Hi, I can't seem to be able to bump Twitter. Whenever a client tries to browse https://twitter.com there's a connection refusal error page (111). Any clue as to what I could try? # grep -v ^# squid.test.conf | grep -v ^$ http_access allow localhost manager http_access deny manager http_port 3227 http_port 3228 tproxy https_port 3229 tproxy ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=16MB cert=/etc/ssl/squid/proxyserver.pem acl localnet src 10.0.0.0/8 # RFC1918 possible internal network acl localnet src 192.168.0.0/16 # RFC1918 possible internal network acl localnet src fc00::/7 # RFC 4193 local private network range acl interceptedhttp myportname 3228 acl interceptedhttps myportname 3229 http_access deny interceptedhttp !localnet http_access deny interceptedhttps !localnet sslcrtd_program /usr/libexec/squid/ssl_crtd -s /var/lib/squid/ssl_db_test -M 16MB sslcrtd_children 10 reply_header_access Alternate-Protocol deny all ssl_bump stare all ssl_bump bump all cache_dir diskd /var/cache/squid.test 100 16 256 http_access allow localnet http_access allow localhost http_access deny all coredump_dir /var/cache/squid refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320 pid_filename /run/squid.test.pid access_log daemon:/var/log/squid/access.test.log squid cache_log /var/log/squid/cache.test.log debug_options rotate=1 ALL,5 # cat /var/log/squid/access.test.log 1496266616.296 200 10.215.144.48 TAG_NONE/200 0 CONNECT 199.16.156.6:443 - ORIGINAL_DST/199.16.156.6 - 1496266616.322 2 10.215.144.48 TAG_NONE/503 3902 GET https://twitter.com/ - HIER_NONE/- text/html # cat /var/log/squid/cache.test.log 2017/05/31 23:36:55.778 kid1| 41,5| AsyncCall.cc(38) make: make call logfileFlush [call140] 2017/05/31 23:36:55.778 kid1| 41,5| AsyncCallQueue.cc(57) fireNext: leaving logfileFlush(0x80945048*?) 2017/05/31 23:36:56.093 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 33 2017/05/31 23:36:56.093 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3229 remote=[::] FD 33 flags=25 2017/05/31 23:36:56.093 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 13 HTTP Request 2017/05/31 23:36:56.093 kid1| 89,5| Intercept.cc(375) Lookup: address BEGIN: me/client= 199.16.156.6:443, destination/me= 10.215.144.48:42597 2017/05/31 23:36:56.093 kid1| 89,5| Intercept.cc(169) TproxyTransparent: address TPROXY: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.093 kid1| 28,4| Eui48.cc(178) lookup: id=0x80cefb18 query ARP table 2017/05/31 23:36:56.093 kid1| 28,4| Eui48.cc(221) lookup: id=0x80cefb18 query ARP on each interface (512 found) 2017/05/31 23:36:56.093 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface lo 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp1s7 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp1s7 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp1s7 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp1s7 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp1s8 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp1s8 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp2s0f0 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp2s0f0 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp2s0f1 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp2s0f1 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(227) lookup: id=0x80cefb18 found interface enp0s8 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(236) lookup: id=0x80cefb18 looking up ARP address for 10.215.144.48 on enp0s8 2017/05/31 23:36:56.094 kid1| 28,4| Eui48.cc(279) lookup: id=0x80cefb18 got address 64:31:50:17:9a:fd on enp0s8 2017/05/31 23:36:56.094 kid1| 5,5| TcpAcceptor.cc(287) acceptOne: Listener: local=[::]:3229 remote=[::] FD 33 flags=25 accepted new connection local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 handler Subscription: 0x80cef9d8*1 2017/05/31 23:36:56.094 kid1| 5,5| AsyncCall.cc(26) AsyncCall: The AsyncCall httpsAccept constructed, this=0x80d66d88 [call141] 2017/05/31 23:36:56.094 kid1| 5,5| AsyncCall.cc(93) ScheduleCall: TcpAcceptor.cc(317) will call httpsAccept(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, MXID_2) [call141] 2017/05/31 23:36:56.094 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 33, type=1, handler=1, client_data=0x80cef6e8, timeout=0 2017/05/31 23:36:56.094 kid1| 5,5| AsyncCallQueue.cc(55) fireNext: entering httpsAccept(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, MXID_2) 2017/05/31 23:36:56.094 kid1| 5,5| AsyncCall.cc(38) make: make call httpsAccept [call141] 2017/05/31 23:36:56.094 kid1| 33,4| client_side.cc(3920) httpsAccept: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 accepted, starting SSL negotiation. 2017/05/31 23:36:56.094 kid1| 93,5| AsyncJob.cc(34) AsyncJob: AsyncJob constructed, this=0x80d60a74 type=Http::Server [job8] 2017/05/31 23:36:56.094 kid1| 93,5| AsyncCall.cc(26) AsyncCall: The AsyncCall AsyncJob::start constructed, this=0x80d77ce0 [call142] 2017/05/31 23:36:56.094 kid1| 93,5| AsyncCall.cc(93) ScheduleCall: AsyncJob.cc(26) will call AsyncJob::start() [call142] 2017/05/31 23:36:56.094 kid1| 5,5| AsyncCallQueue.cc(57) fireNext: leaving httpsAccept(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, MXID_2) 2017/05/31 23:36:56.094 kid1| 93,5| AsyncCallQueue.cc(55) fireNext: entering AsyncJob::start() 2017/05/31 23:36:56.094 kid1| 93,5| AsyncCall.cc(38) make: make call AsyncJob::start [call142] 2017/05/31 23:36:56.094 kid1| 93,5| AsyncJob.cc(123) callStart: Http::Server status in: [ job8] 2017/05/31 23:36:56.094 kid1| 33,5| AsyncCall.cc(26) AsyncCall: The AsyncCall ConnStateData::connStateClosed constructed, this=0x80924868 [call143] 2017/05/31 23:36:56.094 kid1| 5,5| comm.cc(993) comm_add_close_handler: comm_add_close_handler: FD 13, AsyncCall=0x80924868*1 2017/05/31 23:36:56.094 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0xbfb501bc 2017/05/31 23:36:56.094 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0xbfb501bc 2017/05/31 23:36:56.094 kid1| 33,5| client_side.cc(3938) postHttpsAccept: accept transparent connection: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.094 kid1| 23,3| HttpRequest.h(82) SetHost: HttpRequest::SetHost() given IP: 199.16.156.6 2017/05/31 23:36:56.094 kid1| 28,3| Checklist.cc(70) preCheck: 0x80d634c8 checking slow rules 2017/05/31 23:36:56.094 kid1| 28,5| Acl.cc(138) matches: checking (ssl_bump rules) 2017/05/31 23:36:56.094 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'ALLOWED/4is not banned 2017/05/31 23:36:56.094 kid1| 28,5| Acl.cc(138) matches: checking (ssl_bump rule) 2017/05/31 23:36:56.094 kid1| 28,5| Acl.cc(138) matches: checking all 2017/05/31 23:36:56.094 kid1| 28,3| Ip.cc(539) match: aclIpMatchIp: '10.215.144.48' found 2017/05/31 23:36:56.094 kid1| 28,3| Acl.cc(158) matches: checked: all = 1 2017/05/31 23:36:56.094 kid1| 28,3| Acl.cc(158) matches: checked: (ssl_bump rule) = 1 2017/05/31 23:36:56.094 kid1| 28,3| Acl.cc(158) matches: checked: (ssl_bump rules) = 1 2017/05/31 23:36:56.094 kid1| 28,3| Checklist.cc(63) markFinished: 0x80d634c8 answer ALLOWED for match 2017/05/31 23:36:56.095 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x80d634c8 answer=ALLOWED 2017/05/31 23:36:56.095 kid1| 33,2| client_side.cc(3896) httpsSslBumpAccessCheckDone: sslBump needed for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 method 4 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(3200) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: attempting to parse 2017/05/31 23:36:56.095 kid1| 74,5| HttpParser.cc(37) reset: Request buffer is CONNECT 199.16.156.6:443 HTTP/1.1 Host: 199.16.156.6:443 2017/05/31 23:36:56.095 kid1| 74,5| HttpParser.cc(47) parseRequestFirstLine: parsing possible request: CONNECT 199.16.156.6:443 HTTP/1.1 Host: 199.16.156.6:443 2017/05/31 23:36:56.095 kid1| 74,5| HttpParser.cc(257) HttpParserParseReqLine: Parser: retval 1: from 0->34: method 0->6; url 8->23; version 25->32 (1/1) 2017/05/31 23:36:56.095 kid1| 33,3| client_side.cc(2258) parseHttpRequest: parseHttpRequest: req_hdr = {Host: 199.16.156.6:443 } 2017/05/31 23:36:56.095 kid1| 33,3| client_side.cc(2262) parseHttpRequest: parseHttpRequest: end = { } 2017/05/31 23:36:56.095 kid1| 33,3| client_side.cc(2266) parseHttpRequest: parseHttpRequest: prefix_sz = 61, req_line_sz = 35 2017/05/31 23:36:56.095 kid1| 93,5| AsyncJob.cc(34) AsyncJob: AsyncJob constructed, this=0x80d63e80 type=ClientHttpRequest [job9] 2017/05/31 23:36:56.095 kid1| 87,3| clientStream.cc(144) clientStreamInsertHead: clientStreamInsertHead: Inserted node 0x80d65688 with data 0x80d6561c after head 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(2282) parseHttpRequest: parseHttpRequest: Request Header is Host: 199.16.156.6:443 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(2303) parseHttpRequest: Prepare absolute URL from intercept 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(2342) parseHttpRequest: parseHttpRequest: Complete request received 2017/05/31 23:36:56.095 kid1| 11,2| client_side.cc(2345) parseHttpRequest: HTTP Client local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.095 kid1| 11,2| client_side.cc(2346) parseHttpRequest: HTTP Client REQUEST: --------- CONNECT 199.16.156.6:443 HTTP/1.1 Host: 199.16.156.6:443 ---------- 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(3221) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: done parsing a request 2017/05/31 23:36:56.095 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall clientLifetimeTimeout constructed, this=0x80d66d88 [call144] 2017/05/31 23:36:56.095 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 timeout 86400 2017/05/31 23:36:56.095 kid1| 23,3| url.cc(357) urlParse: urlParse: Split URL '199.16.156.6:443' into proto='', host='199.16.156.6', port='443', path='' 2017/05/31 23:36:56.095 kid1| 23,3| HttpRequest.h(82) SetHost: HttpRequest::SetHost() given IP: 199.16.156.6 2017/05/31 23:36:56.095 kid1| 33,3| client_side.cc(873) clientSetKeepaliveFlag: http_ver = HTTP/1.1 2017/05/31 23:36:56.095 kid1| 33,3| client_side.cc(874) clientSetKeepaliveFlag: method = CONNECT 2017/05/31 23:36:56.095 kid1| 33,3| client_side.h(96) mayUseConnection: This 0x80d645d8 marked 1 2017/05/31 23:36:56.095 kid1| 33,5| client_side.cc(2422) consumeInput: in.buf has 0 unused bytes 2017/05/31 23:36:56.095 kid1| 85,3| client_side_request.cc(130) ClientRequestContext: 0x80d67898 ClientRequestContext constructed 2017/05/31 23:36:56.095 kid1| 83,3| client_side_request.cc(1684) doCallouts: Doing calloutContext->hostHeaderVerify() 2017/05/31 23:36:56.095 kid1| 85,3| client_side_request.cc(631) hostHeaderVerify: validate host=199.16.156.6, port=443, portStr=443 2017/05/31 23:36:56.095 kid1| 14,4| ipcache.cc(501) ipcache_nbgethostbyname: ipcache_nbgethostbyname: Name '199.16.156.6'. 2017/05/31 23:36:56.095 kid1| 14,4| ipcache.cc(810) ipcacheCheckNumeric: ipcacheCheckNumeric: HIT_BYPASS for '199.16.156.6' == 199.16.156.6 2017/05/31 23:36:56.095 kid1| 14,4| ipcache.cc(514) ipcache_nbgethostbyname: ipcache_nbgethostbyname: BYPASS for '199.16.156.6' (already numeric) 2017/05/31 23:36:56.095 kid1| 85,3| client_side_request.cc(524) hostHeaderIpVerify: validate IP 199.16.156.6:443 possible from Host: 2017/05/31 23:36:56.095 kid1| 83,3| client_side_request.cc(1691) doCallouts: Doing calloutContext->clientAccessCheck() 2017/05/31 23:36:56.095 kid1| 28,3| Checklist.cc(70) preCheck: 0x80d678e0 checking slow rules 2017/05/31 23:36:56.095 kid1| 28,5| Acl.cc(138) matches: checking http_access 2017/05/31 23:36:56.095 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'ALLOWED/0is not banned 2017/05/31 23:36:56.095 kid1| 28,5| Acl.cc(138) matches: checking http_access#1 2017/05/31 23:36:56.095 kid1| 28,5| Acl.cc(138) matches: checking localhost 2017/05/31 23:36:56.095 kid1| 28,3| Ip.cc(539) match: aclIpMatchIp: '10.215.144.48' NOT found 2017/05/31 23:36:56.095 kid1| 28,3| Acl.cc(158) matches: checked: localhost = 0 2017/05/31 23:36:56.095 kid1| 28,3| Acl.cc(158) matches: checked: http_access#1 = 0 2017/05/31 23:36:56.095 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'DENIED/0is not banned 2017/05/31 23:36:56.095 kid1| 28,5| Acl.cc(138) matches: checking http_access#2 2017/05/31 23:36:56.095 kid1| 28,5| Acl.cc(138) matches: checking manager 2017/05/31 23:36:56.095 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking '199.16.156.6:443' 2017/05/31 23:36:56.095 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^cache_object://)' 2017/05/31 23:36:56.095 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^https?://[^/]+/squid-internal-mgr/)' 2017/05/31 23:36:56.095 kid1| 28,3| Acl.cc(158) matches: checked: manager = 0 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: http_access#2 = 0 2017/05/31 23:36:56.096 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'DENIED/0is not banned 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking http_access#3 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking interceptedhttp 2017/05/31 23:36:56.096 kid1| 28,3| StringData.cc(34) match: aclMatchStringList: checking '3229' 2017/05/31 23:36:56.096 kid1| 28,3| StringData.cc(37) match: aclMatchStringList: '3229' NOT found 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: interceptedhttp = 0 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: http_access#3 = 0 2017/05/31 23:36:56.096 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'DENIED/0is not banned 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking http_access#4 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking interceptedhttps 2017/05/31 23:36:56.096 kid1| 28,3| StringData.cc(34) match: aclMatchStringList: checking '3229' 2017/05/31 23:36:56.096 kid1| 28,3| StringData.cc(37) match: aclMatchStringList: '3229' found 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: interceptedhttps = 1 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking !localnet 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking localnet 2017/05/31 23:36:56.096 kid1| 28,3| Ip.cc(539) match: aclIpMatchIp: '10.215.144.48' found 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: localnet = 1 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: !localnet = 0 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: http_access#4 = 0 2017/05/31 23:36:56.096 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'ALLOWED/0is not banned 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking http_access#5 2017/05/31 23:36:56.096 kid1| 28,5| Acl.cc(138) matches: checking localnet 2017/05/31 23:36:56.096 kid1| 28,3| Ip.cc(539) match: aclIpMatchIp: '10.215.144.48' found 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: localnet = 1 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: http_access#5 = 1 2017/05/31 23:36:56.096 kid1| 28,3| Acl.cc(158) matches: checked: http_access = 1 2017/05/31 23:36:56.096 kid1| 28,3| Checklist.cc(63) markFinished: 0x80d678e0 answer ALLOWED for match 2017/05/31 23:36:56.096 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x80d678e0 answer=ALLOWED 2017/05/31 23:36:56.096 kid1| 85,2| client_side_request.cc(741) clientAccessCheckDone: The request CONNECT 199.16.156.6:443 is ALLOWED; last ACL checked: localnet 2017/05/31 23:36:56.096 kid1| 83,3| AccessCheck.cc(42) Start: adaptation off, skipping 2017/05/31 23:36:56.096 kid1| 83,3| client_side_request.cc(1719) doCallouts: Doing calloutContext->clientAccessCheck2() 2017/05/31 23:36:56.096 kid1| 85,2| client_side_request.cc(717) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW 2017/05/31 23:36:56.096 kid1| 85,2| client_side_request.cc(741) clientAccessCheckDone: The request CONNECT 199.16.156.6:443 is ALLOWED; last ACL checked: localnet 2017/05/31 23:36:56.096 kid1| 83,3| client_side_request.cc(1737) doCallouts: Doing clientInterpretRequestHeaders() 2017/05/31 23:36:56.096 kid1| 85,5| client_side_request.cc(1173) clientInterpretRequestHeaders: clientInterpretRequestHeaders: REQ_NOCACHE = NOT SET 2017/05/31 23:36:56.096 kid1| 85,5| client_side_request.cc(1175) clientInterpretRequestHeaders: clientInterpretRequestHeaders: REQ_CACHABLE = SET 2017/05/31 23:36:56.096 kid1| 85,5| client_side_request.cc(1177) clientInterpretRequestHeaders: clientInterpretRequestHeaders: REQ_HIERARCHICAL = NOT SET 2017/05/31 23:36:56.096 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0xbfb4f34c 2017/05/31 23:36:56.096 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0xbfb4f34c 2017/05/31 23:36:56.096 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0xbfb4f34c 2017/05/31 23:36:56.096 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0xbfb4f34c 2017/05/31 23:36:56.096 kid1| 85,5| client_side_request.cc(1419) sslBumpAccessCheck: SslBump already decided (4), ignoring ssl_bump for 0x80d60950 2017/05/31 23:36:56.096 kid1| 83,3| client_side_request.cc(1528) sslBumpNeed: sslBump required: stare 2017/05/31 23:36:56.096 kid1| 85,3| client_side_request.cc(115) ~ClientRequestContext: 0x80d67898 ClientRequestContext destructed 2017/05/31 23:36:56.096 kid1| 83,3| client_side_request.cc(1828) doCallouts: calling processRequest() 2017/05/31 23:36:56.096 kid1| 85,4| client_side_request.cc(1491) processRequest: CONNECT 199.16.156.6:443 2017/05/31 23:36:56.096 kid1| 85,5| client_side_request.cc(1574) sslBumpStart: Confirming stare-bumped CONNECT tunnel on FD local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.096 kid1| 85,5| AsyncCall.cc(26) AsyncCall: The AsyncCall ClientSocketContext::sslBumpEstablish constructed, this=0x80d60a90 [call145] 2017/05/31 23:36:56.096 kid1| 85,5| AsyncCall.cc(93) ScheduleCall: client_side_request.cc(1584) will call ClientSocketContext::sslBumpEstablish(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d63dc8) [call145] 2017/05/31 23:36:56.096 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0x80d678e0 2017/05/31 23:36:56.096 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0x80d678e0 2017/05/31 23:36:56.096 kid1| 33,3| client_side.cc(3233) clientParseRequests: Not parsing new requests, as this request may need the connection 2017/05/31 23:36:56.097 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0x80d634c8 2017/05/31 23:36:56.097 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0x80d634c8 2017/05/31 23:36:56.097 kid1| 93,5| AsyncJob.cc(152) callEnd: Http::Server status out: [ job8] 2017/05/31 23:36:56.097 kid1| 93,5| AsyncCallQueue.cc(57) fireNext: leaving AsyncJob::start() 2017/05/31 23:36:56.097 kid1| 85,5| AsyncCallQueue.cc(55) fireNext: entering ClientSocketContext::sslBumpEstablish(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d63dc8) 2017/05/31 23:36:56.097 kid1| 85,5| AsyncCall.cc(38) make: make call ClientSocketContext::sslBumpEstablish [call145] 2017/05/31 23:36:56.097 kid1| 85,5| client_side_request.cc(1537) SslBumpEstablish: responded to CONNECT: 0x80d63dc8 ? 0 2017/05/31 23:36:56.097 kid1| 33,5| client_side.cc(4237) switchToHttps: converting local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 to SSL 2017/05/31 23:36:56.097 kid1| 33,4| ServerBump.cc(27) ServerBump: will peek at 199.16.156.6:443 2017/05/31 23:36:56.097 kid1| 20,3| store.cc(779) storeCreatePureEntry: storeCreateEntry: '199.16.156.6:443' 2017/05/31 23:36:56.097 kid1| 20,5| store.cc(371) StoreEntry: StoreEntry constructed, this=0x80c213e0 2017/05/31 23:36:56.097 kid1| 20,3| MemObject.cc(97) MemObject: new MemObject 0x80d63708 2017/05/31 23:36:56.097 kid1| 20,3| store.cc(484) lock: storeCreateEntry locked key [null_store_key] e:=V/0x80c213e0*1 2017/05/31 23:36:56.097 kid1| 20,3| store_key_md5.cc(89) storeKeyPrivate: storeKeyPrivate: CONNECT 199.16.156.6:443 2017/05/31 23:36:56.097 kid1| 20,3| store.cc(448) hashInsert: StoreEntry::hashInsert: Inserting Entry e:=IV/0x80c213e0*1 key 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.097 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80d8fe20 104(6000, 0xbfb50158) 2017/05/31 23:36:56.097 kid1| 33,5| client_side.cc(3693) httpsCreate: will negotate SSL on local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.097 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.097 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.097 kid1| 85,5| AsyncCallQueue.cc(57) fireNext: leaving ClientSocketContext::sslBumpEstablish(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d63dc8) 2017/05/31 23:36:56.097 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.097 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.097 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.097 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.097 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.097 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.097 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.097 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.098 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.098 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.098 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.098 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.099 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.099 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.099 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.099 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.100 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.100 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.100 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.100 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.100 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.100 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.100 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.100 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 11 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 bytes of TLS client Hello 2017/05/31 23:36:56.100 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.100 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.100 kid1| 83,5| client_side.cc(4267) clientPeekAndSpliceSSL: Start peek and splice on FD 13 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(118) read: FD 13 read 8 <= 11 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(144) readAndBuffer: read 8 out of 11 bytes 2017/05/31 23:36:56.100 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 8 bytes of TLS client Hello 2017/05/31 23:36:56.101 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.101 kid1| 83,2| client_side.cc(4270) clientPeekAndSpliceSSL: SSL_accept failed. 2017/05/31 23:36:56.101 kid1| 83,5| client_side.cc(4284) clientPeekAndSpliceSSL: I got hello. Start forwarding the request!!! 2017/05/31 23:36:56.101 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.101 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.101 kid1| 28,3| Checklist.cc(70) preCheck: 0x80d634c8 checking slow rules 2017/05/31 23:36:56.101 kid1| 28,5| Acl.cc(138) matches: checking (ssl_bump rules) 2017/05/31 23:36:56.101 kid1| 28,5| Checklist.cc(400) bannedAction: Action 'ALLOWED/4is not banned 2017/05/31 23:36:56.101 kid1| 28,5| Acl.cc(138) matches: checking (ssl_bump rule) 2017/05/31 23:36:56.101 kid1| 28,5| Acl.cc(138) matches: checking all 2017/05/31 23:36:56.101 kid1| 28,3| Ip.cc(539) match: aclIpMatchIp: '10.215.144.48' found 2017/05/31 23:36:56.101 kid1| 28,3| Acl.cc(158) matches: checked: all = 1 2017/05/31 23:36:56.101 kid1| 28,3| Acl.cc(158) matches: checked: (ssl_bump rule) = 1 2017/05/31 23:36:56.101 kid1| 28,3| Acl.cc(158) matches: checked: (ssl_bump rules) = 1 2017/05/31 23:36:56.101 kid1| 28,3| Checklist.cc(63) markFinished: 0x80d634c8 answer ALLOWED for match 2017/05/31 23:36:56.101 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x80d634c8 answer=ALLOWED 2017/05/31 23:36:56.101 kid1| 33,5| client_side.cc(4322) httpsSslBumpStep2AccessCheckDone: Answer: ALLOWED kind:4 2017/05/31 23:36:56.101 kid1| 17,3| FwdState.cc(331) Start: '199.16.156.6:443' 2017/05/31 23:36:56.101 kid1| 17,2| FwdState.cc(132) FwdState: Forwarding client request local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, url=199.16.156.6:443 2017/05/31 23:36:56.101 kid1| 20,3| store.cc(484) lock: FwdState locked key D1806996FC89FCA8A2553AF78760C5D4 e:=IV/0x80c213e0*2 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(137) peerSelect: e:=IWV/0x80c213e0*2 199.16.156.6:443 2017/05/31 23:36:56.101 kid1| 20,3| store.cc(484) lock: peerSelect locked key D1806996FC89FCA8A2553AF78760C5D4 e:=IWV/0x80c213e0*3 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(441) peerSelectFoo: CONNECT 199.16.156.6 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(401) peerCheckNetdbDirect: peerCheckNetdbDirect: MY RTT = 0 msec 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(402) peerCheckNetdbDirect: peerCheckNetdbDirect: minimum_direct_rtt = 400 msec 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(409) peerCheckNetdbDirect: peerCheckNetdbDirect: MY hops = 0 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(410) peerCheckNetdbDirect: peerCheckNetdbDirect: minimum_direct_hops = 4 2017/05/31 23:36:56.101 kid1| 15,3| neighbors.cc(100) whichPeer: whichPeer: from [::] 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(474) peerSelectFoo: peerSelectFoo: direct = DIRECT_MAYBE (default) 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(477) peerSelectFoo: peerSelectFoo: direct = DIRECT_MAYBE 2017/05/31 23:36:56.101 kid1| 14,3| ipcache.cc(619) ipcache_gethostbyname: ipcache_gethostbyname: '199.16.156.6', flags=0 2017/05/31 23:36:56.101 kid1| 14,4| ipcache.cc(810) ipcacheCheckNumeric: ipcacheCheckNumeric: HIT_BYPASS for '199.16.156.6' == 199.16.156.6 2017/05/31 23:36:56.101 kid1| 14,5| net_db.cc(365) networkFromInaddr: networkFromInaddr : Masked IPv4 Address to 199.16.156.6/24. 2017/05/31 23:36:56.101 kid1| 14,5| net_db.cc(369) networkFromInaddr: networkFromInaddr : Masked IPv4 Address to 199.16.156.6/24. 2017/05/31 23:36:56.101 kid1| 44,3| peer_select.cc(110) peerSelectIcpPing: peerSelectIcpPing: 199.16.156.6:443 2017/05/31 23:36:56.101 kid1| 44,5| peer_select.cc(940) peerAddFwdServer: peerAddFwdServer: adding DIRECT HIER_DIRECT 2017/05/31 23:36:56.101 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for '199.16.156.6:443' 2017/05/31 23:36:56.101 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED 2017/05/31 23:36:56.101 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED 2017/05/31 23:36:56.101 kid1| 44,2| peer_select.cc(288) peerSelectDnsPaths: ORIGINAL_DST = local=10.215.144.48 remote=199.16.156.6:443 flags=25 2017/05/31 23:36:56.101 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0 2017/05/31 23:36:56.101 kid1| 17,3| FwdState.cc(386) startConnectionOrFail: 199.16.156.6:443 2017/05/31 23:36:56.101 kid1| 17,3| FwdState.cc(804) connectStart: fwdConnectStart: 199.16.156.6:443 2017/05/31 23:36:56.101 kid1| 48,3| pconn.cc(439) pop: lookup for key {199.16.156.6:443/199.16.156.6} failed. 2017/05/31 23:36:56.102 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0xbfb4fabc 2017/05/31 23:36:56.102 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0xbfb4fabc 2017/05/31 23:36:56.102 kid1| 17,3| FwdState.cc(1304) GetMarkingsToServer: from 10.215.144.48 netfilter mark 0 2017/05/31 23:36:56.102 kid1| 17,3| AsyncCall.cc(26) AsyncCall: The AsyncCall fwdConnectDoneWrapper constructed, this=0x80d92248 [call146] 2017/05/31 23:36:56.102 kid1| 93,5| AsyncJob.cc(34) AsyncJob: AsyncJob constructed, this=0x80d78b40 type=Comm::ConnOpener [job10] 2017/05/31 23:36:56.102 kid1| 93,5| AsyncCall.cc(26) AsyncCall: The AsyncCall AsyncJob::start constructed, this=0x80d92290 [call147] 2017/05/31 23:36:56.102 kid1| 93,5| AsyncCall.cc(93) ScheduleCall: AsyncJob.cc(26) will call AsyncJob::start() [call147] 2017/05/31 23:36:56.102 kid1| 44,3| peer_select.cc(79) ~ps_state: 199.16.156.6:443 2017/05/31 23:36:56.102 kid1| 20,3| store.cc(522) unlock: peerSelect unlocking key D1806996FC89FCA8A2553AF78760C5D4 e:=p2IWV/0x80c213e0*3 2017/05/31 23:36:56.102 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0x80d634c8 2017/05/31 23:36:56.102 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0x80d634c8 2017/05/31 23:36:56.102 kid1| 93,5| AsyncCallQueue.cc(55) fireNext: entering AsyncJob::start() 2017/05/31 23:36:56.102 kid1| 93,5| AsyncCall.cc(38) make: make call AsyncJob::start [call147] 2017/05/31 23:36:56.102 kid1| 93,5| AsyncJob.cc(123) callStart: Comm::ConnOpener status in: [ job10] 2017/05/31 23:36:56.102 kid1| 50,3| comm.cc(347) comm_openex: comm_openex: Attempt open socket for: 10.215.144.48 2017/05/31 23:36:56.102 kid1| 50,3| comm.cc(388) comm_openex: comm_openex: Opened socket local=10.215.144.48 remote=[::] FD 15 flags=1 : family=2, type=1, protocol=6 2017/05/31 23:36:56.102 kid1| 5,5| comm.cc(420) comm_init_opened: local=10.215.144.48 remote=[::] FD 15 flags=1 is a new socket 2017/05/31 23:36:56.102 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 15 199.16.156.6 2017/05/31 23:36:56.102 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall Comm::ConnOpener::earlyAbort constructed, this=0x80d90490 [call148] 2017/05/31 23:36:56.102 kid1| 5,5| comm.cc(993) comm_add_close_handler: comm_add_close_handler: FD 15, AsyncCall=0x80d90490*1 2017/05/31 23:36:56.102 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall Comm::ConnOpener::timeout constructed, this=0x80d904e0 [call149] 2017/05/31 23:36:56.102 kid1| 5,3| ConnOpener.cc(289) createFd: local=10.215.144.48 remote=199.16.156.6:443 flags=25 will timeout in 60 2017/05/31 23:36:56.102 kid1| 5,5| comm.cc(644) comm_connect_addr: sock=15, addrinfo( flags=4, family=2, socktype=1, protocol=6, &addr=0x80d922d0, addrlen=16 ) 2017/05/31 23:36:56.102 kid1| 5,5| ConnOpener.cc(343) doConnect: local=10.215.144.48 remote=199.16.156.6:443 flags=25: Comm::INPROGRESS 2017/05/31 23:36:56.102 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 15, type=2, handler=1, client_data=0x80d90530, timeout=0 2017/05/31 23:36:56.102 kid1| 93,5| AsyncJob.cc(152) callEnd: Comm::ConnOpener status out: [ job10] 2017/05/31 23:36:56.102 kid1| 93,5| AsyncCallQueue.cc(57) fireNext: leaving AsyncJob::start() 2017/05/31 23:36:56.293 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 15, type=1, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall Comm::ConnOpener::doConnect constructed, this=0x80d92290 [call150] 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(93) ScheduleCall: ConnOpener.cc(460) will call Comm::ConnOpener::doConnect() [call150] 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering Comm::ConnOpener::doConnect() 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(38) make: make call Comm::ConnOpener::doConnect [call150] 2017/05/31 23:36:56.293 kid1| 5,4| AsyncJob.cc(123) callStart: Comm::ConnOpener status in: [ job10] 2017/05/31 23:36:56.293 kid1| 5,5| ConnOpener.cc(365) doConnect: local=10.215.144.48 remote=199.16.156.6:443 flags=25: * - ERR tried too many times already. 2017/05/31 23:36:56.293 kid1| 17,3| AsyncCall.cc(93) ScheduleCall: ConnOpener.cc(137) will call fwdConnectDoneWrapper(local=10.215.144.48 remote=199.16.156.6:443 flags=25, errno=111, flag=-8, data=0x80d67d10) [call146] 2017/05/31 23:36:56.293 kid1| 93,5| AsyncJob.cc(84) mustStop: Comm::ConnOpener will stop, reason: Comm::ConnOpener::doConnect 2017/05/31 23:36:56.293 kid1| 93,5| AsyncJob.cc(137) callEnd: Comm::ConnOpener::doConnect() ends job [Stopped, reason:Comm::ConnOpener::doConnect job10] 2017/05/31 23:36:56.293 kid1| 5,4| ConnOpener.cc(153) cleanFd: local=10.215.144.48 remote=199.16.156.6:443 flags=25 closing temp FD 15 2017/05/31 23:36:56.293 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 15, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(56) cancel: will not call Comm::ConnOpener::timeout [call149] because Comm::ConnOpener::cleanFd 2017/05/31 23:36:56.293 kid1| 5,5| comm.cc(1038) comm_remove_close_handler: comm_remove_close_handler: FD 15, AsyncCall=0x80d90490*2 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(56) cancel: will not call Comm::ConnOpener::earlyAbort [call148] because comm_remove_close_handler 2017/05/31 23:36:56.293 kid1| 5,3| comm.cc(868) _comm_close: comm_close: start closing FD 15 2017/05/31 23:36:56.293 kid1| 5,3| comm.cc(540) commUnsetFdTimeout: Remove timeout for FD 15 2017/05/31 23:36:56.293 kid1| 5,5| comm.cc(721) commCallCloseHandlers: commCallCloseHandlers: FD 15 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall comm_close_complete constructed, this=0x80d90490 [call151] 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCall.cc(93) ScheduleCall: comm.cc(941) will call comm_close_complete(FD 15) [call151] 2017/05/31 23:36:56.293 kid1| 93,5| AsyncJob.cc(40) ~AsyncJob: AsyncJob destructed, this=0x80d78b40 type=Comm::ConnOpener [job10] 2017/05/31 23:36:56.293 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving Comm::ConnOpener::doConnect() 2017/05/31 23:36:56.293 kid1| 17,3| AsyncCallQueue.cc(55) fireNext: entering fwdConnectDoneWrapper(local=10.215.144.48 remote=199.16.156.6:443 flags=25, errno=111, flag=-8, data=0x80d67d10) 2017/05/31 23:36:56.293 kid1| 17,3| AsyncCall.cc(38) make: make call fwdConnectDoneWrapper [call146] 2017/05/31 23:36:56.293 kid1| 17,3| FwdState.cc(415) fail: ERR_CONNECT_FAIL "Service Unavailable" 199.16.156.6:443 2017/05/31 23:36:56.293 kid1| 17,3| FwdState.cc(616) retryOrBail: re-forwarding (0 tries, 0 secs) 2017/05/31 23:36:56.293 kid1| 17,3| FwdState.cc(386) startConnectionOrFail: 199.16.156.6:443 2017/05/31 23:36:56.293 kid1| 17,3| FwdState.cc(403) startConnectionOrFail: Connection failed: 199.16.156.6:443 2017/05/31 23:36:56.293 kid1| 17,3| FwdState.cc(265) ~FwdState: FwdState destructor starting 2017/05/31 23:36:56.293 kid1| 46,5| access_log.cc(289) stopPeerClock: First connection started: 1496266616.101970, current total response time value: -1 2017/05/31 23:36:56.293 kid1| 4,4| errorpage.cc(603) errorAppendEntry: Creating an error page for entry 0x80c213e0 with errorstate 0x80d93298 page id 11 2017/05/31 23:36:56.293 kid1| 4,2| errorpage.cc(1262) BuildContent: No existing error page language negotiated for ERR_CONNECT_FAIL. Using default error file. 2017/05/31 23:36:56.293 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%l --> '/* * Copyright (C) 1996-2015 The Squid Software Foundation and contributors * * Squid software is distributed under GPLv2+ license and includes * contributions from numerous individuals and organizations. * Please see the COPYING and CONTRIBUTORS files for details. */ /* Stylesheet for Squid Error pages [REMOVED FOR A SHORTER POST] ' 2017/05/31 23:36:56.293 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%; --> '%;' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%c --> 'ERR_CONNECT_FAIL' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%U --> 'https://199.16.156.6/*' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%U --> 'https://199.16.156.6/*' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%I --> '199.16.156.6' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%E --> '(111) Connection refused' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%w --> 'root' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%W --> '?subject=CacheErrorInfo%20-%20ERR_CONNECT_FAIL&body=CacheHost%3A%20inf-fw1%0D%0AErrPage%3A%20ERR_CONNECT_FAIL%0D%0AErr%3A%20(111)%20Connection%20refused%0D%0ATimeStamp%3A%20Wed,%2031%20May%202017%2021%3A36%3A56%20GMT%0D%0A%0D%0AClientIP%3A%2010.215.144.48%0D%0AServerIP%3A%20199.16.156.6%0D%0A%0D%0AHTTP%20Request%3A%0D%0ACONNECT%20%2F%20HTTP%2F1.1%0AHost%3A%20199.16.156.6%3A443%0D%0A%0D%0A%0D%0A' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%w --> 'root' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%T --> 'Wed, 31 May 2017 21:36:56 GMT' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%h --> 'inf-fw1' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%s --> 'squid/3.5.14' 2017/05/31 23:36:56.294 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%c --> 'ERR_CONNECT_FAIL' 2017/05/31 23:36:56.294 kid1| 11,5| HttpRequest.cc(474) detailError: current error details: 11/111 2017/05/31 23:36:56.294 kid1| 20,3| store.cc(484) lock: StoreEntry::storeErrorResponse locked key D1806996FC89FCA8A2553AF78760C5D4 e:=p2IWV/0x80c213e0*3 2017/05/31 23:36:56.294 kid1| 20,3| store.cc(1867) replaceHttpReply: StoreEntry::replaceHttpReply: 199.16.156.6:443 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 34 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 6 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 12 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 12 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 3 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 4 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 29 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 12 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 23 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 14 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 4 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 13 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.294 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 20 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 4 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 15 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 16 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 2 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(834) write: storeWrite: writing 3525 bytes for 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(985) checkCachable: StoreEntry::checkCachable: NO: private key 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(500) setReleaseFlag: StoreEntry::setReleaseFlag: 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,3| store_swapout.cc(381) mayStartSwapOut: not cachable 2017/05/31 23:36:56.295 kid1| 20,2| store.cc(954) checkCachable: StoreEntry::checkCachable: NO: not cachable 2017/05/31 23:36:56.295 kid1| 90,3| store_client.cc(732) invokeHandlers: InvokeHandlers: D1806996FC89FCA8A2553AF78760C5D4 2017/05/31 23:36:56.295 kid1| 90,3| store_client.cc(738) invokeHandlers: StoreEntry::InvokeHandlers: checking client #0 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(1053) complete: storeComplete: 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(1342) validLength: storeEntryValidLength: Checking 'D1806996FC89FCA8A2553AF78760C5D4' 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(1344) validLength: storeEntryValidLength: object_len = 3782 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(1345) validLength: storeEntryValidLength: hdr_sz = 257 2017/05/31 23:36:56.295 kid1| 20,5| store.cc(1346) validLength: storeEntryValidLength: content_length = 3525 2017/05/31 23:36:56.295 kid1| 20,3| store_swapout.cc(356) mayStartSwapOut: already rejected 2017/05/31 23:36:56.295 kid1| 20,2| store.cc(954) checkCachable: StoreEntry::checkCachable: NO: not cachable 2017/05/31 23:36:56.295 kid1| 90,3| store_client.cc(732) invokeHandlers: InvokeHandlers: D1806996FC89FCA8A2553AF78760C5D4 2017/05/31 23:36:56.295 kid1| 90,3| store_client.cc(738) invokeHandlers: StoreEntry::InvokeHandlers: checking client #0 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(522) unlock: StoreEntry::storeErrorResponse unlocking key D1806996FC89FCA8A2553AF78760C5D4 e:=sp2XINV/0x80c213e0*3 2017/05/31 23:36:56.295 kid1| 17,4| AsyncCall.cc(26) AsyncCall: The AsyncCall ConnStateData::ConnStateData::httpsPeeked constructed, this=0x80d93320 [call152] 2017/05/31 23:36:56.295 kid1| 17,4| AsyncCall.cc(93) ScheduleCall: FwdState.cc(248) will call ConnStateData::ConnStateData::httpsPeeked() [call152] 2017/05/31 23:36:56.295 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 1 2017/05/31 23:36:56.295 kid1| 20,3| store.cc(522) unlock: FwdState unlocking key D1806996FC89FCA8A2553AF78760C5D4 e:=sp2XINV/0x80c213e0*2 2017/05/31 23:36:56.295 kid1| 17,3| AsyncCall.cc(56) cancel: will not call fwdConnectDoneWrapper [call146] because FwdState destructed 2017/05/31 23:36:56.295 kid1| 17,3| FwdState.cc(292) ~FwdState: FwdState destructor done 2017/05/31 23:36:56.295 kid1| 17,3| AsyncCallQueue.cc(57) fireNext: leaving fwdConnectDoneWrapper(local=10.215.144.48 remote=199.16.156.6:443 flags=25, errno=111, flag=-8, data=0x80d67d10) 2017/05/31 23:36:56.295 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering comm_close_complete(FD 15) 2017/05/31 23:36:56.295 kid1| 5,4| AsyncCall.cc(38) make: make call comm_close_complete [call151] 2017/05/31 23:36:56.295 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 15 199.16.156.6 2017/05/31 23:36:56.295 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 15, type=1, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.295 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 15, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.295 kid1| 5,5| AcceptLimiter.cc(55) kick: size=0 2017/05/31 23:36:56.295 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving comm_close_complete(FD 15) 2017/05/31 23:36:56.295 kid1| 17,4| AsyncCallQueue.cc(55) fireNext: entering ConnStateData::ConnStateData::httpsPeeked() 2017/05/31 23:36:56.295 kid1| 17,4| AsyncCall.cc(38) make: make call ConnStateData::ConnStateData::httpsPeeked [call152] 2017/05/31 23:36:56.295 kid1| 17,4| AsyncJob.cc(123) callStart: Http::Server status in: [ job8] 2017/05/31 23:36:56.295 kid1| 33,5| client_side.cc(4411) httpsPeeked: Error while bumping: 199.16.156.6 2017/05/31 23:36:56.295 kid1| 11,5| HttpRequest.cc(473) detailError: old error details: 11/111 2017/05/31 23:36:56.296 kid1| 11,5| HttpRequest.cc(474) detailError: current error details: 11/111 2017/05/31 23:36:56.296 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x80d65688 2017/05/31 23:36:56.296 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x80d65688 2017/05/31 23:36:56.296 kid1| 87,3| clientStream.cc(223) clientStreamDetach: clientStreamDetach: Calling 1 with cbdata 0x80d66a08 2017/05/31 23:36:56.296 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x80d65638 2017/05/31 23:36:56.296 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x80d65638 2017/05/31 23:36:56.296 kid1| 33,3| client_side_request.cc(246) ~ClientHttpRequest: httpRequestFree: 199.16.156.6:443 2017/05/31 23:36:56.296 kid1| 33,5| client_side.cc(576) logRequest: logging half-baked transaction: 199.16.156.6:443 2017/05/31 23:36:56.296 kid1| 28,3| Checklist.cc(70) preCheck: 0xbfb4fe7c checking fast ACLs 2017/05/31 23:36:56.296 kid1| 28,5| Acl.cc(138) matches: checking access_log daemon:/var/log/squid/access.test.log 2017/05/31 23:36:56.296 kid1| 28,5| Acl.cc(138) matches: checking (access_log daemon:/var/log/squid/access.test.log line) 2017/05/31 23:36:56.296 kid1| 28,3| Acl.cc(158) matches: checked: (access_log daemon:/var/log/squid/access.test.log line) = 1 2017/05/31 23:36:56.296 kid1| 28,3| Acl.cc(158) matches: checked: access_log daemon:/var/log/squid/access.test.log = 1 2017/05/31 23:36:56.296 kid1| 28,3| Checklist.cc(63) markFinished: 0xbfb4fe7c answer ALLOWED for match 2017/05/31 23:36:56.296 kid1| 50,5| ModDaemon.cc(65) logfileNewBuffer: logfileNewBuffer: daemon:/var/log/squid/access.test.log: new buffer 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(172) logfile_mod_daemon_append: logfile_mod_daemon_append: daemon:/var/log/squid/access.test.log: appending 1 bytes 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(176) logfile_mod_daemon_append: logfile_mod_daemon_append: current buffer has 0 of 32768 bytes before append 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(172) logfile_mod_daemon_append: logfile_mod_daemon_append: daemon:/var/log/squid/access.test.log: appending 106 bytes 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(176) logfile_mod_daemon_append: logfile_mod_daemon_append: current buffer has 1 of 32768 bytes before append 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(172) logfile_mod_daemon_append: logfile_mod_daemon_append: daemon:/var/log/squid/access.test.log: appending 2 bytes 2017/05/31 23:36:56.296 kid1| 50,3| ModDaemon.cc(176) logfile_mod_daemon_append: logfile_mod_daemon_append: current buffer has 107 of 32768 bytes before append 2017/05/31 23:36:56.296 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 21, type=2, handler=1, client_data=0x80945048, timeout=0 2017/05/31 23:36:56.296 kid1| 28,4| FilledChecklist.cc(66) ~ACLFilledChecklist: ACLFilledChecklist destroyed 0xbfb4fe7c 2017/05/31 23:36:56.296 kid1| 28,4| Checklist.cc(197) ~ACLChecklist: ACLChecklist::~ACLChecklist: destroyed 0xbfb4fe7c 2017/05/31 23:36:56.296 kid1| 93,5| AsyncCall.cc(26) AsyncCall: The AsyncCall Initiate::noteInitiatorAborted constructed, this=0x80d92248 [call153] 2017/05/31 23:36:56.296 kid1| 93,5| AsyncCall.cc(93) ScheduleCall: Initiator.cc(40) will call Initiate::noteInitiatorAborted() [call153] 2017/05/31 23:36:56.296 kid1| 93,5| AsyncJob.cc(40) ~AsyncJob: AsyncJob destructed, this=0x80d63e80 type=ClientHttpRequest [job9] 2017/05/31 23:36:56.296 kid1| 33,5| client_side.cc(4135) getSslContextStart: Generating SSL certificate for twitter.com using ssl_crtd. 2017/05/31 23:36:56.296 kid1| 33,5| client_side.cc(4139) getSslContextStart: SSL crtd request: new_certificate 3238 host=twitter.com Sign=signTrusted SignHash=SHA256 -----BEGIN CERTIFICATE----- MII [REMOVED FOR A SHORTER POST] -----END CERTIFICATE----- -----BEGIN PRIVATE KEY----- MII [REMOVED FOR A SHORTER POST] -----END PRIVATE KEY----- 2017/05/31 23:36:56.296 kid1| 84,5| helper.cc(1167) GetFirstAvailable: GetFirstAvailable: Running servers 5 2017/05/31 23:36:56.296 kid1| 5,5| AsyncCall.cc(26) AsyncCall: The AsyncCall helperDispatchWriteDone constructed, this=0x80d8eef8 [call154] 2017/05/31 23:36:56.296 kid1| 5,5| Write.cc(35) Write: local=[::] remote=[::] FD 10 flags=1: sz 3260: asynCall 0x80d8eef8*1 2017/05/31 23:36:56.296 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 10, type=2, handler=1, client_data=0x808fe194, timeout=0 2017/05/31 23:36:56.296 kid1| 84,5| helper.cc(1309) helperDispatch: helperDispatch: Request sent to ssl_crtd #Hlpr1, 3260 bytes 2017/05/31 23:36:56.296 kid1| 17,4| AsyncJob.cc(152) callEnd: Http::Server status out: [ job8] 2017/05/31 23:36:56.296 kid1| 17,4| AsyncCallQueue.cc(57) fireNext: leaving ConnStateData::ConnStateData::httpsPeeked() 2017/05/31 23:36:56.297 kid1| 93,5| AsyncCallQueue.cc(55) fireNext: entering Initiate::noteInitiatorAborted() 2017/05/31 23:36:56.297 kid1| 93,5| AsyncCall.cc(38) make: make call Initiate::noteInitiatorAborted [call153] 2017/05/31 23:36:56.297 kid1| 93,5| AsyncCall.cc(56) cancel: will not call Initiate::noteInitiatorAborted [call153] because job gone 2017/05/31 23:36:56.297 kid1| 93,5| AsyncCall.cc(48) make: will not call Initiate::noteInitiatorAborted [call153] because of job gone 2017/05/31 23:36:56.297 kid1| 93,5| AsyncCallQueue.cc(57) fireNext: leaving Initiate::noteInitiatorAborted() 2017/05/31 23:36:56.297 kid1| 50,3| ModDaemon.cc(108) logfileHandleWrite: daemon:/var/log/squid/access.test.log: write returned 109 2017/05/31 23:36:56.297 kid1| 5,5| Write.cc(66) HandleWrite: local=[::] remote=[::] FD 10 flags=1: off 0, sz 3260. 2017/05/31 23:36:56.297 kid1| 5,5| Write.cc(108) HandleWrite: write() returns 3260 2017/05/31 23:36:56.297 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 10 flags=1 (0, 0) 2017/05/31 23:36:56.297 kid1| 5,5| AsyncCall.cc(93) ScheduleCall: IoCallback.cc(135) will call helperDispatchWriteDone(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=3260, buf=0x80d7ae10) [call154] 2017/05/31 23:36:56.297 kid1| 5,5| AsyncCallQueue.cc(55) fireNext: entering helperDispatchWriteDone(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=3260, buf=0x80d7ae10) 2017/05/31 23:36:56.297 kid1| 5,5| AsyncCall.cc(38) make: make call helperDispatchWriteDone [call154] 2017/05/31 23:36:56.297 kid1| 5,5| AsyncCallQueue.cc(57) fireNext: leaving helperDispatchWriteDone(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=3260, buf=0x80d7ae10) 2017/05/31 23:36:56.297 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 21, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.297 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 10, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.300 kid1| 5,3| Read.cc(144) HandleRead: FD 10, size 4095, retval 2905, errno 0 2017/05/31 23:36:56.300 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 10 flags=1 (0, 0) 2017/05/31 23:36:56.300 kid1| 5,4| AsyncCall.cc(93) ScheduleCall: IoCallback.cc(135) will call helperHandleRead(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=2905, buf=0x809234f0) [call111] 2017/05/31 23:36:56.300 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering helperHandleRead(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=2905, buf=0x809234f0) 2017/05/31 23:36:56.300 kid1| 5,4| AsyncCall.cc(38) make: make call helperHandleRead [call111] 2017/05/31 23:36:56.300 kid1| 84,5| helper.cc(866) helperHandleRead: helperHandleRead: 2905 bytes from ssl_crtd #Hlpr1 2017/05/31 23:36:56.300 kid1| 84,3| helper.cc(892) helperHandleRead: helperHandleRead: end of reply found 2017/05/31 23:36:56.300 kid1| 84,3| Reply.cc(29) parse: Parsing helper buffer 2017/05/31 23:36:56.300 kid1| 84,3| Reply.cc(48) parse: Buff length is larger than 2 2017/05/31 23:36:56.300 kid1| 84,3| Reply.cc(52) parse: helper Result = OK 2017/05/31 23:36:56.300 kid1| 33,5| client_side.cc(3992) sslCrtdHandleReply: Certificate for 199.16.156.6 was successfully recieved from ssl_crtd 2017/05/31 23:36:56.300 kid1| 33,5| client_side.cc(4394) doPeekAndSpliceStep: PeekAndSplice mode, proceed with client negotiation. Currrent state:SSLv2/v3 read client hello A 2017/05/31 23:36:56.300 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=2, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.301 kid1| 84,5| helper.cc(1167) GetFirstAvailable: GetFirstAvailable: Running servers 5 2017/05/31 23:36:56.301 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall helperHandleRead constructed, this=0x80d78220 [call155] 2017/05/31 23:36:56.301 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, queueing read for local=[::] remote=[::] FD 10 flags=1; asynCall 0x80d78220*1 2017/05/31 23:36:56.301 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 10, type=1, handler=1, client_data=0x808fe16c, timeout=0 2017/05/31 23:36:56.301 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving helperHandleRead(local=[::] remote=[::] FD 10 flags=1, data=0x809233a8, size=2905, buf=0x809234f0) 2017/05/31 23:36:56.301 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80d8fe20 6(0, 0x80d92248) 2017/05/31 23:36:56.301 kid1| 83,5| support.cc(2154) get_session_cb: Request to search for SSL Session of len:32272931686:268141813 2017/05/31 23:36:56.301 kid1| 54,5| MemMap.cc(148) openForReading: trying to open slot for key 669B4410F584FB0F9A063B581AD8A05B for reading in map [ssl_session_cache] 2017/05/31 23:36:56.301 kid1| 54,5| MemMap.cc(169) openForReadingAt: trying to open slot at 51 for reading in map [ssl_session_cache] 2017/05/31 23:36:56.301 kid1| 54,5| MemMap.cc(161) openForReading: failed to open slot for key 669B4410F584FB0F9A063B581AD8A05B for reading in map [ssl_session_cache] 2017/05/31 23:36:56.301 kid1| 83,5| support.cc(2169) get_session_cb: Failed to retrieved from cache 2017/05/31 23:36:56.301 kid1| 83,5| bio.cc(95) write: FD 13 wrote 918 <= 918 2017/05/31 23:36:56.301 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80d8fe20 11(0, 0) 2017/05/31 23:36:56.301 kid1| 83,5| bio.cc(118) read: FD 13 read -1 <= 5 2017/05/31 23:36:56.301 kid1| 83,5| bio.cc(123) read: error: 11 ignored: 1 2017/05/31 23:36:56.301 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x80d60950, timeout=0 2017/05/31 23:36:56.301 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.302 kid1| 83,5| bio.cc(118) read: FD 13 read 5 <= 5 2017/05/31 23:36:56.302 kid1| 83,5| bio.cc(118) read: FD 13 read 262 <= 262 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(118) read: FD 13 read 5 <= 5 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(118) read: FD 13 read 1 <= 1 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(118) read: FD 13 read 5 <= 5 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(118) read: FD 13 read 64 <= 64 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(95) write: FD 13 wrote 266 <= 266 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80d8fe20 11(0, 0) 2017/05/31 23:36:56.318 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80d8fe20 7(0, 0x80d92248) -----BEGIN SSL SESSION PARAMETERS----- MGACAQECAgMDBAIALwQABDDdX0DcPIcUITJcdR7aVovBoj+LZ/5wkReoH845k907 vgdlroH/auAfzPOm6P9xXIehBgIEWS83eKIEAgIBLKQCBACmDQQLdHdpdHRlci5j b20= -----END SSL SESSION PARAMETERS----- 2017/05/31 23:36:56.318 kid1| 83,2| client_side.cc(3796) clientNegotiateSSL: clientNegotiateSSL: New session 0x80d8b330 on FD 13 (10.215.144.48:42597) 2017/05/31 23:36:56.318 kid1| 83,3| client_side.cc(3800) clientNegotiateSSL: clientNegotiateSSL: FD 13 negotiated cipher AES128-SHA 2017/05/31 23:36:56.318 kid1| 83,5| client_side.cc(3816) clientNegotiateSSL: clientNegotiateSSL: FD 13 has no certificate. 2017/05/31 23:36:56.318 kid1| 33,4| client_side.cc(231) readSomeData: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: reading request... 2017/05/31 23:36:56.318 kid1| 33,5| AsyncCall.cc(26) AsyncCall: The AsyncCall ConnStateData::clientReadRequest constructed, this=0x80d7abc8 [call156] 2017/05/31 23:36:56.318 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, queueing read for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17; asynCall 0x80d7abc8*1 2017/05/31 23:36:56.318 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x808fe268, timeout=0 2017/05/31 23:36:56.318 kid1| 5,3| IoCallback.cc(116) finish: called for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 (0, 0) 2017/05/31 23:36:56.318 kid1| 33,5| AsyncCall.cc(93) ScheduleCall: IoCallback.cc(135) will call ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) [call156] 2017/05/31 23:36:56.318 kid1| 33,5| AsyncCallQueue.cc(55) fireNext: entering ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) 2017/05/31 23:36:56.318 kid1| 33,5| AsyncCall.cc(38) make: make call ConnStateData::clientReadRequest [call156] 2017/05/31 23:36:56.318 kid1| 33,5| AsyncJob.cc(123) callStart: Http::Server status in: [ job8] 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3251) clientReadRequest: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.319 kid1| 83,5| bio.cc(118) read: FD 13 read 5 <= 5 2017/05/31 23:36:56.319 kid1| 83,5| bio.cc(118) read: FD 13 read 432 <= 432 2017/05/31 23:36:56.319 kid1| 83,2| support.cc(1364) ssl_read_method: SSL FD 13 is pending 2017/05/31 23:36:56.319 kid1| 5,3| Read.cc(91) ReadNow: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, size 66, retval 66, errno 0 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3200) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: attempting to parse 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(37) reset: Request buffer is GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Window 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(47) parseRequestFirstLine: parsing possible request: GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Window 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(257) HttpParserParseReqLine: Parser: retval 1: from 0->15: method 0->2; url 4->4; version 6->13 (1/1) 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(2194) parseHttpRequest: Incomplete request, waiting for end of headers 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3238) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: not enough request data: 66 < 65536 2017/05/31 23:36:56.319 kid1| 33,4| client_side.cc(231) readSomeData: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: reading request... 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(26) AsyncCall: The AsyncCall ConnStateData::clientReadRequest constructed, this=0x80d8ea80 [call157] 2017/05/31 23:36:56.319 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, queueing read for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17; asynCall 0x80d8ea80*1 2017/05/31 23:36:56.319 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x808fe268, timeout=0 2017/05/31 23:36:56.319 kid1| 33,5| AsyncJob.cc(152) callEnd: Http::Server status out: [ job8] 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCallQueue.cc(57) fireNext: leaving ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) 2017/05/31 23:36:56.319 kid1| 5,3| IoCallback.cc(116) finish: called for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 (0, 0) 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(93) ScheduleCall: IoCallback.cc(135) will call ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) [call157] 2017/05/31 23:36:56.319 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCallQueue.cc(55) fireNext: entering ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(38) make: make call ConnStateData::clientReadRequest [call157] 2017/05/31 23:36:56.319 kid1| 33,5| AsyncJob.cc(123) callStart: Http::Server status in: [ job8] 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3251) clientReadRequest: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.319 kid1| 83,2| support.cc(1364) ssl_read_method: SSL FD 13 is pending 2017/05/31 23:36:56.319 kid1| 5,3| Read.cc(91) ReadNow: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, size 61, retval 61, errno 0 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3200) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: attempting to parse 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(37) reset: Request buffer is GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/ 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(47) parseRequestFirstLine: parsing possible request: GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/ 2017/05/31 23:36:56.319 kid1| 74,5| HttpParser.cc(257) HttpParserParseReqLine: Parser: retval 1: from 0->15: method 0->2; url 4->4; version 6->13 (1/1) 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(2194) parseHttpRequest: Incomplete request, waiting for end of headers 2017/05/31 23:36:56.319 kid1| 33,5| client_side.cc(3238) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: not enough request data: 127 < 65536 2017/05/31 23:36:56.319 kid1| 33,4| client_side.cc(231) readSomeData: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: reading request... 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(26) AsyncCall: The AsyncCall ConnStateData::clientReadRequest constructed, this=0x80d7abc8 [call158] 2017/05/31 23:36:56.319 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, queueing read for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17; asynCall 0x80d7abc8*1 2017/05/31 23:36:56.319 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=1, handler=1, client_data=0x808fe268, timeout=0 2017/05/31 23:36:56.319 kid1| 33,5| AsyncJob.cc(152) callEnd: Http::Server status out: [ job8] 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCallQueue.cc(57) fireNext: leaving ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) 2017/05/31 23:36:56.319 kid1| 5,3| IoCallback.cc(116) finish: called for local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 (0, 0) 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(93) ScheduleCall: IoCallback.cc(135) will call ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) [call158] 2017/05/31 23:36:56.319 kid1| 5,5| ModEpoll.cc(116) SetSelect: FD 13, type=2, handler=0, client_data=0, timeout=0 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCallQueue.cc(55) fireNext: entering ConnStateData::clientReadRequest(local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, data=0x80d60950) 2017/05/31 23:36:56.319 kid1| 33,5| AsyncCall.cc(38) make: make call ConnStateData::clientReadRequest [call158] 2017/05/31 23:36:56.319 kid1| 33,5| AsyncJob.cc(123) callStart: Http::Server status in: [ job8] 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(3251) clientReadRequest: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.320 kid1| 33,2| client_side.cc(2370) maybeMakeSpaceAvailable: growing request buffer: available=385 used=127 2017/05/31 23:36:56.320 kid1| 5,3| Read.cc(91) ReadNow: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17, size 385, retval 268, errno 0 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(3200) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: attempting to parse 2017/05/31 23:36:56.320 kid1| 74,5| HttpParser.cc(37) reset: Request buffer is GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate, br Cookie: guest_id=v1%3A149087497487789376; personalization_id="v1_zoGltEgEbV7jirFVg/rLKg==" Connection: keep-alive 2017/05/31 23:36:56.320 kid1| 74,5| HttpParser.cc(47) parseRequestFirstLine: parsing possible request: GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate, br Cookie: guest_id=v1%3A149087497487789376; personalization_id="v1_zoGltEgEbV7jirFVg/rLKg==" Connection: keep-alive 2017/05/31 23:36:56.320 kid1| 74,5| HttpParser.cc(257) HttpParserParseReqLine: Parser: retval 1: from 0->15: method 0->2; url 4->4; version 6->13 (1/1) 2017/05/31 23:36:56.320 kid1| 33,3| client_side.cc(2258) parseHttpRequest: parseHttpRequest: req_hdr = {Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate, br Cookie: guest_id=v1%3A149087497487789376; personalization_id="v1_zoGltEgEbV7jirFVg/rLKg==" Connection: keep-alive } 2017/05/31 23:36:56.320 kid1| 33,3| client_side.cc(2262) parseHttpRequest: parseHttpRequest: end = { } 2017/05/31 23:36:56.320 kid1| 33,3| client_side.cc(2266) parseHttpRequest: parseHttpRequest: prefix_sz = 395, req_line_sz = 16 2017/05/31 23:36:56.320 kid1| 93,5| AsyncJob.cc(34) AsyncJob: AsyncJob constructed, this=0x80d8c238 type=ClientHttpRequest [job11] 2017/05/31 23:36:56.320 kid1| 87,3| clientStream.cc(144) clientStreamInsertHead: clientStreamInsertHead: Inserted node 0x80d65688 with data 0x80d6561c after head 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(2282) parseHttpRequest: parseHttpRequest: Request Header is Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate, br Cookie: guest_id=v1%3A149087497487789376; personalization_id="v1_zoGltEgEbV7jirFVg/rLKg==" Connection: keep-alive 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(2303) parseHttpRequest: Prepare absolute URL from intercept 2017/05/31 23:36:56.320 kid1| 25,5| mime_header.cc(37) mime_get_header_field: mime_get_header: looking for 'Host' 2017/05/31 23:36:56.320 kid1| 25,5| mime_header.cc(59) mime_get_header_field: mime_get_header: checking 'Host: twitter.com' 2017/05/31 23:36:56.320 kid1| 25,5| mime_header.cc(82) mime_get_header_field: mime_get_header: returning 'twitter.com' 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(2125) prepareTransparentURL: TRANSPARENT HOST REWRITE: 'https://twitter.com/' 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(2342) parseHttpRequest: parseHttpRequest: Complete request received 2017/05/31 23:36:56.320 kid1| 11,2| client_side.cc(2345) parseHttpRequest: HTTP Client local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.320 kid1| 11,2| client_side.cc(2346) parseHttpRequest: HTTP Client REQUEST: --------- GET / HTTP/1.1 Host: twitter.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: es-ES,es;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate, br Cookie: guest_id=v1%3A149087497487789376; personalization_id="v1_zoGltEgEbV7jirFVg/rLKg==" Connection: keep-alive ---------- 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(3221) clientParseRequests: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17: done parsing a request 2017/05/31 23:36:56.320 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall clientLifetimeTimeout constructed, this=0x80d92248 [call159] 2017/05/31 23:36:56.320 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 timeout 86400 2017/05/31 23:36:56.320 kid1| 23,3| url.cc(357) urlParse: urlParse: Split URL 'https://twitter.com/' into proto='https', host='twitter.com', port='443', path='/' 2017/05/31 23:36:56.320 kid1| 14,3| Address.cc(389) lookupHostIP: Given Non-IP 'twitter.com': Name or service not known 2017/05/31 23:36:56.320 kid1| 33,3| client_side.cc(873) clientSetKeepaliveFlag: http_ver = HTTP/1.1 2017/05/31 23:36:56.320 kid1| 33,3| client_side.cc(874) clientSetKeepaliveFlag: method = GET 2017/05/31 23:36:56.320 kid1| 33,4| client_side.cc(2455) quitAfterError: Will close after error: local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(2476) serveDelayedError: Responding with delated error for https://twitter.com/ 2017/05/31 23:36:56.320 kid1| 20,3| store.cc(484) lock: clientReplyContext::setReplyToStoreEntry locked key D1806996FC89FCA8A2553AF78760C5D4 e:=sp2XINV/0x80c213e0*2 2017/05/31 23:36:56.320 kid1| 11,5| HttpRequest.cc(474) detailError: current error details: 11/111 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(1709) pullData: 0 written 0 into local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.320 kid1| 33,5| client_side.cc(1665) getNextRangeOffset: range: 0; http offset 0; reply 0 2017/05/31 23:36:56.320 kid1| 87,3| clientStream.cc(184) clientStreamRead: clientStreamRead: Calling 1 with cbdata 0x80d66a08 from node 0x80d65688 2017/05/31 23:36:56.320 kid1| 90,3| store_client.cc(200) copy: store_client::copy: D1806996FC89FCA8A2553AF78760C5D4, from 0, for length 4096, cb 1, cbdata 0x80d659a0 2017/05/31 23:36:56.320 kid1| 20,3| store.cc(484) lock: store_client::copy locked key D1806996FC89FCA8A2553AF78760C5D4 e:=sp2XINV/0x80c213e0*3 2017/05/31 23:36:56.320 kid1| 90,3| store_client.cc(297) storeClientCopy2: storeClientCopy2: D1806996FC89FCA8A2553AF78760C5D4 2017/05/31 23:36:56.320 kid1| 33,5| store_client.cc(329) doCopy: store_client::doCopy: co: 0, hi: 3782 2017/05/31 23:36:56.320 kid1| 90,3| store_client.cc(433) scheduleMemRead: store_client::doCopy: Copying normal from memory 2017/05/31 23:36:56.320 kid1| 88,5| client_side_reply.cc(2154) sendMoreData: clientReplyContext::sendMoreData: https://twitter.com/, 3782 bytes (3782 new bytes) 2017/05/31 23:36:56.320 kid1| 88,5| client_side_reply.cc(2158) sendMoreData: clientReplyContext::sendMoreData:local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 '199.16.156.6:443' out.offset=0 2017/05/31 23:36:56.321 kid1| 88,2| client_side_reply.cc(2001) processReplyAccessResult: The reply for GET https://twitter.com/ is ALLOWED, because it matched (access_log daemon:/var/log/squid/access.test.log line) 2017/05/31 23:36:56.321 kid1| 20,3| store.cc(484) lock: ClientHttpRequest::loggingEntry locked key D1806996FC89FCA8A2553AF78760C5D4 e:=sp2XINV/0x80c213e0*4 2017/05/31 23:36:56.321 kid1| 88,3| client_side_reply.cc(2039) processReplyAccessResult: clientReplyContext::sendMoreData: Appending 3525 bytes after 257 bytes of headers 2017/05/31 23:36:56.321 kid1| 87,3| clientStream.cc(162) clientStreamCallback: clientStreamCallback: Calling 1 with cbdata 0x80d6561c from node 0x80d65638 2017/05/31 23:36:56.321 kid1| 11,2| client_side.cc(1391) sendStartOfMessage: HTTP Client local=199.16.156.6:443 remote=10.215.144.48 FD 13 flags=17 2017/05/31 23:36:56.321 kid1| 11,2| client_side.cc(1392) sendStartOfMessage: HTTP Client REPLY: --------- HTTP/1.1 503 Service Unavailable Server: squid/3.5.14 Mime-Version: 1.0 Date: Wed, 31 May 2017 21:36:56 GMT Content-Type: text/html;charset=utf-8 Content-Length: 3525 X-Squid-Error: ERR_CONNECT_FAIL 111 Vary: Accept-Language Content-Language: en X-Cache: MISS from inf-fw1 X-Cache-Lookup: NONE from inf-fw1:3227 Via: 1.1 inf-fw1 (squid/3.5.14) Connection: close Thanks, Vieri _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users