Advertisement
Guest User

Untitled

a guest
Dec 27th, 2017
600
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 100.07 KB | None | 0 0
  1. 2017-12-27 20:46:33,429:DEBUG:certbot.main:certbot version: 0.19.0
  2. 2017-12-27 20:46:33,429:DEBUG:certbot.main:Arguments: ['--dry-run']
  3. 2017-12-27 20:46:33,429:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
  4. 2017-12-27 20:46:33,440:DEBUG:certbot.log:Root logging level set at 20
  5. 2017-12-27 20:46:33,440:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
  6. 2017-12-27 20:46:33,448:DEBUG:certbot.plugins.selection:Requested authenticator <certbot.cli._Default object at 0x26e46d0> and installer <certbot.cli._Default object at 0x26e46d0>
  7. 2017-12-27 20:46:33,448:DEBUG:certbot.cli:Default Detector is Namespace(account=<certbot.cli._Default object at 0x26e0110>, agree_dev_preview=None, allow_subset_of_names=<certbot.cli._Default object at 0x26e2250>, apache=<certbot.cli._Default object at 0x26e4f90>, apache_challenge_location=<certbot.cli._Default object at 0x26efad0>, apache_ctl=<certbot.cli._Default object at 0x26efed0>, apache_dismod=<certbot.cli._Default object at 0x26ef510>, apache_enmod=<certbot.cli._Default object at 0x26ef410>, apache_handle_modules=<certbot.cli._Default object at 0x26efc50>, apache_handle_sites=<certbot.cli._Default object at 0x26efdd0>, apache_init_script=<certbot.cli._Default object at 0x26f0050>, apache_le_vhost_ext=<certbot.cli._Default object at 0x26ef650>, apache_logs_root=<certbot.cli._Default object at 0x26ef990>, apache_server_root=<certbot.cli._Default object at 0x26ef790>, apache_vhost_root=<certbot.cli._Default object at 0x26ef890>, authenticator=<certbot.cli._Default object at 0x26e46d0>, break_my_certs=<certbot.cli._Default object at 0x26e85d0>, cert_path=<certbot.cli._Default object at 0x26e02d0>, certname=<certbot.cli._Default object at 0x26e4490>, chain_path=<certbot.cli._Default object at 0x26e2750>, checkpoints=<certbot.cli._Default object at 0x26e8210>, config_dir=<certbot.cli._Default object at 0x26e2a90>, config_file=None, configurator=<certbot.cli._Default object at 0x26e46d0>, csr=<certbot.cli._Default object at 0x26e8650>, debug=<certbot.cli._Default object at 0x26dca50>, debug_challenges=<certbot.cli._Default object at 0x26dcc90>, deploy_hook=<certbot.cli._Default object at 0x26ed610>, dialog=None, directory_hooks=<certbot.cli._Default object at 0x26ed810>, dns_cloudflare=<certbot.cli._Default object at 0x26ed990>, dns_cloudxns=<certbot.cli._Default object at 0x26eda90>, dns_digitalocean=<certbot.cli._Default object at 0x26edb90>, dns_dnsimple=<certbot.cli._Default object at 0x26edc90>, dns_dnsmadeeasy=<certbot.cli._Default object at 0x26edd90>, dns_google=<certbot.cli._Default object at 0x26ede90>, dns_luadns=<certbot.cli._Default object at 0x26edf90>, dns_nsone=<certbot.cli._Default object at 0x26ef0d0>, dns_rfc2136=<certbot.cli._Default object at 0x26ef1d0>, dns_route53=<certbot.cli._Default object at 0x26ef2d0>, domains=<certbot.cli._Default object at 0x26e4610>, dry_run=True, duplicate=<certbot.cli._Default object at 0x26e0350>, eff_email=<certbot.cli._Default object at 0x26e2cd0>, email=<certbot.cli._Default object at 0x26e2e50>, expand=<certbot.cli._Default object at 0x26e2850>, force_interactive=<certbot.cli._Default object at 0x26e4790>, fullchain_path=<certbot.cli._Default object at 0x26e2410>, func=<function renew at 0x2601758>, hsts=<certbot.cli._Default object at 0x26e8ad0>, http01_address=<certbot.cli._Default object at 0x26e84d0>, http01_port=<certbot.cli._Default object at 0x26e8050>, ifaces=<certbot.cli._Default object at 0x26e0c10>, init=<certbot.cli._Default object at 0x26dcd10>, installer=<certbot.cli._Default object at 0x26e46d0>, key_path=<certbot.cli._Default object at 0x26e2090>, logs_dir=<certbot.cli._Default object at 0x26e2f90>, manual=<certbot.cli._Default object at 0x26ed290>, manual_auth_hook=<certbot.cli._Default object at 0x26ef3d0>, manual_cleanup_hook=<certbot.cli._Default object at 0x26f0290>, manual_public_ip_logging_ok=<certbot.cli._Default object at 0x26f0390>, max_log_backups=<certbot.cli._Default object at 0x26e4a90>, must_staple=<certbot.cli._Default object at 0x26e87d0>, nginx=<certbot.cli._Default object at 0x26ed690>, no_bootstrap=<certbot.cli._Default object at 0x26e0a50>, no_self_upgrade=<certbot.cli._Default object at 0x26e07d0>, no_verify_ssl=<certbot.cli._Default object at 0x26dced0>, noninteractive_mode=<certbot.cli._Default object at 0x26e4910>, num=<certbot.cli._Default object at 0x26e8c50>, os_packages_only=<certbot.cli._Default object at 0x26e0590>, post_hook=<certbot.cli._Default object at 0x26ed410>, pre_hook=<certbot.cli._Default object at 0x26ed310>, pref_challs=<certbot.cli._Default object at 0x26ed210>, prepare=<certbot.cli._Default object at 0x26dc6d0>, quiet=<certbot.cli._Default object at 0x26e0c90>, reason=<certbot.cli._Default object at 0x26e8490>, redirect=<certbot.cli._Default object at 0x26e88d0>, register_unsafely_without_email=<certbot.cli._Default object at 0x26e4190>, reinstall=<certbot.cli._Default object at 0x26e29d0>, renew_by_default=<certbot.cli._Default object at 0x26e24d0>, renew_hook=<certbot.cli._Default object at 0x26ed510>, renew_with_new_domains=<certbot.cli._Default object at 0x26e2350>, rsa_key_size=<certbot.cli._Default object at 0x26e86d0>, server=<certbot.cli._Default object at 0x26e43d0>, staging=<certbot.cli._Default object at 0x26dc8d0>, standalone=<certbot.cli._Default object at 0x26ed490>, standalone_supported_challenges=<certbot.cli._Default object at 0x26f04d0>, staple=<certbot.cli._Default object at 0x26e8ed0>, strict_permissions=<certbot.cli._Default object at 0x26ed110>, text_mode=<certbot.cli._Default object at 0x26e4c10>, tls_sni_01_address=<certbot.cli._Default object at 0x26e8390>, tls_sni_01_port=<certbot.cli._Default object at 0x26e8290>, tos=<certbot.cli._Default object at 0x26e0f90>, uir=<certbot.cli._Default object at 0x26e8cd0>, update_registration=<certbot.cli._Default object at 0x26e2fd0>, user_agent=<certbot.cli._Default object at 0x26e8a50>, user_agent_comment=<certbot.cli._Default object at 0x26e8990>, validate_hooks=<certbot.cli._Default object at 0x26ed710>, verb='renew', verbose_count=<certbot.cli._Default object at 0x26e4d90>, webroot=<certbot.cli._Default object at 0x26ed090>, webroot_map=<certbot.cli._Default object at 0x26f06d0>, webroot_path=<certbot.cli._Default object at 0x26f0150>, work_dir=<certbot.cli._Default object at 0x26e2d90>)
  8. 2017-12-27 20:46:33,453:DEBUG:certbot.storage:Should renew, less than 30 days before certificate expiry 2018-01-03 06:52:30 UTC.
  9. 2017-12-27 20:46:33,453:INFO:certbot.renewal:Cert is due for renewal, auto-renewing...
  10. 2017-12-27 20:46:33,454:DEBUG:certbot.plugins.selection:Requested authenticator apache and installer apache
  11. 2017-12-27 20:46:33,574:DEBUG:certbot_apache.configurator:Apache version is 2.4.27
  12. 2017-12-27 20:46:33,748:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
  13. Description: Apache Web Server plugin - Beta
  14. Interfaces: IAuthenticator, IInstaller, IPlugin
  15. Entry point: apache = certbot_apache.configurator:ApacheConfigurator
  16. Initialized: <certbot_apache.configurator.ApacheConfigurator object at 0x26e5550>
  17. Prep: True
  18. 2017-12-27 20:46:33,749:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
  19. Description: Apache Web Server plugin - Beta
  20. Interfaces: IAuthenticator, IInstaller, IPlugin
  21. Entry point: apache = certbot_apache.configurator:ApacheConfigurator
  22. Initialized: <certbot_apache.configurator.ApacheConfigurator object at 0x26e5550>
  23. Prep: True
  24. 2017-12-27 20:46:33,749:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_apache.configurator.ApacheConfigurator object at 0x26e5550> and installer <certbot_apache.configurator.ApacheConfigurator object at 0x26e5550>
  25. 2017-12-27 20:46:33,749:INFO:certbot.plugins.selection:Plugins selected: Authenticator apache, Installer apache
  26. 2017-12-27 20:46:33,762:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, contact=(u'mailto:anders.collstrup@gmail.com',), agreement=u'https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf', key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x1d1dd90>)>)), uri=u'https://acme-staging.api.letsencrypt.org/acme/reg/4864483', new_authzr_uri=u'https://acme-staging.api.letsencrypt.org/acme/new-authz', terms_of_service=u'https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf'), c7404f41975695ab060ff7a3db7057cc, Meta(creation_host=u'centos7-1.collstrup.com', creation_dt=datetime.datetime(2017, 10, 3, 17, 51, 30, tzinfo=<UTC>)))>
  27. 2017-12-27 20:46:33,765:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/directory.
  28. 2017-12-27 20:46:33,767:INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging.api.letsencrypt.org
  29. 2017-12-27 20:46:34,074:DEBUG:requests.packages.urllib3.connectionpool:"GET /directory HTTP/1.1" 200 582
  30. 2017-12-27 20:46:34,077:DEBUG:acme.client:Received response:
  31. HTTP 200
  32. content-length: 582
  33. expires: Wed, 27 Dec 2017 20:46:34 GMT
  34. strict-transport-security: max-age=604800
  35. server: nginx
  36. connection: keep-alive
  37. pragma: no-cache
  38. cache-control: max-age=0, no-cache, no-store
  39. date: Wed, 27 Dec 2017 20:46:34 GMT
  40. x-frame-options: DENY
  41. content-type: application/json
  42. replay-nonce: ag2f-IC3OUdgQp2kMv6aUtxq3ISubz1TRgu7rfDkcRs
  43.  
  44. {
  45. "1RsxV-qf-Uw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  46. "key-change": "https://acme-staging.api.letsencrypt.org/acme/key-change",
  47. "meta": {
  48. "terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf"
  49. },
  50. "new-authz": "https://acme-staging.api.letsencrypt.org/acme/new-authz",
  51. "new-cert": "https://acme-staging.api.letsencrypt.org/acme/new-cert",
  52. "new-reg": "https://acme-staging.api.letsencrypt.org/acme/new-reg",
  53. "revoke-cert": "https://acme-staging.api.letsencrypt.org/acme/revoke-cert"
  54. }
  55. 2017-12-27 20:46:34,078:INFO:certbot.main:Renewing an existing certificate
  56. 2017-12-27 20:46:34,080:DEBUG:acme.client:Requesting fresh nonce
  57. 2017-12-27 20:46:34,080:DEBUG:acme.client:Sending HEAD request to https://acme-staging.api.letsencrypt.org/acme/new-authz.
  58. 2017-12-27 20:46:34,294:DEBUG:requests.packages.urllib3.connectionpool:"HEAD /acme/new-authz HTTP/1.1" 405 0
  59. 2017-12-27 20:46:34,296:DEBUG:acme.client:Received response:
  60. HTTP 405
  61. content-length: 91
  62. pragma: no-cache
  63. expires: Wed, 27 Dec 2017 20:46:34 GMT
  64. server: nginx
  65. connection: keep-alive
  66. allow: POST
  67. cache-control: max-age=0, no-cache, no-store
  68. date: Wed, 27 Dec 2017 20:46:34 GMT
  69. content-type: application/problem+json
  70. replay-nonce: 9V_xUGVpZzbvTON8gy8H9eJYQ9GmEpVntv9H7-2PiMU
  71.  
  72.  
