Advertisement
Guest User

fubz

a guest
Jun 8th, 2016
209
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.87 KB | None | 0 0
  1. 2016-06-05 20:12:44,398:DEBUG:certbot.main:Root logging level set at 30
  2. 2016-06-05 20:12:44,399:INFO:certbot.main:Saving debug log to /var/log/letsencrypt/letsencrypt.log
  3. 2016-06-05 20:12:44,400:DEBUG:certbot.main:certbot version: 0.8.0
  4. 2016-06-05 20:12:44,400:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/var/www/openmediavault/', '--text', '--keep-until-expiring', '--agree-tos', '--expand', '--email', 'gsola96@gmail.com', '-d', 'gsola96.duckdns.org']
  5. 2016-06-05 20:12:44,400:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#webroot,PluginEntryPoint#null,PluginEntryPoint#manual,PluginEntryPoint#standalone)
  6. 2016-06-05 20:12:44,401:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
  7. 2016-06-05 20:12:44,415:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot
  8. Description: Place files in webroot directory
  9. Interfaces: IAuthenticator, IPlugin
  10. Entry point: webroot = certbot.plugins.webroot:Authenticator
  11. Initialized: <certbot.plugins.webroot.Authenticator object at 0x235e810>
  12. Prep: True
  13. 2016-06-05 20:12:44,415:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x235e810> and installer None
  14. 2016-06-05 20:12:44,953:DEBUG:certbot.main:Picked account: <Account(ae660231edc756deb02c9c040e611989)>
  15. 2016-06-05 20:12:44,957:DEBUG:root:Sending GET request to https://acme-v01.api.letsencrypt.org/directory. args: (), kwargs: {}
  16. 2016-06-05 20:12:44,965:INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-v01.api.letsencrypt.org
  17. 2016-06-05 20:12:45,685:DEBUG:requests.packages.urllib3.connectionpool:"GET /directory HTTP/1.1" 200 280
  18. 2016-06-05 20:12:45,688:DEBUG:root:Received <Response [200]>. Headers: {'Content-Length': '280', 'Expires': 'Sun, 05 Jun 2016 20:10:47 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:47 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '6M001z_BV6oIYqNpPnZvVruHBQ-lAWWv-TGldSk6Q1U'}. Content: '{\n "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz",\n "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert",\n "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg",\n "revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert"\n}'
  19. 2016-06-05 20:12:45,688:DEBUG:acme.client:Received response <Response [200]> (headers: {'Content-Length': '280', 'Expires': 'Sun, 05 Jun 2016 20:10:47 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:47 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '6M001z_BV6oIYqNpPnZvVruHBQ-lAWWv-TGldSk6Q1U'}): '{\n "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz",\n "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert",\n "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg",\n "revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert"\n}'
  20. 2016-06-05 20:12:45,715:DEBUG:certbot.storage:Should renew, less than 30 days before certificate expiry 2016-06-05 19:03:00 UTC.
  21. 2016-06-05 20:12:45,715:INFO:certbot.renewal:Cert is due for renewal, auto-renewing...
  22. 2016-06-05 20:12:45,716:DEBUG:root:Requesting fresh nonce
  23. 2016-06-05 20:12:45,716:DEBUG:root:Sending HEAD request to https://acme-v01.api.letsencrypt.org/acme/new-authz. args: (), kwargs: {}
  24. 2016-06-05 20:12:45,964:DEBUG:requests.packages.urllib3.connectionpool:"HEAD /acme/new-authz HTTP/1.1" 405 0
  25. 2016-06-05 20:12:45,966:DEBUG:root:Received <Response [405]>. Headers: {'Content-Length': '91', 'Pragma': 'no-cache', 'Expires': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Server': 'nginx', 'Connection': 'keep-alive', 'Allow': 'POST', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'iUbBqCi7gi_HFYktRjt7bvvZKbWgMl5wEzZXGTI9e14'}. Content: ''
  26. 2016-06-05 20:12:45,967:DEBUG:acme.client:Storing nonce: '\x89F\xc1\xa8(\xbb\x82/\xc7\x15\x89-F;{n\xfb\xd9)\xb5\xa02^p\x136W\x192={^'
  27. 2016-06-05 20:12:45,968:DEBUG:acme.jose.json_util:Omitted empty fields: combinations=None, challenges=None, expires=None, status=None
  28. 2016-06-05 20:12:45,968:DEBUG:acme.client:Serialized JSON: {"identifier": {"type": "dns", "value": "gsola96.duckdns.org"}, "resource": "new-authz"}
  29. 2016-06-05 20:12:45,972:DEBUG:acme.jose.json_util:Omitted empty fields: kid=None, x5c=(), crit=(), typ=None, jwk=None, alg=None, jku=None, cty=None, x5tS256=None, x5u=None, x5t=None
  30. 2016-06-05 20:12:45,983:DEBUG:acme.jose.json_util:Omitted empty fields: kid=None, x5c=(), crit=(), typ=None, jku=None, cty=None, x5tS256=None, x5u=None, x5t=None, nonce=None
  31. 2016-06-05 20:12:45,983:DEBUG:root:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz. args: (), kwargs: {'data': '{"header": {"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "qAlIRf0gC0daHATM9L3549sfPofjVPgjmuEqx_xuZ6vS7LwjKLY0McFWQXnoOF9EtPQWQwPf-ZIqhlTLj3dskp9YSIfBMQdeNOVjYAFNehfW5VDMSNIk8l9IBJZ3IhxVjXzEzAJkFTzr9N2wMb5b38M410MxEmoKTPE8BGTU_sx7fmeeJ2eTOMGJE47cB1eWSPANqnzdwh3bzILMmvJMwKmIX5hW2RZxYC_LTTDMCfJo0Pb677JPkTaQ6z4NJG-HPJ5dYdh3MuNDrVHfhmSw5f-349WgGDFOSkeLBccgVpl8RPuNElJNHXe37NQYKrcHctaA1C3CihGn5gOVu3sqZQ"}}, "protected": "eyJub25jZSI6ICJpVWJCcUNpN2dpX0hGWWt0Ump0N2J2dlpLYldnTWw1d0V6WlhHVEk5ZTE0In0", "payload": "eyJpZGVudGlmaWVyIjogeyJ0eXBlIjogImRucyIsICJ2YWx1ZSI6ICJnc29sYTk2LmR1Y2tkbnMub3JnIn0sICJyZXNvdXJjZSI6ICJuZXctYXV0aHoifQ", "signature": "JJU_ZEfTAPDACp2uVtsB9dsjpEnle1F73AS0kxD6iqrygq_nM_fO271SOySNbc7lkIT20lXgCceaTA6-SzWI8dYF1wP_5AHwZCX_uPYLAi7qkWjkxtOwh_EmZndT0Po6alPWLMy7vmIpPvXEFnRH9kR9nn9drBlqD0NzbjgS-VnLTwf_jy9WKURQTkSYIcZ0AiZViNBEy3VaI-MfTbzxhZsMkgWmbOPU562Vj2kJudX0FvO310otJVNJE1LkmOwbKh9tSIttOvPiYgE1oPU_x8ysmtbDJsF0GS2KneS4nFdz4bgGFH9KISqc-XYWSevwGARiOKQ6IKfJvJYdRqn2tA"}'}
  32. 2016-06-05 20:12:46,301:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1004
  33. 2016-06-05 20:12:46,303:DEBUG:root:Received <Response [201]>. Headers: {'Content-Length': '1004', 'Expires': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'Qh2-lieYqcDfknwVHVSD3M2GWs_rSUjrXug77OwouWM'}. Content: '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "pending",\n "expires": "2016-06-12T20:10:48.377269832Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU"\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  34. 2016-06-05 20:12:46,304:DEBUG:acme.client:Storing nonce: "B\x1d\xbe\x96'\x98\xa9\xc0\xdf\x92|\x15\x1dT\x83\xdc\xcd\x86Z\xcf\xebIH\xeb^\xe8;\xec\xec(\xb9c"
  35. 2016-06-05 20:12:46,304:DEBUG:acme.client:Received response <Response [201]> (headers: {'Content-Length': '1004', 'Expires': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'Qh2-lieYqcDfknwVHVSD3M2GWs_rSUjrXug77OwouWM'}): '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "pending",\n "expires": "2016-06-12T20:10:48.377269832Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU"\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  36. 2016-06-05 20:12:46,306:DEBUG:acme.challenges:dns-01 was not recognized, full message: {u'status': u'pending', u'token': u'hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks', u'type': u'dns-01', u'uri': u'https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438'}
  37. 2016-06-05 20:12:46,308:INFO:certbot.auth_handler:Performing the following challenges:
  38. 2016-06-05 20:12:46,309:INFO:certbot.auth_handler:http-01 challenge for gsola96.duckdns.org
  39. 2016-06-05 20:12:46,309:INFO:certbot.plugins.webroot:Using the webroot path /var/www/openmediavault for all unmatched domains.
  40. 2016-06-05 20:12:46,309:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /var/www/openmediavault/.well-known/acme-challenge
  41. 2016-06-05 20:12:46,323:DEBUG:certbot.plugins.webroot:Attempting to save validation to /var/www/openmediavault/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU
  42. 2016-06-05 20:12:46,324:INFO:certbot.auth_handler:Waiting for verification...
  43. 2016-06-05 20:12:46,324:DEBUG:acme.client:Serialized JSON: {"keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI", "type": "http-01", "resource": "challenge"}
  44. 2016-06-05 20:12:46,327:DEBUG:acme.jose.json_util:Omitted empty fields: kid=None, x5c=(), crit=(), typ=None, jwk=None, alg=None, jku=None, cty=None, x5tS256=None, x5u=None, x5t=None
  45. 2016-06-05 20:12:46,334:DEBUG:acme.jose.json_util:Omitted empty fields: kid=None, x5c=(), crit=(), typ=None, jku=None, cty=None, x5tS256=None, x5u=None, x5t=None, nonce=None
  46. 2016-06-05 20:12:46,334:DEBUG:root:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439. args: (), kwargs: {'data': '{"header": {"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "qAlIRf0gC0daHATM9L3549sfPofjVPgjmuEqx_xuZ6vS7LwjKLY0McFWQXnoOF9EtPQWQwPf-ZIqhlTLj3dskp9YSIfBMQdeNOVjYAFNehfW5VDMSNIk8l9IBJZ3IhxVjXzEzAJkFTzr9N2wMb5b38M410MxEmoKTPE8BGTU_sx7fmeeJ2eTOMGJE47cB1eWSPANqnzdwh3bzILMmvJMwKmIX5hW2RZxYC_LTTDMCfJo0Pb677JPkTaQ6z4NJG-HPJ5dYdh3MuNDrVHfhmSw5f-349WgGDFOSkeLBccgVpl8RPuNElJNHXe37NQYKrcHctaA1C3CihGn5gOVu3sqZQ"}}, "protected": "eyJub25jZSI6ICJRaDItbGllWXFjRGZrbndWSFZTRDNNMkdXc19yU1Vqclh1Zzc3T3dvdVdNIn0", "payload": "eyJrZXlBdXRob3JpemF0aW9uIjogIlZBelJ2UThBR2hOSEMwWko1ajFBZFRMZl93bTU0XzhwRXN4aG1xREEtTFUuMWx2Tm5kYzlXTF9HczNwd3ZIQjFyWnpuQ2VPUm5FdzR1R29VX1ZoS0V1SSIsICJ0eXBlIjogImh0dHAtMDEiLCAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIn0", "signature": "mqicbbCSeomENiQDiwEF8jvETe8VyRoUzVqfm82q_MIQwwznPJgtvuxZZiUWXMb8blA5D883yHiZNcuQoByNTRIZ8Ji9Z7DZh_HUJZuzhGFbGECqaFa3cJBCiQzotxjaGUdGeM2R1-_worzVvbfUJfGsn4FMc-D65hKMDD03986Hi0wSvINZwzUC8BzUKU-CYRHoPTO9EUMMdKVx7PqLFuCbK2ISYxDsP4OjhHmpqs56W89vCRfvZAj6fTKzHdrIqBGrII_Q2Nnj1WIU7Aexy_JyYRAKtLJxmQZdiLsd9dxcP-EFmJLH_Qc-RMzTOCaWOSopYZonsBaN-gICRhEIrA"}'}
  47. 2016-06-05 20:12:46,626:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439 HTTP/1.1" 202 335
  48. 2016-06-05 20:12:46,628:DEBUG:root:Received <Response [202]>. Headers: {'Content-Length': '335', 'Expires': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro>;rel="up"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Content-Type': 'application/json', 'Replay-Nonce': 'Qma1BUyBv9YyTnTRkqddnR4W8uVUf6T6cg39YzRzxbM'}. Content: '{\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI"\n}'
  49. 2016-06-05 20:12:46,629:DEBUG:acme.client:Storing nonce: 'Bf\xb5\x05L\x81\xbf\xd62Nt\xd1\x92\xa7]\x9d\x1e\x16\xf2\xe5T\x7f\xa4\xfar\r\xfdc4s\xc5\xb3'
  50. 2016-06-05 20:12:46,629:DEBUG:acme.client:Received response <Response [202]> (headers: {'Content-Length': '335', 'Expires': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro>;rel="up"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:48 GMT', 'Content-Type': 'application/json', 'Replay-Nonce': 'Qma1BUyBv9YyTnTRkqddnR4W8uVUf6T6cg39YzRzxbM'}): '{\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI"\n}'
  51. 2016-06-05 20:12:49,634:DEBUG:root:Sending GET request to https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro. args: (), kwargs: {}
  52. 2016-06-05 20:12:49,893:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro HTTP/1.1" 200 1111
