I have practiced this attack on my LAN, but I use ettercap with IP Tables still commented out so that SSL Strip can do the work. I have not used APR Spoof to do the spoofing so I can't tell you if that is causing your issue. What I can tell you is that when I use ettercap, the output when a PC on my LAN gets "attacked" shows up in the ettercap output window. I suggest giving this a try over arpspoof, I ran the ettercap GTK just because I and familiar with the setup to start arp spoofing, and I can though in some DNS spoofing if necessary, but you can of course run it from the command line just as quickly as arpspoof. Another way you can tell if it is just the logging that is screwed up is by looking at the site in the browser bar, it will make HTTPS sites HTTP on the initial presentation of the page.
The only issue that i have ran into with this attack is that it does not always grab the credentials, for example, I will go to a few sites, facebook, paypal, ebay. Then try it a second time and it might miss paypal for instance. Haven't nailed down why this happens. Hope you can get something out of this.