  73. 2017-12-27 20:46:34,296:DEBUG:acme.client:Storing nonce: 9V_xUGVpZzbvTON8gy8H9eJYQ9GmEpVntv9H7-2PiMU
  74. 2017-12-27 20:46:34,297:DEBUG:acme.client:JWS payload:
  75. {
  76. "identifier": {
  77. "type": "dns",
  78. "value": "www.collstrup.com"
  79. },
  80. "resource": "new-authz"
  81. }
  82. 2017-12-27 20:46:34,301:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  83. {
  84. "protected": "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",
  85. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAid3d3LmNvbGxzdHJ1cC5jb20iCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ",
  86. "signature": "yLdVLT_ofHmVLOgsZZjQ5quChEKWYQ73XpcAAYhfZrvUl3F3451YQNkgwRfd9xLvtiUFXuJz0a0p0SWmxzc0nYpNoAbiRkvTe-lCM3Epwi3VTjSEM_t3PigIrefhIh8nUH51VsLQbGctyxgsUqRXc5RIOCKq9zej9i2IfEp3Tq0FPy0_MTWAOdMipJopoY2aa6GKF8P2Wu2m3Oy18BUyAzWvknoIGAPqXVVzzd3vA2y00lkzpkWYdgfPmS_jdsVJsuzSwNtvKsQ7I1owX8IiwpFo5PYrBCjmE5i6cCxccL_CJfshWmz37Q0VFJHYn2RrWyfVhou78MeW6tA3iBBLKg"
  87. }
  88. 2017-12-27 20:46:34,540:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1858
  89. 2017-12-27 20:46:34,541:DEBUG:acme.client:Received response:
  90. HTTP 201
  91. content-length: 1858
  92. expires: Wed, 27 Dec 2017 20:46:34 GMT
  93. cache-control: max-age=0, no-cache, no-store
  94. strict-transport-security: max-age=604800
  95. server: nginx
  96. connection: keep-alive
  97. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  98. location: https://acme-staging.api.letsencrypt.org/acme/authz/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA
  99. pragma: no-cache
  100. boulder-requester: 4864483
  101. date: Wed, 27 Dec 2017 20:46:34 GMT
  102. x-frame-options: DENY
  103. content-type: application/json
  104. replay-nonce: nMIn13e4Tj5iqXeb9B7QYMi8O5o7Blq114qH4xdOG84
  105.  
  106. {
  107. "identifier": {
  108. "type": "dns",
  109. "value": "www.collstrup.com"
  110. },
  111. "status": "valid",
  112. "expires": "2018-01-26T18:20:59Z",
  113. "challenges": [
  114. {
  115. "type": "dns-01",
  116. "status": "pending",
  117. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809544",
  118. "token": "UL8t4mq9SxsdYSXbDJl4HbGiqz5jaaXYq_gpOlTSnhg"
  119. },
  120. {
  121. "type": "tls-sni-01",
  122. "status": "pending",
  123. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545",
  124. "token": "EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10"
  125. },
  126. {
  127. "type": "http-01",
  128. "status": "valid",
  129. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809546",
  130. "token": "5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  131. "keyAuthorization": "5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  132. "validationRecord": [
  133. {
  134. "url": "https://www.collstrup.com/.well-known/acme-challenge/5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  135. "hostname": "www.collstrup.com",
  136. "port": "443",
  137. "addressesResolved": [
  138. "77.215.239.148"
  139. ],
  140. "addressUsed": "77.215.239.148",
  141. "addressesTried": []
  142. },
  143. {
  144. "url": "http://www.collstrup.com/.well-known/acme-challenge/5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  145. "hostname": "www.collstrup.com",
  146. "port": "80",
  147. "addressesResolved": [
  148. "77.215.239.148"
  149. ],
  150. "addressUsed": "77.215.239.148",
  151. "addressesTried": []
  152. }
  153. ]
  154. }
  155. ],
  156. "combinations": [
  157. [
  158. 2
  159. ],
  160. [
  161. 1
  162. ],
  163. [
  164. 0
  165. ]
  166. ]
  167. }
  168. 2017-12-27 20:46:34,542:DEBUG:acme.client:Storing nonce: nMIn13e4Tj5iqXeb9B7QYMi8O5o7Blq114qH4xdOG84
  169. 2017-12-27 20:46:34,544:DEBUG:acme.client:JWS payload:
  170. {
  171. "identifier": {
  172. "type": "dns",
  173. "value": "collstrup.com"
  174. },
  175. "resource": "new-authz"
  176. }
  177. 2017-12-27 20:46:34,551:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  178. {
  179. "protected": "eyJub25jZSI6ICJuTUluMTNlNFRqNWlxWGViOUI3UVlNaThPNW83QmxxMTE0cUg0eGRPRzg0IiwgImFsZyI6ICJSUzI1NiIsICJqd2siOiB7ImUiOiAiQVFBQiIsICJrdHkiOiAiUlNBIiwgIm4iOiAiMFBuamRQMFNmVmVOTWJiTVJ1MmRtbXVhck9vTEZjUDJyaUNKNnhFX3prY0VueFM4TWktdjJiVlEwNXpEWVgwS3FicXNRLU1HcWw0QmszbkhzYmJQbWtMZzFaRjBqZlR2bjNfWmNRZGhvcEM4dWM5ZlR2SzRreVRPaFYyLVBPUnNRQTBnUTVSS2xUZlk5SzlZTGZ4WVFjWUJBejdVbkNrcjh0aUJQTXFyQW9YdzM4Yldaa0FHNVFEcERubHhHMUdVSnotTWJqMzgxaU8tZnBNQVU1aS1fQ0t4REJ3SmF3eFJIaUVHMUdsMFpCdzRMdmNKNm8tRlJsRWcwem5Qd1hYWjhKZmczQWNicWhXR2JERExSRnNrUmVQdFQ5Y2tEVmg1dlNKZEx4Nkt6c0theGRIUUZJZC1WenZLQzlEQTVBcDhJaEtPc3FJQ0ZoVFBiN3ZMSG0wZm1RIn19",
  180. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAiY29sbHN0cnVwLmNvbSIKICB9LCAKICAicmVzb3VyY2UiOiAibmV3LWF1dGh6Igp9",
  181. "signature": "T7NwIAObW36EvSzPHltzFa_PTBi3MbeJHmLlE3cRVBHlSOuYBgFaLxu5fVDHuoLr3YrDgF9I76MVj9o9-lDABIsPc_HOaFhUYAuhU_BqGKLGY2XZPY9JB-K_Bl5slVgaeJXf2gcTrjfpXO5yGe3mb-Jq4jrHf7fgl3IxgfnLOBIWK70731DyK6VhiMCYtG74WZ_GveVnUwZyS6EYpjwV4UHlzP202VOS9NOenJblzKP5kKPU32WOnEJpqc7MFEz6DsSkUnN8mOKSjKF3Wxw9u_Wfl5NmC1ZIl2C_sgYNJDhTiqj_W4hSsho3s20-dFqFPJxYGd9q5G-wDaGOjtiq3Q"
  182. }
  183. 2017-12-27 20:46:34,797:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1007
  184. 2017-12-27 20:46:34,798:DEBUG:acme.client:Received response:
  185. HTTP 201
  186. content-length: 1007
  187. expires: Wed, 27 Dec 2017 20:46:34 GMT
  188. cache-control: max-age=0, no-cache, no-store
  189. strict-transport-security: max-age=604800
  190. server: nginx
  191. connection: keep-alive
  192. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  193. location: https://acme-staging.api.letsencrypt.org/acme/authz/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc
  194. pragma: no-cache
  195. boulder-requester: 4864483
  196. date: Wed, 27 Dec 2017 20:46:34 GMT
  197. x-frame-options: DENY
  198. content-type: application/json
  199. replay-nonce: RB0oE_dGoBnBRQqp0w8sPHMxgyjKeIP0_gOicdUDqFM
  200.  
  201. {
  202. "identifier": {
  203. "type": "dns",
  204. "value": "collstrup.com"
  205. },
  206. "status": "pending",
  207. "expires": "2018-01-03T20:46:34.661680579Z",
  208. "challenges": [
  209. {
  210. "type": "dns-01",
  211. "status": "pending",
  212. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838155",
  213. "token": "soEOnUS4n1U5yyKOssK8zKVEAydych7cmAXEXCpHL2U"
  214. },
  215. {
  216. "type": "tls-sni-01",
  217. "status": "pending",
  218. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156",
  219. "token": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ"
  220. },
  221. {
  222. "type": "http-01",
  223. "status": "pending",
  224. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838157",
  225. "token": "Qx98hjZEY82y7kj6jK2nYcF5R1j9ydRMPSYVyjhlUYE"
  226. }
  227. ],
  228. "combinations": [
  229. [
  230. 1
  231. ],
  232. [
  233. 0
  234. ],
  235. [
  236. 2
  237. ]
  238. ]
  239. }
  240. 2017-12-27 20:46:34,799:DEBUG:acme.client:Storing nonce: RB0oE_dGoBnBRQqp0w8sPHMxgyjKeIP0_gOicdUDqFM
  241. 2017-12-27 20:46:34,801:DEBUG:acme.client:JWS payload:
  242. {
  243. "identifier": {
  244. "type": "dns",
  245. "value": "mail.collstrup.com"
  246. },
  247. "resource": "new-authz"
  248. }
  249. 2017-12-27 20:46:34,808:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  250. {
  251. "protected": "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",
  252. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAibWFpbC5jb2xsc3RydXAuY29tIgogIH0sIAogICJyZXNvdXJjZSI6ICJuZXctYXV0aHoiCn0",
  253. "signature": "DU3L7H2NsfmyaLPoCrJ1_r-7q1D0UQkZDKTCAXUdMyUUMCccEHgqWZ4azlOD_XjTpY4pUQlgB8PnzIJgo8HxZ0tPRP6WNMaxEo49AoRTL0wITTnpbj-Tz7y57QsuBFUbuAvV_ucryaacYcPi4QAxu_B0kBTuKfZRl2dltIaODSVfw0sp-qaI08jKD0eUahWKVWGc2S_za18wuyUqFfvSP28ACh2-PFUeDOmmyJn1my1YNydtpAayU8I96_mSg0eZoyNB_f8WWsmmoMWPt8M-zSu2D9ho-eKH1b-YzEPG1xbDGCbj6xurp0LCR_zrMZJ9liekVzPu8oya1-DVubpSJA"
  254. }
  255. 2017-12-27 20:46:35,063:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1012
  256. 2017-12-27 20:46:35,065:DEBUG:acme.client:Received response:
  257. HTTP 201
  258. content-length: 1012
  259. expires: Wed, 27 Dec 2017 20:46:35 GMT
  260. cache-control: max-age=0, no-cache, no-store
  261. strict-transport-security: max-age=604800
  262. server: nginx
  263. connection: keep-alive
  264. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  265. location: https://acme-staging.api.letsencrypt.org/acme/authz/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k
  266. pragma: no-cache
  267. boulder-requester: 4864483
  268. date: Wed, 27 Dec 2017 20:46:35 GMT
  269. x-frame-options: DENY
  270. content-type: application/json
  271. replay-nonce: elFuVhkbo5cBdLo-tbfHuMB_0QerANwIkKuGLI3wDEg
  272.  
  273. {
  274. "identifier": {
  275. "type": "dns",
  276. "value": "mail.collstrup.com"
  277. },
  278. "status": "pending",
  279. "expires": "2018-01-03T20:46:34.930005209Z",
  280. "challenges": [
  281. {
  282. "type": "http-01",
  283. "status": "pending",
  284. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838158",
  285. "token": "KQVTJvgqFfCRg1Shvvuc8r5Ci_ZBnHO4Ja_JFj2d6kM"
  286. },
  287. {
  288. "type": "tls-sni-01",
  289. "status": "pending",
  290. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159",
  291. "token": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI"
  292. },
  293. {
  294. "type": "dns-01",
  295. "status": "pending",
  296. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838160",
  297. "token": "1euWOQHIopySNCwMBgm8yekW28g600GkhZPgepEJxGw"
  298. }
  299. ],
  300. "combinations": [
  301. [
  302. 0
  303. ],
  304. [
  305. 2
  306. ],
  307. [
  308. 1
  309. ]
  310. ]
  311. }
  312. 2017-12-27 20:46:35,065:DEBUG:acme.client:Storing nonce: elFuVhkbo5cBdLo-tbfHuMB_0QerANwIkKuGLI3wDEg
  313. 2017-12-27 20:46:35,067:DEBUG:acme.client:JWS payload:
  314. {
  315. "identifier": {
  316. "type": "dns",
  317. "value": "minecraft.collstrup.com"
  318. },
  319. "resource": "new-authz"
  320. }
  321. 2017-12-27 20:46:35,070:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  322. {
  323. "protected": "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",
  324. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAibWluZWNyYWZ0LmNvbGxzdHJ1cC5jb20iCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ",
  325. "signature": "dB_WaHKHIBAu1e5mUsASsJXfYWkjVbGDHkLcwnFggYADXXZyl-FXje8vTDJvN2Qx20JfgyTniLa8XB1ASY86Fs95FcbHfIIS5kD6-kc1BV4mH1rL_I_TRh6nN1-48JAvoG76Pev7V633gXn3G677r40xadvofQgyLvx4e0FxEXO4WQ6f1lCozXtFjDz85xvkCGu5-8nKLfFaGNQ9lvFczdZm9-yYhE8S1Ocx9I1hUoO8EZVeXlacuc7ofiWv1YgukP_97oOmekc5CHUknSEzY2MCH1gGvC27hRMlmQSgziwgvlVndiuL6V8OK00eo0-HEPBE09ON9C_-LGgsael0fQ"
  326. }
  327. 2017-12-27 20:46:35,317:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1017
  328. 2017-12-27 20:46:35,319:DEBUG:acme.client:Received response:
  329. HTTP 201
  330. content-length: 1017
  331. expires: Wed, 27 Dec 2017 20:46:35 GMT
  332. cache-control: max-age=0, no-cache, no-store
  333. strict-transport-security: max-age=604800
  334. server: nginx
  335. connection: keep-alive
  336. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  337. location: https://acme-staging.api.letsencrypt.org/acme/authz/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4
  338. pragma: no-cache
  339. boulder-requester: 4864483
  340. date: Wed, 27 Dec 2017 20:46:35 GMT
  341. x-frame-options: DENY
  342. content-type: application/json
  343. replay-nonce: lgYfe6OeOFF83AnBiKiph1tE7of3bfNYv_Xxy4A1rNs
  344.  
  345. {
  346. "identifier": {
  347. "type": "dns",
  348. "value": "minecraft.collstrup.com"
  349. },
  350. "status": "pending",
  351. "expires": "2018-01-03T20:46:35.183691726Z",
  352. "challenges": [
  353. {
  354. "type": "http-01",
  355. "status": "pending",
  356. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838164",
  357. "token": "k65IpNItDa-DtZ-XyUbj-atgfyFmcqiEp6IvZcMHMuU"
  358. },
  359. {
  360. "type": "tls-sni-01",
  361. "status": "pending",
  362. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165",
  363. "token": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ"
  364. },
  365. {
  366. "type": "dns-01",
  367. "status": "pending",
  368. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838166",
  369. "token": "Mi-8LMhwDyT84760AtvwaCoeJrrZYvh5c2hThDPZ4Tw"
  370. }
  371. ],
  372. "combinations": [
  373. [
  374. 2
  375. ],
  376. [
  377. 0
  378. ],
  379. [
  380. 1
  381. ]
  382. ]
  383. }
  384. 2017-12-27 20:46:35,319:DEBUG:acme.client:Storing nonce: lgYfe6OeOFF83AnBiKiph1tE7of3bfNYv_Xxy4A1rNs
  385. 2017-12-27 20:46:35,321:DEBUG:acme.client:JWS payload:
  386. {
  387. "identifier": {
  388. "type": "dns",
  389. "value": "nc.collstrup.com"
  390. },
  391. "resource": "new-authz"
  392. }
  393. 2017-12-27 20:46:35,329:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  394. {
  395. "protected": "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",
  396. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAibmMuY29sbHN0cnVwLmNvbSIKICB9LCAKICAicmVzb3VyY2UiOiAibmV3LWF1dGh6Igp9",
  397. "signature": "vXVfdUrX1Wj2AkruMwqcQs9za0xHbjFkm6EeFM26raj2JuthlWk5zV5KGuPthdF-l5SeRLMW9XDIKdq3A5b_XXHnwjMfHXMRE8i31yZJvlawfUnxYu5oZU1Sn-jvnXpm1msqI_ANjzGqaAw1CXem50zbKOFyJbX4GsVgLdLqVvQmHEscCUiF-w6WkgjkCdhpzfLQnY9Jp5YCp6iBPQRAzqDleopaocWVexKDC0EVYkhRyBWJeqAYjvNWVp6HOcvQSuXKZwy0acv1g50BiTPNPVByxFkUgr9BxtJA0s61CTPYn30wHbZWSk7TO6xBfvCphmhcCbx7z0bvARU7AW2maA"
  398. }
  399. 2017-12-27 20:46:35,575:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1010
  400. 2017-12-27 20:46:35,576:DEBUG:acme.client:Received response:
  401. HTTP 201
  402. content-length: 1010
  403. expires: Wed, 27 Dec 2017 20:46:35 GMT
  404. cache-control: max-age=0, no-cache, no-store
  405. strict-transport-security: max-age=604800
  406. server: nginx
  407. connection: keep-alive
  408. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  409. location: https://acme-staging.api.letsencrypt.org/acme/authz/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g
  410. pragma: no-cache
  411. boulder-requester: 4864483
  412. date: Wed, 27 Dec 2017 20:46:35 GMT
  413. x-frame-options: DENY
  414. content-type: application/json
  415. replay-nonce: HZGqSjrj2q1lAIP98WKV133yQAx-GBh2nJk_8u3iunw
  416.  
  417. {
  418. "identifier": {
  419. "type": "dns",
  420. "value": "nc.collstrup.com"
  421. },
  422. "status": "pending",
  423. "expires": "2018-01-03T20:46:35.441107157Z",
  424. "challenges": [
  425. {
  426. "type": "http-01",
  427. "status": "pending",
  428. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838170",
  429. "token": "K_0CJLmuBprcjE0s83N5wgIwbUf6SUhCFBDmME2fKVM"
  430. },
  431. {
  432. "type": "tls-sni-01",
  433. "status": "pending",
  434. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171",
  435. "token": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU"
  436. },
  437. {
  438. "type": "dns-01",
  439. "status": "pending",
  440. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838172",
  441. "token": "uHCSaP4jlvayxaxgFd_detwDXy3gRfPmI40EbzJAUaE"
  442. }
  443. ],
  444. "combinations": [
  445. [
  446. 2
  447. ],
  448. [
  449. 1
  450. ],
  451. [
  452. 0
  453. ]
  454. ]
  455. }
  456. 2017-12-27 20:46:35,576:DEBUG:acme.client:Storing nonce: HZGqSjrj2q1lAIP98WKV133yQAx-GBh2nJk_8u3iunw
  457. 2017-12-27 20:46:35,578:DEBUG:acme.client:JWS payload:
  458. {
  459. "identifier": {
  460. "type": "dns",
  461. "value": "nextcloud.collstrup.com"
  462. },
  463. "resource": "new-authz"
  464. }
  465. 2017-12-27 20:46:35,581:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  466. {
  467. "protected": "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",
  468. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAibmV4dGNsb3VkLmNvbGxzdHJ1cC5jb20iCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ",
  469. "signature": "JEgZwIdYMZjLPs2kEV1_CjASUOaf05YXWCoSfoPejzO3ZOdeqx69EtREnzC6SsHun96x4SYIex9beTqsycInWAMzpypb3Kds84E68Uw-aCJLostyGLiuPOd6_xDbrC-N2evmxUfrUYnGSt8oSsQSYME_KtfO1oFlb-8gV5hpbtI_0Riv1DakrSrRYQqOYSSsJnCK9ZMB_hpXtzNGRP5G0y5_oHbMJ8w_wIhZauD8Q7j05LY6VgyZzAV9FfGas3msG5HOFJK3uo1eAe3zmaKiVrlAd_HdH0EUUsAVOQ7Yc7AQutoYVt7D0wh11VQSIlN4F2JaPsCUSuwrQ4Ca1NxTCg"
  470. }
  471. 2017-12-27 20:46:35,828:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1017
  472. 2017-12-27 20:46:35,830:DEBUG:acme.client:Received response:
  473. HTTP 201
  474. content-length: 1017
  475. expires: Wed, 27 Dec 2017 20:46:35 GMT
  476. cache-control: max-age=0, no-cache, no-store
  477. strict-transport-security: max-age=604800
  478. server: nginx
  479. connection: keep-alive
  480. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  481. location: https://acme-staging.api.letsencrypt.org/acme/authz/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8
  482. pragma: no-cache
  483. boulder-requester: 4864483
  484. date: Wed, 27 Dec 2017 20:46:35 GMT
  485. x-frame-options: DENY
  486. content-type: application/json
  487. replay-nonce: p6FPWi7yUoev1I6un_Tt_Ce_fXuUrAG29JJ6glRK6lI
  488.  
  489. {
  490. "identifier": {
  491. "type": "dns",
  492. "value": "nextcloud.collstrup.com"
  493. },
  494. "status": "pending",
  495. "expires": "2018-01-03T20:46:35.695741503Z",
  496. "challenges": [
  497. {
  498. "type": "dns-01",
  499. "status": "pending",
  500. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838173",
  501. "token": "uwGNti1cptNfNBsspYv-zNxvEupMbKCV-l5VKQwXaMM"
  502. },
  503. {
  504. "type": "tls-sni-01",
  505. "status": "pending",
  506. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174",
  507. "token": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4"
  508. },
  509. {
  510. "type": "http-01",
  511. "status": "pending",
  512. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838175",
  513. "token": "egLECQ7hBVmDY_WOVz7g7Uorm9Q4xol6C6GMHj1nV1M"
  514. }
  515. ],
  516. "combinations": [
  517. [
  518. 0
  519. ],
  520. [
  521. 1
  522. ],
  523. [
  524. 2
  525. ]
  526. ]
  527. }
  528. 2017-12-27 20:46:35,830:DEBUG:acme.client:Storing nonce: p6FPWi7yUoev1I6un_Tt_Ce_fXuUrAG29JJ6glRK6lI
  529. 2017-12-27 20:46:35,832:DEBUG:acme.client:JWS payload:
  530. {
  531. "identifier": {
  532. "type": "dns",
  533. "value": "plex.collstrup.com"
  534. },
  535. "resource": "new-authz"
  536. }
  537. 2017-12-27 20:46:35,839:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  538. {
  539. "protected": "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",
  540. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAicGxleC5jb2xsc3RydXAuY29tIgogIH0sIAogICJyZXNvdXJjZSI6ICJuZXctYXV0aHoiCn0",
  541. "signature": "HUuqid_tvwBF3eCcUwSa3PxOc8kyvF5RIjcKFFr7BHhGDfAmK1FhjnN_r7v7tuXEe-aBHcHkh2Cora6JaYKNkemjp4p2JnUGLGaV26IWy0yaVDLNiFrS_-hH9vdR45h4jY7NFDr1y-l2UjdlILJajKh_Rxn-PZoW2jTfk47bVt8xxWwI-Pzb-qbIGFJsIGIULVr8GWrBdI9QjNe2kZKjIPBU1FJPT8qk9KgFQmNoVAVGiGibKc1pVjqfOwR6Q5elrGojqEsiYKEebyTMzYGSTQSKDXvfdThLZ5ZUh__4-7jIbdiIP21ADFrG601Qgjl8o4BPDoSbt9Al1ygalj5FaQ"
  542. }
  543. 2017-12-27 20:46:36,078:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1012
  544. 2017-12-27 20:46:36,080:DEBUG:acme.client:Received response:
  545. HTTP 201
  546. content-length: 1012
  547. expires: Wed, 27 Dec 2017 20:46:36 GMT
  548. cache-control: max-age=0, no-cache, no-store
  549. strict-transport-security: max-age=604800
  550. server: nginx
  551. connection: keep-alive
  552. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  553. location: https://acme-staging.api.letsencrypt.org/acme/authz/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs
  554. pragma: no-cache
  555. boulder-requester: 4864483
  556. date: Wed, 27 Dec 2017 20:46:36 GMT
  557. x-frame-options: DENY
  558. content-type: application/json
  559. replay-nonce: _IMOU6n90D-vzKztvt_cl-y1qkEcQ5nLzkiBhTk47zg
  560.  