  53. 2016-06-05 20:12:49,895:DEBUG:root:Received <Response [200]>. Headers: {'Content-Length': '1111', 'Expires': 'Sun, 05 Jun 2016 20:10:52 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:52 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '31MV3E2nbYH05vzEWhvRAhBBbO13rUJn6mtnJjIluQ8'}. Content: '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "pending",\n "expires": "2016-06-12T20:10:48Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI"\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  54. 2016-06-05 20:12:49,896:DEBUG:acme.client:Received response <Response [200]> (headers: {'Content-Length': '1111', 'Expires': 'Sun, 05 Jun 2016 20:10:52 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:52 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '31MV3E2nbYH05vzEWhvRAhBBbO13rUJn6mtnJjIluQ8'}): '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "pending",\n "expires": "2016-06-12T20:10:48Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI"\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  55. 2016-06-05 20:12:49,898:DEBUG:acme.challenges:dns-01 was not recognized, full message: {u'status': u'pending', u'token': u'hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks', u'type': u'dns-01', u'uri': u'https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438'}
  56. 2016-06-05 20:12:52,903:DEBUG:root:Sending GET request to https://acme-v01.api.letsencrypt.org/acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro. args: (), kwargs: {}
  57. 2016-06-05 20:12:53,161:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro HTTP/1.1" 200 1674
  58. 2016-06-05 20:12:53,163:DEBUG:root:Received <Response [200]>. Headers: {'Content-Length': '1674', 'Expires': 'Sun, 05 Jun 2016 20:10:55 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:55 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '_5Aa2uM8ysg-KlAeY_JtbB60oHBAhfPyF1ChnNsjMDA'}. Content: '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "invalid",\n "expires": "2016-06-12T20:10:48Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "invalid",\n "error": {\n "type": "urn:acme:error:connection",\n "detail": "Could not connect to http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU"\n },\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI",\n "validationRecord": [\n {\n "url": "http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "hostname": "gsola96.duckdns.org",\n "port": "80",\n "addressesResolved": [\n "83.47.2.66"\n ],\n "addressUsed": "83.47.2.66"\n }\n ]\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  59. 2016-06-05 20:12:53,164:DEBUG:acme.client:Received response <Response [200]> (headers: {'Content-Length': '1674', 'Expires': 'Sun, 05 Jun 2016 20:10:55 GMT', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Sun, 05 Jun 2016 20:10:55 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': '_5Aa2uM8ysg-KlAeY_JtbB60oHBAhfPyF1ChnNsjMDA'}): '{\n "identifier": {\n "type": "dns",\n "value": "gsola96.duckdns.org"\n },\n "status": "invalid",\n "expires": "2016-06-12T20:10:48Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442437",\n "token": "pmi2AVdNomTdHwBjUs0V2tIebJbGzSFcjUEsr6WGJ5Q"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438",\n "token": "hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks"\n },\n {\n "type": "http-01",\n "status": "invalid",\n "error": {\n "type": "urn:acme:error:connection",\n "detail": "Could not connect to http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU"\n },\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442439",\n "token": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "keyAuthorization": "VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU.1lvNndc9WL_Gs3pwvHB1rZznCeORnEw4uGoU_VhKEuI",\n "validationRecord": [\n {\n "url": "http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU",\n "hostname": "gsola96.duckdns.org",\n "port": "80",\n "addressesResolved": [\n "83.47.2.66"\n ],\n "addressUsed": "83.47.2.66"\n }\n ]\n }\n ],\n "combinations": [\n [\n 1\n ],\n [\n 0\n ],\n [\n 2\n ]\n ]\n}'
  60. 2016-06-05 20:12:53,166:DEBUG:acme.challenges:dns-01 was not recognized, full message: {u'status': u'pending', u'token': u'hXkShs9HgdU30zaDm2394jSayT6QHVQ2FTKkhekV0Ks', u'type': u'dns-01', u'uri': u'https://acme-v01.api.letsencrypt.org/acme/challenge/5ZNGmX8SSRc54vev7y0Ujum-ABnTrHeK-NHRbLxiHro/111442438'}
  61. 2016-06-05 20:12:53,169:INFO:certbot.reporter:Reporting to user: The following errors were reported by the server:
  62.  
  63. Domain: gsola96.duckdns.org
  64. Type: connection
  65. Detail: Could not connect to http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU
  66.  
  67. To fix these errors, please make sure that your domain name was entered correctly and the DNS A record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided.
  68. 2016-06-05 20:12:53,169:INFO:certbot.auth_handler:Cleaning up challenges
  69. 2016-06-05 20:12:53,170:DEBUG:certbot.plugins.webroot:Removing /var/www/openmediavault/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU
  70. 2016-06-05 20:12:53,171:INFO:certbot.plugins.webroot:Unable to clean up challenge directory /var/www/openmediavault/.well-known/acme-challenge
  71. 2016-06-05 20:12:53,171:DEBUG:certbot.plugins.webroot:Error was: [Errno 20] Not a directory: '/var/www/openmediavault/.well-known/acme-challenge'
  72. 2016-06-05 20:12:53,175:DEBUG:certbot.main:Exiting abnormally:
  73. Traceback (most recent call last):
  74. File "~/.local/share/letsencrypt/bin/letsencrypt", line 11, in <module>
  75. sys.exit(main())
  76. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 735, in main
  77. return config.func(config, plugins)
  78. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 554, in obtain_cert
  79. _, action = _auth_from_domains(le_client, config, domains, lineage)
  80. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 90, in _auth_from_domains
  81. renewal.renew_cert(config, domains, le_client, lineage)
  82. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/renewal.py", line 236, in renew_cert
  83. new_certr, new_chain, new_key, _ = le_client.obtain_certificate(domains)
  84. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/client.py", line 247, in obtain_certificate
  85. self.config.allow_subset_of_names)
  86. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 74, in get_authorizations
  87. self._respond(resp, best_effort)
  88. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 131, in _respond
  89. self._poll_challenges(chall_update, best_effort)
  90. File "/~/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 195, in _poll_challenges
  91. raise errors.FailedChallenges(all_failed_achalls)
  92. FailedChallenges: Failed authorization procedure. gsola96.duckdns.org (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Could not connect to http://gsola96.duckdns.org/.well-known/acme-challenge/VAzRvQ8AGhNHC0ZJ5j1AdTLf_wm54_8pEsxhmqDA-LU
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement