Advertisement
Guest User

Untitled

a guest
Mar 15th, 2023
41
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.80 KB | None | 0 0
  1. 2023-03-15 17:30:23,262:DEBUG:acme.client:Storing nonce: F977jnK19goygEATTiwAIDZYW7blMZ54F2FTFsIYPM1154c
  2. 2023-03-15 17:30:23,262:INFO:certbot._internal.auth_handler:Performing the following challenges:
  3. 2023-03-15 17:30:23,262:INFO:certbot._internal.auth_handler:http-01 challenge for oracle.fireballdev.tech
  4. 2023-03-15 17:30:23,262:DEBUG:acme.standalone:Successfully bound to :80 using IPv6
  5. 2023-03-15 17:30:23,263:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations.
  6. 2023-03-15 17:30:23,264:DEBUG:acme.client:JWS payload:
  7. b'{}'
  8. 2023-03-15 17:30:23,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/211107521487/3HwLSA:
  9. {
  10. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAxMDc0NzM3NyIsICJub25jZSI6ICJGOTc3am5LMTlnb3lnRUFUVGl3QUlEWllXN2JsTVo1NEYyRlRGc0lZUE0xMTU0YyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjExMTA3NTIxNDg3LzNId0xTQSJ9",
  11. "signature": "K4U0PMv5Gc1xRq6ilYhXbdO_IGMshGSacxI0TwotP1J84SxcjG52LdIjwyGsDJgtoHeG9xeEF4YT5JAp8JIKxD8fUYrk3HOoJ_y22FSpLIV4CGG1HHlBytmy2ADQ3fWlMhIN5SBsHMc0281JqbTIqtkY2bUCfd4IfKflDzrMmrD0YUS-l8mQyGySVzNYc0UzitHTUjC4OrmQJZVa-HENsykchAmhYfO0ixy5RQM3rs4mVLNMOi-nh53r0945xtveyIslxfLPTJJaEyU56V0L5Di-p_mEMsgu22WkP77YEcYimXaAquZF_Jq1bRgR0gLGaFFGMUQjZ5XPCf6c_2DNPw",
  12. "payload": "e30"
  13. }
  14. 2023-03-15 17:30:23,432:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/211107521487/3HwLSA HTTP/1.1" 200 187
  15. 2023-03-15 17:30:23,433:DEBUG:acme.client:Received response:
  16. HTTP 200
  17. Server: nginx
  18. Date: Wed, 15 Mar 2023 17:30:23 GMT
  19. Content-Type: application/json
  20. Content-Length: 187
  21. Connection: keep-alive
  22. Boulder-Requester: 1010747377
  23. Cache-Control: public, max-age=0, no-cache
  24. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/211107521487>;rel="up"
  25. Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/211107521487/3HwLSA
  26. Replay-Nonce: 853FO3uNeeQbUu9r3GAgS7JAh09GJwSxjfifeHUWGCmMTfo
  27. X-Frame-Options: DENY
  28. Strict-Transport-Security: max-age=604800
  29.  
  30. {
  31. "type": "http-01",
  32. "status": "pending",
  33. "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/211107521487/3HwLSA",
  34. "token": "JC_Xv4_0VyceYVH7V3FoLaW-n6qGfimI5BbQC63ySkk"
  35. }
  36. 2023-03-15 17:30:23,433:DEBUG:acme.client:Storing nonce: 853FO3uNeeQbUu9r3GAgS7JAh09GJwSxjfifeHUWGCmMTfo
  37. 2023-03-15 17:30:23,433:INFO:certbot._internal.auth_handler:Waiting for verification...
  38. 2023-03-15 17:30:24,434:DEBUG:acme.client:JWS payload:
  39. b''
  40. 2023-03-15 17:30:24,438:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/211107521487:
  41. {
  42. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTAxMDc0NzM3NyIsICJub25jZSI6ICI4NTNGTzN1TmVlUWJVdTlyM0dBZ1M3SkFoMDlHSndTeGpmaWZlSFVXR0NtTVRmbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjExMTA3NTIxNDg3In0",
  43. "signature": "SVl20qV_hyjW8o3NTQdhwP3s3AfBUjldCJPNua645hhJ5hSUINrueThUxx1duFJ9QYn9XHEU6iBJneBqsxsUhBhCAO7bt6BtfObWK8-7yniBe6UJTYgpPwRfBwwXDivoQ2-yBEP2uPXmo8XInEny5RGwLnYW6ExmM1_98pwsSWASY9-m08aFZDoIqW4pTEk1X_s6RBzGEyTW0tMQR_fhsPwk6XK9OsmJ7VBoO6WdP9i5cFLlRZ4x38JsTvxkw9qUkbS4gdMrIKwpeecS-VI8-2CWkD8AWr_LdYexQ_wh_YZVfc8SlIzeQDnl4dYmuiOeLhwQqaCkLW7WsUUHGRh95A",
  44. "payload": ""
  45. }
  46. 2023-03-15 17:30:24,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/211107521487 HTTP/1.1" 200 1074
  47. 2023-03-15 17:30:24,604:DEBUG:acme.client:Received response:
  48. HTTP 200
  49. Server: nginx
  50. Date: Wed, 15 Mar 2023 17:30:24 GMT
  51. Content-Type: application/json
  52. Content-Length: 1074
  53. Connection: keep-alive
  54. Boulder-Requester: 1010747377
  55. Cache-Control: public, max-age=0, no-cache
  56. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
  57. Replay-Nonce: A5FEaRuyg8dFG0CK5s1gh8G3IWjb3BAcN8hzYWHgnW84ZgY
  58. X-Frame-Options: DENY
  59. Strict-Transport-Security: max-age=604800
  60.  
  61. {
  62. "identifier": {
  63. "type": "dns",
  64. "value": "oracle.fireballdev.tech"
  65. },
  66. "status": "invalid",
  67. "expires": "2023-03-22T17:30:22Z",
  68. "challenges": [
  69. {
  70. "type": "http-01",
  71. "status": "invalid",
  72. "error": {
  73. "type": "urn:ietf:params:acme:error:connection",
  74. "detail": "130.61.120.104: Fetching http://oracle.fireballdev.tech/.well-known/acme-challenge/JC_Xv4_0VyceYVH7V3FoLaW-n6qGfimI5BbQC63ySkk: Error getting validation data",
  75. "status": 400
  76. },
  77. "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/211107521487/3HwLSA",
  78. "token": "JC_Xv4_0VyceYVH7V3FoLaW-n6qGfimI5BbQC63ySkk",
  79. "validationRecord": [
  80. {
  81. "url": "http://oracle.fireballdev.tech/.well-known/acme-challenge/JC_Xv4_0VyceYVH7V3FoLaW-n6qGfimI5BbQC63ySkk",
  82. "hostname": "oracle.fireballdev.tech",
  83. "port": "80",
  84. "addressesResolved": [
  85. "130.61.120.104"
  86. ],
  87. "addressUsed": "130.61.120.104"
  88. }
  89. ],
  90. "validated": "2023-03-15T17:30:23Z"
  91. }
  92. ]
  93. }
  94. 2023-03-15 17:30:24,605:DEBUG:acme.client:Storing nonce: A5FEaRuyg8dFG0CK5s1gh8G3IWjb3BAcN8hzYWHgnW84ZgY
  95. 2023-03-15 17:30:24,605:INFO:certbot._internal.auth_handler:Challenge failed for domain oracle.fireballdev.tech
  96. 2023-03-15 17:30:24,605:INFO:certbot._internal.auth_handler:http-01 challenge for oracle.fireballdev.tech
  97. 2023-03-15 17:30:24,605:DEBUG:certbot._internal.display.obj:Notifying user:
  98. Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
  99. Domain: oracle.fireballdev.tech
  100. Type: connection
  101. Detail: 130.61.120.104: Fetching http://oracle.fireballdev.tech/.well-known/acme-challenge/JC_Xv4_0VyceYVH7V3FoLaW-n6qGfimI5BbQC63ySkk: Error getting validation data
  102.  
  103. Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.
  104.  
  105. 2023-03-15 17:30:24,606:DEBUG:certbot._internal.error_handler:Encountered exception:
  106. Traceback (most recent call last):
  107. File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations
  108. self._poll_authorizations(authzrs, max_retries, best_effort)
  109. File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations
  110. raise errors.AuthorizationError('Some challenges have failed.')
  111. certbot.errors.AuthorizationError: Some challenges have failed.
  112.  
  113. 2023-03-15 17:30:24,606:DEBUG:certbot._internal.error_handler:Calling registered functions
  114. 2023-03-15 17:30:24,606:INFO:certbot._internal.auth_handler:Cleaning up challenges
  115. 2023-03-15 17:30:24,606:DEBUG:certbot._internal.plugins.standalone:Stopping server at :::80...
  116. 2023-03-15 17:30:24,765:DEBUG:certbot._internal.log:Exiting abnormally:
  117. Traceback (most recent call last):
  118. File "/usr/bin/certbot", line 33, in <module>
  119. sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')())
  120. File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main
  121. return internal_main.main(cli_args)
  122. File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main
  123. return config.func(config, plugins)
  124. File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly
  125. lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
  126. File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert
  127. lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  128. File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate
  129. cert, chain, key, _ = self.obtain_certificate(domains)
  130. File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate
  131. orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  132. File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations
  133. authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
  134. File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations
  135. self._poll_authorizations(authzrs, max_retries, best_effort)
  136. File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations
  137. raise errors.AuthorizationError('Some challenges have failed.')
  138. certbot.errors.AuthorizationError: Some challenges have failed.
  139. 2023-03-15 17:30:24,766:ERROR:certbot._internal.log:Some challenges have failed.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement