Paksoicety

Lets encrypt Issue

Oct 31st, 2016
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 42.73 KB | None | 0 0
  1. 2016-10-31 06:14:48,103:DEBUG:certbot.main:Root logging level set at 20
  2. 2016-10-31 06:14:48,104:INFO:certbot.main:Saving debug log to /opt/psa/var/modules/letsencrypt/logs/letsencrypt.log
  3. 2016-10-31 06:14:48,104:DEBUG:certbot.main:certbot version: 0.9.3
  4. 2016-10-31 06:14:48,104:DEBUG:certbot.main:Arguments: ['--non-interactive', '--renew-by-default', '--no-redirect', '--agree-tos', '--text', '--config-dir', '/opt/psa/var/modules/letsencrypt/etc', '--work-dir', '/opt/psa/var/modules/letsencrypt/lib', '--logs-dir', '/opt/psa/var/modules/letsencrypt/logs', '--authenticator', 'letsencrypt-plesk:plesk', '--installer', 'letsencrypt-plesk:plesk', '--email', 'waseem@paksociety.com', '-d', 'cdn1.wetravel.com.pk']
  5. 2016-10-31 06:14:48,104:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#webroot,PluginEntryPoint#null,PluginEntryPoint#manual,PluginEntryPoint#standalone,PluginEntryPoint#letsencrypt-plesk:plesk)
  6. 2016-10-31 06:14:48,104:DEBUG:certbot.plugins.selection:Requested authenticator letsencrypt-plesk:plesk and installer letsencrypt-plesk:plesk
  7. 2016-10-31 06:14:48,106:DEBUG:certbot.plugins.selection:Single candidate plugin: * letsencrypt-plesk:plesk
  8. Description: Plesk
  9. Interfaces: IAuthenticator, IInstaller, IPlugin
  10. Entry point: plesk = letsencrypt_plesk.configurator:PleskConfigurator
  11. Initialized: <letsencrypt_plesk.configurator.PleskConfigurator object at 0x7feda6e9ead0>
  12. Prep: True
  13. 2016-10-31 06:14:48,107:DEBUG:certbot.plugins.selection:Selected authenticator <letsencrypt_plesk.configurator.PleskConfigurator object at 0x7feda6e9ead0> and installer <letsencrypt_plesk.configurator.PleskConfigurator object at 0x7feda6e9ead0>
  14. 2016-10-31 06:14:48,118:DEBUG:certbot.main:Picked account: <Account(9aa2b2306ae37990a44e769534c26c06)>
  15. 2016-10-31 06:14:48,118:DEBUG:root:Sending GET request to https://acme-v01.api.letsencrypt.org/directory. args: (), kwargs: {}
  16. 2016-10-31 06:14:48,119:INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-v01.api.letsencrypt.org
  17. 2016-10-31 06:14:48,327:DEBUG:requests.packages.urllib3.connectionpool:"GET /directory HTTP/1.1" 200 280
  18. 2016-10-31 06:14:48,328:DEBUG:root:Received <Response [200]>. Headers: {'Content-Length': '280', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Boulder-Request-Id': 'kIfDGd_aL-PEy1leNp_wjC2tshBLvIl88FKKPixPckw', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'l_4r8jhSQt6qBRrmhz9eik4RybZ3cj34GZlN7y5UZUE'}. Content: '{\n "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz",\n "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert",\n "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg",\n "revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert"\n}'
  19. 2016-10-31 06:14:48,328:DEBUG:acme.client:Received response <Response [200]> (headers: {'Content-Length': '280', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Boulder-Request-Id': 'kIfDGd_aL-PEy1leNp_wjC2tshBLvIl88FKKPixPckw', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'l_4r8jhSQt6qBRrmhz9eik4RybZ3cj34GZlN7y5UZUE'}): '{\n "new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz",\n "new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert",\n "new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg",\n "revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert"\n}'
  20. 2016-10-31 06:14:48,338:DEBUG:certbot.renewal:Auto-renewal forced with --force-renewal...
  21. 2016-10-31 06:14:48,338:INFO:certbot.main:Renewing an existing certificate
  22. 2016-10-31 06:14:48,338:DEBUG:root:Requesting fresh nonce
  23. 2016-10-31 06:14:48,338:DEBUG:root:Sending HEAD request to https://acme-v01.api.letsencrypt.org/acme/new-authz. args: (), kwargs: {}
  24. 2016-10-31 06:14:48,506:DEBUG:requests.packages.urllib3.connectionpool:"HEAD /acme/new-authz HTTP/1.1" 405 0
  25. 2016-10-31 06:14:48,507:DEBUG:root:Received <Response [405]>. Headers: {'Content-Length': '91', 'Pragma': 'no-cache', 'Boulder-Request-Id': '_-8pfotKb2o9n6v0LNU7LrXeylzmm6Z3ZA_0xYUujxY', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Server': 'nginx', 'Connection': 'keep-alive', 'Allow': 'POST', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'EYiBGCImHCVRCT20h0CMhNzgxQT9CfI12AQKHBnXdYg'}. Content: ''
  26. 2016-10-31 06:14:48,508:DEBUG:acme.client:Storing nonce: '\x11\x88\x81\x18"&\x1c%Q\t=\xb4\x87@\x8c\x84\xdc\xe0\xc5\x04\xfd\t\xf25\xd8\x04\n\x1c\x19\xd7u\x88'
  27. 2016-10-31 06:14:48,509:DEBUG:acme.jose.json_util:Omitted empty fields: expires=None, combinations=None, challenges=None, status=None
  28. 2016-10-31 06:14:48,509:DEBUG:acme.client:Serialized JSON: {"identifier": {"type": "dns", "value": "cdn1.wetravel.com.pk"}, "resource": "new-authz"}
  29. 2016-10-31 06:14:48,512:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, jwk=None, x5t=None, x5tS256=None, cty=None, x5u=None, typ=None, alg=None, jku=None
  30. 2016-10-31 06:14:48,517:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, nonce=None, x5tS256=None, cty=None, x5t=None, x5u=None, typ=None, jku=None
  31. 2016-10-31 06:14:48,517:DEBUG:root:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz. args: (), kwargs: {'data': '{"header": {"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "6QoPvTm_w82v3elAKToXMoE6jc_6umEf8ge_tLZHkjBAe5n8SvsFUgeBGJ6Bh4oxGXxYxM8TdsgdFIWTWt_w_Ix9tGQW8B2oJhgkJktRU39N0YFJL8WEPRV3YXvvEqo-Gp_4pn8U_blgl0dDQQC5KOkVcq_1kxLKJp9_bdlP4R9lrdFxs2tDc9DBAtbsEkhsfY1QfaeQ7t9Owj7I0Q8JGWKRtPj7dr36KmqGH90A7H-Z-y44pElwhsOGnS6XdTwJCHgojQuth5E24AVwg-tIodggHutCc5dveekyeuG-VyJKa44UQTlPWXpgtSVxXbaykA-DAK4Vs3Sm2xKSQipMGQ"}}, "protected": "eyJub25jZSI6ICJFWWlCR0NJbUhDVlJDVDIwaDBDTWhOemd4UVQ5Q2ZJMTJBUUtIQm5YZFlnIn0", "payload": "eyJpZGVudGlmaWVyIjogeyJ0eXBlIjogImRucyIsICJ2YWx1ZSI6ICJjZG4xLndldHJhdmVsLmNvbS5wayJ9LCAicmVzb3VyY2UiOiAibmV3LWF1dGh6In0", "signature": "gCMms80nrFaP8L4OiqKP4Wcej7mTdChQ6RbKBjuuk5ET1l7oTuLWkwAJyM_71xBF3WKj5UTR057xXaa6EchY8WlzEfYWzgWSgFXNwyv3SJJwwHQe6icmvs290960k4DflSKtf5HAlVH9bpAqIsarD1MEmYuamMCavKcAGEgGJT-RrBG7-nBvOWPxeJcxB4cYGR1jkSc3EgnGMcmya18rPVdpxNRSRUiISl2OyQ6DKbwkufqm7SWSP9fYt4EYRNxk-nBwR5tpJaHALBhASs2gi7ArGNVFOsnGfz2V0vcfVQE7ugTzgYtUj7Sid3SyxhRJLi78GgDca2ODG1bH_cH1ag"}'}
  32. 2016-10-31 06:14:48,808:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1788
  33. 2016-10-31 06:14:48,809:DEBUG:root:Received <Response [201]>. Headers: {'Content-Length': '1788', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Boulder-Request-Id': '29YLeVB7p2lMJoym_97xG-htwyYgQF6j7d2dGtU9AS4', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'bl4XCNE_fV4vi30gnfsqTAi8maFq96xZmYoI5mTSHuY'}. Content: '{\n "identifier": {\n "type": "dns",\n "value": "cdn1.wetravel.com.pk"\n },\n "status": "valid",\n "expires": "2016-12-07T19:49:08Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912320",\n "token": "3KPPvQKMiUOyDlMfHNZjvs8P5rpsUeYA81LuIOE647M"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912321",\n "token": "KTl89CwnYvetj-4kmbD8hMZrkjna2Itu5Qbr6vXlPo0"\n },\n {\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n }\n ],\n "combinations": [\n [\n 0\n ],\n [\n 1\n ],\n [\n 2\n ]\n ]\n}'
  34. 2016-10-31 06:14:48,809:DEBUG:acme.client:Storing nonce: 'n^\x17\x08\xd1?}^/\x8b} \x9d\xfb*L\x08\xbc\x99\xa1j\xf7\xacY\x99\x8a\x08\xe6d\xd2\x1e\xe6'
  35. 2016-10-31 06:14:48,809:DEBUG:acme.client:Received response <Response [201]> (headers: {'Content-Length': '1788', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Boulder-Request-Id': '29YLeVB7p2lMJoym_97xG-htwyYgQF6j7d2dGtU9AS4', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'bl4XCNE_fV4vi30gnfsqTAi8maFq96xZmYoI5mTSHuY'}): '{\n "identifier": {\n "type": "dns",\n "value": "cdn1.wetravel.com.pk"\n },\n "status": "valid",\n "expires": "2016-12-07T19:49:08Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912320",\n "token": "3KPPvQKMiUOyDlMfHNZjvs8P5rpsUeYA81LuIOE647M"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912321",\n "token": "KTl89CwnYvetj-4kmbD8hMZrkjna2Itu5Qbr6vXlPo0"\n },\n {\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n }\n ],\n "combinations": [\n [\n 0\n ],\n [\n 1\n ],\n [\n 2\n ]\n ]\n}'
  36. 2016-10-31 06:14:48,809:INFO:certbot.auth_handler:Performing the following challenges:
  37. 2016-10-31 06:14:48,810:INFO:certbot.auth_handler:http-01 challenge for cdn1.wetravel.com.pk
  38. 2016-10-31 06:14:48,812:DEBUG:letsencrypt_plesk.api_client:Plesk API-RPC request: <?xml version="1.0" ?><packet><site><get><filter><name>cdn1.wetravel.com.pk</name></filter><dataset><hosting/></dataset></get></site></packet>
  39. 2016-10-31 06:14:48,813:INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): 127.0.0.1
  40. 2016-10-31 06:14:48,930:DEBUG:requests.packages.urllib3.connectionpool:"POST /enterprise/control/agent.php HTTP/1.1" 200 None
  41. 2016-10-31 06:14:48,931:DEBUG:letsencrypt_plesk.api_client:Plesk API-RPC response: <?xml version="1.0" encoding="UTF-8"?>
  42. <packet version="1.6.7.0">
  43. <site>
  44. <get>
  45. <result>
  46. <status>ok</status>
  47. <filter-id>cdn1.wetravel.com.pk</filter-id>
  48. <id>11</id>
  49. <data>
  50. <gen_info>
  51. <cr_date>2016-09-16</cr_date>
  52. <name>cdn1.wetravel.com.pk</name>
  53. <ascii-name>cdn1.wetravel.com.pk</ascii-name>
  54. <status>0</status>
  55. <real_size>970752</real_size>
  56. <dns_ip_address>62.138.8.78</dns_ip_address>
  57. <htype>vrt_hst</htype>
  58. <guid>21f82224-ba67-475b-bce5-6204491be5d5</guid>
  59. <webspace-guid>01fd158b-1724-4e5f-8002-f07b71d68c57</webspace-guid>
  60. <sb-site-uuid/>
  61. <webspace-id>4</webspace-id>
  62. <description/>
  63. </gen_info>
  64. <hosting>
  65. <vrt_hst>
  66. <property>
  67. <name>ftp_login</name>
  68. <value>mohsin1</value>
  69. </property>
  70. <property>
  71. <name>ftp_password</name>
  72. <value>Wzw*39o4</value>
  73. </property>
  74. <property>
  75. <name>ftp_password_type</name>
  76. <value>plain</value>
  77. </property>
  78. <property>
  79. <name>ftp_quota</name>
  80. <value>-1</value>
  81. </property>
  82. <property>
  83. <name>ssl</name>
  84. <value>true</value>
  85. </property>
  86. <property>
  87. <name>shell</name>
  88. <value>/bin/sh</value>
  89. </property>
  90. <property>
  91. <name>php</name>
  92. <value>true</value>
  93. </property>
  94. <property>
  95. <name>php_handler_id</name>
  96. <value>plesk-php70-fpm</value>
  97. </property>
  98. <property>
  99. <name>ssi</name>
  100. <value>false</value>
  101. </property>
  102. <property>
  103. <name>cgi</name>
  104. <value>true</value>
  105. </property>
  106. <property>
  107. <name>perl</name>
  108. <value>false</value>
  109. </property>
  110. <property>
  111. <name>python</name>
  112. <value>false</value>
  113. </property>
  114. <property>
  115. <name>asp</name>
  116. <value>false</value>
  117. </property>
  118. <property>
  119. <name>asp_dot_net</name>
  120. <value>false</value>
  121. </property>
  122. <property>
  123. <name>miva</name>
  124. <value>false</value>
  125. </property>
  126. <property>
  127. <name>coldfusion</name>
  128. <value>false</value>
  129. </property>
  130. <property>
  131. <name>webstat</name>
  132. <value>awstats</value>
  133. </property>
  134. <property>
  135. <name>webstat_protected</name>
  136. <value>true</value>
  137. </property>
  138. <property>
  139. <name>errdocs</name>
  140. <value>true</value>
  141. </property>
  142. <property>
  143. <name>wuscripts</name>
  144. <value>false</value>
  145. </property>
  146. <property>
  147. <name>at_domains</name>
  148. <value>false</value>
  149. </property>
  150. <property>
  151. <name>fastcgi</name>
  152. <value>true</value>
  153. </property>
  154. <property>
  155. <name>cgi_mode</name>
  156. <value>www-root</value>
  157. </property>
  158. <property>
  159. <name>www_root</name>
  160. <value>/var/www/vhosts/wetravel.com.pk/httpdocs</value>
  161. </property>
  162. <property>
  163. <name>open_basedir</name>
  164. <value>{WEBSPACEROOT}{/}{:}{TMP}{/}</value>
  165. </property>
  166. <property>
  167. <name>apache-restrict-follow-sym-links</name>
  168. <value>false</value>
  169. </property>
  170. <property>
  171. <name>nginx-transparent-mode</name>
  172. <value>false</value>
  173. </property>
  174. <property>
  175. <name>nginx-serve-static</name>
  176. <value>true</value>
  177. </property>
  178. <property>
  179. <name>nginx-static-extensions</name>
  180. <value>ac3 avi bmp bz2 cue dat doc docx dts eot exe flv gz htm html ico img iso mkv mp3 mp4 mpeg mpg ogg pdf ppt pptx qt rar rm svg swf tar tgz ttf txt wav woff woff2 xls xlsx zip&#13;
  181. </value>
  182. </property>
  183. <property>
  184. <name>nginx-serve-php</name>
  185. <value>false</value>
  186. </property>
  187. <property>
  188. <name>additional-settings</name>
  189. <value/>
  190. </property>
  191. <property>
  192. <name>additional-ssl-settings</name>
  193. <value/>
  194. </property>
  195. <property>
  196. <name>additional-nginx-settings</name>
  197. <value>location ~* \.(js|css|png|jpg|jpeg|gif|ico)$ {
  198. expires 30d;
  199. add_header Pragma public;
  200. add_header Cache-Control “public”;
  201. try_files $uri @fallback;
  202. }
  203.  
  204. gzip on;
  205. gzip_static on;
  206. gzip_disable "msie6";
  207. gzip_http_version 1.1;
  208. gzip_vary on;
  209. gzip_comp_level 4;
  210. gzip_min_length 10240;
  211. gzip_proxied expired no-cache no-store private auth;
  212. gzip_types text/plain text/css application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript application/javascript text/x-js;
  213. gzip_buffers 16 8k;
  214. gzip_disable "MSIE [1-6]\.";
  215. client_body_timeout 60;
  216. client_header_timeout 60;
  217. keepalive_timeout 60;
  218. send_timeout 20;
  219. types_hash_max_size 4096;</value>
  220. </property>
  221. <ip_address>62.138.8.78</ip_address>
  222. </vrt_hst>
  223. </hosting>
  224. </data>
  225. </result>
  226. </get>
  227. </site>
  228. </packet>
  229.  
  230. 2016-10-31 06:14:48,934:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  231. 2016-10-31 06:14:48,939:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 cp2perm /tmp/tmpLk8_jj /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/.htaccess 0644
  232. 2016-10-31 06:14:48,945:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  233. 2016-10-31 06:14:48,950:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 cp2perm /tmp/tmpyEa8GY /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA 0644
  234. 2016-10-31 06:14:48,956:INFO:certbot.auth_handler:Waiting for verification...
  235. 2016-10-31 06:14:48,956:DEBUG:acme.client:Serialized JSON: {"keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s", "type": "http-01", "resource": "challenge"}
  236. 2016-10-31 06:14:48,957:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, jwk=None, x5t=None, x5tS256=None, cty=None, x5u=None, typ=None, alg=None, jku=None
  237. 2016-10-31 06:14:48,959:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, nonce=None, x5tS256=None, cty=None, x5t=None, x5u=None, typ=None, jku=None
  238. 2016-10-31 06:14:48,959:DEBUG:root:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322. args: (), kwargs: {'data': '{"header": {"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "6QoPvTm_w82v3elAKToXMoE6jc_6umEf8ge_tLZHkjBAe5n8SvsFUgeBGJ6Bh4oxGXxYxM8TdsgdFIWTWt_w_Ix9tGQW8B2oJhgkJktRU39N0YFJL8WEPRV3YXvvEqo-Gp_4pn8U_blgl0dDQQC5KOkVcq_1kxLKJp9_bdlP4R9lrdFxs2tDc9DBAtbsEkhsfY1QfaeQ7t9Owj7I0Q8JGWKRtPj7dr36KmqGH90A7H-Z-y44pElwhsOGnS6XdTwJCHgojQuth5E24AVwg-tIodggHutCc5dveekyeuG-VyJKa44UQTlPWXpgtSVxXbaykA-DAK4Vs3Sm2xKSQipMGQ"}}, "protected": "eyJub25jZSI6ICJibDRYQ05FX2ZWNHZpMzBnbmZzcVRBaThtYUZxOTZ4Wm1Zb0k1bVRTSHVZIn0", "payload": "eyJrZXlBdXRob3JpemF0aW9uIjogImI1SFZROHRTNHExVk9fc3E0d3p5czRFcG83UkZ1TzVkZWhKZjB0QlVheEEudTgyTVo2cmN0MXdGVlFDYTNmUmNuTENCNzh5VzNzZVNUM1B3Znppb3MxcyIsICJ0eXBlIjogImh0dHAtMDEiLCAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIn0", "signature": "Xha3eBJXktq9P4LOufRJnWZ7gofHKAPAx8jcdkf108mszc9riiApz8egOSXYOq4Pq-fsy2qYLoN8awryAyeqLCoRxi2-zOLzFe6XYP77MypDc7NHCIY2TSSLbR42xjKZjBqBMImOQmnSTgkxZ6kV6MMvMmVHvRW1vTKnacp0rwrX3Pkpiq7fKKdCPZxDxINl02cHEOOhfkrQKgeyv0OBPK_2LZ1OJqOJFbquKr3bzhYNuUWx5fVc-XL5tcDUdEjEG0jS6ukNzwBMBWJyK-BFTrDY5JCKrOjKR7gOVkAbPAKvEWOSADcHZSFTAv2eW6l4vl1mYW1OERIz1xLaYWgGXQ"}'}
  239. 2016-10-31 06:14:49,140:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322 HTTP/1.1" 202 933
  240. 2016-10-31 06:14:49,140:DEBUG:root:Received <Response [202]>. Headers: {'Content-Length': '933', 'Boulder-Request-Id': 'jUpUR2L9W-Sw_zGw3neaJr2n7vPKU9OtAyVAeXC7XKA', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Server': 'nginx', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA>;rel="up"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Content-Type': 'application/json', 'Replay-Nonce': 'uEiw4IdDq1SihJ1cMgCsqgAspZ8ADPAy37Gdj4VYOos'}. Content: '{\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n}'
  241. 2016-10-31 06:14:49,140:DEBUG:acme.client:Storing nonce: '\xb8H\xb0\xe0\x87C\xabT\xa2\x84\x9d\\2\x00\xac\xaa\x00,\xa5\x9f\x00\x0c\xf02\xdf\xb1\x9d\x8f\x85X:\x8b'
  242. 2016-10-31 06:14:49,140:DEBUG:acme.client:Received response <Response [202]> (headers: {'Content-Length': '933', 'Boulder-Request-Id': 'jUpUR2L9W-Sw_zGw3neaJr2n7vPKU9OtAyVAeXC7XKA', 'Expires': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Server': 'nginx', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA>;rel="up"', 'Location': 'https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:48 GMT', 'Content-Type': 'application/json', 'Replay-Nonce': 'uEiw4IdDq1SihJ1cMgCsqgAspZ8ADPAy37Gdj4VYOos'}): '{\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n}'
  243. 2016-10-31 06:14:52,144:DEBUG:root:Sending GET request to https://acme-v01.api.letsencrypt.org/acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA. args: (), kwargs: {}
  244. 2016-10-31 06:14:52,487:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA HTTP/1.1" 200 1788
  245. 2016-10-31 06:14:52,487:DEBUG:root:Received <Response [200]>. Headers: {'Content-Length': '1788', 'Expires': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Boulder-Request-Id': 'Z3GTM7ewtOL_tHmIntLaOma2_AO5AZUHx-TRxHXYD-Y', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Mon, 31 Oct 2016 06:14:52 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'c13I72nV2ybSBCPBJdQtOxXywm4Ocgq58pa-McwoXnk'}. Content: '{\n "identifier": {\n "type": "dns",\n "value": "cdn1.wetravel.com.pk"\n },\n "status": "valid",\n "expires": "2016-12-07T19:49:08Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912320",\n "token": "3KPPvQKMiUOyDlMfHNZjvs8P5rpsUeYA81LuIOE647M"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912321",\n "token": "KTl89CwnYvetj-4kmbD8hMZrkjna2Itu5Qbr6vXlPo0"\n },\n {\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n }\n ],\n "combinations": [\n [\n 0\n ],\n [\n 1\n ],\n [\n 2\n ]\n ]\n}'
  246. 2016-10-31 06:14:52,487:DEBUG:acme.client:Received response <Response [200]> (headers: {'Content-Length': '1788', 'Expires': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Boulder-Request-Id': 'Z3GTM7ewtOL_tHmIntLaOma2_AO5AZUHx-TRxHXYD-Y', 'Strict-Transport-Security': 'max-age=604800', 'Server': 'nginx', 'Connection': 'keep-alive', 'Link': '<https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next"', 'Pragma': 'no-cache', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Date': 'Mon, 31 Oct 2016 06:14:52 GMT', 'X-Frame-Options': 'DENY', 'Content-Type': 'application/json', 'Replay-Nonce': 'c13I72nV2ybSBCPBJdQtOxXywm4Ocgq58pa-McwoXnk'}): '{\n "identifier": {\n "type": "dns",\n "value": "cdn1.wetravel.com.pk"\n },\n "status": "valid",\n "expires": "2016-12-07T19:49:08Z",\n "challenges": [\n {\n "type": "tls-sni-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912320",\n "token": "3KPPvQKMiUOyDlMfHNZjvs8P5rpsUeYA81LuIOE647M"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912321",\n "token": "KTl89CwnYvetj-4kmbD8hMZrkjna2Itu5Qbr6vXlPo0"\n },\n {\n "type": "http-01",\n "status": "valid",\n "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/uJnrA3gKCfQnT3EUUxJv3El-s-WcLwxurMqYaYz-pNA/286912322",\n "token": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "keyAuthorization": "b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA.u82MZ6rct1wFVQCa3fRcnLCB78yW3seST3Pwfzios1s",\n "validationRecord": [\n {\n "url": "http://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "80",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n },\n {\n "url": "https://cdn1.wetravel.com.pk/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA",\n "hostname": "cdn1.wetravel.com.pk",\n "port": "443",\n "addressesResolved": [\n "62.138.8.78"\n ],\n "addressUsed": "62.138.8.78"\n }\n ]\n }\n ],\n "combinations": [\n [\n 0\n ],\n [\n 1\n ],\n [\n 2\n ]\n ]\n}'
  247. 2016-10-31 06:14:52,488:INFO:certbot.auth_handler:Cleaning up challenges
  248. 2016-10-31 06:14:52,488:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/web.config
  249. 2016-10-31 06:14:52,494:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  250. 2016-10-31 06:14:52,500:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 list both /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  251. 2016-10-31 06:14:52,508:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/.htaccess
  252. 2016-10-31 06:14:52,516:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 rm /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/.htaccess
  253. 2016-10-31 06:14:52,528:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  254. 2016-10-31 06:14:52,536:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 list both /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  255. 2016-10-31 06:14:52,545:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA
  256. 2016-10-31 06:14:52,552:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 rm /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge/b5HVQ8tS4q1VO_sq4wzys4Epo7RFuO5dehJf0tBUaxA
  257. 2016-10-31 06:14:52,564:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  258. 2016-10-31 06:14:52,573:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 list both /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  259. 2016-10-31 06:14:52,581:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 rmdir /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known/acme-challenge
  260. 2016-10-31 06:14:52,594:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 file_exists /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known
  261. 2016-10-31 06:14:52,602:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 list both /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known
  262. 2016-10-31 06:14:52,607:DEBUG:letsencrypt_plesk.api_client:Plesk exec: /usr/local/psa/admin/bin/filemng mohsin1 rmdir /var/www/vhosts/wetravel.com.pk/httpdocs/.well-known
  263. 2016-10-31 06:14:52,655:INFO:certbot.crypto_util:Generating key (2048 bits): /opt/psa/var/modules/letsencrypt/etc/keys/0017_key-certbot.pem
  264. 2016-10-31 06:14:52,656:INFO:certbot.crypto_util:Creating CSR: /opt/psa/var/modules/letsencrypt/etc/csr/0017_csr-certbot.pem
  265. 2016-10-31 06:14:52,656:DEBUG:certbot.client:CSR: CSR(file='/opt/psa/var/modules/letsencrypt/etc/csr/0017_csr-certbot.pem', data='0\x82\x02\x960\x82\x01~\x02\x01\x020\x1f1\x1d0\x1b\x06\x03U\x04\x03\x0c\x14cdn1.wetravel.com.pk0\x82\x01"0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x01\x05\x00\x03\x82\x01\x0f\x000\x82\x01\n\x02\x82\x01\x01\x00\xe3\x91u\x88\xee\x0e\x1f\xaf\x1aX{. \x98\xbc\xd9 \x932\x06mgpc\x9c\xc1\xeb\xa3\x84\x80\x12\x9a,*\\.\x14KtP\xd2\x14\xe5\xd0\xd0\xd9\xd4\x1e\xa6\xd4\xe1\x8d#\xcby3\x8a\x08h\xd8\rr\xb6\x9c\xb5\xbe\xe5\xdf\xc0*\x9cj\x9d\xda\xe8\xa6\xd4,A@\x10Y\xc2:\x80\xdc#\x08\xfc\xfa8\x9f\x1e\xdd\x81\xe9\xf3\xac\x99\xc3\x9e\xbe.\n\x96\xab\xfa1\x06\xf4\x19\xba\xb4~\xb5v_y\x9a\xb4\x94}\xf5\xd1\x94\xd9\x98\x1fp\xcb\xdc\xab<\x83V/\xde\xb9x\xef\xcb\xd9M}?\xb6\x80\t\x18\xa8\x8a\x81\xcb\xf3\xb2\xa5\xa0\xe8\x15\xb8}\xab?:\xd6Cz\xae\x0b\x94\x9a\x83\xf9#Z\xeaG\x99\xac\xf0.\x0c\x9cvX\xeem\nAKY)\xb9\x9f\x1bZ\xb5~\x9d\x8cf\xb6Nv\x9dX\xa4\xe2-\xf8_`]>\xd5n+Y/\xda\xdeQ\xab\xe0\x97\x08 \xd3o\xe7\x87\xbb\xa38\xc3Qb/\xf7\x18\x84OG\xfa\x0f\x0f:&\x1e\xbc\xa3\xac\x8a\xc7\xa9\x85\x02\x03\x01\x00\x01\xa0200\x06\t*\x86H\x86\xf7\r\x01\t\x0e1#0!0\x1f\x06\x03U\x1d\x11\x04\x180\x16\x82\x14cdn1.wetravel.com.pk0\r\x06\t*\x86H\x86\xf7\r\x01\x01\x0b\x05\x00\x03\x82\x01\x01\x00iG\x1bT\x11\xce\x86\xa7%\x91\xef\x80O\xd1M\xd4\x0f9-i\x18\x84\r\xc0\xec\xa7m\xdb\xe1k\xfe\xa1\xbe\x82$:<\x87\x06G\xa4\xe4\xa6\xa7\x03|)x0\x0f\x01\xd9V7\xe0\x11\x9c-\xe5\x9bHp\xed9\xbd\x88%\x1b\xc6d\xa0\xcf\xe4\xd9K\xd7?\xf0\x8b#\xa1t\xcf\xae-\xb5\xac\xcdR\\\xde\x84F\xe0\x96\xbf$\xe8.\x92MSR\x8b\x1f,D\xf7=\xb3\x9cx\xb5[\xe3|\x92\x87\xe5?a\xc2\x01\xf2\xf2}4\x9dS\x802\xd4\x01\x8dR\x02!\xee\xff\xd8\x80\xa3,\x02\xcd`\xa9\xf2~|\xec\xb4V\xd1\x15Q\xff\x1e\xce\xd5\x1fd\xc1\xd5\xaa\x16\xd5-\x98\xe5/\x182\xc8W\xa8u\xad\xa9\x84F}\xbb\xc7+\xb0\x9f!\nj\xc4\x86\x1b\xbe-)\x10\x8b\xe1\x95:\xd8\xdd\x89\x1e\x9dJ\x07;)\xb3\xc2,@"\xed\x07\xea\x02\x96\xb9\xf0\rZm\x9b/V\xc2{\x03\xce\x1f\xe5:\xf8\xb2bp7`\x178f\xed\xa4\\\xdfUN\xd6\xcc\xc1w\xadi', form='der'), domains: [u'cdn1.wetravel.com.pk']
  266. 2016-10-31 06:14:52,657:DEBUG:acme.client:Requesting issuance...
  267. 2016-10-31 06:14:52,657:DEBUG:acme.client:Serialized JSON: {"resource": "new-cert", "csr": "MIICljCCAX4CAQIwHzEdMBsGA1UEAwwUY2RuMS53ZXRyYXZlbC5jb20ucGswggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDjkXWI7g4frxpYey4gmLzZIJMyBm1ncGOcweujhIASmiwqXC4US3RQ0hTl0NDZ1B6m1OGNI8t5M4oIaNgNcractb7l38AqnGqd2uim1CxBQBBZwjqA3CMI_Po4nx7dgenzrJnDnr4uCpar-jEG9Bm6tH61dl95mrSUffXRlNmYH3DL3Ks8g1Yv3rl478vZTX0_toAJGKiKgcvzsqWg6BW4fas_OtZDeq4LlJqD-SNa6keZrPAuDJx2WO5tCkFLWSm5nxtatX6djGa2TnadWKTiLfhfYF0-1W4rWS_a3lGr4JcIINNv54e7ozjDUWIv9xiET0f6Dw86Jh68o6yKx6mFAgMBAAGgMjAwBgkqhkiG9w0BCQ4xIzAhMB8GA1UdEQQYMBaCFGNkbjEud2V0cmF2ZWwuY29tLnBrMA0GCSqGSIb3DQEBCwUAA4IBAQBpRxtUEc6GpyWR74BP0U3UDzktaRiEDcDsp23b4Wv-ob6CJDo8hwZHpOSmpwN8KXgwDwHZVjfgEZwt5ZtIcO05vYglG8ZkoM_k2UvXP_CLI6F0z64ttazNUlzehEbglr8k6C6STVNSix8sRPc9s5x4tVvjfJKH5T9hwgHy8n00nVOAMtQBjVICIe7_2ICjLALNYKnyfnzstFbRFVH_Hs7VH2TB1aoW1S2Y5S8YMshXqHWtqYRGfbvHK7CfIQpqxIYbvi0pEIvhlTrY3YkenUoHOymzwixAIu0H6gKWufANWm2bL1bCewPOH-U6-LJicDdgFzhm7aRc31VO1szBd61p"}
  268. 2016-10-31 06:14:52,657:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, jwk=None, x5t=None, x5tS256=None, cty=None, x5u=None, typ=None, alg=None, jku=None
  269. 2016-10-31 06:14:52,658:DEBUG:acme.jose.json_util:Omitted empty fields: x5c=(), crit=(), kid=None, nonce=None, x5tS256=None, cty=None, x5t=None, x5u=None, typ=None, jku=None
  270. 2016-10-31 06:14:52,659:DEBUG:root:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-cert. args: (), kwargs: {'headers': {'Accept': 'application/pkix-cert'}, 'data': '{"header": {"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "6QoPvTm_w82v3elAKToXMoE6jc_6umEf8ge_tLZHkjBAe5n8SvsFUgeBGJ6Bh4oxGXxYxM8TdsgdFIWTWt_w_Ix9tGQW8B2oJhgkJktRU39N0YFJL8WEPRV3YXvvEqo-Gp_4pn8U_blgl0dDQQC5KOkVcq_1kxLKJp9_bdlP4R9lrdFxs2tDc9DBAtbsEkhsfY1QfaeQ7t9Owj7I0Q8JGWKRtPj7dr36KmqGH90A7H-Z-y44pElwhsOGnS6XdTwJCHgojQuth5E24AVwg-tIodggHutCc5dveekyeuG-VyJKa44UQTlPWXpgtSVxXbaykA-DAK4Vs3Sm2xKSQipMGQ"}}, "protected": "eyJub25jZSI6ICJ1RWl3NElkRHExU2loSjFjTWdDc3FnQXNwWjhBRFBBeTM3R2RqNFZZT29zIn0", "payload": "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", "signature": "5DbkuoxTxt411R8Gh9MFVS4vNBPvEKFNgJYpVHF7eQBCdViEmaA8A6SQNjvbs7QRcC1ybxsntSG0TUkbtb2biUgY6U7IHiOvnwe5eu2vw9XX9qHac1_WYx6_zM45kc0_8xcUNv8AYM018zYdIG0yu8TT8FTNMNziiLvQTGX-OIFJ48pNuGeG8HAXJtZdu5Ht3rb2jvDZT-4c7-LXyauNr5DbvcZBIN53qb5VVGxnZPdzo-kKunJ3WuGPGsLAg33sm4JFnXqzDJae4hXAB26TkrJhNN-_SR-UfQmBRSxLp1i5PQ0KAOInXUKqHwzh5Y8UkAf0YXUuZ6VRysv86-bDJQ"}'}
  271. 2016-10-31 06:14:53,061:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-cert HTTP/1.1" 500 101
  272. 2016-10-31 06:14:53,065:DEBUG:root:Received <Response [500]>. Headers: {'Content-Length': '101', 'Boulder-Request-Id': 'ZoXRwmYikmflNWXhzGh8D-I4j80aZeRP-W3tYWvvvDQ', 'Expires': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Server': 'nginx', 'Connection': 'close', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'OQALgTkrJO4Ebm6MOL3RvdQEquZMg7kxWyd-zoX5XJo'}. Content: '{\n "type": "urn:acme:error:serverInternal",\n "detail": "Error creating new cert",\n "status": 500\n}'
  273. 2016-10-31 06:14:53,065:DEBUG:acme.client:Storing nonce: "9\x00\x0b\x819+$\xee\x04nn\x8c8\xbd\xd1\xbd\xd4\x04\xaa\xe6L\x83\xb91['~\xce\x85\xf9\\\x9a"
  274. 2016-10-31 06:14:53,065:DEBUG:acme.client:Received response <Response [500]> (headers: {'Content-Length': '101', 'Boulder-Request-Id': 'ZoXRwmYikmflNWXhzGh8D-I4j80aZeRP-W3tYWvvvDQ', 'Expires': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Server': 'nginx', 'Connection': 'close', 'Cache-Control': 'max-age=0, no-cache, no-store', 'Pragma': 'no-cache', 'Boulder-Requester': '4969680', 'Date': 'Mon, 31 Oct 2016 06:14:52 GMT', 'Content-Type': 'application/problem+json', 'Replay-Nonce': 'OQALgTkrJO4Ebm6MOL3RvdQEquZMg7kxWyd-zoX5XJo'}): '{\n "type": "urn:acme:error:serverInternal",\n "detail": "Error creating new cert",\n "status": 500\n}'
  275. 2016-10-31 06:14:53,066:DEBUG:certbot.main:Exiting abnormally:
  276. Traceback (most recent call last):
  277. File "/opt/psa/var/modules/letsencrypt/venv/bin/certbot", line 11, in <module>
  278. sys.exit(main())
  279. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/main.py", line 776, in main
  280. return config.func(config, plugins)
  281. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/main.py", line 511, in run
  282. action, lineage = _auth_from_domains(le_client, config, domains)
  283. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/main.py", line 96, in _auth_from_domains
  284. renewal.renew_cert(config, domains, le_client, lineage)
  285. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/renewal.py", line 238, in renew_cert
  286. new_certr, new_chain, new_key, _ = le_client.obtain_certificate(domains)
  287. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/client.py", line 263, in obtain_certificate
  288. return (self.obtain_certificate_from_csr(domains, csr, authzr=authzr)
  289. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/certbot/client.py", line 234, in obtain_certificate_from_csr
  290. authzr)
  291. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/acme/client.py", line 312, in request_issuance
  292. headers={'Accept': content_type})
  293. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/acme/client.py", line 649, in post
  294. return self._check_response(response, content_type=content_type)
  295. File "/usr/local/psa/var/modules/letsencrypt/venv.mTwB9/lib/python2.7/site-packages/acme/client.py", line 565, in _check_response
  296. raise messages.Error.from_json(jobj)
  297. Error: urn:acme:error:serverInternal :: The server experienced an internal error :: Error creating new cert
Add Comment
Please, Sign In to add comment