.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: www.facebook.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:40.048 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.facebook.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:40.048 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:40.048 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.facebook.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:40.048 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: www.facebook.com:443' via www.facebook.com
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'www.facebook.com:443'
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2a03:2880:f15c:183:face:b00c:0:25de]:443 flags=1
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=157.240.218.35:443 flags=1
2020/06/19 13:02:40.062 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:40.921 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:40.921 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:40.921 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44018 FD 26 flags=1
2020/06/19 13:02:40.921 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT static.xx.fbcdn.net:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: static.xx.fbcdn.net:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:40.921 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT static.xx.fbcdn.net:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:40.921 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:40.921 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT static.xx.fbcdn.net:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:40.921 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: static.xx.fbcdn.net:443' via static.xx.fbcdn.net
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'static.xx.fbcdn.net:443'
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2a03:2880:f05c:110:face:b00c:0:3]:443 flags=1
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=157.240.218.15:443 flags=1
2020/06/19 13:02:40.933 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:41.571 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:41.571 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:41.572 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:41.572 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:41.581 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44024 FD 29 flags=1
2020/06/19 13:02:41.581 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT facebook.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: facebook.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:41.581 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT facebook.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:41.581 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:41.581 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT facebook.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:41.581 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: facebook.com:443' via facebook.com
2020/06/19 13:02:41.581 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44022 FD 28 flags=1
2020/06/19 13:02:41.582 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT static.xx.fbcdn.net:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: static.xx.fbcdn.net:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:41.582 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT static.xx.fbcdn.net:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:41.582 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:41.582 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT static.xx.fbcdn.net:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: static.xx.fbcdn.net:443' via static.xx.fbcdn.net
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'static.xx.fbcdn.net:443'
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2a03:2880:f05c:110:face:b00c:0:3]:443 flags=1
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=157.240.218.15:443 flags=1
2020/06/19 13:02:41.582 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'facebook.com:443'
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2a03:2880:f15c:183:face:b00c:0:25de]:443 flags=1
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=157.240.218.35:443 flags=1
2020/06/19 13:02:41.593 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:43.691 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:43.691 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:43.691 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44030 FD 32 flags=1
2020/06/19 13:02:43.691 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT fbsbx.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: fbsbx.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:43.691 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT fbsbx.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:43.692 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:43.692 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT fbsbx.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:43.692 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: fbsbx.com:443' via fbsbx.com
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'fbsbx.com:443'
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2a03:2880:f15c:183:face:b00c:0:25de]:443 flags=1
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=157.240.218.35:443 flags=1
2020/06/19 13:02:43.705 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:49.683 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:49.683 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/ HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Upgrade-Insecure-Requests: 1


----------
2020/06/19 13:02:49.684 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:49.684 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:49.684 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:49.684 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.baidu.com/
2020/06/19 13:02:49.684 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/' via www.baidu.com
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/'
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:49.710 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:49.797 kid1| 37,2| IcmpSquid.cc(90) SendEcho: to 45.113.192.101, opcode 3, len 13
2020/06/19 13:02:49.798| 42,2| IcmpPinger.cc(198) Recv: Pass 45.113.192.101 off to ICMPv4 module.
2020/06/19 13:02:49.798| 42,2| Icmp.cc(95) Log: pingerLog: 1592551969.798225 45.113.192.101 32
2020/06/19 13:02:49.798 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33746 remote=45.113.192.101:80 FD 34 flags=1
2020/06/19 13:02:49.798 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Upgrade-Insecure-Requests: 1
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:49.886| 42,2| IcmpPinger.cc(211) SendResult: return result to squid. len=7994
2020/06/19 13:02:49.887| 42,2| Icmp.cc(95) Log: pingerLog: 1592551969.886833 45.113.192.101 0 Echo Reply 88ms 9 hops
2020/06/19 13:02:49.948 kid1| ctx: enter level 0: 'http://www.baidu.com/'
2020/06/19 13:02:49.948 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33746 remote=45.113.192.101:80 FD 34 flags=1
2020/06/19 13:02:49.948 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Bdpagetype: 1
Bdqid: 0x83b1bd790001e97a
Cache-Control: private
Connection: keep-alive
Content-Encoding: gzip
Content-Type: text/html;charset=utf-8
Date: Fri, 19 Jun 2020 07:32:49 GMT
Expires: Fri, 19 Jun 2020 07:32:49 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Server: BWS/1.1
Set-Cookie: BAIDUID=78ECD6FC0F2BF4525306F45043544AD0:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: PSTM=1592551969; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; max-age=31536000; expires=Sat, 19-Jun-21 07:32:49 GMT; domain=.baidu.com; path=/; version=1; comment=bd
Set-Cookie: BDSVRTM=6; path=/
Set-Cookie: BD_HOME=1; path=/
Set-Cookie: H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109; path=/; domain=.baidu.com
Traceid: 159255196904455447149489574217235163514
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Ua-Compatible: IE=Edge,chrome=1
Transfer-Encoding: chunked

670

----------
2020/06/19 13:02:49.948 kid1| ctx: exit level 0
2020/06/19 13:02:49.948 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:49.948 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/ is ALLOWED, because it matched localhost
2020/06/19 13:02:49.948 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:49.948 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Bdpagetype: 1
Bdqid: 0x83b1bd790001e97a
Cache-Control: private
Content-Encoding: gzip
Content-Type: text/html;charset=utf-8
Date: Fri, 19 Jun 2020 07:32:49 GMT
Expires: Fri, 19 Jun 2020 07:32:49 GMT
P3p: CP=" OTI DSP COR IVA OUR IND COM "
P3p: CP=" OTI DSP COR IVA OUR IND COM "
Server: BWS/1.1
Set-Cookie: BAIDUID=78ECD6FC0F2BF4525306F45043544AD0:FG=1; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: PSTM=1592551969; expires=Thu, 31-Dec-37 23:55:55 GMT; max-age=2147483647; path=/; domain=.baidu.com
Set-Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; max-age=31536000; expires=Sat, 19-Jun-21 07:32:49 GMT; domain=.baidu.com; path=/; version=1; comment=bd
Set-Cookie: BDSVRTM=6; path=/
Set-Cookie: BD_HOME=1; path=/
Set-Cookie: H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109; path=/; domain=.baidu.com
Traceid: 159255196904455447149489574217235163514
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Ua-Compatible: IE=Edge,chrome=1
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Transfer-Encoding: chunked
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:49.948 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:49.948 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:49.949 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:49.949 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:49.959 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.038 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.038 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.039 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.040 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.040 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.051 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.125 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.126 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.129 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.130 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.131 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.131 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:50.204 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:50.204 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.205 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.205 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.205 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.205 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png
2020/06/19 13:02:50.205 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png' via ss.bdimg.com
2020/06/19 13:02:50.206 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.206 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.206 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44036 FD 35 flags=1
2020/06/19 13:02:50.206 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.206 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.206 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.206 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.206 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44036 FD 35 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png
2020/06/19 13:02:50.206 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png' via ss.bdimg.com
2020/06/19 13:02:50.207 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.207 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.207 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44038 FD 36 flags=1
2020/06/19 13:02:50.207 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.207 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.207 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.207 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.207 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44038 FD 36 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png
2020/06/19 13:02:50.207 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png' via ss.bdimg.com
2020/06/19 13:02:50.210 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.210 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.210 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44040 FD 37 flags=1
2020/06/19 13:02:50.210 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.210 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.210 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.210 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.210 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44040 FD 37 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png
2020/06/19 13:02:50.210 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png' via ss.bdimg.com
2020/06/19 13:02:50.211 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.211 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.211 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44042 FD 38 flags=1
2020/06/19 13:02:50.211 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.211 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.211 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.211 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.211 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44042 FD 38 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png
2020/06/19 13:02:50.211 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png' via ss.bdimg.com
2020/06/19 13:02:50.212 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.212 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.212 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44044 FD 39 flags=1
2020/06/19 13:02:50.212 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.212 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.212 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.212 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.212 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44044 FD 39 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png
2020/06/19 13:02:50.212 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png' via ss.bdimg.com
2020/06/19 13:02:50.212 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.212 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.212 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44046 FD 40 flags=1
2020/06/19 13:02:50.212 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.212 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.213 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.213 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.213 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44046 FD 40 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png
2020/06/19 13:02:50.213 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png' via ss.bdimg.com
2020/06/19 13:02:50.213 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.213 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.213 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44048 FD 41 flags=1
2020/06/19 13:02:50.213 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.213 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.213 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.213 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.213 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44048 FD 41 flags=1, url=http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png
2020/06/19 13:02:50.213 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png' via ss.bdimg.com
2020/06/19 13:02:50.215 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.215 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.215 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1
2020/06/19 13:02:50.215 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:50.215 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.215 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.215 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.215 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1, url=http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png' via www.baidu.com
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png'
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.216 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33746 remote=45.113.192.101:80 FD 34 flags=1
2020/06/19 13:02:50.216 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.216 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.216 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.216 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44052 FD 43 flags=1
2020/06/19 13:02:50.216 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/img/flexible/logo/pc/result.png HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:50.216 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/flexible/logo/pc/result.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.216 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.216 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/flexible/logo/pc/result.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.216 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44052 FD 43 flags=1, url=http://www.baidu.com/img/flexible/logo/pc/result.png
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/img/flexible/logo/pc/result.png' via www.baidu.com
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/img/flexible/logo/pc/result.png'
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:50.216 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.219 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.219 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.220 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44056 FD 45 flags=1
2020/06/19 13:02:50.220 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/img/flexible/logo/pc/result@2.png HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:50.220 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/flexible/logo/pc/result@2.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.220 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.220 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/flexible/logo/pc/result@2.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.220 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44056 FD 45 flags=1, url=http://www.baidu.com/img/flexible/logo/pc/result@2.png
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/img/flexible/logo/pc/result@2.png' via www.baidu.com
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/img/flexible/logo/pc/result@2.png'
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:50.220 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.231 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.231 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.231 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44060 FD 47 flags=1
2020/06/19 13:02:50.231 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.231 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.231 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.231 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.231 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44060 FD 47 flags=1, url=http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png
2020/06/19 13:02:50.231 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png' via ss.bdimg.com
2020/06/19 13:02:50.243 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:50.243 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:50.243 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44062 FD 48 flags=1
2020/06/19 13:02:50.243 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png HTTP/1.1
Host: ss.bdimg.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:50.243 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.243 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:50.243 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:50.243 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44062 FD 48 flags=1, url=http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png
2020/06/19 13:02:50.243 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png' via ss.bdimg.com
2020/06/19 13:02:50.302 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33766 remote=45.113.192.101:80 FD 44 flags=1
2020/06/19 13:02:50.302 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /img/flexible/logo/pc/result.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.313 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:50.313 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /img/flexible/logo/pc/result@2.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.375 kid1| ctx: enter level 0: 'http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png'
2020/06/19 13:02:50.375 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33746 remote=45.113.192.101:80 FD 34 flags=1
2020/06/19 13:02:50.375 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 15444
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
Etag: "3c54-5a85ce9c4ce00"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Thu, 18 Jun 2020 14:51:36 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:50.375 kid1| ctx: exit level 0
2020/06/19 13:02:50.375 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/img/PCtm_d9c8750bed0b3c7d089fa7d55720d6cf.png is ALLOWED, because it matched localhost
2020/06/19 13:02:50.375 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1
2020/06/19 13:02:50.375 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 15444
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
ETag: "3c54-5a85ce9c4ce00"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Thu, 18 Jun 2020 14:51:36 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:50.422 kid1| ctx: enter level 0: 'http://www.baidu.com/img/flexible/logo/pc/result.png'
2020/06/19 13:02:50.423 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33766 remote=45.113.192.101:80 FD 44 flags=1
2020/06/19 13:02:50.423 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 6617
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
Etag: "19d9-5a533d00d4900"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Sat, 09 May 2020 09:33:56 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:50.423 kid1| ctx: exit level 0
2020/06/19 13:02:50.423 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/img/flexible/logo/pc/result.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:50.423 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44052 FD 43 flags=1
2020/06/19 13:02:50.423 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 6617
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
ETag: "19d9-5a533d00d4900"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Sat, 09 May 2020 09:33:56 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:50.441 kid1| ctx: enter level 0: 'http://www.baidu.com/img/flexible/logo/pc/result@2.png'
2020/06/19 13:02:50.441 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:50.441 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 12802
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
Etag: "3202-5a533d00d4900"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Sat, 09 May 2020 09:33:56 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:50.441 kid1| ctx: exit level 0
2020/06/19 13:02:50.441 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/img/flexible/logo/pc/result@2.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:50.441 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44056 FD 45 flags=1
2020/06/19 13:02:50.441 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 12802
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:50 GMT
ETag: "3202-5a533d00d4900"
Expires: Mon, 17 Jun 2030 07:32:50 GMT
Last-Modified: Sat, 09 May 2020 09:33:56 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png'
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=123.125.115.30:80 flags=1
2020/06/19 13:02:50.598 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:50.918 kid1| 37,2| IcmpSquid.cc(90) SendEcho: to 123.125.115.30, opcode 3, len 12
2020/06/19 13:02:50.918| 42,2| IcmpPinger.cc(198) Recv: Pass 123.125.115.30 off to ICMPv4 module.
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41242 remote=123.125.115.30:80 FD 50 flags=1
2020/06/19 13:02:50.918| 42,2| Icmp.cc(95) Log: pingerLog: 1592551970.918201 123.125.115.30 32
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41244 remote=123.125.115.30:80 FD 51 flags=1
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/qrcode/qrcode@2x-b2d2779047.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41250 remote=123.125.115.30:80 FD 54 flags=1
2020/06/19 13:02:50.918 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/wenku@2x-f3aba893c1.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41252 remote=123.125.115.30:80 FD 55 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41254 remote=123.125.115.30:80 FD 56 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/tupian@2x-482fc011fc.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41256 remote=123.125.115.30:80 FD 57 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/baike@2x-1fe3db7fa6.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41258 remote=123.125.115.30:80 FD 58 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/zhidao@2x-e9b427ecc4.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41240 remote=123.125.115.30:80 FD 49 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/baiduyun@2x-e0be79e69e.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41248 remote=123.125.115.30:80 FD 53 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/jingyan@2x-e53eac48cb.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:41246 remote=123.125.115.30:80 FD 52 flags=1
2020/06/19 13:02:50.919 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /static/superman/img/topnav/yinyue@2x-c18adacacb.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/
DNT: 1
Host: ss.bdimg.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:51.225| 42,2| IcmpPinger.cc(211) SendResult: return result to squid. len=7993
2020/06/19 13:02:51.225 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png'
2020/06/19 13:02:51.225| 42,2| Icmp.cc(95) Log: pingerLog: 1592551971.225374 123.125.115.30 0 Echo Reply 308ms 16 hops
2020/06/19 13:02:51.225 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41250 remote=123.125.115.30:80 FD 54 flags=1
2020/06/19 13:02:51.225 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 2920
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-b68"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.226 kid1| ctx: exit level 0
2020/06/19 13:02:51.226 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/wenku@2x-f3aba893c1.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.226 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44044 FD 39 flags=1
2020/06/19 13:02:51.226 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 2920
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-b68"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.226 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png'
2020/06/19 13:02:51.226 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41242 remote=123.125.115.30:80 FD 50 flags=1
2020/06/19 13:02:51.226 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 900
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5ec3a791-384"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Tue, 19 May 2020 09:32:01 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.226 kid1| ctx: exit level 0
2020/06/19 13:02:51.226 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png'
2020/06/19 13:02:51.226 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41248 remote=123.125.115.30:80 FD 53 flags=1
2020/06/19 13:02:51.226 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 3869
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-f1d"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41252 remote=123.125.115.30:80 FD 55 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 6733
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-1a4d"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41256 remote=123.125.115.30:80 FD 57 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 3145
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-c49"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41258 remote=123.125.115.30:80 FD 58 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 2697
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-a89"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41254 remote=123.125.115.30:80 FD 56 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 2123
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-84b"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41240 remote=123.125.115.30:80 FD 49 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 4735
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-127f"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.227 kid1| ctx: exit level 0
2020/06/19 13:02:51.227 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png'
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41246 remote=123.125.115.30:80 FD 52 flags=1
2020/06/19 13:02:51.227 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 3695
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5e7c3f77-e6f"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.228 kid1| ctx: exit level 0
2020/06/19 13:02:51.228 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode-hover@2x-9eb662f4e8.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44062 FD 48 flags=1
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 900
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5ec3a791-384"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Tue, 19 May 2020 09:32:01 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.228 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/jingyan@2x-e53eac48cb.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44046 FD 40 flags=1
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 3869
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-f1d"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.228 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/baobaozhidao@2x-af409f9dbe.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44042 FD 38 flags=1
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 6733
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-1a4d"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.228 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/baike@2x-1fe3db7fa6.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44038 FD 36 flags=1
2020/06/19 13:02:51.228 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 3145
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-c49"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.229 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/zhidao@2x-e9b427ecc4.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44036 FD 35 flags=1
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 2697
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-a89"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.229 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/tupian@2x-482fc011fc.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44040 FD 37 flags=1
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 2123
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-84b"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.229 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/baiduyun@2x-e0be79e69e.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:51.229 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 4735
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-127f"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.230 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/topnav/yinyue@2x-c18adacacb.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.230 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44048 FD 41 flags=1
2020/06/19 13:02:51.230 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 3695
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5e7c3f77-e6f"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Thu, 26 Mar 2020 05:36:55 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.386 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:51.386 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/favicon.ico HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:51.386 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.386 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:51.386 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.386 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.baidu.com/favicon.ico
2020/06/19 13:02:51.386 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/favicon.ico' via www.baidu.com
2020/06/19 13:02:51.386 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/favicon.ico'
2020/06/19 13:02:51.386 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:51.386 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:51.387 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:51.387 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:51.387 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:51.387 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:51.387 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /favicon.ico HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:51.492 kid1| ctx: enter level 0: 'http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png'
2020/06/19 13:02:51.492 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:41244 remote=123.125.115.30:80 FD 51 flags=1
2020/06/19 13:02:51.492 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Connection: keep-alive
Content-Length: 901
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "5ec3a791-385"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Tue, 19 May 2020 09:32:01 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:51.492 kid1| ctx: exit level 0
2020/06/19 13:02:51.492 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://ss.bdimg.com/static/superman/img/qrcode/qrcode@2x-b2d2779047.png is ALLOWED, because it matched localhost
2020/06/19 13:02:51.492 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44060 FD 47 flags=1
2020/06/19 13:02:51.492 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=2592000
Content-Length: 901
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "5ec3a791-385"
Expires: Sun, 19 Jul 2020 07:32:51 GMT
Last-Modified: Tue, 19 May 2020 09:32:01 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.518 kid1| ctx: enter level 0: 'http://www.baidu.com/favicon.ico'
2020/06/19 13:02:51.518 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:51.518 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Encoding: gzip
Content-Length: 984
Content-Type: image/x-icon
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "423e-55c8139094a40"
Last-Modified: Fri, 27 Oct 2017 06:16:01 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent


----------
2020/06/19 13:02:51.518 kid1| ctx: exit level 0
2020/06/19 13:02:51.518 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/favicon.ico is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:51.518 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:51.518 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Encoding: gzip
Content-Length: 984
Content-Type: image/x-icon
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "423e-55c8139094a40"
Last-Modified: Fri, 27 Oct 2017 06:16:01 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.675 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:51.675 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/baidu.html?from=noscript HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Upgrade-Insecure-Requests: 1


----------
2020/06/19 13:02:51.675 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/baidu.html?from=noscript is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.675 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:51.675 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/baidu.html?from=noscript is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.675 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.baidu.com/baidu.html?from=noscript
2020/06/19 13:02:51.675 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/baidu.html?from=noscript' via www.baidu.com
2020/06/19 13:02:51.675 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/baidu.html?from=noscript'
2020/06/19 13:02:51.675 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:51.675 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:51.676 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:51.676 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:51.676 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:51.676 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:51.676 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /baidu.html?from=noscript HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Upgrade-Insecure-Requests: 1
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=0
Connection: keep-alive


----------
2020/06/19 13:02:51.810 kid1| ctx: enter level 0: 'http://www.baidu.com/baidu.html?from=noscript'
2020/06/19 13:02:51.810 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:51.810 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=86400
Content-Encoding: gzip
Content-Length: 1131
Content-Type: text/html
Date: Fri, 19 Jun 2020 07:32:51 GMT
Etag: "b83-59bafefa98680"
Expires: Sat, 20 Jun 2020 07:32:51 GMT
Last-Modified: Thu, 09 Jan 2020 07:27:06 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent


----------
2020/06/19 13:02:51.810 kid1| ctx: exit level 0
2020/06/19 13:02:51.810 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/baidu.html?from=noscript is ALLOWED, because it matched localhost
2020/06/19 13:02:51.810 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:51.810 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=86400
Content-Encoding: gzip
Content-Length: 1131
Content-Type: text/html
Date: Fri, 19 Jun 2020 07:32:51 GMT
ETag: "b83-59bafefa98680"
Expires: Sat, 20 Jun 2020 07:32:51 GMT
Last-Modified: Thu, 09 Jan 2020 07:27:06 GMT
Server: Apache
Vary: Accept-Encoding,User-Agent
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:51.905 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:51.905 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:51.905 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44084 FD 59 flags=1
2020/06/19 13:02:51.906 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT ss1.bdstatic.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: ss1.bdstatic.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:51.906 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ss1.bdstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.906 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:51.906 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ss1.bdstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:51.906 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: ss1.bdstatic.com:443' via ss1.bdstatic.com
2020/06/19 13:02:52.493 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:52.493 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:52.493 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44086 FD 60 flags=1
2020/06/19 13:02:52.493 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT play.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: play.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:52.493 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT play.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.493 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:52.493 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT play.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.493 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: play.google.com:443' via play.google.com
2020/06/19 13:02:52.497 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'ss1.bdstatic.com:443'
2020/06/19 13:02:52.497 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:52.497 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:52.497 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=103.235.46.90:443 flags=1
2020/06/19 13:02:52.497 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'play.google.com:443'
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:80e::200e]:443 flags=1
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.27.174:443 flags=1
2020/06/19 13:02:52.509 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:52.770 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:52.770 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:52.770 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44092 FD 63 flags=1
2020/06/19 13:02:52.770 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT play.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: play.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:02:52.770 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT play.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.770 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:52.770 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT play.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.770 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: play.google.com:443' via play.google.com
2020/06/19 13:02:52.770 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'play.google.com:443'
2020/06/19 13:02:52.770 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:52.770 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:52.771 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:80e::200e]:443 flags=1
2020/06/19 13:02:52.771 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.27.174:443 flags=1
2020/06/19 13:02:52.771 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:52.892 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:52.892 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/img/bd_logo1.png HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/baidu.html?from=noscript
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/bd_logo1.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/bd_logo1.png is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.892 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.baidu.com/img/bd_logo1.png
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/img/bd_logo1.png' via www.baidu.com
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/img/bd_logo1.png'
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:52.892 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:52.892 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /img/bd_logo1.png HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/baidu.html?from=noscript
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:52.892 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1
2020/06/19 13:02:52.892 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.baidu.com/img/gs.gif HTTP/1.1
Host: www.baidu.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/baidu.html?from=noscript
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109


----------
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/gs.gif is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:52.892 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.baidu.com/img/gs.gif is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:52.892 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1, url=http://www.baidu.com/img/gs.gif
2020/06/19 13:02:52.892 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.baidu.com/img/gs.gif' via www.baidu.com
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.baidu.com/img/gs.gif'
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.101:80 flags=1
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=45.113.192.102:80 flags=1
2020/06/19 13:02:52.893 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:52.893 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:33766 remote=45.113.192.101:80 FD 44 flags=1
2020/06/19 13:02:52.893 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /img/gs.gif HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://www.baidu.com/baidu.html?from=noscript
DNT: 1
Cookie: BAIDUID=78ECD6FC0F2BF45290EE9F0AEFAD3932:FG=1; BIDUPSID=78ECD6FC0F2BF4525306F45043544AD0; PSTM=1592551969; BDSVRTM=6; BD_HOME=1; H_PS_PSSID=31906_1467_31326_21116_31660_32046_30824_32109
Host: www.baidu.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:53.014 kid1| ctx: enter level 0: 'http://www.baidu.com/img/gs.gif'
2020/06/19 13:02:53.014 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33766 remote=45.113.192.101:80 FD 44 flags=1
2020/06/19 13:02:53.014 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 91
Content-Type: image/gif
Date: Fri, 19 Jun 2020 07:32:53 GMT
Etag: "5b-511126b7d2380"
Expires: Mon, 17 Jun 2030 07:32:53 GMT
Last-Modified: Thu, 12 Mar 2015 07:34:54 GMT
Server: Apache

GIF89a
----------
2020/06/19 13:02:53.014 kid1| ctx: exit level 0
2020/06/19 13:02:53.014 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/img/gs.gif is ALLOWED, because it matched localhost
2020/06/19 13:02:53.014 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44050 FD 42 flags=1
2020/06/19 13:02:53.014 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 91
Content-Type: image/gif
Date: Fri, 19 Jun 2020 07:32:53 GMT
ETag: "5b-511126b7d2380"
Expires: Mon, 17 Jun 2030 07:32:53 GMT
Last-Modified: Thu, 12 Mar 2015 07:34:54 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:53.021 kid1| ctx: enter level 0: 'http://www.baidu.com/img/bd_logo1.png'
2020/06/19 13:02:53.021 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:33770 remote=45.113.192.101:80 FD 46 flags=1
2020/06/19 13:02:53.021 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 7877
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:53 GMT
Etag: "1ec5-502264e2ae4c0"
Expires: Mon, 17 Jun 2030 07:32:53 GMT
Last-Modified: Wed, 03 Sep 2014 10:00:27 GMT
Server: Apache

PNG

----------
2020/06/19 13:02:53.021 kid1| ctx: exit level 0
2020/06/19 13:02:53.021 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.baidu.com/img/bd_logo1.png is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.log line)
2020/06/19 13:02:53.021 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:53.021 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: max-age=315360000
Content-Length: 7877
Content-Type: image/png
Date: Fri, 19 Jun 2020 07:32:53 GMT
ETag: "1ec5-502264e2ae4c0"
Expires: Mon, 17 Jun 2030 07:32:53 GMT
Last-Modified: Wed, 03 Sep 2014 10:00:27 GMT
Server: Apache
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:54.437 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:02:54.437 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:02:54.437 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:02:54.437 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT mozilla.cloudflare-dns.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: mozilla.cloudflare-dns.com:443


----------
2020/06/19 13:02:54.437 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mozilla.cloudflare-dns.com:443 is AUTH_REQUIRED; last ACL checked: authenticated
2020/06/19 13:02:54.437 kid1| 4,2| errorpage.cc(1261) BuildContent: No existing error page language negotiated for ERR_CACHE_ACCESS_DENIED. Using default error file.
2020/06/19 13:02:54.437 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:54.437 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:54.437 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for CONNECT mozilla.cloudflare-dns.com:443 is ALLOWED, because it matched authenticated
2020/06/19 13:02:54.438 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:02:54.438 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 407 Proxy Authentication Required
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:32:54 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3706
X-Squid-Error: ERR_CACHE_ACCESS_DENIED 0
Vary: Accept-Language
Content-Language: en
Proxy-Authenticate: Basic realm="proxy"
X-Cache: MISS from prillo
X-Cache-Lookup: NONE from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:54.438 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:02:54.592 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:54.592 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.neverssl.com/ HTTP/1.1
Host: www.neverssl.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Upgrade-Insecure-Requests: 1


----------
2020/06/19 13:02:54.592 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.neverssl.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:54.592 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:54.592 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.neverssl.com/ is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:54.592 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.neverssl.com/
2020/06/19 13:02:54.592 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.neverssl.com/' via www.neverssl.com
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.neverssl.com/'
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:7600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:fc00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:5600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:b400:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:4a00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9400:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:ec00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.43:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.222:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.9:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.110:80 flags=1
2020/06/19 13:02:54.631 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:7600:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:fc00:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:5600:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:e00:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:b400:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:4a00:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:9400:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.632 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: www.neverssl.com [2600:9000:2079:ec00:0:ec4b:cb00:21]:80
2020/06/19 13:02:54.644 kid1| 37,2| IcmpSquid.cc(90) SendEcho: to 13.35.221.43, opcode 3, len 16
2020/06/19 13:02:54.644| 42,2| IcmpPinger.cc(198) Recv: Pass 13.35.221.43 off to ICMPv4 module.
2020/06/19 13:02:54.644 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:53370 remote=13.35.221.43:80 FD 66 flags=1
2020/06/19 13:02:54.644 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Upgrade-Insecure-Requests: 1
Host: www.neverssl.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:54.644| 42,2| Icmp.cc(95) Log: pingerLog: 1592551974.644650 13.35.221.43 32
2020/06/19 13:02:54.656| 42,2| IcmpPinger.cc(211) SendResult: return result to squid. len=7997
2020/06/19 13:02:54.656| 42,2| Icmp.cc(95) Log: pingerLog: 1592551974.656155 13.35.221.43 0 Echo Reply 11ms 9 hops
2020/06/19 13:02:54.657 kid1| ctx: enter level 0: 'http://www.neverssl.com/'
2020/06/19 13:02:54.657 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:53370 remote=13.35.221.43:80 FD 66 flags=1
2020/06/19 13:02:54.657 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Date: Thu, 18 Jun 2020 21:02:11 GMT
Last-Modified: Thu, 06 Jun 2019 04:19:28 GMT
Server: AmazonS3
Content-Encoding: gzip
Vary: Accept-Encoding
X-Cache: Hit from cloudfront
Via: 1.1 4c0ee71d8032304fad715fcdba22fe10.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: flvd8ba4hRxLdwcPlhYHXTZaGjq0uUypMz185M5tWkih03rhPH1v5A==
Age: 37845


----------
2020/06/19 13:02:54.657 kid1| ctx: exit level 0
2020/06/19 13:02:54.657 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.neverssl.com/ is ALLOWED, because it matched localhost
2020/06/19 13:02:54.657 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:54.657 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Content-Type: text/html
Date: Thu, 18 Jun 2020 21:02:11 GMT
Last-Modified: Thu, 06 Jun 2019 04:19:28 GMT
Server: AmazonS3
Content-Encoding: gzip
Vary: Accept-Encoding
X-Cache: Hit from cloudfront
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: flvd8ba4hRxLdwcPlhYHXTZaGjq0uUypMz185M5tWkih03rhPH1v5A==
Age: 37845
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Transfer-Encoding: chunked
Via: 1.1 4c0ee71d8032304fad715fcdba22fe10.cloudfront.net (CloudFront), 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:54.978 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:54.978 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.neverssl.com/favicon.ico HTTP/1.1
Host: www.neverssl.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:54.978 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.neverssl.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:54.978 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:54.978 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://www.neverssl.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:54.978 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://www.neverssl.com/favicon.ico
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.neverssl.com/favicon.ico' via www.neverssl.com
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.neverssl.com/favicon.ico'
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.43:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.222:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.9:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.110:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:7600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:fc00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:5600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:b400:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:4a00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9400:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:ec00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:54.978 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:54.978 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:53370 remote=13.35.221.43:80 FD 66 flags=1
2020/06/19 13:02:54.978 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /favicon.ico HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Host: www.neverssl.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:54.989 kid1| ctx: enter level 0: 'http://www.neverssl.com/favicon.ico'
2020/06/19 13:02:54.989 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:53370 remote=13.35.221.43:80 FD 66 flags=1
2020/06/19 13:02:54.989 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 124
Connection: keep-alive
Date: Thu, 18 Jun 2020 22:24:32 GMT
Last-Modified: Sat, 17 Feb 2018 00:30:16 GMT
ETag: "8f084423a729c7ac2155a0cfcef9e92d"
Accept-Ranges: bytes
Server: AmazonS3
X-Cache: Hit from cloudfront
Via: 1.1 4c0ee71d8032304fad715fcdba22fe10.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: 0DrspdGfYAcKMiVyVQtAqktTNf0gKXP5uCVLZn-EgfliVfUj5frzDQ==
Age: 32903


----------
2020/06/19 13:02:54.990 kid1| ctx: exit level 0
2020/06/19 13:02:54.990 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://www.neverssl.com/favicon.ico is ALLOWED, because it matched localhost
2020/06/19 13:02:54.990 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:54.990 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 124
Date: Thu, 18 Jun 2020 22:24:32 GMT
Last-Modified: Sat, 17 Feb 2018 00:30:16 GMT
ETag: "8f084423a729c7ac2155a0cfcef9e92d"
Accept-Ranges: bytes
Server: AmazonS3
X-Cache: Hit from cloudfront
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: 0DrspdGfYAcKMiVyVQtAqktTNf0gKXP5uCVLZn-EgfliVfUj5frzDQ==
Age: 32903
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 4c0ee71d8032304fad715fcdba22fe10.cloudfront.net (CloudFront), 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:55.192 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:55.192 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://dhcbmknrfltszwxv.neverssl.com/online HTTP/1.1
Host: dhcbmknrfltszwxv.neverssl.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive
Referer: http://www.neverssl.com/
Upgrade-Insecure-Requests: 1


----------
2020/06/19 13:02:55.192 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://dhcbmknrfltszwxv.neverssl.com/online is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:55.192 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:55.192 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://dhcbmknrfltszwxv.neverssl.com/online is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:55.192 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://dhcbmknrfltszwxv.neverssl.com/online
2020/06/19 13:02:55.192 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://dhcbmknrfltszwxv.neverssl.com/online' via dhcbmknrfltszwxv.neverssl.com
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://dhcbmknrfltszwxv.neverssl.com/online'
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:fe00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9200:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:e600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:c800:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:1000:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:6e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:6200:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.110:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.43:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.222:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.9:80 flags=1
2020/06/19 13:02:55.230 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:55.230 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:fe00:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.230 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:9200:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.230 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:e600:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.231 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:c800:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.231 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:1000:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.231 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:9e00:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.231 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:6e00:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.231 kid1| 14,2| ipcache.cc(916) ipcacheMarkBadAddr: ipcacheMarkBadAddr: dhcbmknrfltszwxv.neverssl.com [2600:9000:2079:6200:0:ec4b:cb00:21]:80
2020/06/19 13:02:55.240 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:40972 remote=13.35.221.110:80 FD 67 flags=1
2020/06/19 13:02:55.240 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /online HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://www.neverssl.com/
Upgrade-Insecure-Requests: 1
Host: dhcbmknrfltszwxv.neverssl.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:55.253 kid1| ctx: enter level 0: 'http://dhcbmknrfltszwxv.neverssl.com/online'
2020/06/19 13:02:55.253 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:40972 remote=13.35.221.110:80 FD 67 flags=1
2020/06/19 13:02:55.253 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Date: Thu, 18 Jun 2020 21:38:12 GMT
Last-Modified: Fri, 16 Feb 2018 21:32:40 GMT
Server: AmazonS3
Content-Encoding: gzip
Vary: Accept-Encoding
X-Cache: Hit from cloudfront
Via: 1.1 95f44a887b4be5cf70a20f236b06b771.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: Ch4tltMXyIB5TO243xqcSEA23r2XRXC2mXCctNk-9jCoZ5Z0q2T-og==
Age: 35684


----------
2020/06/19 13:02:55.253 kid1| ctx: exit level 0
2020/06/19 13:02:55.253 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://dhcbmknrfltszwxv.neverssl.com/online is ALLOWED, because it matched localhost
2020/06/19 13:02:55.253 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:55.253 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Content-Type: text/html
Date: Thu, 18 Jun 2020 21:38:12 GMT
Last-Modified: Fri, 16 Feb 2018 21:32:40 GMT
Server: AmazonS3
Content-Encoding: gzip
Vary: Accept-Encoding
X-Cache: Hit from cloudfront
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: Ch4tltMXyIB5TO243xqcSEA23r2XRXC2mXCctNk-9jCoZ5Z0q2T-og==
Age: 35684
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Transfer-Encoding: chunked
Via: 1.1 95f44a887b4be5cf70a20f236b06b771.cloudfront.net (CloudFront), 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:02:55.339 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:55.339 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://dhcbmknrfltszwxv.neverssl.com/favicon.ico HTTP/1.1
Host: dhcbmknrfltszwxv.neverssl.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=
Connection: keep-alive


----------
2020/06/19 13:02:55.339 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://dhcbmknrfltszwxv.neverssl.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:55.339 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:02:55.339 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request GET http://dhcbmknrfltszwxv.neverssl.com/favicon.ico is ALLOWED; last ACL checked: localhost
2020/06/19 13:02:55.339 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1, url=http://dhcbmknrfltszwxv.neverssl.com/favicon.ico
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://dhcbmknrfltszwxv.neverssl.com/favicon.ico' via dhcbmknrfltszwxv.neverssl.com
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://dhcbmknrfltszwxv.neverssl.com/favicon.ico'
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.110:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.43:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.222:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=13.35.221.9:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:fe00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9200:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:e600:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:c800:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:1000:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:9e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:6e00:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2600:9000:2079:6200:0:ec4b:cb00:21]:80 flags=1
2020/06/19 13:02:55.339 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:02:55.339 kid1| 11,2| http.cc(2229) sendRequest: HTTP Server local=192.168.199.4:40972 remote=13.35.221.110:80 FD 67 flags=1
2020/06/19 13:02:55.339 kid1| 11,2| http.cc(2230) sendRequest: HTTP Server REQUEST:
---------
GET /favicon.ico HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Host: dhcbmknrfltszwxv.neverssl.com
Via: 1.1 prillo (squid/3.5.27)
X-Forwarded-For: 127.0.0.1
Cache-Control: max-age=259200
Connection: keep-alive


----------
2020/06/19 13:02:55.349 kid1| ctx: enter level 0: 'http://dhcbmknrfltszwxv.neverssl.com/favicon.ico'
2020/06/19 13:02:55.349 kid1| 11,2| http.cc(719) processReplyHeader: HTTP Server local=192.168.199.4:40972 remote=13.35.221.110:80 FD 67 flags=1
2020/06/19 13:02:55.349 kid1| 11,2| http.cc(720) processReplyHeader: HTTP Server REPLY:
---------
HTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 124
Connection: keep-alive
Date: Thu, 18 Jun 2020 22:24:32 GMT
Last-Modified: Sat, 17 Feb 2018 00:30:16 GMT
ETag: "8f084423a729c7ac2155a0cfcef9e92d"
Accept-Ranges: bytes
Server: AmazonS3
X-Cache: Hit from cloudfront
Via: 1.1 95f44a887b4be5cf70a20f236b06b771.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: smwhHuGLXlQmIeq5BPBk1sXtdvSVmkmJo73cXFduHamAi50F_NkpVg==
Age: 32903


----------
2020/06/19 13:02:55.349 kid1| ctx: exit level 0
2020/06/19 13:02:55.349 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for GET http://dhcbmknrfltszwxv.neverssl.com/favicon.ico is ALLOWED, because it matched localhost
2020/06/19 13:02:55.349 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44012 FD 23 flags=1
2020/06/19 13:02:55.349 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 200 OK
Content-Type: image/png
Content-Length: 124
Date: Thu, 18 Jun 2020 22:24:32 GMT
Last-Modified: Sat, 17 Feb 2018 00:30:16 GMT
ETag: "8f084423a729c7ac2155a0cfcef9e92d"
Accept-Ranges: bytes
Server: AmazonS3
X-Cache: Hit from cloudfront
X-Amz-Cf-Pop: DEL54-C2
X-Amz-Cf-Id: smwhHuGLXlQmIeq5BPBk1sXtdvSVmkmJo73cXFduHamAi50F_NkpVg==
Age: 32903
X-Cache: MISS from prillo
X-Cache-Lookup: MISS from prillo:3128
Via: 1.1 95f44a887b4be5cf70a20f236b06b771.cloudfront.net (CloudFront), 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:03:03.370 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:03:03.370 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:03:03.370 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44102 FD 68 flags=1
2020/06/19 13:03:03.370 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT www.google.co.in:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: www.google.co.in:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:03:03.370 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.google.co.in:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:03:03.370 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:03:03.370 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT www.google.co.in:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:03:03.370 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: www.google.co.in:443' via www.google.co.in
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'www.google.co.in:443'
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:805::2003]:443 flags=1
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=216.58.196.195:443 flags=1
2020/06/19 13:03:03.396 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:03:12.933 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44084 flags=1
2020/06/19 13:03:27.612 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:03:27.612 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:03:27.612 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44106 FD 49 flags=1
2020/06/19 13:03:27.612 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT ssl.gstatic.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: ssl.gstatic.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:03:27.612 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ssl.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:03:27.612 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:03:27.612 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT ssl.gstatic.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: ssl.gstatic.com:443' via ssl.gstatic.com
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'ssl.gstatic.com:443'
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:80c::2003]:443 flags=1
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.166.3:443 flags=1
2020/06/19 13:03:27.612 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:03:58.440 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:03:58.440 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT mozilla.cloudflare-dns.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: mozilla.cloudflare-dns.com:443


----------
2020/06/19 13:03:58.440 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mozilla.cloudflare-dns.com:443 is AUTH_REQUIRED; last ACL checked: authenticated
2020/06/19 13:03:58.440 kid1| 4,2| errorpage.cc(1261) BuildContent: No existing error page language negotiated for ERR_CACHE_ACCESS_DENIED. Using default error file.
2020/06/19 13:03:58.440 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:03:58.440 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:03:58.440 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for CONNECT mozilla.cloudflare-dns.com:443 is ALLOWED, because it matched authenticated
2020/06/19 13:03:58.440 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:03:58.440 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 407 Proxy Authentication Required
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:33:58 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3706
X-Squid-Error: ERR_CACHE_ACCESS_DENIED 0
Vary: Accept-Language
Content-Language: en
Proxy-Authenticate: Basic realm="proxy"
X-Cache: MISS from prillo
X-Cache-Lookup: NONE from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:03:58.441 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:04:45.476 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44052 flags=1
2020/06/19 13:04:46.477 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44062 flags=1
2020/06/19 13:04:46.477 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44056 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44048 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44046 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44044 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44042 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44040 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44038 flags=1
2020/06/19 13:04:46.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44036 flags=1
2020/06/19 13:04:47.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44060 flags=1
2020/06/19 13:04:48.478 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44050 flags=1
2020/06/19 13:04:50.480 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44012 flags=1
2020/06/19 13:05:02.443 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:05:02.443 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT mozilla.cloudflare-dns.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: mozilla.cloudflare-dns.com:443


----------
2020/06/19 13:05:02.443 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mozilla.cloudflare-dns.com:443 is AUTH_REQUIRED; last ACL checked: authenticated
2020/06/19 13:05:02.443 kid1| 4,2| errorpage.cc(1261) BuildContent: No existing error page language negotiated for ERR_CACHE_ACCESS_DENIED. Using default error file.
2020/06/19 13:05:02.443 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:05:02.444 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:05:02.444 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for CONNECT mozilla.cloudflare-dns.com:443 is ALLOWED, because it matched authenticated
2020/06/19 13:05:02.444 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:05:02.444 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 407 Proxy Authentication Required
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:35:02 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3706
X-Squid-Error: ERR_CACHE_ACCESS_DENIED 0
Vary: Accept-Language
Content-Language: en
Proxy-Authenticate: Basic realm="proxy"
X-Cache: MISS from prillo
X-Cache-Lookup: NONE from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:05:02.444 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:05:19.482 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44000 flags=1
2020/06/19 13:05:20.483 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44008 flags=1
2020/06/19 13:05:32.484 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44024 flags=1
2020/06/19 13:05:33.485 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44018 flags=1
2020/06/19 13:05:34.486 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44030 flags=1
2020/06/19 13:05:34.487 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44022 flags=1
2020/06/19 13:05:43.487 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44014 flags=1
2020/06/19 13:05:43.488 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44086 flags=1
2020/06/19 13:05:53.488 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44004 flags=1
2020/06/19 13:05:54.489 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44102 flags=1
2020/06/19 13:05:54.490 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:43992 flags=1
2020/06/19 13:05:56.296 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:05:56.296 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:05:56.296 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44110 FD 10 flags=1
2020/06/19 13:05:56.296 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT chat-pa.clients6.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: chat-pa.clients6.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:05:56.296 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT chat-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:05:56.297 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:05:56.297 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT chat-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:05:56.297 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: chat-pa.clients6.google.com:443' via chat-pa.clients6.google.com
2020/06/19 13:05:56.303 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:05:56.303 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:05:56.303 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44112 FD 16 flags=1
2020/06/19 13:05:56.303 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT chat-pa.clients6.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: chat-pa.clients6.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:05:56.303 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT chat-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:05:56.303 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:05:56.303 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT chat-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:05:56.303 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: chat-pa.clients6.google.com:443' via chat-pa.clients6.google.com
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'chat-pa.clients6.google.com:443'
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:809::200a]:443 flags=1
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.167.10:443 flags=1
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'chat-pa.clients6.google.com:443'
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:809::200a]:443 flags=1
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.167.10:443 flags=1
2020/06/19 13:05:56.312 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:05:56.876 kid1| 33,2| client_side.cc(832) swanSong: local=127.0.0.1:3128 remote=127.0.0.1:44112 flags=1
2020/06/19 13:06:03.325 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:06:03.325 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:06:03.325 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44118 FD 16 flags=1
2020/06/19 13:06:03.325 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT mail.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: mail.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:06:03.325 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mail.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:06:03.325 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:06:03.325 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mail.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:06:03.325 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: mail.google.com:443' via mail.google.com
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'mail.google.com:443'
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:802::2005]:443 flags=1
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.31.5:443 flags=1
2020/06/19 13:06:03.340 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2020/06/19 13:06:06.488 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:06:06.488 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT mozilla.cloudflare-dns.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: mozilla.cloudflare-dns.com:443


----------
2020/06/19 13:06:06.488 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT mozilla.cloudflare-dns.com:443 is AUTH_REQUIRED; last ACL checked: authenticated
2020/06/19 13:06:06.488 kid1| 4,2| errorpage.cc(1261) BuildContent: No existing error page language negotiated for ERR_CACHE_ACCESS_DENIED. Using default error file.
2020/06/19 13:06:06.488 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:06:06.488 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:06:06.489 kid1| 88,2| client_side_reply.cc(2073) processReplyAccessResult: The reply for CONNECT mozilla.cloudflare-dns.com:443 is ALLOWED, because it matched authenticated
2020/06/19 13:06:06.489 kid1| 11,2| client_side.cc(1409) sendStartOfMessage: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44096 FD 65 flags=1
2020/06/19 13:06:06.489 kid1| 11,2| client_side.cc(1410) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 407 Proxy Authentication Required
Server: squid/3.5.27
Mime-Version: 1.0
Date: Fri, 19 Jun 2020 07:36:06 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3706
X-Squid-Error: ERR_CACHE_ACCESS_DENIED 0
Vary: Accept-Language
Content-Language: en
Proxy-Authenticate: Basic realm="proxy"
X-Cache: MISS from prillo
X-Cache-Lookup: NONE from prillo:3128
Via: 1.1 prillo (squid/3.5.27)
Connection: keep-alive


----------
2020/06/19 13:06:06.489 kid1| 20,2| store.cc(996) checkCachable: StoreEntry::checkCachable: NO: not cachable
2020/06/19 13:06:07.616 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2020/06/19 13:06:07.617 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2020/06/19 13:06:07.617 kid1| 11,2| client_side.cc(2389) parseHttpRequest: HTTP Client local=127.0.0.1:3128 remote=127.0.0.1:44122 FD 19 flags=1
2020/06/19 13:06:07.617 kid1| 11,2| client_side.cc(2390) parseHttpRequest: HTTP Client REQUEST:
---------
CONNECT taskassist-pa.clients6.google.com:443 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:77.0) Gecko/20100101 Firefox/77.0
Proxy-Connection: keep-alive
Connection: keep-alive
Host: taskassist-pa.clients6.google.com:443
Proxy-Authorization: Basic dXNlcjE6MTIzNDU2Nzg=


----------
2020/06/19 13:06:07.617 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT taskassist-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:06:07.617 kid1| 85,2| client_side_request.cc(721) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2020/06/19 13:06:07.617 kid1| 85,2| client_side_request.cc(745) clientAccessCheckDone: The request CONNECT taskassist-pa.clients6.google.com:443 is ALLOWED; last ACL checked: localhost
2020/06/19 13:06:07.617 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: taskassist-pa.clients6.google.com:443' via taskassist-pa.clients6.google.com
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'taskassist-pa.clients6.google.com:443'
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=[::] remote=[2404:6800:4002:809::200a]:443 flags=1
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=172.217.161.10:443 flags=1
2020/06/19 13:06:07.631 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0