  561. {
  562. "identifier": {
  563. "type": "dns",
  564. "value": "plex.collstrup.com"
  565. },
  566. "status": "pending",
  567. "expires": "2018-01-03T20:46:35.946101542Z",
  568. "challenges": [
  569. {
  570. "type": "http-01",
  571. "status": "pending",
  572. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838176",
  573. "token": "YaNKw5mSD82099MkgXL9NEDh1Eu8SLmdfKABIFQiOTs"
  574. },
  575. {
  576. "type": "tls-sni-01",
  577. "status": "pending",
  578. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177",
  579. "token": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo"
  580. },
  581. {
  582. "type": "dns-01",
  583. "status": "pending",
  584. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838178",
  585. "token": "1cAY4-2fxMrE5CSntcI4cyRBz6WsKFQTO4kuZZnqpJM"
  586. }
  587. ],
  588. "combinations": [
  589. [
  590. 1
  591. ],
  592. [
  593. 2
  594. ],
  595. [
  596. 0
  597. ]
  598. ]
  599. }
  600. 2017-12-27 20:46:36,080:DEBUG:acme.client:Storing nonce: _IMOU6n90D-vzKztvt_cl-y1qkEcQ5nLzkiBhTk47zg
  601. 2017-12-27 20:46:36,082:DEBUG:acme.client:JWS payload:
  602. {
  603. "identifier": {
  604. "type": "dns",
  605. "value": "vpn.collstrup.com"
  606. },
  607. "resource": "new-authz"
  608. }
  609. 2017-12-27 20:46:36,084:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz:
  610. {
  611. "protected": "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",
  612. "payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAidnBuLmNvbGxzdHJ1cC5jb20iCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ",
  613. "signature": "lMiIr1unmghSg0UlpLR6nanCYZCG_ujstA68KQFuvhuJ3om8PsfzJ0vbzOF5SpLOsZAInu2OmduUlkxVLgp43UHcGB1zwtTYSt_46cnFiPfDH0CDg11Q7BoSOCZ5SzXFmiEcs2aXK_OpYApSObFH_BUIY0xqor5sbzb8CpUlNdHeLhPZjkZeYQbbP5oniujEa-T_M1Gj6LCtVlseH_8BzbCywWZjMkTn8ZJWgNdpWLpQRg3nXyUCYQNtb5fzTAgoJqZfidDr0gTQf_q3X55e0jRzca2-q6DdpP335uiDQQlIQje-gF1GFLhFkVMH6_AIT6XgkNAkjQE12Le7QEIooQ"
  614. }
  615. 2017-12-27 20:46:36,323:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/new-authz HTTP/1.1" 201 1011
  616. 2017-12-27 20:46:36,325:DEBUG:acme.client:Received response:
  617. HTTP 201
  618. content-length: 1011
  619. expires: Wed, 27 Dec 2017 20:46:36 GMT
  620. cache-control: max-age=0, no-cache, no-store
  621. strict-transport-security: max-age=604800
  622. server: nginx
  623. connection: keep-alive
  624. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  625. location: https://acme-staging.api.letsencrypt.org/acme/authz/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978
  626. pragma: no-cache
  627. boulder-requester: 4864483
  628. date: Wed, 27 Dec 2017 20:46:36 GMT
  629. x-frame-options: DENY
  630. content-type: application/json
  631. replay-nonce: E5cFA2AjTo9YQA2PJ2Ckrf98v-kXJhVhtRjLhBizcTw
  632.  
  633. {
  634. "identifier": {
  635. "type": "dns",
  636. "value": "vpn.collstrup.com"
  637. },
  638. "status": "pending",
  639. "expires": "2018-01-03T20:46:36.191114163Z",
  640. "challenges": [
  641. {
  642. "type": "dns-01",
  643. "status": "pending",
  644. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838182",
  645. "token": "pv3sFAeXQvR1EJSbOSYQeimRzVjGg8nCk7gQ5xYy4xQ"
  646. },
  647. {
  648. "type": "tls-sni-01",
  649. "status": "pending",
  650. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183",
  651. "token": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE"
  652. },
  653. {
  654. "type": "http-01",
  655. "status": "pending",
  656. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838184",
  657. "token": "YE-xzjU_xkkBnb2SIbnc3narQNPrwK8l--w3bRN3Bu0"
  658. }
  659. ],
  660. "combinations": [
  661. [
  662. 0
  663. ],
  664. [
  665. 2
  666. ],
  667. [
  668. 1
  669. ]
  670. ]
  671. }
  672. 2017-12-27 20:46:36,325:DEBUG:acme.client:Storing nonce: E5cFA2AjTo9YQA2PJ2Ckrf98v-kXJhVhtRjLhBizcTw
  673. 2017-12-27 20:46:36,327:INFO:certbot.auth_handler:Performing the following challenges:
  674. 2017-12-27 20:46:36,327:INFO:certbot.auth_handler:tls-sni-01 challenge for www.collstrup.com
  675. 2017-12-27 20:46:36,328:INFO:certbot.auth_handler:tls-sni-01 challenge for collstrup.com
  676. 2017-12-27 20:46:36,328:INFO:certbot.auth_handler:tls-sni-01 challenge for mail.collstrup.com
  677. 2017-12-27 20:46:36,328:INFO:certbot.auth_handler:tls-sni-01 challenge for minecraft.collstrup.com
  678. 2017-12-27 20:46:36,329:INFO:certbot.auth_handler:tls-sni-01 challenge for nc.collstrup.com
  679. 2017-12-27 20:46:36,329:INFO:certbot.auth_handler:tls-sni-01 challenge for nextcloud.collstrup.com
  680. 2017-12-27 20:46:36,329:INFO:certbot.auth_handler:tls-sni-01 challenge for plex.collstrup.com
  681. 2017-12-27 20:46:36,330:INFO:certbot.auth_handler:tls-sni-01 challenge for vpn.collstrup.com
  682. 2017-12-27 20:46:37,270:DEBUG:certbot_apache.parser:Adding Include /etc/httpd/conf.d/le_tls_sni_01_cert_challenge.conf to /files/etc/httpd/conf/httpd.conf
  683. 2017-12-27 20:46:37,270:DEBUG:certbot_apache.tls_sni_01:writing a config file with text:
  684. <IfModule mod_ssl.c>
  685. <VirtualHost *:443>
  686. ServerName b58345c2b1ec52e65c96ec58ed47fe61.ab20b64e42a5b09762041d980122abcf.acme.invalid
  687. UseCanonicalName on
  688. SSLStrictSNIVHostCheck on
  689.  
  690. LimitRequestBody 1048576
  691.  
  692. Include /etc/letsencrypt/options-ssl-apache.conf
  693. SSLCertificateFile /var/lib/letsencrypt/EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10.crt
  694. SSLCertificateKeyFile /var/lib/letsencrypt/EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10.pem
  695.  
  696. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  697. </VirtualHost>
  698.  
  699. <VirtualHost *:443>
  700. ServerName b2c745050edbf30027126bb216dca681.062ea705dbda1cc6a238f46fcb6da2c9.acme.invalid
  701. UseCanonicalName on
  702. SSLStrictSNIVHostCheck on
  703.  
  704. LimitRequestBody 1048576
  705.  
  706. Include /etc/letsencrypt/options-ssl-apache.conf
  707. SSLCertificateFile /var/lib/letsencrypt/-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ.crt
  708. SSLCertificateKeyFile /var/lib/letsencrypt/-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ.pem
  709.  
  710. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  711. </VirtualHost>
  712.  
  713. <VirtualHost *:443>
  714. ServerName 4ea4d53834bcf58de66a64d61aa75d94.26926b981d29346adb6568298501405f.acme.invalid
  715. UseCanonicalName on
  716. SSLStrictSNIVHostCheck on
  717.  
  718. LimitRequestBody 1048576
  719.  
  720. Include /etc/letsencrypt/options-ssl-apache.conf
  721. SSLCertificateFile /var/lib/letsencrypt/iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI.crt
  722. SSLCertificateKeyFile /var/lib/letsencrypt/iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI.pem
  723.  
  724. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  725. </VirtualHost>
  726.  
  727. <VirtualHost *:443>
  728. ServerName 168ce7fdb53f2aecab3d0cc614a45ef4.84c1c84d4adaa9092b53aae47ce96d87.acme.invalid
  729. UseCanonicalName on
  730. SSLStrictSNIVHostCheck on
  731.  
  732. LimitRequestBody 1048576
  733.  
  734. Include /etc/letsencrypt/options-ssl-apache.conf
  735. SSLCertificateFile /var/lib/letsencrypt/xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ.crt
  736. SSLCertificateKeyFile /var/lib/letsencrypt/xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ.pem
  737.  
  738. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  739. </VirtualHost>
  740.  
  741. <VirtualHost *:443>
  742. ServerName e3cf2e1185c4232c35467b9d6b83b194.d307fc40f23b776cf83d232fcb6b61ab.acme.invalid
  743. UseCanonicalName on
  744. SSLStrictSNIVHostCheck on
  745.  
  746. LimitRequestBody 1048576
  747.  
  748. Include /etc/letsencrypt/options-ssl-apache.conf
  749. SSLCertificateFile /var/lib/letsencrypt/yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU.crt
  750. SSLCertificateKeyFile /var/lib/letsencrypt/yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU.pem
  751.  
  752. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  753. </VirtualHost>
  754.  
  755. <VirtualHost *:443>
  756. ServerName 450ec3a542b91a6bc13972fc2369283f.ff57c22698e78f731384df952052199f.acme.invalid
  757. UseCanonicalName on
  758. SSLStrictSNIVHostCheck on
  759.  
  760. LimitRequestBody 1048576
  761.  
  762. Include /etc/letsencrypt/options-ssl-apache.conf
  763. SSLCertificateFile /var/lib/letsencrypt/XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4.crt
  764. SSLCertificateKeyFile /var/lib/letsencrypt/XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4.pem
  765.  
  766. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  767. </VirtualHost>
  768.  
  769. <VirtualHost *:443>
  770. ServerName 6bc0f4a33022635703e7f1245300534a.72ff90c78ce9bc213da5c5b76fa64193.acme.invalid
  771. UseCanonicalName on
  772. SSLStrictSNIVHostCheck on
  773.  
  774. LimitRequestBody 1048576
  775.  
  776. Include /etc/letsencrypt/options-ssl-apache.conf
  777. SSLCertificateFile /var/lib/letsencrypt/ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo.crt
  778. SSLCertificateKeyFile /var/lib/letsencrypt/ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo.pem
  779.  
  780. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  781. </VirtualHost>
  782.  
  783. <VirtualHost *:443>
  784. ServerName 828f9d1107a55c87e15c3fc187189c60.d0b4243178634ce1bb3c7c17cbbc49b5.acme.invalid
  785. UseCanonicalName on
  786. SSLStrictSNIVHostCheck on
  787.  
  788. LimitRequestBody 1048576
  789.  
  790. Include /etc/letsencrypt/options-ssl-apache.conf
  791. SSLCertificateFile /var/lib/letsencrypt/U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE.crt
  792. SSLCertificateKeyFile /var/lib/letsencrypt/U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE.pem
  793.  
  794. DocumentRoot /var/lib/letsencrypt/tls_sni_01_page/
  795. </VirtualHost>
  796.  
  797. </IfModule>
  798.  
  799. 2017-12-27 20:46:37,324:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd.conf
  800. 2017-12-27 20:46:40,500:INFO:certbot.auth_handler:Waiting for verification...
  801. 2017-12-27 20:46:40,501:DEBUG:acme.client:JWS payload:
  802. {
  803. "keyAuthorization": "EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  804. "type": "tls-sni-01",
  805. "resource": "challenge"
  806. }
  807. 2017-12-27 20:46:40,505:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545:
  808. {
  809. "protected": "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",
  810. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIkVFLUQ0Rmw5cFVHc0pqUmJmaWlRbVBiREIxR1hMVENOOWZlWVZLRWxxMTAuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  811. "signature": "iz8oE7Tyh_-X2qXeaVlUX-VYPwQIaLbnUnMapTqWraIHNXCQpDnhMkk600cUDGL18InbzgbwH_WHPJm-LpP7Dw7Ig8dOT_qU0RUSQj5--J_5rFqSawdHsfqXvnttY6tpiD02UXw5YAmqUaDcD5LiHfHL4qdvND4R2RAfOqcADrOx9GLlBwtBH0-s45aDocjKvSlicxT32sJ1Fn1GtWAulz4HUgnoOYGuNgXY93sDJAVOml01la4gbqN3-gerreZ9LyvyrCVu3_93F1HSj__BETJJHYTCfKnWBs7ONDEEjmgCYNetAN88hFJW613EKc8Q3dGIPpoZna_b2N-HKkPPKQ"
  812. }
  813. 2017-12-27 20:46:40,736:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545 HTTP/1.1" 202 228
  814. 2017-12-27 20:46:40,738:DEBUG:acme.client:Received response:
  815. HTTP 202
  816. content-length: 228
  817. cache-control: max-age=0, no-cache, no-store
  818. expires: Wed, 27 Dec 2017 20:46:40 GMT
  819. server: nginx
  820. connection: keep-alive
  821. link: <https://acme-staging.api.letsencrypt.org/acme/authz/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA>;rel="up"
  822. location: https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545
  823. pragma: no-cache
  824. boulder-requester: 4864483
  825. date: Wed, 27 Dec 2017 20:46:40 GMT
  826. content-type: application/json
  827. replay-nonce: MtjIoYBLmW5TIni37vL5ytd_ZDSikKEziMiQH0ML9zw
  828.  
  829. {
  830. "type": "tls-sni-01",
  831. "status": "pending",
  832. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545",
  833. "token": "EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10"
  834. }
  835. 2017-12-27 20:46:40,738:DEBUG:acme.client:Storing nonce: MtjIoYBLmW5TIni37vL5ytd_ZDSikKEziMiQH0ML9zw
  836. 2017-12-27 20:46:40,739:DEBUG:acme.client:JWS payload:
  837. {
  838. "keyAuthorization": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  839. "type": "tls-sni-01",
  840. "resource": "challenge"
  841. }
  842. 2017-12-27 20:46:40,747:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156:
  843. {
  844. "protected": "eyJub25jZSI6ICJNdGpJb1lCTG1XNVRJbmkzN3ZMNXl0ZF9aRFNpa0tFemlNaVFIME1MOXp3IiwgImFsZyI6ICJSUzI1NiIsICJqd2siOiB7ImUiOiAiQVFBQiIsICJrdHkiOiAiUlNBIiwgIm4iOiAiMFBuamRQMFNmVmVOTWJiTVJ1MmRtbXVhck9vTEZjUDJyaUNKNnhFX3prY0VueFM4TWktdjJiVlEwNXpEWVgwS3FicXNRLU1HcWw0QmszbkhzYmJQbWtMZzFaRjBqZlR2bjNfWmNRZGhvcEM4dWM5ZlR2SzRreVRPaFYyLVBPUnNRQTBnUTVSS2xUZlk5SzlZTGZ4WVFjWUJBejdVbkNrcjh0aUJQTXFyQW9YdzM4Yldaa0FHNVFEcERubHhHMUdVSnotTWJqMzgxaU8tZnBNQVU1aS1fQ0t4REJ3SmF3eFJIaUVHMUdsMFpCdzRMdmNKNm8tRlJsRWcwem5Qd1hYWjhKZmczQWNicWhXR2JERExSRnNrUmVQdFQ5Y2tEVmg1dlNKZEx4Nkt6c0theGRIUUZJZC1WenZLQzlEQTVBcDhJaEtPc3FJQ0ZoVFBiN3ZMSG0wZm1RIn19",
  845. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIi1pQTE3Qko3SURRUHJQV3BNTXNJMlE1MFF4S21tbFNlcEUtNTduZ2lUUlEuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  846. "signature": "Pdlipfb_WebD9TF3QRSyYSkbgiRpwO3QxRlOrjaTBW2SjsOF7rGm03OlR_fmUEi9hsFgeTIF-iQmztXF8Gmh0GszAem-JrgAA_YsJR-IQcCdh_Zez_C8ABK3240--j-2HYbGv-EzIfV-Cqcufedl_0P3of4qtoqGYRMD6GVU4hZa8WCMSLOHkf5XeH5ZuM8bYej2oJKvZchgls75ZgCj70r6-Qxwhm5-bbFOV11Q_9vCcFZH_sWhSdo2Sp0WEucLndZOhI2B3qrWAVk1KC_2OoZt2t0XYdBTjXM7aEN5orKl0JebN6UjZOewSqquu5uVlIp35-seuP4ZUKyp6XETBg"
  847. }
  848. 2017-12-27 20:46:40,998:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156 HTTP/1.1" 202 341
  849. 2017-12-27 20:46:41,000:DEBUG:acme.client:Received response:
  850. HTTP 202
  851. content-length: 341
  852. cache-control: max-age=0, no-cache, no-store
  853. expires: Wed, 27 Dec 2017 20:46:40 GMT
  854. server: nginx
  855. connection: keep-alive
  856. link: <https://acme-staging.api.letsencrypt.org/acme/authz/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc>;rel="up"
  857. location: https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156
  858. pragma: no-cache
  859. boulder-requester: 4864483
  860. date: Wed, 27 Dec 2017 20:46:40 GMT
  861. content-type: application/json
  862. replay-nonce: 8EpZahMlcD_g7BTEUiIBM48EIn8KNAK8o6p26zSc_RQ
  863.  
  864. {
  865. "type": "tls-sni-01",
  866. "status": "pending",
  867. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156",
  868. "token": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ",
  869. "keyAuthorization": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  870. }
  871. 2017-12-27 20:46:41,000:DEBUG:acme.client:Storing nonce: 8EpZahMlcD_g7BTEUiIBM48EIn8KNAK8o6p26zSc_RQ
  872. 2017-12-27 20:46:41,001:DEBUG:acme.client:JWS payload:
  873. {
  874. "keyAuthorization": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  875. "type": "tls-sni-01",
  876. "resource": "challenge"
  877. }
  878. 2017-12-27 20:46:41,004:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159:
  879. {
  880. "protected": "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",
  881. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogImlaX1JOc1JMSU9JcG5HMjlSLUlXdE1vTkNPV0ItWkg4Z3Z3NDAzcnI3cUkuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  882. "signature": "z-tyUVfV5CPfjyYvru4wdKH5ySMRyv6bLIfgWT0eC1g74ypx_vMtgJoCpr_cG9O6E1yQaft4UZsP0t6wAgTj8ZBau9m-8vrwJIBuXeanGlxZZveiwUgRYby-mTSZL9iHncWicvxVF72h8YyBDlmIdGZ7uKHIfhagPl3j65AUVIoExQHe9hXF4pbGtd29ZxPlLTAHB8BPhO1wdQd3V-na5ApYrACFve_kkouYjaFw7tVE6wcIqMQ6EoB4N1OIkplTET2gRZ-3qHsqt-NJL23QQd76oxuscQKMvDKwTsEYIELyDlgdZvsh699L1WbOE0f0Pnr1-EOPTZM7sVoABP1imw"
  883. }
  884. 2017-12-27 20:46:41,272:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159 HTTP/1.1" 202 341
  885. 2017-12-27 20:46:41,273:DEBUG:acme.client:Received response:
  886. HTTP 202
  887. content-length: 341
  888. cache-control: max-age=0, no-cache, no-store
  889. expires: Wed, 27 Dec 2017 20:46:41 GMT
  890. server: nginx
  891. connection: keep-alive
  892. link: <https://acme-staging.api.letsencrypt.org/acme/authz/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k>;rel="up"
  893. location: https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159
  894. pragma: no-cache
  895. boulder-requester: 4864483
  896. date: Wed, 27 Dec 2017 20:46:41 GMT
  897. content-type: application/json
  898. replay-nonce: pEVufKvrK_A1I_9ZFS-3cmtTyAkdQWYlq626K42eXC0
  899.  
  900. {
  901. "type": "tls-sni-01",
  902. "status": "pending",
  903. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159",
  904. "token": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI",
  905. "keyAuthorization": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  906. }
  907. 2017-12-27 20:46:41,274:DEBUG:acme.client:Storing nonce: pEVufKvrK_A1I_9ZFS-3cmtTyAkdQWYlq626K42eXC0
  908. 2017-12-27 20:46:41,275:DEBUG:acme.client:JWS payload:
  909. {
  910. "keyAuthorization": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  911. "type": "tls-sni-01",
  912. "resource": "challenge"
  913. }
  914. 2017-12-27 20:46:41,282:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165:
  915. {
  916. "protected": "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",
  917. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogInhLQ2k4YkY2eVZESFI5V0hiWjlfbjI0b2tOR3lveWdhcmxBbEJOeklJZlEuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  918. "signature": "uKmTDzkN1QdGjmtbJfSGiadiiXWaOTGHh5n3A3L1pkVurondDj2XkNN9jup3bkoBuoYJ0_NjSqnX3AxdxGClO6k_o7acy01-rEWf_C9HUf6AIKcuXtxWVpGVtrEfAKXiStI9ZcBrJ3DlwxK_inaOKNlZmn8xapnct-s7e91AlubS1bwtuaGSGUGyLU1TCsEQQIBpNLTnm0ZWfy1-sn7NYx0YGaTaW2U0Ij7Zc14LKMbcWoVWQw2u9YcYOH-xotFzp9k3G1LpJwiiXQzxsI_JdZNlfwOrUrqTza8Mn3Ra3UiymyEOfMFGwirSc_S2yl96VOB8EfeouknvurADJsyNLw"
  919. }
  920. 2017-12-27 20:46:41,542:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165 HTTP/1.1" 202 341
  921. 2017-12-27 20:46:41,543:DEBUG:acme.client:Received response:
  922. HTTP 202
  923. content-length: 341
  924. cache-control: max-age=0, no-cache, no-store
  925. expires: Wed, 27 Dec 2017 20:46:41 GMT
  926. server: nginx
  927. connection: keep-alive
  928. link: <https://acme-staging.api.letsencrypt.org/acme/authz/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4>;rel="up"
  929. location: https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165
  930. pragma: no-cache
  931. boulder-requester: 4864483
  932. date: Wed, 27 Dec 2017 20:46:41 GMT
  933. content-type: application/json
  934. replay-nonce: 79uZrqCek1Omq8yE2mbRQ0nKLBZTv7lWgfjlaURMM-U
  935.  
  936. {
  937. "type": "tls-sni-01",
  938. "status": "pending",
  939. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165",
  940. "token": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ",
  941. "keyAuthorization": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  942. }
  943. 2017-12-27 20:46:41,543:DEBUG:acme.client:Storing nonce: 79uZrqCek1Omq8yE2mbRQ0nKLBZTv7lWgfjlaURMM-U
  944. 2017-12-27 20:46:41,544:DEBUG:acme.client:JWS payload:
  945. {
  946. "keyAuthorization": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  947. "type": "tls-sni-01",
  948. "resource": "challenge"
  949. }
  950. 2017-12-27 20:46:41,547:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171:
  951. {
  952. "protected": "eyJub25jZSI6ICI3OXVacnFDZWsxT21xOHlFMm1iUlEwbktMQlpUdjdsV2dmamxhVVJNTS1VIiwgImFsZyI6ICJSUzI1NiIsICJqd2siOiB7ImUiOiAiQVFBQiIsICJrdHkiOiAiUlNBIiwgIm4iOiAiMFBuamRQMFNmVmVOTWJiTVJ1MmRtbXVhck9vTEZjUDJyaUNKNnhFX3prY0VueFM4TWktdjJiVlEwNXpEWVgwS3FicXNRLU1HcWw0QmszbkhzYmJQbWtMZzFaRjBqZlR2bjNfWmNRZGhvcEM4dWM5ZlR2SzRreVRPaFYyLVBPUnNRQTBnUTVSS2xUZlk5SzlZTGZ4WVFjWUJBejdVbkNrcjh0aUJQTXFyQW9YdzM4Yldaa0FHNVFEcERubHhHMUdVSnotTWJqMzgxaU8tZnBNQVU1aS1fQ0t4REJ3SmF3eFJIaUVHMUdsMFpCdzRMdmNKNm8tRlJsRWcwem5Qd1hYWjhKZmczQWNicWhXR2JERExSRnNrUmVQdFQ5Y2tEVmg1dlNKZEx4Nkt6c0theGRIUUZJZC1WenZLQzlEQTVBcDhJaEtPc3FJQ0ZoVFBiN3ZMSG0wZm1RIn19",
  953. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogInlaWlpSNzUzZDU0c0tuY0VrZVhRZkoxbWJnbVh5QnViemt3T05hY3ZBalUuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  954. "signature": "MkGOQE24ehr4rDdpj6-eWPKibwMNp_sQMsRNtSi-WAVFrceaqRcUVIEWaCnRd2JkXbrlHJJlajtLHBlmVJD48lPn7j3or95GXR00M9cJtNBbOzHXCd8qW8bx0D0Kv4GzbjDH6etY9lkVg3F17-O16D4d7Ae47506hFpY2b7_QyYGbqJJipmajEoiKWt7rbq2NIeze8G-5g_yjpfercbjAw1dHyyOVEFcZmdNrD6v1gNBfIa9VL8YiejY0BfGGKfkwdVwJkl91iZcW3OYaGO5V2XlVk9eKAP9CC-O6otvDgXBk21C3lW0TruyDaTXjVzdVunX0tD4yA_QHsCGR-INZA"
  955. }
  956. 2017-12-27 20:46:41,788:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171 HTTP/1.1" 202 341
  957. 2017-12-27 20:46:41,790:DEBUG:acme.client:Received response:
  958. HTTP 202
  959. content-length: 341
  960. cache-control: max-age=0, no-cache, no-store
  961. expires: Wed, 27 Dec 2017 20:46:41 GMT
  962. server: nginx
  963. connection: keep-alive
  964. link: <https://acme-staging.api.letsencrypt.org/acme/authz/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g>;rel="up"
  965. location: https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171
  966. pragma: no-cache
  967. boulder-requester: 4864483
  968. date: Wed, 27 Dec 2017 20:46:41 GMT
  969. content-type: application/json
  970. replay-nonce: vGePrm7Md810X2fwdM8kzceUXdH8KnjDUXPe1MH9uDY
  971.  
  972. {
  973. "type": "tls-sni-01",
  974. "status": "pending",
  975. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171",
  976. "token": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU",
  977. "keyAuthorization": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  978. }
  979. 2017-12-27 20:46:41,790:DEBUG:acme.client:Storing nonce: vGePrm7Md810X2fwdM8kzceUXdH8KnjDUXPe1MH9uDY
  980. 2017-12-27 20:46:41,791:DEBUG:acme.client:JWS payload:
  981. {
  982. "keyAuthorization": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  983. "type": "tls-sni-01",
  984. "resource": "challenge"
  985. }
  986. 2017-12-27 20:46:41,798:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174:
  987. {
  988. "protected": "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",
  989. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIlhRNFRsVzEyYWtrSmtFS2pianoyS2EyaGN4SEl0TzJRMU5yMW0ybzRNUTQuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  990. "signature": "M4CYf3aRfeqQ0mnxWi71RBC_8VeBBW6WnvpecVXMgGeaCJdT24YjbrBkjprNKnd0vYz880YVkuzrZBNa0JSlwP6HQ9_Q6Wiu8WM9EM3TiQi8U_zB9sWlfVZ9pwnSxmjIp0WhRtDXjTEw6D-g3jVUZAw1ZI7eUOyrtFsjAkWWG37ds3ifdlBFrWpcLPFa4DbkAfbO7gckDsmJUhHZviz8O6XsYYB-ZH_1Tt5neYAx-XKOMUjyVcvUGDnuTIFSlO_hvDRZ4PUVfMvS-OfVXc9gv_bQYoEbfxqVQJLnosuUdre1lmKDZ_8rXbgTRsDSKQBjplZNFVxIMbZIEzXSADpr7g"
  991. }
  992. 2017-12-27 20:46:42,039:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174 HTTP/1.1" 202 341
  993. 2017-12-27 20:46:42,041:DEBUG:acme.client:Received response:
  994. HTTP 202
  995. content-length: 341
  996. cache-control: max-age=0, no-cache, no-store
  997. expires: Wed, 27 Dec 2017 20:46:42 GMT
  998. server: nginx
  999. connection: keep-alive
  1000. link: <https://acme-staging.api.letsencrypt.org/acme/authz/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8>;rel="up"
  1001. location: https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174
  1002. pragma: no-cache
  1003. boulder-requester: 4864483
  1004. date: Wed, 27 Dec 2017 20:46:42 GMT
  1005. content-type: application/json
  1006. replay-nonce: hYn3ZYXhTg89-7dnQeoHL4XjadowznKMQXzDBNDdHrI
  1007.  
  1008. {
  1009. "type": "tls-sni-01",
  1010. "status": "pending",
  1011. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174",
  1012. "token": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4",
  1013. "keyAuthorization": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  1014. }
  1015. 2017-12-27 20:46:42,041:DEBUG:acme.client:Storing nonce: hYn3ZYXhTg89-7dnQeoHL4XjadowznKMQXzDBNDdHrI
  1016. 2017-12-27 20:46:42,042:DEBUG:acme.client:JWS payload:
  1017. {
  1018. "keyAuthorization": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1019. "type": "tls-sni-01",
  1020. "resource": "challenge"
  1021. }
  1022. 2017-12-27 20:46:42,049:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177:
  1023. {
  1024. "protected": "eyJub25jZSI6ICJoWW4zWllYaFRnODktN2RuUWVvSEw0WGphZG93em5LTVFYekRCTkRkSHJJIiwgImFsZyI6ICJSUzI1NiIsICJqd2siOiB7ImUiOiAiQVFBQiIsICJrdHkiOiAiUlNBIiwgIm4iOiAiMFBuamRQMFNmVmVOTWJiTVJ1MmRtbXVhck9vTEZjUDJyaUNKNnhFX3prY0VueFM4TWktdjJiVlEwNXpEWVgwS3FicXNRLU1HcWw0QmszbkhzYmJQbWtMZzFaRjBqZlR2bjNfWmNRZGhvcEM4dWM5ZlR2SzRreVRPaFYyLVBPUnNRQTBnUTVSS2xUZlk5SzlZTGZ4WVFjWUJBejdVbkNrcjh0aUJQTXFyQW9YdzM4Yldaa0FHNVFEcERubHhHMUdVSnotTWJqMzgxaU8tZnBNQVU1aS1fQ0t4REJ3SmF3eFJIaUVHMUdsMFpCdzRMdmNKNm8tRlJsRWcwem5Qd1hYWjhKZmczQWNicWhXR2JERExSRnNrUmVQdFQ5Y2tEVmg1dlNKZEx4Nkt6c0theGRIUUZJZC1WenZLQzlEQTVBcDhJaEtPc3FJQ0ZoVFBiN3ZMSG0wZm1RIn19",
  1025. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogImp1ME42N1lCSFBGZEJHaWJpQmlFZmdVSGFyTzBoT0U3OTFaX21SdmlpWW8uQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  1026. "signature": "hBgiyZMUtOSltSYoZV6KOnKMOGjmRR2lgWJwuZrsUjKkissky0wnWNY7IL4yk0kMNDs1YhAr7wRj15Z8b7ub1goQvVqDFnAqlloTvf9G-ASpri2Ippd75_iN1PN0Ud4WhXdFPd9zoZhRk4a-d7NlLp7jNHPtMtQbOHs2g_33Kx-L4VbH8L5av56p2KQ7ToXiWcyfaSXpAqtQM1NA608MOHADO9s3Rc-Lwgy3vujaOKVGnrSV0H2X8kMLAAfaC-IBnqJLfwl4ykpblamzV1OurPW1xzjsI836i9rC6L-ZJsm1lu0adQy3Rn6h7lhX-uxAeUIlFjbTZDPmqM-58XpF5g"
  1027. }
  1028. 2017-12-27 20:46:42,292:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177 HTTP/1.1" 202 341
  1029. 2017-12-27 20:46:42,293:DEBUG:acme.client:Received response:
  1030. HTTP 202
  1031. content-length: 341
  1032. cache-control: max-age=0, no-cache, no-store
  1033. expires: Wed, 27 Dec 2017 20:46:42 GMT
  1034. server: nginx
  1035. connection: keep-alive
  1036. link: <https://acme-staging.api.letsencrypt.org/acme/authz/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs>;rel="up"
  1037. location: https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177
  1038. pragma: no-cache
  1039. boulder-requester: 4864483
  1040. date: Wed, 27 Dec 2017 20:46:42 GMT
  1041. content-type: application/json
  1042. replay-nonce: X3_Os_vDTDckJxlW7QZn-Kn_WRwtKgzPolsclI35yNQ
  1043.  
  1044. {
  1045. "type": "tls-sni-01",
  1046. "status": "pending",
  1047. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177",
  1048. "token": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo",
  1049. "keyAuthorization": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  1050. }
  1051. 2017-12-27 20:46:42,294:DEBUG:acme.client:Storing nonce: X3_Os_vDTDckJxlW7QZn-Kn_WRwtKgzPolsclI35yNQ
  1052. 2017-12-27 20:46:42,295:DEBUG:acme.client:JWS payload:
  1053. {
  1054. "keyAuthorization": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1055. "type": "tls-sni-01",
  1056. "resource": "challenge"
  1057. }
  1058. 2017-12-27 20:46:42,302:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183:
  1059. {
  1060. "protected": "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",
  1061. "payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIlUzZXRPVmVXOU9NTDRPSFF1SzdNRzFBeGRRYVRBUGgtOWdSNUdVMmQ5UEUuQmlIeDNQWjJTYXJfekp0NG9pcXl5d0VYUEZ5X2hURHkyWmJhTURQczUyRSIsIAogICJ0eXBlIjogInRscy1zbmktMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9",
  1062. "signature": "qSKS_GFtXJZVnMwMVq_ehZhFao2nAU3v8PA464fCff6GznC-B5WmqTqBLtenc_fSLakyzy9WaGNmx3_FnMvtyKErW7WNSOnZPmywAO8cB9SBr92JV8qyKzS8FeRl9oiU5q5eJKa0Q_TjMVwwjNE1AcTj8sDM3xHfDnN4LngRw6AvE21HiUj7V8CWqDoyDUMOAtLm98rsXSO8tJk_lgs8RE8JqJa9bymtE-fR_D8o63UiokDS7xqN0PyoR3vKLNel4fxOYjkC8neRAj8Gpnokw1v-VKz2nobN2GbBR46yyY3XCqa-60VH--bnf5ycZSNpp0HCt5muhZdqzwQ0iflcGw"
  1063. }
  1064. 2017-12-27 20:46:42,547:DEBUG:requests.packages.urllib3.connectionpool:"POST /acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183 HTTP/1.1" 202 341
  1065. 2017-12-27 20:46:42,549:DEBUG:acme.client:Received response:
  1066. HTTP 202
  1067. content-length: 341
  1068. cache-control: max-age=0, no-cache, no-store
  1069. expires: Wed, 27 Dec 2017 20:46:42 GMT
  1070. server: nginx
  1071. connection: keep-alive
  1072. link: <https://acme-staging.api.letsencrypt.org/acme/authz/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978>;rel="up"
  1073. location: https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183
  1074. pragma: no-cache
  1075. boulder-requester: 4864483
  1076. date: Wed, 27 Dec 2017 20:46:42 GMT
  1077. content-type: application/json
  1078. replay-nonce: Ry5XAeLQCtfU7Dem03mpG-ksIbhvlwMVq3NZe-euwGA
  1079.  
  1080. {
  1081. "type": "tls-sni-01",
  1082. "status": "pending",
  1083. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183",
  1084. "token": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE",
  1085. "keyAuthorization": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E"
  1086. }
  1087. 2017-12-27 20:46:42,549:DEBUG:acme.client:Storing nonce: Ry5XAeLQCtfU7Dem03mpG-ksIbhvlwMVq3NZe-euwGA
  1088. 2017-12-27 20:46:45,553:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4.
  1089. 2017-12-27 20:46:45,775:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4 HTTP/1.1" 200 1912
  1090. 2017-12-27 20:46:45,777:DEBUG:acme.client:Received response:
  1091. HTTP 200
  1092. content-length: 1912
  1093. expires: Wed, 27 Dec 2017 20:46:45 GMT
  1094. strict-transport-security: max-age=604800
  1095. server: nginx
  1096. connection: keep-alive
  1097. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1098. pragma: no-cache
  1099. cache-control: max-age=0, no-cache, no-store
  1100. date: Wed, 27 Dec 2017 20:46:45 GMT
  1101. x-frame-options: DENY
  1102. content-type: application/json
  1103. replay-nonce: D0IGfaO3Y-0aX6rgRGgbfEpRqAW5dxhP2OgGTIlyJJM
  1104.  
  1105. {
  1106. "identifier": {
  1107. "type": "dns",
  1108. "value": "minecraft.collstrup.com"
  1109. },
  1110. "status": "invalid",
  1111. "expires": "2018-01-03T20:46:35Z",
  1112. "challenges": [
  1113. {
  1114. "type": "http-01",
  1115. "status": "pending",
  1116. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838164",
  1117. "token": "k65IpNItDa-DtZ-XyUbj-atgfyFmcqiEp6IvZcMHMuU"
  1118. },
  1119. {
  1120. "type": "tls-sni-01",
  1121. "status": "invalid",
  1122. "error": {
  1123. "type": "urn:acme:error:unauthorized",
  1124. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested 168ce7fdb53f2aecab3d0cc614a45ef4.84c1c84d4adaa9092b53aae47ce96d87.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1125. "status": 403
  1126. },
  1127. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838165",
  1128. "token": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ",
  1129. "keyAuthorization": "xKCi8bF6yVDHR9WHbZ9_n24okNGyoygarlAlBNzIIfQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1130. "validationRecord": [
  1131. {
  1132. "hostname": "minecraft.collstrup.com",
  1133. "port": "443",
  1134. "addressesResolved": [
  1135. "77.215.239.148"
  1136. ],
  1137. "addressUsed": "77.215.239.148",
  1138. "addressesTried": []
  1139. }
  1140. ]
  1141. },
  1142. {
  1143. "type": "dns-01",
  1144. "status": "pending",
  1145. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1iJQQgLnnzIMAKwaCx9HR-s9GNEOljm-EX-UrCsmUv4/86838166",
  1146. "token": "Mi-8LMhwDyT84760AtvwaCoeJrrZYvh5c2hThDPZ4Tw"
  1147. }
  1148. ],
  1149. "combinations": [
  1150. [
  1151. 2
  1152. ],
  1153. [
  1154. 0
  1155. ],
  1156. [
  1157. 1
  1158. ]
  1159. ]
  1160. }
  1161. 2017-12-27 20:46:45,779:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g.
  1162. 2017-12-27 20:46:45,997:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g HTTP/1.1" 200 1898
  1163. 2017-12-27 20:46:45,999:DEBUG:acme.client:Received response:
  1164. HTTP 200
  1165. content-length: 1898
  1166. expires: Wed, 27 Dec 2017 20:46:45 GMT
  1167. strict-transport-security: max-age=604800
  1168. server: nginx
  1169. connection: keep-alive
  1170. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1171. pragma: no-cache
  1172. cache-control: max-age=0, no-cache, no-store
  1173. date: Wed, 27 Dec 2017 20:46:45 GMT
  1174. x-frame-options: DENY
  1175. content-type: application/json
  1176. replay-nonce: Md8d5vI45ploIqHgJ8wsAON0msF2OKsWiZq-sfXs94Y
  1177.  
  1178. {
  1179. "identifier": {
  1180. "type": "dns",
  1181. "value": "nc.collstrup.com"
  1182. },
  1183. "status": "invalid",
  1184. "expires": "2018-01-03T20:46:35Z",
  1185. "challenges": [
  1186. {
  1187. "type": "http-01",
  1188. "status": "pending",
  1189. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838170",
  1190. "token": "K_0CJLmuBprcjE0s83N5wgIwbUf6SUhCFBDmME2fKVM"
  1191. },
  1192. {
  1193. "type": "tls-sni-01",
  1194. "status": "invalid",
  1195. "error": {
  1196. "type": "urn:acme:error:unauthorized",
  1197. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested e3cf2e1185c4232c35467b9d6b83b194.d307fc40f23b776cf83d232fcb6b61ab.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1198. "status": 403
  1199. },
  1200. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838171",
  1201. "token": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU",
  1202. "keyAuthorization": "yZZZR753d54sKncEkeXQfJ1mbgmXyBubzkwONacvAjU.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1203. "validationRecord": [
  1204. {
  1205. "hostname": "nc.collstrup.com",
  1206. "port": "443",
  1207. "addressesResolved": [
  1208. "77.215.239.148"
  1209. ],
  1210. "addressUsed": "77.215.239.148",
  1211. "addressesTried": []
  1212. }
  1213. ]
  1214. },
  1215. {
  1216. "type": "dns-01",
  1217. "status": "pending",
  1218. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/nrZ0-xdr9cSy1z8yUPJRMvkQdtutINAIH3Vk9Kfp5_g/86838172",
  1219. "token": "uHCSaP4jlvayxaxgFd_detwDXy3gRfPmI40EbzJAUaE"
  1220. }
  1221. ],
  1222. "combinations": [
  1223. [
  1224. 2
  1225. ],
  1226. [
  1227. 1
  1228. ],
  1229. [
  1230. 0
  1231. ]
  1232. ]
  1233. }
  1234. 2017-12-27 20:46:46,001:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA.
  1235. 2017-12-27 20:46:46,227:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA HTTP/1.1" 200 1858
  1236. 2017-12-27 20:46:46,229:DEBUG:acme.client:Received response:
  1237. HTTP 200
  1238. content-length: 1858
  1239. expires: Wed, 27 Dec 2017 20:46:46 GMT
  1240. strict-transport-security: max-age=604800
  1241. server: nginx
  1242. connection: keep-alive
  1243. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1244. pragma: no-cache
  1245. cache-control: max-age=0, no-cache, no-store
  1246. date: Wed, 27 Dec 2017 20:46:46 GMT
  1247. x-frame-options: DENY
  1248. content-type: application/json
  1249. replay-nonce: ub4QBAB5ZnJPanJ1GvS0BloZOtu5-R_13IKDzi3lovQ
  1250.  
  1251. {
  1252. "identifier": {
  1253. "type": "dns",
  1254. "value": "www.collstrup.com"
  1255. },
  1256. "status": "valid",
  1257. "expires": "2018-01-26T18:20:59Z",
  1258. "challenges": [
  1259. {
  1260. "type": "dns-01",
  1261. "status": "pending",
  1262. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809544",
  1263. "token": "UL8t4mq9SxsdYSXbDJl4HbGiqz5jaaXYq_gpOlTSnhg"
  1264. },
  1265. {
  1266. "type": "tls-sni-01",
  1267. "status": "pending",
  1268. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809545",
  1269. "token": "EE-D4Fl9pUGsJjRbfiiQmPbDB1GXLTCN9feYVKElq10"
  1270. },
  1271. {
  1272. "type": "http-01",
  1273. "status": "valid",
  1274. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/kPuSTf9vQbLtxqDvNImhTrgL4VmrkbyxIaFrJzSochA/86809546",
  1275. "token": "5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  1276. "keyAuthorization": "5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1277. "validationRecord": [
  1278. {
  1279. "url": "https://www.collstrup.com/.well-known/acme-challenge/5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  1280. "hostname": "www.collstrup.com",
  1281. "port": "443",
  1282. "addressesResolved": [
  1283. "77.215.239.148"
  1284. ],
  1285. "addressUsed": "77.215.239.148",
  1286. "addressesTried": []
  1287. },
  1288. {
  1289. "url": "http://www.collstrup.com/.well-known/acme-challenge/5BsI_ZxbQts-U_yVGpOPUvg1P91v7jroq4OSDbt6xHc",
  1290. "hostname": "www.collstrup.com",
  1291. "port": "80",
  1292. "addressesResolved": [
  1293. "77.215.239.148"
  1294. ],
  1295. "addressUsed": "77.215.239.148",
  1296. "addressesTried": []
  1297. }
  1298. ]
  1299. }
  1300. ],
  1301. "combinations": [
  1302. [
  1303. 2
  1304. ],
  1305. [
  1306. 1
  1307. ],
  1308. [
  1309. 0
  1310. ]
  1311. ]
  1312. }
  1313. 2017-12-27 20:46:46,231:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc.
  1314. 2017-12-27 20:46:46,453:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc HTTP/1.1" 200 1892
  1315. 2017-12-27 20:46:46,455:DEBUG:acme.client:Received response:
  1316. HTTP 200
  1317. content-length: 1892
  1318. expires: Wed, 27 Dec 2017 20:46:46 GMT
  1319. strict-transport-security: max-age=604800
  1320. server: nginx
  1321. connection: keep-alive
  1322. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1323. pragma: no-cache
  1324. cache-control: max-age=0, no-cache, no-store
  1325. date: Wed, 27 Dec 2017 20:46:46 GMT
  1326. x-frame-options: DENY
  1327. content-type: application/json
  1328. replay-nonce: CazKJik_TnDsvNqyZzW-EIsJ6XsxdHSy7GAw6eN4fu8
  1329.  
  1330. {
  1331. "identifier": {
  1332. "type": "dns",
  1333. "value": "collstrup.com"
  1334. },
  1335. "status": "invalid",
  1336. "expires": "2018-01-03T20:46:34Z",
  1337. "challenges": [
  1338. {
  1339. "type": "dns-01",
  1340. "status": "pending",
  1341. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838155",
  1342. "token": "soEOnUS4n1U5yyKOssK8zKVEAydych7cmAXEXCpHL2U"
  1343. },
  1344. {
  1345. "type": "tls-sni-01",
  1346. "status": "invalid",
  1347. "error": {
  1348. "type": "urn:acme:error:unauthorized",
  1349. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested b2c745050edbf30027126bb216dca681.062ea705dbda1cc6a238f46fcb6da2c9.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1350. "status": 403
  1351. },
  1352. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838156",
  1353. "token": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ",
  1354. "keyAuthorization": "-iA17BJ7IDQPrPWpMMsI2Q50QxKmmlSepE-57ngiTRQ.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1355. "validationRecord": [
  1356. {
  1357. "hostname": "collstrup.com",
  1358. "port": "443",
  1359. "addressesResolved": [
  1360. "77.215.239.148"
  1361. ],
  1362. "addressUsed": "77.215.239.148",
  1363. "addressesTried": []
  1364. }
  1365. ]
  1366. },
  1367. {
  1368. "type": "http-01",
  1369. "status": "pending",
  1370. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/PAa9qCzp6NU_jSEanW7jRjnTmCT-WyT5bMmuyq2AvJc/86838157",
  1371. "token": "Qx98hjZEY82y7kj6jK2nYcF5R1j9ydRMPSYVyjhlUYE"
  1372. }
  1373. ],
  1374. "combinations": [
  1375. [
  1376. 1
  1377. ],
  1378. [
  1379. 0
  1380. ],
  1381. [
  1382. 2
  1383. ]
  1384. ]
  1385. }
  1386. 2017-12-27 20:46:46,457:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978.
  1387. 2017-12-27 20:46:46,687:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978 HTTP/1.1" 200 1900
  1388. 2017-12-27 20:46:46,688:DEBUG:acme.client:Received response:
  1389. HTTP 200
  1390. content-length: 1900
  1391. expires: Wed, 27 Dec 2017 20:46:46 GMT
  1392. strict-transport-security: max-age=604800
  1393. server: nginx
  1394. connection: keep-alive
  1395. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1396. pragma: no-cache
  1397. cache-control: max-age=0, no-cache, no-store
  1398. date: Wed, 27 Dec 2017 20:46:46 GMT
  1399. x-frame-options: DENY
  1400. content-type: application/json
  1401. replay-nonce: FBBIr36KRIjFVWweZb-w-sHxG49zFh5XPp6eJCncvZg
  1402.  
  1403. {
  1404. "identifier": {
  1405. "type": "dns",
  1406. "value": "vpn.collstrup.com"
  1407. },
  1408. "status": "invalid",
  1409. "expires": "2018-01-03T20:46:36Z",
  1410. "challenges": [
  1411. {
  1412. "type": "dns-01",
  1413. "status": "pending",
  1414. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838182",
  1415. "token": "pv3sFAeXQvR1EJSbOSYQeimRzVjGg8nCk7gQ5xYy4xQ"
  1416. },
  1417. {
  1418. "type": "tls-sni-01",
  1419. "status": "invalid",
  1420. "error": {
  1421. "type": "urn:acme:error:unauthorized",
  1422. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested 828f9d1107a55c87e15c3fc187189c60.d0b4243178634ce1bb3c7c17cbbc49b5.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1423. "status": 403
  1424. },
  1425. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838183",
  1426. "token": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE",
  1427. "keyAuthorization": "U3etOVeW9OML4OHQuK7MG1AxdQaTAPh-9gR5GU2d9PE.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1428. "validationRecord": [
  1429. {
  1430. "hostname": "vpn.collstrup.com",
  1431. "port": "443",
  1432. "addressesResolved": [
  1433. "77.215.239.148"
  1434. ],
  1435. "addressUsed": "77.215.239.148",
  1436. "addressesTried": []
  1437. }
  1438. ]
  1439. },
  1440. {
  1441. "type": "http-01",
  1442. "status": "pending",
  1443. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/1N3W-13X0TnLf_ZVo3-musfNJGmAEPb54bj7V_4w978/86838184",
  1444. "token": "YE-xzjU_xkkBnb2SIbnc3narQNPrwK8l--w3bRN3Bu0"
  1445. }
  1446. ],
  1447. "combinations": [
  1448. [
  1449. 0
  1450. ],
  1451. [
  1452. 2
  1453. ],
  1454. [
  1455. 1
  1456. ]
  1457. ]
  1458. }
  1459. 2017-12-27 20:46:46,691:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8.
  1460. 2017-12-27 20:46:46,911:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8 HTTP/1.1" 200 1912
  1461. 2017-12-27 20:46:46,913:DEBUG:acme.client:Received response:
  1462. HTTP 200
  1463. content-length: 1912
  1464. expires: Wed, 27 Dec 2017 20:46:46 GMT
  1465. strict-transport-security: max-age=604800
  1466. server: nginx
  1467. connection: keep-alive
  1468. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1469. pragma: no-cache
  1470. cache-control: max-age=0, no-cache, no-store
  1471. date: Wed, 27 Dec 2017 20:46:46 GMT
  1472. x-frame-options: DENY
  1473. content-type: application/json
  1474. replay-nonce: D4kr5y5-nDNrhX4g1tkcZLheigQObF6sRvKCHIQCwaA
  1475.  
  1476. {
  1477. "identifier": {
  1478. "type": "dns",
  1479. "value": "nextcloud.collstrup.com"
  1480. },
  1481. "status": "invalid",
  1482. "expires": "2018-01-03T20:46:35Z",
  1483. "challenges": [
  1484. {
  1485. "type": "dns-01",
  1486. "status": "pending",
  1487. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838173",
  1488. "token": "uwGNti1cptNfNBsspYv-zNxvEupMbKCV-l5VKQwXaMM"
  1489. },
  1490. {
  1491. "type": "tls-sni-01",
  1492. "status": "invalid",
  1493. "error": {
  1494. "type": "urn:acme:error:unauthorized",
  1495. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested 450ec3a542b91a6bc13972fc2369283f.ff57c22698e78f731384df952052199f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1496. "status": 403
  1497. },
  1498. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838174",
  1499. "token": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4",
  1500. "keyAuthorization": "XQ4TlW12akkJkEKjbjz2Ka2hcxHItO2Q1Nr1m2o4MQ4.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1501. "validationRecord": [
  1502. {
  1503. "hostname": "nextcloud.collstrup.com",
  1504. "port": "443",
  1505. "addressesResolved": [
  1506. "77.215.239.148"
  1507. ],
  1508. "addressUsed": "77.215.239.148",
  1509. "addressesTried": []
  1510. }
  1511. ]
  1512. },
  1513. {
  1514. "type": "http-01",
  1515. "status": "pending",
  1516. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/qCmctMLV1yAy7IGvSMQffBmWQJZxr8GC7wLX85apSb8/86838175",
  1517. "token": "egLECQ7hBVmDY_WOVz7g7Uorm9Q4xol6C6GMHj1nV1M"
  1518. }
  1519. ],
  1520. "combinations": [
  1521. [
  1522. 0
  1523. ],
  1524. [
  1525. 1
  1526. ],
  1527. [
  1528. 2
  1529. ]
  1530. ]
  1531. }
  1532. 2017-12-27 20:46:46,915:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k.
  1533. 2017-12-27 20:46:47,137:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k HTTP/1.1" 200 1902
  1534. 2017-12-27 20:46:47,138:DEBUG:acme.client:Received response:
  1535. HTTP 200
  1536. content-length: 1902
  1537. expires: Wed, 27 Dec 2017 20:46:47 GMT
  1538. strict-transport-security: max-age=604800
  1539. server: nginx
  1540. connection: keep-alive
  1541. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1542. pragma: no-cache
  1543. cache-control: max-age=0, no-cache, no-store
  1544. date: Wed, 27 Dec 2017 20:46:47 GMT
  1545. x-frame-options: DENY
  1546. content-type: application/json
  1547. replay-nonce: JjqV38HUXhNDTeLD-jbns8GcRM9ujbz2kEizwjjkanU
  1548.  
  1549. {
  1550. "identifier": {
  1551. "type": "dns",
  1552. "value": "mail.collstrup.com"
  1553. },
  1554. "status": "invalid",
  1555. "expires": "2018-01-03T20:46:34Z",
  1556. "challenges": [
  1557. {
  1558. "type": "http-01",
  1559. "status": "pending",
  1560. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838158",
  1561. "token": "KQVTJvgqFfCRg1Shvvuc8r5Ci_ZBnHO4Ja_JFj2d6kM"
  1562. },
  1563. {
  1564. "type": "tls-sni-01",
  1565. "status": "invalid",
  1566. "error": {
  1567. "type": "urn:acme:error:unauthorized",
  1568. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested 4ea4d53834bcf58de66a64d61aa75d94.26926b981d29346adb6568298501405f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1569. "status": 403
  1570. },
  1571. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838159",
  1572. "token": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI",
  1573. "keyAuthorization": "iZ_RNsRLIOIpnG29R-IWtMoNCOWB-ZH8gvw403rr7qI.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1574. "validationRecord": [
  1575. {
  1576. "hostname": "mail.collstrup.com",
  1577. "port": "443",
  1578. "addressesResolved": [
  1579. "77.215.239.148"
  1580. ],
  1581. "addressUsed": "77.215.239.148",
  1582. "addressesTried": []
  1583. }
  1584. ]
  1585. },
  1586. {
  1587. "type": "dns-01",
  1588. "status": "pending",
  1589. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/b3l2FF44qcs1LAl7jSJbTXNBZXjbkhqTvgH-wv15w1k/86838160",
  1590. "token": "1euWOQHIopySNCwMBgm8yekW28g600GkhZPgepEJxGw"
  1591. }
  1592. ],
  1593. "combinations": [
  1594. [
  1595. 0
  1596. ],
  1597. [
  1598. 2
  1599. ],
  1600. [
  1601. 1
  1602. ]
  1603. ]
  1604. }
  1605. 2017-12-27 20:46:47,141:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs.
  1606. 2017-12-27 20:46:47,361:DEBUG:requests.packages.urllib3.connectionpool:"GET /acme/authz/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs HTTP/1.1" 200 1902
  1607. 2017-12-27 20:46:47,363:DEBUG:acme.client:Received response:
  1608. HTTP 200
  1609. content-length: 1902
  1610. expires: Wed, 27 Dec 2017 20:46:47 GMT
  1611. strict-transport-security: max-age=604800
  1612. server: nginx
  1613. connection: keep-alive
  1614. link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next"
  1615. pragma: no-cache
  1616. cache-control: max-age=0, no-cache, no-store
  1617. date: Wed, 27 Dec 2017 20:46:47 GMT
  1618. x-frame-options: DENY
  1619. content-type: application/json
  1620. replay-nonce: J3LhGKHIu_zivcTcS8mnv96Mdn2CPqWisc_cgxO0GpU
  1621.  
  1622. {
  1623. "identifier": {
  1624. "type": "dns",
  1625. "value": "plex.collstrup.com"
  1626. },
  1627. "status": "invalid",
  1628. "expires": "2018-01-03T20:46:35Z",
  1629. "challenges": [
  1630. {
  1631. "type": "http-01",
  1632. "status": "pending",
  1633. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838176",
  1634. "token": "YaNKw5mSD82099MkgXL9NEDh1Eu8SLmdfKABIFQiOTs"
  1635. },
  1636. {
  1637. "type": "tls-sni-01",
  1638. "status": "invalid",
  1639. "error": {
  1640. "type": "urn:acme:error:unauthorized",
  1641. "detail": "Incorrect validation certificate for tls-sni-01 challenge. Requested 6bc0f4a33022635703e7f1245300534a.72ff90c78ce9bc213da5c5b76fa64193.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names \"collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com\"",
  1642. "status": 403
  1643. },
  1644. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838177",
  1645. "token": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo",
  1646. "keyAuthorization": "ju0N67YBHPFdBGibiBiEfgUHarO0hOE791Z_mRviiYo.BiHx3PZ2Sar_zJt4oiqyywEXPFy_hTDy2ZbaMDPs52E",
  1647. "validationRecord": [
  1648. {
  1649. "hostname": "plex.collstrup.com",
  1650. "port": "443",
  1651. "addressesResolved": [
  1652. "77.215.239.148"
  1653. ],
  1654. "addressUsed": "77.215.239.148",
  1655. "addressesTried": []
  1656. }
  1657. ]
  1658. },
  1659. {
  1660. "type": "dns-01",
  1661. "status": "pending",
  1662. "uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/2vmCjtn9CqDz82ThCdiQ-D03cQedNBbHJs57nMJqNKs/86838178",
  1663. "token": "1cAY4-2fxMrE5CSntcI4cyRBz6WsKFQTO4kuZZnqpJM"
  1664. }
  1665. ],
  1666. "combinations": [
  1667. [
  1668. 1
  1669. ],
  1670. [
  1671. 2
  1672. ],
  1673. [
  1674. 0
  1675. ]
  1676. ]
  1677. }
  1678. 2017-12-27 20:46:47,365:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
  1679.  
  1680. Domain: nextcloud.collstrup.com
  1681. Type: unauthorized
  1682. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested 450ec3a542b91a6bc13972fc2369283f.ff57c22698e78f731384df952052199f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1683.  
  1684. Domain: minecraft.collstrup.com
  1685. Type: unauthorized
  1686. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested 168ce7fdb53f2aecab3d0cc614a45ef4.84c1c84d4adaa9092b53aae47ce96d87.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1687.  
  1688. Domain: collstrup.com
  1689. Type: unauthorized
  1690. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested b2c745050edbf30027126bb216dca681.062ea705dbda1cc6a238f46fcb6da2c9.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1691.  
  1692. Domain: vpn.collstrup.com
  1693. Type: unauthorized
  1694. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested 828f9d1107a55c87e15c3fc187189c60.d0b4243178634ce1bb3c7c17cbbc49b5.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1695.  
  1696. Domain: nc.collstrup.com
  1697. Type: unauthorized
  1698. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested e3cf2e1185c4232c35467b9d6b83b194.d307fc40f23b776cf83d232fcb6b61ab.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1699.  
  1700. Domain: mail.collstrup.com
  1701. Type: unauthorized
  1702. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested 4ea4d53834bcf58de66a64d61aa75d94.26926b981d29346adb6568298501405f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1703.  
  1704. Domain: plex.collstrup.com
  1705. Type: unauthorized
  1706. Detail: Incorrect validation certificate for tls-sni-01 challenge. Requested 6bc0f4a33022635703e7f1245300534a.72ff90c78ce9bc213da5c5b76fa64193.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1707.  
  1708. To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
  1709. 2017-12-27 20:46:47,366:INFO:certbot.auth_handler:Cleaning up challenges
  1710. 2017-12-27 20:46:47,582:WARNING:certbot.renewal:Attempting to renew cert (www.collstrup.com) from /etc/letsencrypt/renewal/www.collstrup.com.conf produced an unexpected error: Failed authorization procedure. nextcloud.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 450ec3a542b91a6bc13972fc2369283f.ff57c22698e78f731384df952052199f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", minecraft.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 168ce7fdb53f2aecab3d0cc614a45ef4.84c1c84d4adaa9092b53aae47ce96d87.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested b2c745050edbf30027126bb216dca681.062ea705dbda1cc6a238f46fcb6da2c9.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", vpn.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 828f9d1107a55c87e15c3fc187189c60.d0b4243178634ce1bb3c7c17cbbc49b5.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", nc.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested e3cf2e1185c4232c35467b9d6b83b194.d307fc40f23b776cf83d232fcb6b61ab.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", mail.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 4ea4d53834bcf58de66a64d61aa75d94.26926b981d29346adb6568298501405f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", plex.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 6bc0f4a33022635703e7f1245300534a.72ff90c78ce9bc213da5c5b76fa64193.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com". Skipping.
  1711. 2017-12-27 20:46:47,583:DEBUG:certbot.renewal:Traceback was:
  1712. Traceback (most recent call last):
  1713. File "/usr/lib/python2.7/site-packages/certbot/renewal.py", line 425, in handle_renewal_request
  1714. main.renew_cert(lineage_config, plugins, renewal_candidate)
  1715. File "/usr/lib/python2.7/site-packages/certbot/main.py", line 743, in renew_cert
  1716. _get_and_save_cert(le_client, config, lineage=lineage)
  1717. File "/usr/lib/python2.7/site-packages/certbot/main.py", line 80, in _get_and_save_cert
  1718. renewal.renew_cert(config, domains, le_client, lineage)
  1719. File "/usr/lib/python2.7/site-packages/certbot/renewal.py", line 297, in renew_cert
  1720. new_certr, new_chain, new_key, _ = le_client.obtain_certificate(domains)
  1721. File "/usr/lib/python2.7/site-packages/certbot/client.py", line 318, in obtain_certificate
  1722. self.config.allow_subset_of_names)
  1723. File "/usr/lib/python2.7/site-packages/certbot/auth_handler.py", line 81, in get_authorizations
  1724. self._respond(resp, best_effort)
  1725. File "/usr/lib/python2.7/site-packages/certbot/auth_handler.py", line 138, in _respond
  1726. self._poll_challenges(chall_update, best_effort)
  1727. File "/usr/lib/python2.7/site-packages/certbot/auth_handler.py", line 202, in _poll_challenges
  1728. raise errors.FailedChallenges(all_failed_achalls)
  1729. FailedChallenges: Failed authorization procedure. nextcloud.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 450ec3a542b91a6bc13972fc2369283f.ff57c22698e78f731384df952052199f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", minecraft.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 168ce7fdb53f2aecab3d0cc614a45ef4.84c1c84d4adaa9092b53aae47ce96d87.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested b2c745050edbf30027126bb216dca681.062ea705dbda1cc6a238f46fcb6da2c9.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", vpn.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 828f9d1107a55c87e15c3fc187189c60.d0b4243178634ce1bb3c7c17cbbc49b5.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", nc.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested e3cf2e1185c4232c35467b9d6b83b194.d307fc40f23b776cf83d232fcb6b61ab.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", mail.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 4ea4d53834bcf58de66a64d61aa75d94.26926b981d29346adb6568298501405f.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com", plex.collstrup.com (tls-sni-01): urn:acme:error:unauthorized :: The client lacks sufficient authorization :: Incorrect validation certificate for tls-sni-01 challenge. Requested 6bc0f4a33022635703e7f1245300534a.72ff90c78ce9bc213da5c5b76fa64193.acme.invalid from 77.215.239.148:443. Received 2 certificate(s), first certificate had names "collstrup.com, mail.collstrup.com, minecraft.collstrup.com, nc.collstrup.com, nextcloud.collstrup.com, plex.collstrup.com, vpn.collstrup.com, www.collstrup.com"
  1730.  
  1731. 2017-12-27 20:46:47,583:ERROR:certbot.renewal:All renewal attempts failed. The following certs could not be renewed:
  1732. 2017-12-27 20:46:47,583:ERROR:certbot.renewal: /etc/letsencrypt/live/www.collstrup.com/fullchain.pem (failure)
  1733. 2017-12-27 20:46:47,583:DEBUG:certbot.log:Exiting abnormally:
  1734. Traceback (most recent call last):
  1735. File "/bin/certbot", line 9, in <module>
  1736. load_entry_point('certbot==0.19.0', 'console_scripts', 'certbot')()
  1737. File "/usr/lib/python2.7/site-packages/certbot/main.py", line 861, in main
  1738. return config.func(config, plugins)
  1739. File "/usr/lib/python2.7/site-packages/certbot/main.py", line 797, in renew
  1740. renewal.handle_renewal_request(config)
  1741. File "/usr/lib/python2.7/site-packages/certbot/renewal.py", line 443, in handle_renewal_request
  1742. len(renew_failures), len(parse_failures)))
  1743. Error: 1 renew failure(s), 0 parse failure(s)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement