2018/01/11 09:04:00 kid1| Finished loading MIME types and icons.
2018/01/11 09:04:00 kid1| HTCP Disabled.
2018/01/11 09:04:00 kid1| Pinger socket opened on FD 15
2018/01/11 09:04:00 kid1| Squid plugin modules loaded: 0
2018/01/11 09:04:00 kid1| Adaptation support is off.
2018/01/11 09:04:00 kid1| Accepting NAT intercepted HTTP Socket connections at local=192.168.88.253:3128 remote=[::] FD 12 flags=41
2018/01/11 09:04:00 kid1| Accepting NAT intercepted SSL bumped HTTPS Socket connections at local=192.168.88.253:3129 remote=[::] FD 13 flags=41
2018/01/11 09:04:00| pinger: Initialising ICMP pinger ...
2018/01/11 09:04:00| pinger: ICMP socket opened.
2018/01/11 09:04:00| pinger: ICMPv6 socket opened
2018/01/11 09:04:01 kid1| storeLateRelease: released 0 objects
2018/01/11 09:05:07| Set Current Directory to /var/spool/squid
2018/01/11 09:05:07 kid1| Reconfiguring Squid Cache (version 3.5.12)...
2018/01/11 09:05:07 kid1| Closing HTTP port 192.168.88.253:3128
2018/01/11 09:05:07 kid1| Closing HTTPS port 192.168.88.253:3129
2018/01/11 09:05:07 kid1| Closing Pinger socket on FD 15
2018/01/11 09:05:07 kid1| Logfile: closing log daemon:/var/log/squid/access.log
2018/01/11 09:05:07 kid1| Logfile Daemon: closing log daemon:/var/log/squid/access.log
2018/01/11 09:05:07 kid1| Startup: Initializing Authentication Schemes ...
2018/01/11 09:05:07 kid1| Startup: Initialized Authentication Scheme 'basic'
2018/01/11 09:05:07 kid1| Startup: Initialized Authentication Scheme 'digest'
2018/01/11 09:05:07 kid1| Startup: Initialized Authentication Scheme 'negotiate'
2018/01/11 09:05:07 kid1| Startup: Initialized Authentication Scheme 'ntlm'
2018/01/11 09:05:07 kid1| Startup: Initialized Authentication.
2018/01/11 09:05:07 kid1| Processing Configuration File: /etc/squid/squid.conf (depth 0)
2018/01/11 09:05:07 kid1| Starting Authentication on port 192.168.88.253:3128
2018/01/11 09:05:07 kid1| Disabling Authentication on port 192.168.88.253:3128 (interception enabled)
2018/01/11 09:05:07 kid1| Starting Authentication on port 192.168.88.253:3129
2018/01/11 09:05:07 kid1| Disabling Authentication on port 192.168.88.253:3129 (interception enabled)
2018/01/11 09:05:07 kid1| Initializing https proxy context
2018/01/11 09:05:07 kid1| Initializing https_port 192.168.88.253:3129 SSL context
2018/01/11 09:05:07 kid1| Using certificate in /etc/squid/squidCA.pem
2018/01/11 09:05:07 kid1| Logfile: opening log daemon:/var/log/squid/access.log
2018/01/11 09:05:07 kid1| Logfile Daemon: opening log /var/log/squid/access.log
2018/01/11 09:05:07 kid1| Squid plugin modules loaded: 0
2018/01/11 09:05:07 kid1| Adaptation support is off.
2018/01/11 09:05:07 kid1| Store logging disabled
2018/01/11 09:05:07 kid1| DNS Socket created at [::], FD 10
2018/01/11 09:05:07 kid1| DNS Socket created at 0.0.0.0, FD 11
2018/01/11 09:05:07 kid1| Adding nameserver 91.192.60.7 from /etc/resolv.conf
2018/01/11 09:05:07 kid1| Adding nameserver 91.192.60.3 from /etc/resolv.conf
2018/01/11 09:05:07 kid1| HTCP Disabled.
2018/01/11 09:05:07 kid1| Pinger socket opened on FD 16
2018/01/11 09:05:07| pinger: Initialising ICMP pinger ...
2018/01/11 09:05:07| pinger: ICMP socket opened.
2018/01/11 09:05:07| pinger: ICMPv6 socket opened
2018/01/11 09:05:07 kid1| Finished loading MIME types and icons.
2018/01/11 09:05:07 kid1| Accepting NAT intercepted HTTP Socket connections at local=192.168.88.253:3128 remote=[::] FD 12 flags=41
2018/01/11 09:05:07 kid1| Accepting HTTP Socket connections at local=192.168.88.253:3130 remote=[::] FD 13 flags=9
2018/01/11 09:05:07 kid1| Accepting NAT intercepted SSL bumped HTTPS Socket connections at local=192.168.88.253:3129 remote=[::] FD 14 flags=41
2018/01/11 09:05:17| Pinger exiting.
2018/01/11 09:05:50.268 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59022 FD 7 flags=33 (intercepted port$
2018/01/11 09:05:50.268 kid1| SECURITY ALERT: By user agent:
2018/01/11 09:05:50.268 kid1| SECURITY ALERT: on URL: api.pokki.com:443
2018/01/11 09:05:50.268 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59022 FD 7 flags=33
2018/01/11 09:05:50.275 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59023 FD 15 flags=33 (intercepted por$
2018/01/11 09:05:50.275 kid1| SECURITY ALERT: By user agent:
2018/01/11 09:05:50.275 kid1| SECURITY ALERT: on URL: api1.pokki.com:443
2018/01/11 09:05:50.275 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59023 FD 15 flags=33
2018/01/11 09:05:50.283 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59024 FD 17 flags=33 (intercepted por$
2018/01/11 09:05:50.283 kid1| SECURITY ALERT: By user agent:
2018/01/11 09:05:50.283 kid1| SECURITY ALERT: on URL: api.pokkinw.com:443
2018/01/11 09:05:50.283 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59024 FD 17 flags=33
2018/01/11 09:05:50.290 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59025 FD 18 flags=33 (intercepted por$
2018/01/11 09:05:50.290 kid1| SECURITY ALERT: By user agent:
2018/01/11 09:05:50.290 kid1| SECURITY ALERT: on URL: api1.pokkinw.com:443
2018/01/11 09:05:50.290 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59025 FD 18 flags=33
2018/01/11 09:05:51 kid1| WARNING: Forwarding loop detected for:
GET /autoupdate/v3/upgrades/88f4da3e278d01590fb2ad8ffe5279cb1ac7a44b/client?os=WIN6.3-64&source=oem&campaign=acer&signature=5cb1917d5682b46fecc2b8b5921305c8 HTTP/1$
Accept: */*
Via: 1.1 proxy (squid/3.5.12)
2018/01/11 09:06:17.690 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59033 FD 33 flags=33 (intercepted port does not match 443)
2018/01/11 09:06:17.690 kid1| SECURITY ALERT: By user agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safar$
2018/01/11 09:06:17.690 kid1| SECURITY ALERT: on URL:
www.youtube.com:4432018/01/11 09:06:17.690 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.88.253:3128 remote=192.168.88.243:59034 FD 32 flags=33 (intercepted port do$
2018/01/11 09:06:17.690 kid1| SECURITY ALERT: By user agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safar$
2018/01/11 09:06:17.690 kid1| SECURITY ALERT: on URL:
www.youtube.com:4432018/01/11 09:06:17.690 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59033 FD 33 flags=33
2018/01/11 09:06:17.690 kid1| abandoning local=192.168.88.253:3128 remote=192.168.88.243:59034 FD 32 flags=33
Пользователь добавил сообщение 11 Января 2018, 09:14:19: