Перейти из форума на сайт.

НовостиФайловые архивы
ПоискАктивные темыТоп лист
ПравилаКто в on-line?
Вход Забыли пароль? Первый раз на этом сайте? Регистрация
Компьютерный форум Ru.Board » Компьютеры » В помощь системному администратору » SQUID (только под *nix)

Модерирует : lynx, Crash_Master, dg, emx, ShriEkeR

 Версия для печати • ПодписатьсяДобавить в закладки
Страницы: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141

Открыть новую тему     Написать ответ в эту тему

Zmey



Strangled by Lynx
Редактировать | Профиль | Сообщение | ICQ | Цитировать | Сообщить модератору
Я думаю удобнее сделать будет один топик по Squid и все вопросы касательно него постить сюда. :)
У меня вопрос такого характера: как настроить резку трафика squid и как настроить замену баннеров или просто их вырезку.


SQUID - HTTP/HTTPS прокси под *nix

 
В первом посте собираем полезные ссылки, преимущественно на русском по Squid.
 
Официальный сайт: www.squid-cache.org
Squid (кеширующий прокси для http): установка, настройка и использование
Squid Web Proxy Cache: получение, компилляция, настройка (архивная версия)
Squid Proxy Server 3.1 Beginners Guide,  Packtpub, 2011, PDF (см. также и другие источники)
 
About Squid Web Proxy Cache (архивная версия)
Зона особого внимания: Squid (архивная версия)
Как не получать рекламы через Internet  
FAQ по Squid (архивная версия)
Авторизация squid в домене Windows 2003 Server
Статьи по Squid на Opennet.ru  
Как заставить Squid быть только прокси, без кэширования чего-либо?
 
Также смотрите фильтр по squid
 
В отдельных темах обсуждается

Squid и ограничение доступа по времени
Squid: ограничить трафик для отдельного юзера: ширина канала
Squid и вырезание баннеров
Анализаторы логов для Squid
 

// текущий бэкап шапки..

Всего записей: 303 | Зарегистр. 07-12-2001 | Отправлено: 14:56 10-05-2002 | Исправлено: TheBarmaley TMP, 15:33 23-03-2016
olegsenin



Junior Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
ipmanyak
само собой стояла такая галка.
 
Проблему решил переводом модема в бридж и поднятии линка на стороне шлюза

Всего записей: 68 | Зарегистр. 01-01-2009 | Отправлено: 16:48 12-03-2013
yrkrus



Member
Редактировать | Профиль | Сообщение | ICQ | Цитировать | Сообщить модератору
Доброго всем времени суток!
Народ подскажите у кого реализована блокировка на сквиде анонимайзеров? Уже замучался, резать так резать...

Всего записей: 379 | Зарегистр. 30-11-2010 | Отправлено: 22:32 15-03-2013 | Исправлено: yrkrus, 22:36 15-03-2013
vlary



Platinum Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
yrkrus Это крайне непростая задача. Либо знать список актуальных анонимайзеров не хуже юзеров и регулярно обновлять черные списки. Либо использовать подход "запрещено все, что не разрешено", и закрыть методы POST и CONNECT для всех сайтов, кроме необходимых. А по GET пусть ходят куда хотят, кроме запрещенных ресурсов.

----------
Заслуженный SCOтовод, почетный SUNтехник и любитель Кошек

Всего записей: 17282 | Зарегистр. 13-06-2007 | Отправлено: 15:09 16-03-2013
yrkrus



Member
Редактировать | Профиль | Сообщение | ICQ | Цитировать | Сообщить модератору
vlary
 
печально, придется пока по старинке списком с запрещенными сайтами

Всего записей: 379 | Зарегистр. 30-11-2010 | Отправлено: 21:41 16-03-2013 | Исправлено: yrkrus, 00:21 17-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Имею ArchLinux на локкальной станции. На сервере локальной сети работает squid.
На локальной станции из менеджера пакетов выполняю обновление баз данных, в конфигурации программы указано, что необходимо обращаться и к http://repo.archlinux.fr/i686-

Код:
 
[root@old-server pacman.d]# pacman -Sy
:: Синхронизируются базы данных пакетов...
 core не устарел
 extra не устарел
 community не устарел
ошибка: не удалось получить файл 'archlinuxfr.db' из repo.archlinux.fr : The requested URL returned error: 400 Bad Request
ошибка: не удалось обновить archlinuxfr (ошибка в библиотеке загрузки)
 
 
В /var/log/squid/access.log имею-

Код:
 
..
1363759825.092    453 192.168.0.12 TCP_MISS/200 487 GET http://www.seamonkey-project.org/images/box/key-point_tr.gif - DIRECT/63.245.217.20 image/gif
1363759889.901     99 192.168.0.12 TCP_MISS/200 2218 GET http://repo.archlinux.fr/ - DIRECT/91.121.141.57 text/html
1363759891.258  70872 192.168.0.12 TCP_MISS/200 90551 CONNECT www.ghostery.com:443 - DIRECT/54.243.127.189 -
1363759896.395    561 192.168.0.12 TCP_MISS/200 26180 GET http://repo.archlinux.fr/i686/ - DIRECT/91.121.141.57 text/html
1363760004.387      0 192.168.0.12 TCP_DENIED/400 1492 GET /i686/archlinuxfr.db - NONE/- text/html
1363760385.937      0 192.168.0.12 TCP_DENIED/400 1492 GET /i686/archlinuxfr.db - NONE/- text/html
..
 
 
При этом в /etc/squid/squid.conf указано-

Код:
 
..
acl allow_http_ip    url_regex -i ^http://78\.46\.78\.247
acl allow_http_ip    url_regex -i ^http://91\.121\.141\.57
acl allow_http_ip    url_regex -i ^http://213\.186\.33\.2
..
acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
#
http_access deny deny_http_ip !allow_http_ip
 
 
При этом если выполнить обновление баз данных через иной канал, на котором отсутствует squi, то я получаю необходимый файл.
Как исправить ситуацию?
Спасибо.

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 13:52 20-03-2013
Alukardd



Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj
Так обращение-то идёт по URL repo.archlinux.fr, а вы разрешили URL с ip, так вообще редко когда пишут...
Либо разрешайте нормальный url_regex и не парьтесь о его адресе, либо разрешайте dst 91.121.141.57/32.

----------
Microsoft gives you windows, linuх gives you the whole house...
I've been using Vim for about 4 years now, mostly because I can't figure out how to exit it.

Всего записей: 6571 | Зарегистр. 28-08-2008 | Отправлено: 14:06 20-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Сечас проверю, Спасибо.
 
Добавлено:
Сделал так-

Код:
 
#
acl allow_http_ip    url_regex -i ^http://78\.46\.78\.247
#acl allow_http_ip    url_regex -i ^http://91\.121\.141\.57
acl allow_http_ip    url_regex -i ^http://213\.186\.33\.2
acl allow_http_ip    dst    91.121.141.57/32
#
 
2013/03/20 12:51:48| aclParseAclLine: ACL 'allow_http_ip' already exists with different type.
FATAL: Bungled squid.conf line 2267: acl allow_http_ip  dst     91.121.141.57/32
Squid Cache (Version 2.5.STABLE13): Terminated abnormally.
 

Посучаю ошибку в squid.conf
 
Добавлено:
Не помогло и нижеследующее-

Код:
 
#acl allow_http_ip    url_regex -i ^http://91\.121\.141\.57
 
acl allow_http_archlinux dstdomain .repo.archlinux.fr
http_access allow allow_http_archlinux
 


Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 14:42 20-03-2013
Alukardd



Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj
В ошибке чётко написано, что нех пихать в один ACL 2 разных типа данных.
Я Вам написал 2 варианта, Вы не использовали ни один из них!..
Почему не сработало с dstdomain я хз? но я Вам говорил только о url_regex или dst.

----------
Microsoft gives you windows, linuх gives you the whole house...
I've been using Vim for about 4 years now, mostly because I can't figure out how to exit it.

Всего записей: 6571 | Зарегистр. 28-08-2008 | Отправлено: 15:27 20-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Пробовал так-

Код:
 
#acl allow_http_ip    url_regex -i ^http://91\.121\.141\.57
acl allow_archlinux dst 91.121.141.57/32
http_access allow allow_archlinux
 

и так=

Код:
 
#acl allow_http_ip    url_regex -i ^http://91\.121\.141\.57
acl allow_archlinux dstdomain .archlinux.fr
http_access allow allow_archlinux
 

Результат - squid перезапускается без ошибок, но в логе обращения к squid тоже сообщение, см. выше.

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 15:40 20-03-2013
Alukardd



Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj
Покажите тогда весь конфиг, т.к. то что я вижу здесь должно работать.

----------
Microsoft gives you windows, linuх gives you the whole house...
I've been using Vim for about 4 years now, mostly because I can't figure out how to exit it.

Всего записей: 6571 | Зарегистр. 28-08-2008 | Отправлено: 16:04 20-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору

Код:
 
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
cache_mem 128 MB
maximum_object_size 16384 KB
cache_dir ufs /var/spool/squid 1024 16 256
cache_store_log none
redirect_program /home/traffic/cgi-bin/Squid/mySQL/redirect-mysql.pl
redirect_children 16
auth_param basic children 5
auth_param basic realm Squid proxy-caching web server
auth_param basic credentialsttl 2 hours
auth_param basic casesensitive off
refresh_pattern \.bz2$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.exe$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gif$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gz$           43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ico$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.jpg$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mid$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mp3$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.pdf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.swf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tar$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tgz$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.zip$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /advs/                             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /banners/                          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /cgi-bin/iframe/                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-analyze                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-si                         43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ad\.                        43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ads\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://adv\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://click\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://count\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://counter\.                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://engine\.                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://img\.readme\.ru             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://userpic\.livejournal\.com   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern .               0       80%     14400
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl RootUser src "/etc/squid/squidblock/users/root.users"
acl Safe_ports port 21 121 2121    # ftp
acl Safe_ports port 70        # gopher
acl Safe_ports port 80        # http
acl Safe_ports port 81-85
acl Safe_ports port 210        # wais
acl Safe_ports port 280        # http-mgmt
acl Safe_ports port 488        # gss-http
acl Safe_ports port 591        # filemaker
acl Safe_ports port 777        # multiling http
acl Safe_ports port 1011 1021    # ðÉÔÅÒÓËÁÑ ÏÐÏÒÎÁÑ ÓÔÁÎÃÉÑ
acl Safe_ports port 2101 2131 8080-8085    # ÄÌÑ NTRIP ËÌÁÓÔÅÒÁ
acl SSL_ports port 443 563 9443        # https, snews, ssl
acl Safe_ports port 1025-65535    # unregistered ports
acl SSL_ports port 3690        # svn
acl Safe_ports port 443 5190    # icq- 443, 5190
acl SSL_ports port 5190        # icq- 443, 5190
acl SSL_ports port 9418         # git
acl Safe_ports port 9418        # git
acl SSL_ports port 60002 60003    # ÄÌÑ ÓÅÒ×ÉÓÁ ÍÅÔËÉ ×ÒÅÍÅÎÉ http://tsp.pki.kz/
acl Safe_ports port 60002 60003    # ÄÌÑ ÓÅÒ×ÉÓÁ ÍÅÔËÉ ×ÒÅÍÅÎÉ http://tsp.pki.kz/
acl CONNECT method CONNECT
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.
http_access deny blocking_url
http_access allow localhost
http_access allow RootUser
acl Time_deny_NoAdmin time AS
acl orizon_deny        url_regex    .orizon-navigation\.com
acl orizon_method    method        OPTIONS PROPFIND
http_access deny orizon_method orizon_deny
acl orizon_method_1    method        CONNECT
acl orizon_port        port        443
http_access deny orizon_method_1 orizon_deny orizon_port
acl CProxy    url_regex    .cproxy. .hidemyass\.com/
http_access deny CProxy
acl Qwerty    url_regex    .qwerty\.ru/ .corbina\.ru/ .avangard-dsl\.ru/
acl Qwerty    url_regex    .loveplanet\.ru/ .mamba\.ru/ .vspomni\.ru/
acl Qwerty    url_regex    .combats\.com/
http_access deny Qwerty
acl Pochta_mail_ru    url_regex    .agent\.mail\.ru/ .blogs\.mail\.ru/ .chat\.mail\.ru/
acl Pochta_mail_ru    url_regex    .exe\.agent\.mail\.ru/ .foto\.mail\.ru/ .games\.mail\.ru/
acl Pochta_mail_ru    url_regex    .go\.mail\.ru/ .jiml\.mail\.ru .love\.mail\.ru/
acl Pochta_mail_ru    url_regex    .mail\.radar\.imgsmail\.ru .rs\.mail\.ru  
acl Pochta_mail_ru    url_regex    .webagent\.mail\.ru:443 .sputnik\.mail\.ru/ .video\.mail\.ru/
http_access deny Pochta_mail_ru
acl Pochta_mail_ru_src    dstdom_regex    mrim
http_access deny Pochta_mail_ru_src
acl deny_mail_ru_ip    url_regex -i \/194\.67\.23\.[0-9]+
acl deny_mail_ru_ip    url_regex -i \/194\.186\.55\.[0-9]+
acl deny_mail_ru_ip    url_regex -i \/195\.222\.173\.105
acl deny_mail_ru_ip    url_regex -i \/213\.180\.203\.[0-9]+
http_access deny deny_mail_ru_ip
acl ICQ_USERS    src        192.168.0.0/24
acl ICQ_ADDR     dst        64.12.0.0/16 205.188.0.0/16
acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com
acl ICQ_METHOD    method        CONNECT
acl ICQ_PORT    port        443 5190
http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT
http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT
always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT
always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT
acl skype_users    src    "/etc/squid/squidblock/users/skype.users"
acl skype_src    dstdom_regex    login.skype.com
acl skype_src    dstdom_regex    publishers.skype.com
http_access deny !skype_users skype_src
acl ip_deny_access url_regex -i [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
acl skype_metod method    CONNECT
acl skype_ports    port    80 443
http_access deny !skype_users skype_metod ip_deny_access skype_ports
acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443
acl Skype_UA browser ^skype^
http_access deny numeric_IPS !skype_users
http_access deny Skype_UA !skype_users
acl allow_http_ip    url_regex -i ^http://192\.168\.0\.2    # óÒÄ 09 éÀÌ 2008 11:28:21 - ÄÌÑ ÄÏÓÔÕÐÁ Ë ÕÚÌÕ ËÏÎÔÒÏÌÑ ÉÎÔÅÒÎÅÔ-ÔÒÁÆÉËÁ
acl allow_http_ip    url_regex -i ^http://192\.168\.0\.6    # óÒÄ 12 ïËÔ 2011 11:45:17 - þÅÈÏ×, myChat
acl allow_http_ip    url_regex -i ^http://192\.168\.0\.14    # óÕ 16 áÐÒ 2011 18:22:55 - ÄÏÓÔÕÐ Ë ÌÏËÁÌØÎÏÍÕ SVN ÓÅÒ×ÅÒÕ
acl allow_http_ip    url_regex -i ^http://195\.66\.65\.[0-9]+    # óÒÄ 09 éÀÌ 2008 11:28:21
acl allow_http_ip    url_regex -i ^http://82\.207\.64\.131    # NTRIP ËÌÁÓÔÅÒ
acl allow_http_ip    url_regex -i ^http://89\.221\.53\.75    # NTRIP ËÌÁÓÔÅÒ
acl allow_http_ip    url_regex -i ^http://91\.198\.76\.2    # NTRIP ËÌÁÓÔÅÒ
acl allow_http_ip    url_regex -i ^http://94\.159\.3\.118    # NTRIP ËÌÁÓÔÅÒ
acl allow_http_ip    url_regex -i ^http://192\.168\.0\.138    # DiffServise_RS -  Referen Station
acl allow_http_ip    url_regex -i ^http://193\.169\.80\.60    # ÄÌÑ ëÁÌÀÖÎÏÇÏ ó.
acl allow_http_ip    url_regex -i ^http://194\.44\.175\.195    # ÄÌÑ ëÁÌÀÖÎÏÇÏ ó.
acl allow_http_ip    url_regex -i ^http://194\.44\.35\.24    # NTRIP ËÌÁÓÔÅÒ
acl allow_http_ip    url_regex -i ^http://213\.221\.61\.66    # ðÉÔÅÒÓËÁÑ ÏÐÏÒÎÁÑ ÓÔÁÎÃÉÑ
acl allow_http_ip    url_regex -i ^http://59\.151\.99\.140    # ÷ÔÏ 29 ñÎ× 2013 10:41:52 - SNTI
acl allow_http_ip    url_regex -i ^http://60\.250\.89\.236    # http://www.hsuanmao.com.tw/www/front/bin/cglist.phtml?Category=6
acl allow_http_ip    url_regex -i ^http://85\.198\.179\.37    # þÔ× 28 æÅ× 2013 13:33:54 - ëÏÎÏÎÅÎËÏ ó.
acl allow_http_ip    url_regex -i ^http://90\.156\.232\.149    # ÷ÔÏ 17 áÐÒ 2012 14:30:48 - master.zinester.com - ÷ÉÎÎÉË á.
acl allow_http_ip    url_regex -i ^http://91\.220\.203\.10    # ÷ÔÏ 10 áÐÒ 2012 16:07:21 - novaposhta.ua
acl allow_http_ip    url_regex -i ^http://174\.37\.205\.152    # óÒÄ 11 éÀÌ 2012 14:04:40 - áÒÔ£ÍÅÎËÏ óÅÒÇÅÊ
acl allow_http_ip    url_regex -i ^http://193\.108\.249\.9    # ðÎÄ 03 ïËÔ 2011 09:44:41 - 193.108.249.9:2121 - ftp ÆÉÌÉÁÌÁ îÁ×ÉÓ-õËÒÁÉÎÁ × Ç. þÅÒËÁÓÓÙ
acl allow_http_ip    url_regex -i ^http://217\.34\.103\.131    # þÔ× 06 óÅÎ 2012 15:28:53 - óÉÎÅÌØÎÉË ÷ÁÄÉÍ
acl allow_http_ip    url_regex -i ^http://72\.14\.207\.104
acl allow_http_ip    url_regex -i ^http://74\.54\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://74\.55\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://74\.86\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://174\.36\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://174\.120\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://174\.133\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://208\.43\.[0-9]+\.[0-9]+
acl allow_http_ip    url_regex -i ^http://62\.146\.66\.[0-9]+
acl allow_http_ip    url_regex -i ^http://80\.190\.143\.[0-9]+
acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
http_access deny deny_http_ip !allow_http_ip
acl BadUsers src "/etc/squid/squidblock/users/bad.users"
http_access allow BadUsers
acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"
acl squid_block_badlang        url_regex -i "/etc/squid/squidblock/badlang.block.txt"
acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"
acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"
acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"
acl squid_block_pirate        url_regex -i "/etc/squid/squidblock/pirate.block.txt"
acl squid_block_porn        url_regex -i "/etc/squid/squidblock/porn.block.txt pron.block.txt"
acl squid_unblock_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.unblock.txt"
acl squid_unblock_badlang    url_regex -i "/etc/squid/squidblock/badlang.unblock.txt"
acl squid_unblock_entertain    url_regex -i "/etc/squid/squidblock/entertain.unblock.txt"
acl squid_unblock_games        url_regex -i "/etc/squid/squidblock/games.unblock.txt"
acl squid_unblock_mp3        url_regex -i "/etc/squid/squidblock/mp3.unblock.txt"
acl squid_unblock_pirate    url_regex -i "/etc/squid/squidblock/pirate.unblock.txt"
acl squid_unblock_porn        url_regex -i "/etc/squid/squidblock/porn.unblock.txt"
http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery
http_access deny squid_block_entertain !squid_unblock_entertain
http_access deny squid_block_games !squid_unblock_games
http_access deny squid_block_mp3 !squid_unblock_mp3
acl KB_TimeSmena time 7:00-20:00
acl squid_block_banners url_regex -i "/etc/squid/squidblock/banners.acl"
acl AntiChat        urlpath_regex    chat
acl exclude_url_chat    url_regex    .agilialinux\.ru/
acl Download_in_RootUsers    src 192.168.0.136/255.255.255.255    # Vinnik_Andrej.ua
acl Download_in_RootUsers    src 192.168.0.162/255.255.255.255    # Bojko_Aleksandr
acl Download_in_RootUsers    src 192.168.0.168/255.255.255.255    # Opalyuk_Ruslan.ua
acl Download_in_RootUsers    src 192.168.0.244/255.255.255.255    # Kucherenko_Sergej
acl TimeNoMusic time MTWHFA
acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$
acl MusicVideoFiles urlpath_regex \.mp.*$
acl MusicVideoFiles urlpath_regex \[mp3.*$
http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers
acl cont-type-video rep_mime_type Content-Type video.
acl cont-type-audio rep_mime_type Content-Type audio.
http_reply_access deny cont-type-video TimeNoMusic !RootUser
http_reply_access deny cont-type-audio TimeNoMusic !RootUser
acl x_tube_src    dstdom_regex    rutube
acl x_tube_src    dstdom_regex    youtube
http_access deny x_tube_src TimeNoMusic !RootUser
 
acl Time_Kutsenko time MTWHF 7:00-17:00
acl Workstation_Kutsenko src  192.168.0.119/255.255.255.255
http_access allow Time_Kutsenko Workstation_Kutsenko
acl LocalNetwork src "/etc/squid/squidblock/users/local.users"
http_access allow KB_TimeSmena LocalNetwork
acl GPF_TimeSmena    time 8:00-20:00
acl GPF_LocalNetwork src "/etc/squid/squidblock/users/local.gpf.users"
http_access allow GPF_LocalNetwork GPF_TimeSmena
acl MaxOpenURL maxconn 5
client_db on
http_access allow KB_TimeSmena LocalNetwork !MaxOpenURL
http_access allow Time_Kutsenko Workstation_Kutsenko !MaxOpenURL
http_access deny all
icp_access allow all
reply_body_max_size 0 allow localhost
reply_body_max_size 0 allow RootUser
reply_body_max_size 0 allow Download_in_RootUsers
reply_body_max_size 100000000 allow LocalNetwork
reply_body_max_size 64000000 allow GPF_LocalNetwork
visible_hostname proxy.orizon-navigation.com
append_domain .orizon-navigation.com
acl SiteMyProvider dstdomain .smela.com.ua
always_direct allow SiteMyProvider
error_directory /usr/share/squid/errors/Russian-koi8-r
delay_pools 4
delay_class 1 1
delay_access 1 allow localhost
delay_access 1 deny all
delay_parameters 1 -1/-1
delay_class 2 2
delay_access 2 allow RootUser
delay_access 2 deny all
delay_parameters 2 -1/-1 12500000/12500000
delay_class 3 2
delay_access 3 allow LocalNetwork
delay_access 3 allow GPF_LocalNetwork
delay_access 3 deny all
delay_parameters 3 6400000/12500000 -1/-1
delay_class 4 1
delay_access 4 allow BadUsers
delay_access 4 deny all
delay_parameters 4 8/24
coredump_dir /var/spool/squid
client_persistent_connections off
server_persistent_connections off
extension_methods REPORT MERGE MKACTIVITY CHECKOUT DELETE
 

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 16:23 20-03-2013
vlary



Platinum Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj Зачем столько url_regex для айпи адресов?
Можно было загнать их в один файл разрешенных или запрещенных айпи, и скопом разрешить или запретить.

Код:
acl goodips dst "/usr/local/squid/acl/goodips"
acl badips dst "/usr/local/squid/acl/badips"
http_access deny badips
http_access allow goodips

Ну и собственно для url_regex можно было сделать через файл

Код:
acl badwords url_regex -i "/usr/local/squid/acl/badwords"
http_access deny badwords

Так конфиг намного читабельней и проще в управлении.

----------
Заслуженный SCOтовод, почетный SUNтехник и любитель Кошек

Всего записей: 17282 | Зарегистр. 13-06-2007 | Отправлено: 16:40 20-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Спасибо. Попробую.
 
Добавлено:
Сейчас выполняется squid.conf-

Код:
 
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
 
no_cache deny QUERY
cache_mem 128 MB
maximum_object_size 16384 KB
cache_dir ufs /var/spool/squid 1024 16 256
cache_store_log none
 
redirect_program /home/traffic/cgi-bin/Squid/mySQL/redirect-mysql.pl
redirect_children 16
 
auth_param basic children 5
auth_param basic realm Squid proxy-caching web server
auth_param basic credentialsttl 2 hours
auth_param basic casesensitive off
 
refresh_pattern \.bz2$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.exe$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gif$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gz$           43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ico$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.jpg$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mid$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mp3$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.pdf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.swf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tar$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tgz$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.zip$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /advs/                             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /banners/                          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /cgi-bin/iframe/                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-analyze                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-si                         43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ad\.                        43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ads\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://adv\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://click\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://count\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://counter\.                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://engine\.                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://img\.readme\.ru             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://userpic\.livejournal\.com   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern .               0       80%     14400
 
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl RootUser src "/etc/squid/squidblock/users/root.users"
acl Safe_ports port 21 121 2121    # ftp
acl Safe_ports port 70        # gopher
acl Safe_ports port 80        # http
acl Safe_ports port 81-85
acl Safe_ports port 210        # wais
acl Safe_ports port 280        # http-mgmt
acl Safe_ports port 488        # gss-http
acl Safe_ports port 591        # filemaker
acl Safe_ports port 777        # multiling http
acl Safe_ports port 1011 1021
acl Safe_ports port 2101 2131 8080-8085
acl SSL_ports port 443 563 9443        # https, snews, ssl
acl Safe_ports port 1025-65535    # unregistered ports
acl SSL_ports port 3690        # svn
acl Safe_ports port 443 5190    # icq- 443, 5190
acl SSL_ports port 5190        # icq- 443, 5190
acl SSL_ports port 9418         # git
acl Safe_ports port 9418        # git
acl SSL_ports port 60002 60003
acl Safe_ports port 60002 60003
acl CONNECT method CONNECT
 
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
 
acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.
http_access deny blocking_url
 
http_access allow localhost
http_access allow RootUser
 
acl Time_deny_NoAdmin time AS
 
acl orizon_deny        url_regex    .orizon-navigation\.com
acl orizon_method    method        OPTIONS PROPFIND
http_access deny orizon_method orizon_deny
 
acl orizon_method_1    method        CONNECT
acl orizon_port        port        443
http_access deny orizon_method_1 orizon_deny orizon_port
 
acl Pochta_mail_ru    url_regex    -i "/etc/squid/squidblock/mail_ru.block.txt"
http_access deny Pochta_mail_ru
 
acl Pochta_mail_ru_src    dstdom_regex    mrim
http_access deny Pochta_mail_ru_src
 
acl allow_http_ip    url_regex -i "/etc/squid/squidblock/goodips.txt"
acl allow_http_ip    url_regex -i "/etc/squid/squidblock/diffservice.unblock.txt"
acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
http_access deny deny_http_ip !allow_http_ip
 
acl ICQ_USERS    src        192.168.0.0/24
acl ICQ_ADDR     dst        64.12.0.0/16 205.188.0.0/16
acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com
acl ICQ_METHOD    method        CONNECT
acl ICQ_PORT    port        443 5190
http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT
http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT
always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT
always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT
 
acl skype_users    src    "/etc/squid/squidblock/users/skype.users"
acl skype_src    dstdom_regex    login.skype.com publishers.skype.com
http_access deny !skype_users skype_src
 
acl ip_deny_access url_regex -i [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
acl skype_metod method    CONNECT
acl skype_ports    port    80 443
http_access deny !skype_users skype_metod ip_deny_access skype_ports
 
acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443
acl Skype_UA browser ^skype^
http_access deny numeric_IPS !skype_users
http_access deny Skype_UA !skype_users
 
acl BadUsers src "/etc/squid/squidblock/users/bad.users"
http_access allow BadUsers
 
acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"
acl squid_block_badlang        url_regex -i "/etc/squid/squidblock/badlang.block.txt"
acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"
acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"
acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"
acl squid_block_pirate        url_regex -i "/etc/squid/squidblock/pirate.block.txt"
acl squid_block_porn        url_regex -i "/etc/squid/squidblock/porn.block.txt pron.block.txt"
acl squid_unblock_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.unblock.txt"
acl squid_unblock_badlang    url_regex -i "/etc/squid/squidblock/badlang.unblock.txt"
acl squid_unblock_entertain    url_regex -i "/etc/squid/squidblock/entertain.unblock.txt"
acl squid_unblock_games        url_regex -i "/etc/squid/squidblock/games.unblock.txt"
acl squid_unblock_mp3        url_regex -i "/etc/squid/squidblock/mp3.unblock.txt"
acl squid_unblock_pirate    url_regex -i "/etc/squid/squidblock/pirate.unblock.txt"
acl squid_unblock_porn        url_regex -i "/etc/squid/squidblock/porn.unblock.txt"
http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery
http_access deny squid_block_entertain !squid_unblock_entertain
http_access deny squid_block_games !squid_unblock_games
http_access deny squid_block_mp3 !squid_unblock_mp3
 
acl KB_TimeSmena time 7:00-20:00
acl squid_block_banners url_regex -i "/etc/squid/squidblock/banners.acl"
acl AntiChat        urlpath_regex    chat
acl exclude_url_chat    url_regex    .agilialinux\.ru/
 
acl Download_in_RootUsers    src 192.168.0.136/255.255.255.255    # Vinnik_Andrej.ua
acl Download_in_RootUsers    src 192.168.0.162/255.255.255.255    # Bojko_Aleksandr
acl Download_in_RootUsers    src 192.168.0.168/255.255.255.255    # Opalyuk_Ruslan.ua
acl Download_in_RootUsers    src 192.168.0.244/255.255.255.255    # Kucherenko_Sergej
 
acl TimeNoMusic time MTWHFA
acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$
acl MusicVideoFiles urlpath_regex \.mp.*$
acl MusicVideoFiles urlpath_regex \[mp3.*$
http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers
acl cont-type-video rep_mime_type Content-Type video.
acl cont-type-audio rep_mime_type Content-Type audio.
http_reply_access deny cont-type-video TimeNoMusic !RootUser
http_reply_access deny cont-type-audio TimeNoMusic !RootUser
acl x_tube_src    dstdom_regex    rutube
acl x_tube_src    dstdom_regex    youtube
http_access deny x_tube_src TimeNoMusic !RootUser
 
acl Time_Kutsenko time MTWHF 7:00-17:00
acl Workstation_Kutsenko src  192.168.0.119/255.255.255.255
http_access allow Time_Kutsenko Workstation_Kutsenko
 
acl LocalNetwork src "/etc/squid/squidblock/users/local.users"
http_access allow KB_TimeSmena LocalNetwork
 
acl GPF_TimeSmena    time 8:00-20:00
acl GPF_LocalNetwork src "/etc/squid/squidblock/users/local.gpf.users"
http_access allow GPF_LocalNetwork GPF_TimeSmena
 
acl MaxOpenURL maxconn 5
client_db on
http_access allow KB_TimeSmena LocalNetwork !MaxOpenURL
http_access allow Time_Kutsenko Workstation_Kutsenko !MaxOpenURL
http_access deny all
 
icp_access allow all
 
reply_body_max_size 0 allow localhost
reply_body_max_size 0 allow RootUser
reply_body_max_size 0 allow Download_in_RootUsers
reply_body_max_size 100000000 allow LocalNetwork
reply_body_max_size 64000000 allow GPF_LocalNetwork
 
visible_hostname proxy.orizon-navigation.com
append_domain .orizon-navigation.com
acl SiteMyProvider dstdomain .smela.com.ua
always_direct allow SiteMyProvider
error_directory /usr/share/squid/errors/Russian-koi8-r
 
delay_pools 4
delay_class 1 1
delay_access 1 allow localhost
delay_access 1 deny all
delay_parameters 1 -1/-1
delay_class 2 2
delay_access 2 allow RootUser
delay_access 2 deny all
delay_parameters 2 -1/-1 12500000/12500000
delay_class 3 2
delay_access 3 allow LocalNetwork
delay_access 3 allow GPF_LocalNetwork
delay_access 3 deny all
delay_parameters 3 6400000/12500000 -1/-1
delay_class 4 1
delay_access 4 allow BadUsers
delay_access 4 deny all
delay_parameters 4 8/24
 
coredump_dir /var/spool/squid
client_persistent_connections off
server_persistent_connections off
extension_methods REPORT MERGE MKACTIVITY CHECKOUT DELETE
 

При обращении к менеджеру пакетов имею-

Код:
 
[root@old-server ~]# pacman -Sy
:: Синхронизируются базы данных пакетов...
ошибка: не удалось получить файл 'core.db' из ftp.linux.kiev.ua : The requested URL returned error: 400 Bad Request
ошибка: не удалось получить файл 'core.db' из mirrors.mithril.org.ua : The requested URL returned error: 400 Bad Request
 core не устарел
ошибка: не удалось получить файл 'extra.db' из ftp.linux.kiev.ua : The requested URL returned error: 400 Bad Request
ошибка: не удалось получить файл 'extra.db' из mirrors.mithril.org.ua : The requested URL returned error: 400 Bad Request
 extra не устарел
ошибка: не удалось получить файл 'community.db' из ftp.linux.kiev.ua : The requested URL returned error: 400 Bad Request
ошибка: не удалось получить файл 'community.db' из mirrors.mithril.org.ua : The requested URL returned error: 400 Bad Request
 community не устарел
ошибка: не удалось получить файл 'archlinuxfr.db' из repo.archlinux.fr : The requested URL returned error: 400 Bad Request
ошибка: не удалось обновить archlinuxfr (ошибка в библиотеке загрузки)
 

В access.log на сервере имею-

Код:
 
[root@maestro squid]# tail -f /var/log/squid/access.log | grep "192.168.0.12 "
1363788246.725      0 192.168.0.12 TCP_DENIED/400 1534 GET /pub/Linux/ArchLinux/core/os/i686/core.db - NONE/- text/html
1363788246.759      0 192.168.0.12 TCP_DENIED/400 1526 GET /linux/archlinux/core/os/i686/core.db - NONE/- text/html
1363788246.845      0 192.168.0.12 TCP_DENIED/400 1538 GET /pub/Linux/ArchLinux/extra/os/i686/extra.db - NONE/- text/html
1363788246.848      0 192.168.0.12 TCP_DENIED/400 1530 GET /linux/archlinux/extra/os/i686/extra.db - NONE/- text/html
1363788246.912      0 192.168.0.12 TCP_DENIED/400 1554 GET /pub/Linux/ArchLinux/community/os/i686/community.db - NONE/- text/html
1363788246.915      0 192.168.0.12 TCP_DENIED/400 1546 GET /linux/archlinux/community/os/i686/community.db - NONE/- text/html
1363788247.148      0 192.168.0.12 TCP_DENIED/400 1492 GET /i686/archlinuxfr.db - NONE/- text/html
 

tcpdump показал-

Код:
 
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
16:11:25.557174 arp who-has server-kb tell old_server_kb
16:11:25.557196 arp reply server-kb is-at 00:1c:f0:6f:2c:b9
16:11:25.557279 IP old_server_kb.56067 > server-kb.domain:  14652+ A? ftp.linux.kiev.ua. (35)
16:11:25.557317 IP old_server_kb.56067 > server-kb.domain:  56236+ AAAA? ftp.linux.kiev.ua. (35)
16:11:25.557515 IP server-kb.domain > old_server_kb.56067:  56236 0/1/0 (85)
16:11:25.557563 IP server-kb.domain > old_server_kb.56067:  14652 1/4/4 A fly.osdn.org.ua (211)
16:11:25.558953 IP old_server_kb.57561 > fly.osdn.org.ua.http: S 2762225420:2762225420(0) win 14600 <mss 1460,sackOK,timestamp 8788245 0,nop,wscale 7>
16:11:25.558991 IP fly.osdn.org.ua.http > old_server_kb.57561: S 492209023:492209023(0) ack 2762225421 win 5792 <mss 1460,sackOK,timestamp 44408738 8788245,nop,wscale 7>
16:11:25.559138 IP old_server_kb.57561 > fly.osdn.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788245 44408738>
16:11:25.559394 IP old_server_kb.57561 > fly.osdn.org.ua.http: P 1:200(199) ack 1 win 115 <nop,nop,timestamp 8788245 44408738>
16:11:25.559415 IP fly.osdn.org.ua.http > old_server_kb.57561: . ack 200 win 54 <nop,nop,timestamp 44408738 8788245>
16:11:25.559740 IP fly.osdn.org.ua.http > old_server_kb.57561: . 1:1449(1448) ack 200 win 54 <nop,nop,timestamp 44408739 8788245>
16:11:25.559756 IP fly.osdn.org.ua.http > old_server_kb.57561: P 1449:1535(86) ack 200 win 54 <nop,nop,timestamp 44408739 8788245>
16:11:25.559842 IP fly.osdn.org.ua.http > old_server_kb.57561: F 1535:1535(0) ack 200 win 54 <nop,nop,timestamp 44408739 8788245>
16:11:25.560130 IP old_server_kb.57561 > fly.osdn.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788245 44408739>
16:11:25.560178 IP old_server_kb.57561 > fly.osdn.org.ua.http: . ack 1535 win 137 <nop,nop,timestamp 8788245 44408739>
16:11:25.560411 IP old_server_kb.57561 > fly.osdn.org.ua.http: F 200:200(0) ack 1536 win 137 <nop,nop,timestamp 8788245 44408739>
16:11:25.560424 IP fly.osdn.org.ua.http > old_server_kb.57561: . ack 201 win 54 <nop,nop,timestamp 44408739 8788245>
16:11:25.568801 IP old_server_kb.50642 > server-kb.domain:  49637+ A? mirrors.mithril.org.ua. (40)
16:11:25.568840 IP old_server_kb.50642 > server-kb.domain:  30636+ AAAA? mirrors.mithril.org.ua. (40)
16:11:25.569023 IP server-kb.domain > old_server_kb.50642:  30636 0/1/0 (94)
16:11:25.569083 IP server-kb.domain > old_server_kb.50642:  49637 1/3/2 A[|domain]
16:11:25.569564 IP old_server_kb.39764 > mirrors.nix.org.ua.http: S 2699115041:2699115041(0) win 14600 <mss 1460,sackOK,timestamp 8788248 0,nop,wscale 7>
16:11:25.569604 IP mirrors.nix.org.ua.http > old_server_kb.39764: S 504147382:504147382(0) ack 2699115042 win 5792 <mss 1460,sackOK,timestamp 44408741 8788248,nop,wscale 7>
16:11:25.569756 IP old_server_kb.39764 > mirrors.nix.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788248 44408741>
16:11:25.569982 IP old_server_kb.39764 > mirrors.nix.org.ua.http: P 1:201(200) ack 1 win 115 <nop,nop,timestamp 8788248 44408741>
16:11:25.570002 IP mirrors.nix.org.ua.http > old_server_kb.39764: . ack 201 win 54 <nop,nop,timestamp 44408741 8788248>
16:11:25.570354 IP mirrors.nix.org.ua.http > old_server_kb.39764: . 1:1449(1448) ack 201 win 54 <nop,nop,timestamp 44408741 8788248>
16:11:25.570366 IP mirrors.nix.org.ua.http > old_server_kb.39764: P 1449:1527(78) ack 201 win 54 <nop,nop,timestamp 44408741 8788248>
16:11:25.570468 IP mirrors.nix.org.ua.http > old_server_kb.39764: F 1527:1527(0) ack 201 win 54 <nop,nop,timestamp 44408741 8788248>
16:11:25.570751 IP old_server_kb.39764 > mirrors.nix.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788248 44408741>
16:11:25.570805 IP old_server_kb.39764 > mirrors.nix.org.ua.http: . ack 1527 win 137 <nop,nop,timestamp 8788248 44408741>
16:11:25.570988 IP old_server_kb.39764 > mirrors.nix.org.ua.http: F 201:201(0) ack 1528 win 137 <nop,nop,timestamp 8788248 44408741>
16:11:25.571004 IP mirrors.nix.org.ua.http > old_server_kb.39764: . ack 202 win 54 <nop,nop,timestamp 44408741 8788248>
16:11:25.578795 IP old_server_kb.59730 > server-kb.domain:  51491+ A? mirrors.mithril.org.ua. (40)
16:11:25.578829 IP old_server_kb.59730 > server-kb.domain:  4898+ AAAA? mirrors.mithril.org.ua. (40)
16:11:25.579022 IP server-kb.domain > old_server_kb.59730:  4898 0/1/0 (94)
16:11:25.579072 IP server-kb.domain > old_server_kb.59730:  51491 1/3/2 A[|domain]
16:11:25.579571 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: S 1945112886:1945112886(0) win 14600 <mss 1460,sackOK,timestamp 8788251 0,nop,wscale 7>
16:11:25.583307 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: S 679086157:679086157(0) ack 1945112887 win 5792 <mss 1460,sackOK,timestamp 3506276671 8788251,nop,wscale 7>
16:11:25.583460 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 1 win 115 <nop,nop,timestamp 8788252 3506276671>
16:11:25.607381 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 1:27(26) ack 1 win 46 <nop,nop,timestamp 3506276695 8788252>
16:11:25.607543 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 27 win 115 <nop,nop,timestamp 8788259 3506276695>
16:11:25.607695 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 1:17(16) ack 27 win 115 <nop,nop,timestamp 8788259 3506276695>
16:11:25.611073 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: . ack 17 win 46 <nop,nop,timestamp 3506276699 8788259>
16:11:25.611086 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 27:61(34) ack 17 win 46 <nop,nop,timestamp 3506276699 8788259>
16:11:25.611314 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 17:39(22) ack 61 win 115 <nop,nop,timestamp 8788260 3506276699>
16:11:25.615957 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 61:84(23) ack 39 win 46 <nop,nop,timestamp 3506276704 8788260>
16:11:25.616179 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 39:44(5) ack 84 win 115 <nop,nop,timestamp 8788262 3506276704>
16:11:25.619680 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 84:93(9) ack 44 win 46 <nop,nop,timestamp 3506276708 8788262>
16:11:25.619962 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 44:55(11) ack 93 win 115 <nop,nop,timestamp 8788263 3506276708>
16:11:25.623534 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 93:130(37) ack 55 win 46 <nop,nop,timestamp 3506276712 8788263>
16:11:25.623764 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 55:70(15) ack 130 win 115 <nop,nop,timestamp 8788264 3506276712>
16:11:25.627599 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 130:167(37) ack 70 win 46 <nop,nop,timestamp 3506276715 8788264>
16:11:25.627852 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 70:80(10) ack 167 win 115 <nop,nop,timestamp 8788265 3506276715>
16:11:25.828369 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 70:80(10) ack 167 win 115 <nop,nop,timestamp 8788326 3506276715>
16:11:25.831976 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: . ack 80 win 46 <nop,nop,timestamp 3506276920 8788326,nop,nop,sack sack 1 {70:80} >
16:11:25.838619 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 167:204(37) ack 80 win 46 <nop,nop,timestamp 3506276927 8788326>
16:11:25.838837 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 80:88(8) ack 204 win 115 <nop,nop,timestamp 8788329 3506276927>
16:11:25.842523 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: . ack 88 win 46 <nop,nop,timestamp 3506276930 8788329>
16:11:25.842543 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 204:241(37) ack 88 win 46 <nop,nop,timestamp 3506276931 8788329>
16:11:25.842762 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 88:98(10) ack 241 win 115 <nop,nop,timestamp 8788330 3506276931>
16:11:25.846469 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 241:278(37) ack 98 win 46 <nop,nop,timestamp 3506276934 8788330>
16:11:25.846701 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 98:112(14) ack 278 win 115 <nop,nop,timestamp 8788331 3506276934>
16:11:25.850349 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 278:298(20) ack 112 win 46 <nop,nop,timestamp 3506276938 8788331>
16:11:25.870478 IP old_server_kb.57564 > fly.osdn.org.ua.http: S 3111292346:3111292346(0) win 14600 <mss 1460,sackOK,timestamp 8788338 0,nop,wscale 7>
16:11:25.870549 IP fly.osdn.org.ua.http > old_server_kb.57564: S 505316278:505316278(0) ack 3111292347 win 5792 <mss 1460,sackOK,timestamp 44408816 8788338,nop,wscale 7>
16:11:25.870701 IP old_server_kb.57564 > fly.osdn.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788338 44408816>
16:11:25.870909 IP old_server_kb.57564 > fly.osdn.org.ua.http: P 1:202(201) ack 1 win 115 <nop,nop,timestamp 8788338 44408816>
16:11:25.870925 IP fly.osdn.org.ua.http > old_server_kb.57564: . ack 202 win 54 <nop,nop,timestamp 44408816 8788338>
16:11:25.880204 IP fly.osdn.org.ua.http > old_server_kb.57564: . 1:1449(1448) ack 202 win 54 <nop,nop,timestamp 44408819 8788338>
16:11:25.880216 IP fly.osdn.org.ua.http > old_server_kb.57564: P 1449:1539(90) ack 202 win 54 <nop,nop,timestamp 44408819 8788338>
16:11:25.880307 IP fly.osdn.org.ua.http > old_server_kb.57564: F 1539:1539(0) ack 202 win 54 <nop,nop,timestamp 44408819 8788338>
16:11:25.880987 IP old_server_kb.57564 > fly.osdn.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788341 44408819>
16:11:25.881052 IP old_server_kb.57564 > fly.osdn.org.ua.http: . ack 1539 win 137 <nop,nop,timestamp 8788341 44408819>
16:11:25.881250 IP old_server_kb.57564 > fly.osdn.org.ua.http: F 202:202(0) ack 1540 win 137 <nop,nop,timestamp 8788341 44408819>
16:11:25.881265 IP fly.osdn.org.ua.http > old_server_kb.57564: . ack 203 win 54 <nop,nop,timestamp 44408819 8788341>
16:11:25.882882 IP old_server_kb.39767 > mirrors.nix.org.ua.http: S 2407993080:2407993080(0) win 14600 <mss 1460,sackOK,timestamp 8788342 0,nop,wscale 7>
16:11:25.882903 IP mirrors.nix.org.ua.http > old_server_kb.39767: S 493452703:493452703(0) ack 2407993081 win 5792 <mss 1460,sackOK,timestamp 44408819 8788342,nop,wscale 7>
16:11:25.883059 IP old_server_kb.39767 > mirrors.nix.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788342 44408819>
16:11:25.883252 IP old_server_kb.39767 > mirrors.nix.org.ua.http: P 1:203(202) ack 1 win 115 <nop,nop,timestamp 8788342 44408819>
16:11:25.883264 IP mirrors.nix.org.ua.http > old_server_kb.39767: . ack 203 win 54 <nop,nop,timestamp 44408819 8788342>
16:11:25.888367 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 298 win 115 <nop,nop,timestamp 8788344 3506276938>
16:11:25.890340 IP mirrors.nix.org.ua.http > old_server_kb.39767: . 1:1449(1448) ack 203 win 54 <nop,nop,timestamp 44408821 8788342>
16:11:25.890351 IP mirrors.nix.org.ua.http > old_server_kb.39767: P 1449:1531(82) ack 203 win 54 <nop,nop,timestamp 44408821 8788342>
16:11:25.890437 IP mirrors.nix.org.ua.http > old_server_kb.39767: F 1531:1531(0) ack 203 win 54 <nop,nop,timestamp 44408821 8788342>
16:11:25.890801 IP old_server_kb.39767 > mirrors.nix.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788344 44408821>
16:11:25.890860 IP old_server_kb.39767 > mirrors.nix.org.ua.http: . ack 1531 win 137 <nop,nop,timestamp 8788344 44408821>
16:11:25.891044 IP old_server_kb.39767 > mirrors.nix.org.ua.http: F 203:203(0) ack 1532 win 137 <nop,nop,timestamp 8788344 44408821>
16:11:25.891064 IP mirrors.nix.org.ua.http > old_server_kb.39767: . ack 204 win 54 <nop,nop,timestamp 44408821 8788344>
16:11:25.892627 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 112:119(7) ack 298 win 115 <nop,nop,timestamp 8788345 3506276938>
16:11:25.896359 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 298:335(37) ack 119 win 46 <nop,nop,timestamp 3506276984 8788345>
16:11:25.896503 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 335 win 115 <nop,nop,timestamp 8788346 3506276984>
16:11:25.896645 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 119:130(11) ack 335 win 115 <nop,nop,timestamp 8788346 3506276984>
16:11:25.900329 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 335:372(37) ack 130 win 46 <nop,nop,timestamp 3506276988 8788346>
16:11:25.900561 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 130:145(15) ack 372 win 115 <nop,nop,timestamp 8788347 3506276988>
16:11:25.904320 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 372:409(37) ack 145 win 46 <nop,nop,timestamp 3506276992 8788347>
16:11:25.904550 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 145:156(11) ack 409 win 115 <nop,nop,timestamp 8788348 3506276992>
16:11:25.908280 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 409:446(37) ack 156 win 46 <nop,nop,timestamp 3506276996 8788348>
16:11:25.908510 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 156:164(8) ack 446 win 115 <nop,nop,timestamp 8788350 3506276996>
16:11:25.912378 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 446:483(37) ack 164 win 46 <nop,nop,timestamp 3506277000 8788350>
16:11:25.915219 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 164:174(10) ack 483 win 115 <nop,nop,timestamp 8788352 3506277000>
16:11:25.918831 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 483:520(37) ack 174 win 46 <nop,nop,timestamp 3506277007 8788352>
16:11:25.919078 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 174:189(15) ack 520 win 115 <nop,nop,timestamp 8788353 3506277007>
16:11:25.922377 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 520:540(20) ack 189 win 46 <nop,nop,timestamp 3506277010 8788353>
16:11:25.945364 IP old_server_kb.57566 > fly.osdn.org.ua.http: S 643443863:643443863(0) win 14600 <mss 1460,sackOK,timestamp 8788361 0,nop,wscale 7>
16:11:25.945435 IP fly.osdn.org.ua.http > old_server_kb.57566: S 506053914:506053914(0) ack 643443864 win 5792 <mss 1460,sackOK,timestamp 44408835 8788361,nop,wscale 7>
16:11:25.945583 IP old_server_kb.57566 > fly.osdn.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788361 44408835>
16:11:25.945787 IP old_server_kb.57566 > fly.osdn.org.ua.http: P 1:210(209) ack 1 win 115 <nop,nop,timestamp 8788361 44408835>
16:11:25.945809 IP fly.osdn.org.ua.http > old_server_kb.57566: . ack 210 win 54 <nop,nop,timestamp 44408835 8788361>
16:11:25.956655 IP fly.osdn.org.ua.http > old_server_kb.57566: . 1:1449(1448) ack 210 win 54 <nop,nop,timestamp 44408838 8788361>
16:11:25.956669 IP fly.osdn.org.ua.http > old_server_kb.57566: P 1449:1555(106) ack 210 win 54 <nop,nop,timestamp 44408838 8788361>
16:11:25.956744 IP fly.osdn.org.ua.http > old_server_kb.57566: F 1555:1555(0) ack 210 win 54 <nop,nop,timestamp 44408838 8788361>
16:11:25.957042 IP old_server_kb.57566 > fly.osdn.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788364 44408838>
16:11:25.957105 IP old_server_kb.57566 > fly.osdn.org.ua.http: . ack 1555 win 137 <nop,nop,timestamp 8788364 44408838>
16:11:25.957298 IP old_server_kb.57566 > fly.osdn.org.ua.http: F 210:210(0) ack 1556 win 137 <nop,nop,timestamp 8788364 44408838>
16:11:25.957314 IP fly.osdn.org.ua.http > old_server_kb.57566: . ack 211 win 54 <nop,nop,timestamp 44408838 8788364>
16:11:25.958880 IP old_server_kb.39769 > mirrors.nix.org.ua.http: S 1604578368:1604578368(0) win 14600 <mss 1460,sackOK,timestamp 8788365 0,nop,wscale 7>
16:11:25.958907 IP mirrors.nix.org.ua.http > old_server_kb.39769: S 503052058:503052058(0) ack 1604578369 win 5792 <mss 1460,sackOK,timestamp 44408838 8788365,nop,wscale 7>
16:11:25.959167 IP old_server_kb.39769 > mirrors.nix.org.ua.http: . ack 1 win 115 <nop,nop,timestamp 8788365 44408838>
16:11:25.959368 IP old_server_kb.39769 > mirrors.nix.org.ua.http: P 1:211(210) ack 1 win 115 <nop,nop,timestamp 8788365 44408838>
16:11:25.959388 IP mirrors.nix.org.ua.http > old_server_kb.39769: . ack 211 win 54 <nop,nop,timestamp 44408838 8788365>
16:11:25.959864 IP mirrors.nix.org.ua.http > old_server_kb.39769: . 1:1449(1448) ack 211 win 54 <nop,nop,timestamp 44408839 8788365>
16:11:25.959879 IP mirrors.nix.org.ua.http > old_server_kb.39769: P 1449:1547(98) ack 211 win 54 <nop,nop,timestamp 44408839 8788365>
16:11:25.959943 IP mirrors.nix.org.ua.http > old_server_kb.39769: F 1547:1547(0) ack 211 win 54 <nop,nop,timestamp 44408839 8788365>
16:11:25.960233 IP old_server_kb.39769 > mirrors.nix.org.ua.http: . ack 1449 win 137 <nop,nop,timestamp 8788365 44408839>
16:11:25.960287 IP old_server_kb.39769 > mirrors.nix.org.ua.http: . ack 1547 win 137 <nop,nop,timestamp 8788365 44408839>
16:11:25.960452 IP old_server_kb.39769 > mirrors.nix.org.ua.http: F 211:211(0) ack 1548 win 137 <nop,nop,timestamp 8788365 44408839>
16:11:25.960471 IP mirrors.nix.org.ua.http > old_server_kb.39769: . ack 212 win 54 <nop,nop,timestamp 44408839 8788365>
16:11:25.961722 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 540 win 115 <nop,nop,timestamp 8788366 3506277010>
16:11:25.962042 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 189:196(7) ack 540 win 115 <nop,nop,timestamp 8788366 3506277010>
16:11:25.965773 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 540:577(37) ack 196 win 46 <nop,nop,timestamp 3506277054 8788366>
16:11:25.965986 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 577 win 115 <nop,nop,timestamp 8788367 3506277054>
16:11:25.966042 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 196:207(11) ack 577 win 115 <nop,nop,timestamp 8788367 3506277054>
16:11:25.969580 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 577:614(37) ack 207 win 46 <nop,nop,timestamp 3506277058 8788367>
16:11:25.969808 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 207:222(15) ack 614 win 115 <nop,nop,timestamp 8788368 3506277058>
16:11:25.973420 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 614:651(37) ack 222 win 46 <nop,nop,timestamp 3506277061 8788368>
16:11:25.973727 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 222:237(15) ack 651 win 115 <nop,nop,timestamp 8788369 3506277061>
16:11:25.977480 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 651:688(37) ack 237 win 46 <nop,nop,timestamp 3506277065 8788369>
16:11:25.977718 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 237:245(8) ack 688 win 115 <nop,nop,timestamp 8788370 3506277065>
16:11:25.981495 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 688:725(37) ack 245 win 46 <nop,nop,timestamp 3506277069 8788370>
16:11:25.981770 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 245:255(10) ack 725 win 115 <nop,nop,timestamp 8788372 3506277069>
16:11:25.985624 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 725:762(37) ack 255 win 46 <nop,nop,timestamp 3506277073 8788372>
16:11:25.985874 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 255:274(19) ack 762 win 115 <nop,nop,timestamp 8788373 3506277073>
16:11:25.989520 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 762:782(20) ack 274 win 46 <nop,nop,timestamp 3506277077 8788373>
16:11:26.025452 IP old_server_kb.57689 > server-kb.domain:  33279+ A? repo.archlinux.fr. (35)
16:11:26.025513 IP old_server_kb.57689 > server-kb.domain:  35806+ AAAA? repo.archlinux.fr. (35)
16:11:26.025755 IP server-kb.domain > old_server_kb.57689:  35806 0/1/0 (87)
16:11:26.025791 IP server-kb.domain > old_server_kb.57689:  33279 1/2/2 A archimage.archlinux.fr (125)
16:11:26.026274 IP old_server_kb.57035 > archimage.archlinux.fr.http: S 3683302951:3683302951(0) win 14600 <mss 1460,sackOK,timestamp 8788385 0,nop,wscale 7>
16:11:26.026324 IP archimage.archlinux.fr.http > old_server_kb.57035: S 490199426:490199426(0) ack 3683302952 win 5792 <mss 1460,sackOK,timestamp 44408855 8788385,nop,wscale 7>
16:11:26.026471 IP old_server_kb.57035 > archimage.archlinux.fr.http: . ack 1 win 115 <nop,nop,timestamp 8788385 44408855>
16:11:26.026697 IP old_server_kb.57035 > archimage.archlinux.fr.http: P 1:179(178) ack 1 win 115 <nop,nop,timestamp 8788385 44408855>
16:11:26.026721 IP archimage.archlinux.fr.http > old_server_kb.57035: . ack 179 win 54 <nop,nop,timestamp 44408855 8788385>
16:11:26.027033 IP archimage.archlinux.fr.http > old_server_kb.57035: . 1:1449(1448) ack 179 win 54 <nop,nop,timestamp 44408855 8788385>
16:11:26.027046 IP archimage.archlinux.fr.http > old_server_kb.57035: P 1449:1493(44) ack 179 win 54 <nop,nop,timestamp 44408855 8788385>
16:11:26.027182 IP archimage.archlinux.fr.http > old_server_kb.57035: F 1493:1493(0) ack 179 win 54 <nop,nop,timestamp 44408855 8788385>
16:11:26.027414 IP old_server_kb.57035 > archimage.archlinux.fr.http: . ack 1449 win 137 <nop,nop,timestamp 8788385 44408855>
16:11:26.027464 IP old_server_kb.57035 > archimage.archlinux.fr.http: . ack 1493 win 137 <nop,nop,timestamp 8788385 44408855>
16:11:26.027636 IP old_server_kb.57035 > archimage.archlinux.fr.http: F 179:179(0) ack 1494 win 137 <nop,nop,timestamp 8788385 44408855>
16:11:26.027660 IP archimage.archlinux.fr.http > old_server_kb.57035: . ack 180 win 54 <nop,nop,timestamp 44408856 8788385>
16:11:26.028385 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: . ack 782 win 115 <nop,nop,timestamp 8788386 3506277077>
16:11:26.030235 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: P 274:280(6) ack 782 win 115 <nop,nop,timestamp 8788386 3506277077>
16:11:26.033913 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: P 782:796(14) ack 280 win 46 <nop,nop,timestamp 3506277122 8788386>
16:11:26.033932 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: F 796:796(0) ack 280 win 46 <nop,nop,timestamp 3506277122 8788386>
16:11:26.041869 IP old_server_kb.34900 > mirrors.nix.org.ua.ftp: F 280:280(0) ack 797 win 115 <nop,nop,timestamp 8788390 3506277122>
16:11:26.045501 IP mirrors.nix.org.ua.ftp > old_server_kb.34900: . ack 281 win 46 <nop,nop,timestamp 3506277133 8788390>
 
167 packets captured
167 packets received by filter
0 packets dropped by kernel
[root@old-server tmp]#  
 

Где и что далее корректировать?

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 16:43 20-03-2013
Alukardd



Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj
Не, извиняйте, но для меня такой конфиг не читабелен. Под мои прихотя его править не стоит, конечно, но если ни кто больше ответ Вам не даст, то будем-с править...
 
Добавлено:
Можете добавить в конфиг debug_options 28,3 и посмотреть в логах, как именно отрабатывают Ваши правила. Очень желательно,  что бы в этот момент сидело как можно меньше народу через проксю, т.к. в противном случае лог будет очень тяжко разгребать.

----------
Microsoft gives you windows, linuх gives you the whole house...
I've been using Vim for about 4 years now, mostly because I can't figure out how to exit it.

Всего записей: 6571 | Зарегистр. 28-08-2008 | Отправлено: 21:21 20-03-2013
ipmanyak



Platinum Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj Вы навертели столько всего, да еще IP адреса в текстовых файлах, потому нам ковырять смысла нет.  

Цитата:
 192.168.0.12 TCP_DENIED/400
говорит о том, что вы своими правилами забанили или хост 192.168.0.12  или сайты, на которые он ломится. Как это выяснить вам уже сказали, включайте DEBUG в конфиге сквида. Не хотите дебажить - создайте аксели для хоста 192.168.0.12 и поставьте их  выше всех правил, воткните их после строки http_access deny CONNECT !SSL_ports  
Аксели:
acl acl12 src  192.168.0.12
http_access allow acl12  
 
P.S.  
Своими регексами убил наповал.
Если сквид у вас и  шлюз в Инет, то зачем лазить в репозитории через него, а не напрямую?
 
 
 
 
 


----------
В сортире лучше быть юзером, чем админом...

Всего записей: 11964 | Зарегистр. 10-12-2003 | Отправлено: 22:34 20-03-2013 | Исправлено: ipmanyak, 22:39 20-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Спасибо. Буду пробовать.
 
Добавлено:
В squid.conf вставил строки-

Код:
 
 
debug_options 28,3
 
acl repos_archlinux    dstdomain    .archlinux.fr .archlinux.org .ftp.linux.kiev.ua .mirrors.mithril.org.ua
always_direct allow repos_archlinux
 
acl acl12    src    192.168.0.12
http_access allow acl12
 

Сейчас этот файл имеет вид-

Код:
 
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
cache_mem 128 MB
maximum_object_size 16384 KB
cache_dir ufs /var/spool/squid 1024 16 256
cache_store_log none
 
redirect_program /home/traffic/cgi-bin/Squid/mySQL/redirect-mysql.pl
redirect_children 16
 
auth_param basic children 5
auth_param basic realm Squid proxy-caching web server
auth_param basic credentialsttl 2 hours
auth_param basic casesensitive off
 
refresh_pattern \.bz2$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.exe$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gif$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.gz$           43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ico$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.jpg$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mid$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.mp3$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.pdf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.swf$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tar$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.tgz$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.zip$          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /advs/                             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /banners/                          43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern /cgi-bin/iframe/                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-analyze                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern \.ru/bf-si                         43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ad\.                        43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://ads\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://adv\.                       43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://click\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://count\.                     43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://counter\.                   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://engine\.                    43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://img\.readme\.ru             43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern http://userpic\.livejournal\.com   43200   100%    43200 override-lastmod override-expire ignore-reload
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern .               0       80%     14400
 
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl RootUser src "/etc/squid/squidblock/users/root.users"
 
acl Safe_ports port 21 121 2121    # ftp
acl Safe_ports port 70        # gopher
acl Safe_ports port 80        # http
acl Safe_ports port 81-85
acl Safe_ports port 210        # wais
acl Safe_ports port 280        # http-mgmt
acl Safe_ports port 488        # gss-http
acl Safe_ports port 591        # filemaker
acl Safe_ports port 777        # multiling http
acl Safe_ports port 1011 1021
acl Safe_ports port 2101 2131 8080-8085
acl SSL_ports port 443 563 9443        # https, snews, ssl
acl Safe_ports port 1025-65535    # unregistered ports
acl SSL_ports port 3690        # svn
acl Safe_ports port 443 5190    # icq- 443, 5190
acl SSL_ports port 5190        # icq- 443, 5190
acl SSL_ports port 9418         # git
acl Safe_ports port 9418        # git
acl SSL_ports port 60002 60003
acl Safe_ports port 60002 60003
acl CONNECT method CONNECT
 
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
 
acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.
 
http_access deny blocking_url
http_access allow localhost
http_access allow RootUser
 
debug_options 28,3
 
acl repos_archlinux    dstdomain    .archlinux.fr .archlinux.org .ftp.linux.kiev.ua .mirrors.mithril.org.ua
always_direct allow repos_archlinux
 
acl acl12    src    192.168.0.12
http_access allow acl12
 
acl Time_deny_NoAdmin time AS
acl orizon_deny        url_regex    .orizon-navigation\.com
acl orizon_method    method        OPTIONS PROPFIND
http_access deny orizon_method orizon_deny
 
acl orizon_method_1    method        CONNECT
acl orizon_port        port        443
http_access deny orizon_method_1 orizon_deny orizon_port
 
acl Pochta_mail_ru    url_regex    -i "/etc/squid/squidblock/mail_ru.block.txt"
http_access deny Pochta_mail_ru
 
acl Pochta_mail_ru_src    dstdom_regex    mrim
http_access deny Pochta_mail_ru_src
 
acl allow_http_ip    url_regex -i "/etc/squid/squidblock/goodips.txt"
acl allow_http_ip    url_regex -i "/etc/squid/squidblock/diffservice.unblock.txt"
acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
http_access deny deny_http_ip !allow_http_ip
 
acl ICQ_USERS    src        192.168.0.0/24
acl ICQ_ADDR     dst        64.12.0.0/16 205.188.0.0/16
acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com
acl ICQ_METHOD    method        CONNECT
acl ICQ_PORT    port        443 5190
http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT
http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT
always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT
always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT
acl skype_users    src    "/etc/squid/squidblock/users/skype.users"
acl skype_src    dstdom_regex    login.skype.com publishers.skype.com
http_access deny !skype_users skype_src
 
acl ip_deny_access url_regex -i [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
acl skype_metod method    CONNECT
acl skype_ports    port    80 443
http_access deny !skype_users skype_metod ip_deny_access skype_ports
 
acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443
acl Skype_UA browser ^skype^
http_access deny numeric_IPS !skype_users
http_access deny Skype_UA !skype_users
 
acl BadUsers src "/etc/squid/squidblock/users/bad.users"
http_access allow BadUsers
 
acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"
acl squid_block_badlang        url_regex -i "/etc/squid/squidblock/badlang.block.txt"
acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"
acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"
acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"
acl squid_block_pirate        url_regex -i "/etc/squid/squidblock/pirate.block.txt"
acl squid_block_porn        url_regex -i "/etc/squid/squidblock/porn.block.txt pron.block.txt"
acl squid_unblock_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.unblock.txt"
acl squid_unblock_badlang    url_regex -i "/etc/squid/squidblock/badlang.unblock.txt"
acl squid_unblock_entertain    url_regex -i "/etc/squid/squidblock/entertain.unblock.txt"
acl squid_unblock_games        url_regex -i "/etc/squid/squidblock/games.unblock.txt"
acl squid_unblock_mp3        url_regex -i "/etc/squid/squidblock/mp3.unblock.txt"
acl squid_unblock_pirate    url_regex -i "/etc/squid/squidblock/pirate.unblock.txt"
acl squid_unblock_porn        url_regex -i "/etc/squid/squidblock/porn.unblock.txt"
http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery
http_access deny squid_block_entertain !squid_unblock_entertain
http_access deny squid_block_games !squid_unblock_games
http_access deny squid_block_mp3 !squid_unblock_mp3
 
acl KB_TimeSmena time 7:00-20:00
acl squid_block_banners url_regex -i "/etc/squid/squidblock/banners.acl"
acl AntiChat        urlpath_regex    chat
acl exclude_url_chat    url_regex    .agilialinux\.ru/
acl Download_in_RootUsers src "/etc/squid/squidblock/users/download_allow.users"
acl TimeNoMusic time MTWHFA
acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$
acl MusicVideoFiles urlpath_regex \.mp.*$
acl MusicVideoFiles urlpath_regex \[mp3.*$
http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers
 
acl cont-type-video rep_mime_type Content-Type video.
acl cont-type-audio rep_mime_type Content-Type audio.
http_reply_access deny cont-type-video TimeNoMusic !RootUser
http_reply_access deny cont-type-audio TimeNoMusic !RootUser
 
acl x_tube_src    dstdom_regex    rutube
acl x_tube_src    dstdom_regex    youtube
http_access deny x_tube_src TimeNoMusic !RootUser
 
acl LocalNetwork src "/etc/squid/squidblock/users/local.users"
http_access allow KB_TimeSmena LocalNetwork
 
acl GPF_TimeSmena    time 8:00-20:00
acl GPF_LocalNetwork src "/etc/squid/squidblock/users/local.gpf.users"
http_access allow GPF_LocalNetwork GPF_TimeSmena
 
acl MaxOpenURL maxconn 5
client_db on
http_access allow KB_TimeSmena LocalNetwork !MaxOpenURL
 
http_access deny all
icp_access allow all
 
reply_body_max_size 0 allow localhost
reply_body_max_size 0 allow RootUser
reply_body_max_size 0 allow Download_in_RootUsers
reply_body_max_size 100000000 allow LocalNetwork
reply_body_max_size 64000000 allow GPF_LocalNetwork
 
visible_hostname proxy.orizon-navigation.com
append_domain .orizon-navigation.com
 
acl SiteMyProvider dstdomain .smela.com.ua
 
always_direct allow SiteMyProvider
error_directory /usr/share/squid/errors/Russian-koi8-r
 
delay_pools 4
delay_class 1 1
delay_access 1 allow localhost
delay_access 1 deny all
delay_parameters 1 -1/-1
delay_class 2 2
delay_access 2 allow RootUser
delay_access 2 deny all
delay_parameters 2 -1/-1 12500000/12500000
delay_class 3 2
delay_access 3 allow LocalNetwork
delay_access 3 allow GPF_LocalNetwork
delay_access 3 deny all
delay_parameters 3 6400000/12500000 -1/-1
delay_class 4 1
delay_access 4 allow BadUsers
delay_access 4 deny all
delay_parameters 4 8/24
 
coredump_dir /var/spool/squid
client_persistent_connections off
server_persistent_connections off
extension_methods REPORT MERGE MKACTIVITY CHECKOUT DELETE
 

Но ответ squid тот же. В cache.cog (фрагмент) имею-

Код:
 
2013/03/21 09:30:02| aclMatchAclList: no match, returning 0
2013/03/21 09:30:02| aclDestroyAccessList: 'no_cache deny QUERY'
2013/03/21 09:30:02| aclDestroyAcls: 'acl QUERY urlpath_regex cgi-bin \?'
2013/03/21 09:30:02| aclDestroyAcls: 'acl all src 0.0.0.0/0.0.0.0'
2013/03/21 09:30:02| aclDestroyAcls: 'acl manager proto cache_object'
2013/03/21 09:30:02| aclDestroyAcls: 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:02| aclDestroyAcls: 'acl to_localhost dst 127.0.0.0/8'
2013/03/21 09:30:02| aclDestroyAcls: 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Safe_ports port 21 121 2121    # ftp'
2013/03/21 09:30:02| aclDestroyAcls: 'acl SSL_ports port 443 563 9443        # https, snews, ssl'
2013/03/21 09:30:02| aclDestroyAcls: 'acl CONNECT method CONNECT'
2013/03/21 09:30:02| aclDestroyAcls: 'acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.'
2013/03/21 09:30:02| aclDestroyAcls: 'acl repos_archlinux    dstdomain    .archlinux.fr .archlinux.org .ftp.linux.kiev.ua .mirrors.mithril.org.ua'
2013/03/21 09:30:02| aclDestroyAcls: 'acl acl12    src    192.168.0.12'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Time_deny_NoAdmin time AS'
2013/03/21 09:30:02| aclDestroyAcls: 'acl orizon_deny        url_regex    .orizon-navigation\.com'
2013/03/21 09:30:02| aclDestroyAcls: 'acl orizon_method    method        OPTIONS PROPFIND'
2013/03/21 09:30:02| aclDestroyAcls: 'acl orizon_method_1    method        CONNECT'
2013/03/21 09:30:02| aclDestroyAcls: 'acl orizon_port        port        443'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Pochta_mail_ru    url_regex    -i "/etc/squid/squidblock/mail_ru.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Pochta_mail_ru_src    dstdom_regex    mrim'
2013/03/21 09:30:02| aclDestroyAcls: 'acl allow_http_ip    url_regex -i "/etc/squid/squidblock/goodips.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ICQ_USERS    src        192.168.0.0/24'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ICQ_ADDR     dst        64.12.0.0/16 205.188.0.0/16'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ICQ_PORT    port        443 5190'
2013/03/21 09:30:02| aclDestroyAcls: 'acl skype_users    src    "/etc/squid/squidblock/users/skype.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl skype_src    dstdom_regex    login.skype.com publishers.skype.com'
2013/03/21 09:30:02| aclDestroyAcls: 'acl ip_deny_access url_regex -i [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:02| aclDestroyAcls: 'acl skype_metod method    CONNECT'
2013/03/21 09:30:02| aclDestroyAcls: 'acl skype_ports    port    80 443'
2013/03/21 09:30:02| aclDestroyAcls: 'acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Skype_UA browser ^skype^'
2013/03/21 09:30:02| aclDestroyAcls: 'acl BadUsers src "/etc/squid/squidblock/users/bad.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_badlang        url_regex -i "/etc/squid/squidblock/badlang.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_pirate        url_regex -i "/etc/squid/squidblock/pirate.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_porn        url_regex -i "/etc/squid/squidblock/porn.block.txt pron.block.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_badlang    url_regex -i "/etc/squid/squidblock/badlang.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_entertain    url_regex -i "/etc/squid/squidblock/entertain.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_games        url_regex -i "/etc/squid/squidblock/games.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_mp3        url_regex -i "/etc/squid/squidblock/mp3.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_pirate    url_regex -i "/etc/squid/squidblock/pirate.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_unblock_porn        url_regex -i "/etc/squid/squidblock/porn.unblock.txt"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl KB_TimeSmena time 7:00-20:00'
2013/03/21 09:30:02| aclDestroyAcls: 'acl squid_block_banners url_regex -i "/etc/squid/squidblock/banners.acl"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl AntiChat        urlpath_regex    chat'
2013/03/21 09:30:02| aclDestroyAcls: 'acl exclude_url_chat    url_regex    .agilialinux\.ru/'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Download_in_RootUsers src "/etc/squid/squidblock/users/download_allow.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl TimeNoMusic time MTWHFA'
2013/03/21 09:30:02| aclDestroyAcls: 'acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$'
2013/03/21 09:30:02| aclDestroyAcls: 'acl cont-type-video rep_mime_type Content-Type video.'
2013/03/21 09:30:02| aclDestroyAcls: 'acl cont-type-audio rep_mime_type Content-Type audio.'
2013/03/21 09:30:02| aclDestroyAcls: 'acl x_tube_src    dstdom_regex    rutube'
2013/03/21 09:30:02| aclDestroyAcls: 'acl Time_Kutsenko time MTWHF 7:00-17:00'
2013/03/21 09:30:02| aclDestroyAcls: 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl GPF_TimeSmena    time 8:00-20:00'
2013/03/21 09:30:02| aclDestroyAcls: 'acl GPF_LocalNetwork src "/etc/squid/squidblock/users/local.gpf.users"'
2013/03/21 09:30:02| aclDestroyAcls: 'acl MaxOpenURL maxconn 5'
2013/03/21 09:30:02| aclDestroyAcls: 'acl SiteMyProvider dstdomain .smela.com.ua'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow manager localhost'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny manager'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny !Safe_ports'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny CONNECT !SSL_ports'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny blocking_url'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow localhost'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow acl12'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny ICQbanner'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny orizon_method orizon_deny'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny orizon_method_1 orizon_deny orizon_port'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny Pochta_mail_ru'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny Pochta_mail_ru_src'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny deny_http_ip !allow_http_ip'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny !skype_users skype_src'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny !skype_users skype_metod ip_deny_access skype_ports'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny numeric_IPS !skype_users'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny Skype_UA !skype_users'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow BadUsers'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny squid_block_entertain !squid_unblock_entertain'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny squid_block_games !squid_unblock_games'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny squid_block_mp3 !squid_unblock_mp3'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny x_tube_src TimeNoMusic !RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow KB_TimeSmena LocalNetwork'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow GPF_LocalNetwork GPF_TimeSmena'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access allow KB_TimeSmena LocalNetwork !MaxOpenURL'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_access deny all'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_reply_access deny cont-type-video TimeNoMusic !RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'http_reply_access deny cont-type-audio TimeNoMusic !RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'icp_access allow all'
2013/03/21 09:30:02| aclDestroyAccessList: 'reply_body_max_size 0 allow localhost'
2013/03/21 09:30:02| aclDestroyAccessList: 'reply_body_max_size 0 allow RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'reply_body_max_size 0 allow Download_in_RootUsers'
2013/03/21 09:30:02| aclDestroyAccessList: 'reply_body_max_size 100000000 allow LocalNetwork'
2013/03/21 09:30:02| aclDestroyAccessList: 'reply_body_max_size 64000000 allow GPF_LocalNetwork'
2013/03/21 09:30:02| aclDestroyAccessList: 'always_direct allow repos_archlinux'
2013/03/21 09:30:02| aclDestroyAccessList: 'always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT'
2013/03/21 09:30:02| aclDestroyAccessList: 'always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:02| aclDestroyAccessList: 'always_direct allow SiteMyProvider'
2013/03/21 09:30:02| aclDestroyAccessList: 'snmp_access deny all'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 1 allow localhost'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 1 deny all'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 2 allow RootUser'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 2 deny all'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 3 allow LocalNetwork'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 3 allow GPF_LocalNetwork'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 3 deny all'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 4 allow BadUsers'
2013/03/21 09:30:02| aclDestroyAccessList: 'delay_access 4 deny all'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'QUERY'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'QUERY'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'all'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'manager'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'localhost'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'to_localhost'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'RootUser'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'Safe_ports'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'CONNECT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'manager'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'localhost'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'manager'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Safe_ports'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'CONNECT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'SSL_ports'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'blocking_url'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'blocking_url'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'localhost'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'repos_archlinux'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'repos_archlinux'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'acl12'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'acl12'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQbanner'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQbanner'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Time_deny_NoAdmin'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'orizon_deny'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'orizon_method'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'orizon_method'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'orizon_deny'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'orizon_method_1'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'orizon_port'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'orizon_method_1'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'orizon_deny'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'orizon_port'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Pochta_mail_ru'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Pochta_mail_ru'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Pochta_mail_ru_src'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Pochta_mail_ru_src'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'allow_http_ip'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'allow_http_ip'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'deny_http_ip'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'deny_http_ip'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'allow_http_ip'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQ_USERS'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQ_ADDR'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQ_DOMAIN'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQ_METHOD'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ICQ_PORT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_METHOD'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_DOMAIN'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_PORT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_USERS'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_METHOD'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_DOMAIN'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_PORT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_METHOD'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_ADDR'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_PORT'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_METHOD'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_DOMAIN'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ICQ_PORT'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'skype_users'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'skype_src'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_users'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_src'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'ip_deny_access'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'skype_metod'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'skype_ports'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_users'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_metod'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'ip_deny_access'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_ports'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'numeric_IPs'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Skype_UA'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'numeric_IPS'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_users'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Skype_UA'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'skype_users'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'BadUsers'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'BadUsers'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_anonimajzery'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_badlang'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_entertain'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_games'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_mp3'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_pirate'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_porn'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_anonimajzery'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_badlang'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_entertain'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_games'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_mp3'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_pirate'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_unblock_porn'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_block_anonimajzery'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_unblock_anonimajzery'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_block_entertain'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_unblock_entertain'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_block_games'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_unblock_games'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_block_mp3'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'squid_unblock_mp3'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'KB_TimeSmena'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'squid_block_banners'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'AntiChat'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'exclude_url_chat'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Download_in_RootUsers'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'TimeNoMusic'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'MusicVideoFiles'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'MusicVideoFiles'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'MusicVideoFiles'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'MusicVideoFiles'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'TimeNoMusic'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Download_in_RootUsers'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'cont-type-video'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'cont-type-audio'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'cont-type-video'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'TimeNoMusic'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'cont-type-audio'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'TimeNoMusic'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'x_tube_src'
2013/03/21 09:30:02| aclParseAclLine: Appending to 'x_tube_src'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'x_tube_src'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'TimeNoMusic'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'Time_Kutsenko'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'KB_TimeSmena'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'LocalNetwork'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'GPF_TimeSmena'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'GPF_LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'GPF_LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'GPF_TimeSmena'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'MaxOpenURL'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'KB_TimeSmena'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'MaxOpenURL'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'localhost'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'Download_in_RootUsers'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'GPF_LocalNetwork'
2013/03/21 09:30:02| aclParseAclLine: Creating ACL 'SiteMyProvider'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'SiteMyProvider'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'localhost'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'RootUser'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'GPF_LocalNetwork'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'BadUsers'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:02| aclParseAccessLine: looking for ACL name 'all'
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking Download_in_RootUsers
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Download_in_RootUsers src "/etc/squid/squidblock/users/download_allow.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking cont-type-video
2013/03/21 09:30:03| aclMatchAcl: checking 'acl cont-type-video rep_mime_type Content-Type video.'
2013/03/21 09:30:03| aclMatchRegex: checking 'image/png'
2013/03/21 09:30:03| aclMatchRegex: looking for 'Content-Type'
2013/03/21 09:30:03| aclMatchRegex: looking for 'video.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking cont-type-audio
2013/03/21 09:30:03| aclMatchAcl: checking 'acl cont-type-audio rep_mime_type Content-Type audio.'
2013/03/21 09:30:03| aclMatchRegex: checking 'image/png'
2013/03/21 09:30:03| aclMatchRegex: looking for 'Content-Type'
2013/03/21 09:30:03| aclMatchRegex: looking for 'audio.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow manager localhost'
2013/03/21 09:30:03| aclMatchAclList: checking manager
2013/03/21 09:30:03| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny manager'
2013/03/21 09:30:03| aclMatchAclList: checking manager
2013/03/21 09:30:03| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !Safe_ports'
2013/03/21 09:30:03| aclMatchAclList: checking !Safe_ports
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Safe_ports port 21 121 2121    # ftp'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny CONNECT !SSL_ports'
2013/03/21 09:30:03| aclMatchAclList: checking CONNECT
2013/03/21 09:30:03| aclMatchAcl: checking 'acl CONNECT method CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking !SSL_ports
2013/03/21 09:30:03| aclMatchAcl: checking 'acl SSL_ports port 443 563 9443        # https, snews, ssl'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny blocking_url'
2013/03/21 09:30:03| aclMatchAclList: checking blocking_url
2013/03/21 09:30:03| aclMatchAcl: checking 'acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.adonweb\.ru/'
2013/03/21 09:30:03| aclMatchRegex: looking for '.runetki\.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow localhost'
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow RootUser'
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow acl12'
2013/03/21 09:30:03| aclMatchAclList: checking acl12
2013/03/21 09:30:03| aclMatchAcl: checking 'acl acl12    src    192.168.0.12'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny ICQbanner'
2013/03/21 09:30:03| aclMatchAclList: checking ICQbanner
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQbanner urlpath_regex /client/ate/ad-handler'
2013/03/21 09:30:03| aclMatchRegex: checking ''
2013/03/21 09:30:03| aclMatchRegex: looking for '/client/ate/ad-handler'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny orizon_method orizon_deny'
2013/03/21 09:30:03| aclMatchAclList: checking orizon_method
2013/03/21 09:30:03| aclMatchAcl: checking 'acl orizon_method    method        OPTIONS PROPFIND'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny orizon_method_1 orizon_deny orizon_port'
2013/03/21 09:30:03| aclMatchAclList: checking orizon_method_1
2013/03/21 09:30:03| aclMatchAcl: checking 'acl orizon_method_1    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking orizon_deny
2013/03/21 09:30:03| aclMatchAcl: checking 'acl orizon_deny        url_regex    .orizon-navigation\.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.orizon-navigation\.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Pochta_mail_ru'
2013/03/21 09:30:03| aclMatchAclList: checking Pochta_mail_ru
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Pochta_mail_ru    url_regex    -i "/etc/squid/squidblock/mail_ru.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.agent.mail.ru'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.video.mail.ru'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Pochta_mail_ru_src'
2013/03/21 09:30:03| aclMatchAclList: checking Pochta_mail_ru_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Pochta_mail_ru_src    dstdom_regex    mrim'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com'
2013/03/21 09:30:03| aclMatchRegex: looking for 'mrim'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny deny_http_ip !allow_http_ip'
2013/03/21 09:30:03| aclMatchAclList: checking deny_http_ip
2013/03/21 09:30:03| aclMatchAcl: checking 'acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_DOMAIN
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.aol\.com'
2013/03/21 09:30:03| aclMatchRegex: looking for '.icq\.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_USERS
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_USERS    src        192.168.0.0/24'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' found
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_DOMAIN
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.aol\.com'
2013/03/21 09:30:03| aclMatchRegex: looking for '.icq\.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !skype_users skype_src'
2013/03/21 09:30:03| aclMatchAclList: checking !skype_users
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_users    src    "/etc/squid/squidblock/users/skype.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: checking skype_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_src    dstdom_regex    login.skype.com publishers.skype.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com'
2013/03/21 09:30:03| aclMatchRegex: looking for 'login.skype.com'
2013/03/21 09:30:03| aclMatchRegex: looking for 'publishers.skype.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !skype_users skype_metod ip_deny_access skype_ports'
2013/03/21 09:30:03| aclMatchAclList: checking !skype_users
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_users    src    "/etc/squid/squidblock/users/skype.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: checking skype_metod
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_metod method    CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking ip_deny_access
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ip_deny_access url_regex -i [0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny numeric_IPS !skype_users'
2013/03/21 09:30:03| aclMatchAclList: checking numeric_IPs
2013/03/21 09:30:03| aclMatchAcl: checking 'acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Skype_UA !skype_users'
2013/03/21 09:30:03| aclMatchAclList: checking Skype_UA
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Skype_UA browser ^skype^'
2013/03/21 09:30:03| aclMatchRegex: checking 'Opera/9.80 (Windows NT 6.1; WOW64; U; ru) Presto/2.10.289 Version/12.00'
2013/03/21 09:30:03| aclMatchRegex: looking for '^skype^'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow BadUsers'
2013/03/21 09:30:03| aclMatchAclList: checking BadUsers
2013/03/21 09:30:03| aclMatchAcl: checking 'acl BadUsers src "/etc/squid/squidblock/users/bad.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_anonimajzery
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '75i.net'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '213.180.203.[0-9]+'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_entertain !squid_unblock_entertain'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_entertain
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.123star.com'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.zoofootball.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_games !squid_unblock_games'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_games
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '209.8.180.34.com'
..
2013/03/21 09:30:03| aclMatchRegex: looking for 'zero-de-conduite'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_mp3 !squid_unblock_mp3'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_mp3
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.allmusic.com.'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.zvuki.ru'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers'
2013/03/21 09:30:03| aclMatchAclList: checking MusicVideoFiles
2013/03/21 09:30:03| aclMatchAcl: checking 'acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$'
2013/03/21 09:30:03| aclMatchRegex: checking ''
2013/03/21 09:30:03| aclMatchRegex: looking for '\.(avi|mov|ogg|wav|wmv|rutube|youtube)$'
2013/03/21 09:30:03| aclMatchRegex: looking for '\.mp.*$'
2013/03/21 09:30:03| aclMatchRegex: looking for '\[mp3.*$'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny x_tube_src TimeNoMusic !RootUser'
2013/03/21 09:30:03| aclMatchAclList: checking x_tube_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl x_tube_src    dstdom_regex    rutube'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com'
2013/03/21 09:30:03| aclMatchRegex: looking for 'rutube'
2013/03/21 09:30:03| aclMatchRegex: looking for 'youtube'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow KB_TimeSmena LocalNetwork'
2013/03/21 09:30:03| aclMatchAclList: checking KB_TimeSmena
2013/03/21 09:30:03| aclMatchAcl: checking 'acl KB_TimeSmena time 7:00-20:00'
2013/03/21 09:30:03| aclMatchTime: checking 570 in 420-1200, weekbits=7f
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclCheck: match found, returning 1
2013/03/21 09:30:03| aclCheckCallback: answer=1
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking all
2013/03/21 09:30:03| aclMatchAcl: checking 'acl all src 0.0.0.0/0.0.0.0'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking all
2013/03/21 09:30:03| aclMatchAcl: checking 'acl all src 0.0.0.0/0.0.0.0'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.118' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclCheck: checking 'always_direct allow repos_archlinux'
2013/03/21 09:30:03| aclMatchAclList: checking repos_archlinux
2013/03/21 09:30:03| aclMatchAcl: checking 'acl repos_archlinux    dstdomain    .archlinux.fr .archlinux.org .ftp.linux.kiev.ua .mirrors.mithril.org.ua'
2013/03/21 09:30:03| aclMatchDomainList: checking 'hst-api.wialon.com'
2013/03/21 09:30:03| aclMatchDomainList: 'hst-api.wialon.com' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_ADDR
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_ADDR     dst        64.12.0.0/16 205.188.0.0/16'
2013/03/21 09:30:03| aclMatchIp: '193.193.165.209' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_DOMAIN
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_DOMAIN    url_regex    .aol\.com .icq\.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'hst-api.wialon.com:443'
2013/03/21 09:30:03| aclMatchRegex: looking for '.aol\.com'
2013/03/21 09:30:03| aclMatchRegex: looking for '.icq\.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct allow SiteMyProvider'
2013/03/21 09:30:03| aclMatchAclList: checking SiteMyProvider
2013/03/21 09:30:03| aclMatchAcl: checking 'acl SiteMyProvider dstdomain .smela.com.ua'
2013/03/21 09:30:03| aclMatchDomainList: checking 'hst-api.wialon.com'
2013/03/21 09:30:03| aclMatchDomainList: 'hst-api.wialon.com' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: NO match found, returning 0
2013/03/21 09:30:03| aclCheckCallback: answer=0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow manager localhost'
2013/03/21 09:30:03| aclMatchAclList: checking manager
2013/03/21 09:30:03| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny manager'
2013/03/21 09:30:03| aclMatchAclList: checking manager
2013/03/21 09:30:03| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !Safe_ports'
2013/03/21 09:30:03| aclMatchAclList: checking !Safe_ports
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Safe_ports port 21 121 2121    # ftp'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny CONNECT !SSL_ports'
2013/03/21 09:30:03| aclMatchAclList: checking CONNECT
2013/03/21 09:30:03| aclMatchAcl: checking 'acl CONNECT method CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny blocking_url'
2013/03/21 09:30:03| aclMatchAclList: checking blocking_url
2013/03/21 09:30:03| aclMatchAcl: checking 'acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '.adonweb\.ru/'
2013/03/21 09:30:03| aclMatchRegex: looking for '.runetki\.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow localhost'
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow RootUser'
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow acl12'
2013/03/21 09:30:03| aclMatchAclList: checking acl12
2013/03/21 09:30:03| aclMatchAcl: checking 'acl acl12    src    192.168.0.12'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny ICQbanner'
2013/03/21 09:30:03| aclMatchAclList: checking ICQbanner
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQbanner urlpath_regex /client/ate/ad-handler'
2013/03/21 09:30:03| aclMatchRegex: checking '/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '/client/ate/ad-handler'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny orizon_method orizon_deny'
2013/03/21 09:30:03| aclMatchAclList: checking orizon_method
2013/03/21 09:30:03| aclMatchAcl: checking 'acl orizon_method    method        OPTIONS PROPFIND'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny orizon_method_1 orizon_deny orizon_port'
2013/03/21 09:30:03| aclMatchAclList: checking orizon_method_1
2013/03/21 09:30:03| aclMatchAcl: checking 'acl orizon_method_1    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Pochta_mail_ru'
2013/03/21 09:30:03| aclMatchAclList: checking Pochta_mail_ru
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Pochta_mail_ru    url_regex    -i "/etc/squid/squidblock/mail_ru.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '.agent.mail.ru'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.video.mail.ru'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Pochta_mail_ru_src'
2013/03/21 09:30:03| aclMatchAclList: checking Pochta_mail_ru_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Pochta_mail_ru_src    dstdom_regex    mrim'
2013/03/21 09:30:03| aclMatchRegex: checking 'www.iifrf.ru'
2013/03/21 09:30:03| aclMatchRegex: looking for 'mrim'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny deny_http_ip !allow_http_ip'
2013/03/21 09:30:03| aclMatchAclList: checking deny_http_ip
2013/03/21 09:30:03| aclMatchAcl: checking 'acl deny_http_ip url_regex -i ^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '^http://[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access    deny    ICQ_METHOD ICQ_DOMAIN !ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access    allow   ICQ_USERS ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_USERS
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_USERS    src        192.168.0.0/24'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !skype_users skype_src'
2013/03/21 09:30:03| aclMatchAclList: checking !skype_users
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_users    src    "/etc/squid/squidblock/users/skype.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: checking skype_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_src    dstdom_regex    login.skype.com publishers.skype.com'
2013/03/21 09:30:03| aclMatchRegex: checking 'www.iifrf.ru'
2013/03/21 09:30:03| aclMatchRegex: looking for 'login.skype.com'
2013/03/21 09:30:03| aclMatchRegex: looking for 'publishers.skype.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny !skype_users skype_metod ip_deny_access skype_ports'
2013/03/21 09:30:03| aclMatchAclList: checking !skype_users
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_users    src    "/etc/squid/squidblock/users/skype.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: checking skype_metod
2013/03/21 09:30:03| aclMatchAcl: checking 'acl skype_metod method    CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny numeric_IPS !skype_users'
2013/03/21 09:30:03| aclMatchAclList: checking numeric_IPs
2013/03/21 09:30:03| aclMatchAcl: checking 'acl numeric_IPs url_regex ^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '^(([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)|(\[(0-9af]+)?[0-9af:]+)?[0-9af]+)?\])):443'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny Skype_UA !skype_users'
2013/03/21 09:30:03| aclMatchAclList: checking Skype_UA
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Skype_UA browser ^skype^'
2013/03/21 09:30:03| aclMatchRegex: checking 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)'
2013/03/21 09:30:03| aclMatchRegex: looking for '^skype^'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow BadUsers'
2013/03/21 09:30:03| aclMatchAclList: checking BadUsers
2013/03/21 09:30:03| aclMatchAcl: checking 'acl BadUsers src "/etc/squid/squidblock/users/bad.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_anonimajzery !squid_unblock_anonimajzery'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_anonimajzery
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_anonimajzery    url_regex -i "/etc/squid/squidblock/anonimajzery.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '75i.net'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '213.180.203.[0-9]+'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_entertain !squid_unblock_entertain'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_entertain
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_entertain    url_regex -i "/etc/squid/squidblock/entertain.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '.123star.com'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.zoofootball.com'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_games !squid_unblock_games'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_games
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_games        url_regex -i "/etc/squid/squidblock/games.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '209.8.180.34.com'
..
2013/03/21 09:30:03| aclMatchRegex: looking for 'zero-de-conduite'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny squid_block_mp3 !squid_unblock_mp3'
2013/03/21 09:30:03| aclMatchAclList: checking squid_block_mp3
2013/03/21 09:30:03| aclMatchAcl: checking 'acl squid_block_mp3        url_regex -i "/etc/squid/squidblock/mp3.block.txt"'
2013/03/21 09:30:03| aclMatchRegex: checking 'http://www.iifrf.ru/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '.allmusic.com.'
..
2013/03/21 09:30:03| aclMatchRegex: looking for '.zvuki.ru'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny MusicVideoFiles TimeNoMusic !Download_in_RootUsers'
2013/03/21 09:30:03| aclMatchAclList: checking MusicVideoFiles
2013/03/21 09:30:03| aclMatchAcl: checking 'acl MusicVideoFiles urlpath_regex \.(avi|mov|ogg|wav|wmv|rutube|youtube)$'
2013/03/21 09:30:03| aclMatchRegex: checking '/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for '\.(avi|mov|ogg|wav|wmv|rutube|youtube)$'
2013/03/21 09:30:03| aclMatchRegex: looking for '\.mp.*$'
2013/03/21 09:30:03| aclMatchRegex: looking for '\[mp3.*$'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access deny x_tube_src TimeNoMusic !RootUser'
2013/03/21 09:30:03| aclMatchAclList: checking x_tube_src
2013/03/21 09:30:03| aclMatchAcl: checking 'acl x_tube_src    dstdom_regex    rutube'
2013/03/21 09:30:03| aclMatchRegex: checking 'www.iifrf.ru'
2013/03/21 09:30:03| aclMatchRegex: looking for 'rutube'
2013/03/21 09:30:03| aclMatchRegex: looking for 'youtube'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'http_access allow KB_TimeSmena LocalNetwork'
2013/03/21 09:30:03| aclMatchAclList: checking KB_TimeSmena
2013/03/21 09:30:03| aclMatchAcl: checking 'acl KB_TimeSmena time 7:00-20:00'
2013/03/21 09:30:03| aclMatchTime: checking 570 in 420-1200, weekbits=7f
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclCheck: match found, returning 1
2013/03/21 09:30:03| aclCheckCallback: answer=1
2013/03/21 09:30:03| aclCheck: checking 'no_cache deny QUERY'
2013/03/21 09:30:03| aclMatchAclList: checking QUERY
2013/03/21 09:30:03| aclMatchAcl: checking 'acl QUERY urlpath_regex cgi-bin \?'
2013/03/21 09:30:03| aclMatchRegex: checking '/favicon.ico'
2013/03/21 09:30:03| aclMatchRegex: looking for 'cgi-bin'
2013/03/21 09:30:03| aclMatchRegex: looking for '\?'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: NO match found, returning 1
2013/03/21 09:30:03| aclCheckCallback: answer=1
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking all
2013/03/21 09:30:03| aclMatchAcl: checking 'acl all src 0.0.0.0/0.0.0.0'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking all
2013/03/21 09:30:03| aclMatchAcl: checking 'acl all src 0.0.0.0/0.0.0.0'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclCheck: checking 'always_direct allow repos_archlinux'
2013/03/21 09:30:03| aclMatchAclList: checking repos_archlinux
2013/03/21 09:30:03| aclMatchAcl: checking 'acl repos_archlinux    dstdomain    .archlinux.fr .archlinux.org .ftp.linux.kiev.ua .mirrors.mithril.org.ua'
2013/03/21 09:30:03| aclMatchDomainList: checking 'www.iifrf.ru'
2013/03/21 09:30:03| aclMatchDomainList: 'www.iifrf.ru' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct    allow    ICQ_METHOD ICQ_ADDR ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct    allow   ICQ_METHOD ICQ_DOMAIN ICQ_PORT'
2013/03/21 09:30:03| aclMatchAclList: checking ICQ_METHOD
2013/03/21 09:30:03| aclMatchAcl: checking 'acl ICQ_METHOD    method        CONNECT'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: checking 'always_direct allow SiteMyProvider'
2013/03/21 09:30:03| aclMatchAclList: checking SiteMyProvider
2013/03/21 09:30:03| aclMatchAcl: checking 'acl SiteMyProvider dstdomain .smela.com.ua'
2013/03/21 09:30:03| aclMatchDomainList: checking 'www.iifrf.ru'
2013/03/21 09:30:03| aclMatchDomainList: 'www.iifrf.ru' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclCheck: NO match found, returning 0
2013/03/21 09:30:03| aclCheckCallback: answer=0
2013/03/21 09:30:03| aclMatchAclList: checking localhost
2013/03/21 09:30:03| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking RootUser
2013/03/21 09:30:03| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking Download_in_RootUsers
2013/03/21 09:30:03| aclMatchAcl: checking 'acl Download_in_RootUsers src "/etc/squid/squidblock/users/download_allow.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' NOT found
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking LocalNetwork
2013/03/21 09:30:03| aclMatchAcl: checking 'acl LocalNetwork src "/etc/squid/squidblock/users/local.users"'
2013/03/21 09:30:03| aclMatchIp: '192.168.0.139' found
2013/03/21 09:30:03| aclMatchAclList: returning 1
2013/03/21 09:30:03| aclMatchAclList: checking cont-type-video
2013/03/21 09:30:03| aclMatchAcl: checking 'acl cont-type-video rep_mime_type Content-Type video.'
2013/03/21 09:30:03| aclMatchRegex: checking 'image/x-icon'
2013/03/21 09:30:03| aclMatchRegex: looking for 'Content-Type'
2013/03/21 09:30:03| aclMatchRegex: looking for 'video.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:03| aclMatchAclList: checking cont-type-audio
2013/03/21 09:30:03| aclMatchAcl: checking 'acl cont-type-audio rep_mime_type Content-Type audio.'
2013/03/21 09:30:03| aclMatchRegex: checking 'image/x-icon'
2013/03/21 09:30:03| aclMatchRegex: looking for 'Content-Type'
2013/03/21 09:30:03| aclMatchRegex: looking for 'audio.'
2013/03/21 09:30:03| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access allow manager localhost'
2013/03/21 09:30:04| aclMatchAclList: checking manager
2013/03/21 09:30:04| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access deny manager'
2013/03/21 09:30:04| aclMatchAclList: checking manager
2013/03/21 09:30:04| aclMatchAcl: checking 'acl manager proto cache_object'
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access deny !Safe_ports'
2013/03/21 09:30:04| aclMatchAclList: checking !Safe_ports
2013/03/21 09:30:04| aclMatchAcl: checking 'acl Safe_ports port 21 121 2121    # ftp'
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access deny CONNECT !SSL_ports'
2013/03/21 09:30:04| aclMatchAclList: checking CONNECT
2013/03/21 09:30:04| aclMatchAcl: checking 'acl CONNECT method CONNECT'
2013/03/21 09:30:04| aclMatchAclList: checking !SSL_ports
2013/03/21 09:30:04| aclMatchAcl: checking 'acl SSL_ports port 443 563 9443        # https, snews, ssl'
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access deny blocking_url'
2013/03/21 09:30:04| aclMatchAclList: checking blocking_url
2013/03/21 09:30:04| aclMatchAcl: checking 'acl blocking_url    url_regex    .adonweb\.ru/ .runetki\.'
2013/03/21 09:30:04| aclMatchRegex: checking 'versioncheck-bg.addons.mozilla.org:443'
2013/03/21 09:30:04| aclMatchRegex: looking for '.adonweb\.ru/'
2013/03/21 09:30:04| aclMatchRegex: looking for '.runetki\.'
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access allow localhost'
2013/03/21 09:30:04| aclMatchAclList: checking localhost
2013/03/21 09:30:04| aclMatchAcl: checking 'acl localhost src 127.0.0.1/255.255.255.255'
2013/03/21 09:30:04| aclMatchIp: '192.168.0.117' NOT found
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access allow RootUser'
2013/03/21 09:30:04| aclMatchAclList: checking RootUser
2013/03/21 09:30:04| aclMatchAcl: checking 'acl RootUser src "/etc/squid/squidblock/users/root.users"'
2013/03/21 09:30:04| aclMatchIp: '192.168.0.117' NOT found
2013/03/21 09:30:04| aclMatchAclList: no match, returning 0
2013/03/21 09:30:04| aclCheck: checking 'http_access allow acl12'
2013/03/21 09:30:04| aclMatchAclList: checking acl12
2013/03/21 09:30:04| aclMatchAcl: checking 'acl acl12    src    192.168.0.12'
 

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 09:56 21-03-2013
Alukardd



Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
bessmertnyj
Используйте, пожалуйста, для таких длинных простыней тэг [more=название простыни]текст простыни[/more], а не [code][/code].
 
Добавлено:
В представленном куске лога, я вообще не нашёл обращений к означенному репозиторию.

----------
Microsoft gives you windows, linuх gives you the whole house...
I've been using Vim for about 4 years now, mostly because I can't figure out how to exit it.

Всего записей: 6571 | Зарегистр. 28-08-2008 | Отправлено: 12:52 21-03-2013 | Исправлено: Alukardd, 13:15 21-03-2013
bessmertnyj

Newbie
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
Вы правы. Я даже не увидел обращения с 192.168.0.12.
По не проверенным данным пакетный менеджер ArchLinux pacman не умеет работать с прокси. Буду выяснять.
Спасибо за помошь.
 
Добавлено:
Проблема доступа пакетного менеджера к внешним репозитария решена. Это проблема не squid, а настройки пакетного менеджера,-http://unixforum.org/index.php?showtopic=65682&st=0&p=638171&#entry638171
Всем спасибо.
Тема закрыта.

Всего записей: 10 | Зарегистр. 28-08-2007 | Отправлено: 14:33 21-03-2013
Smito1



Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
ребят подскажите, стоит squid + squidman на mac os
 
делаю стопе сквиду и запускаю интернет летает, проходит время и начинает адцки тормозить пишет WARNING! Your cache is running out of filedescriptors
не хватает filedescriptors, но как увеличить есть только на линуксе а как увеличить на мак ос не могу понять, подскажите пжл
 
Добавлено:
кэш отключен и почистил, надпись всеравно появляеться, народу около 50-60 человек

Всего записей: 373 | Зарегистр. 19-12-2006 | Отправлено: 17:31 25-03-2013 | Исправлено: Smito1, 17:46 25-03-2013
tankistua

Gold Member
Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору
ты уверен что кеш отключил?

Всего записей: 9572 | Зарегистр. 15-01-2002 | Отправлено: 18:46 25-03-2013
Открыть новую тему     Написать ответ в эту тему

Страницы: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141

Компьютерный форум Ru.Board » Компьютеры » В помощь системному администратору » SQUID (только под *nix)


Реклама на форуме Ru.Board.

Powered by Ikonboard "v2.1.7b" © 2000 Ikonboard.com
Modified by Ru.B0ard
© Ru.B0ard 2000-2024

BitCoin: 1NGG1chHtUvrtEqjeerQCKDMUi6S6CG4iC

Рейтинг.ru