Advertisement
Guest User

Untitled

a guest
Apr 13th, 2022
49
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 41.84 KB | None | 0 0
  1. root@proxy:/etc/letsencrypt# certbot certonly -v --dry-run -d doublebacon.de
  2. Root logging level set at 10
  3. Saving debug log to /var/log/letsencrypt/letsencrypt.log
  4. Requested authenticator None and installer None
  5. Multiple candidate plugins: * dns-cloudflare
  6. Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS).
  7. Interfaces: IAuthenticator, IPlugin
  8. Entry point: dns-cloudflare = certbot_dns_cloudflare.dns_cloudflare:Authenticator
  9. Initialized: <certbot_dns_cloudflare.dns_cloudflare.Authenticator object at 0x7ffac341da90>
  10. Prep: True
  11.  
  12. * nginx
  13. Description: Nginx Web Server plugin - Alpha
  14. Interfaces: IAuthenticator, IInstaller, IPlugin
  15. Entry point: nginx = certbot_nginx.configurator:NginxConfigurator
  16. Initialized: <certbot_nginx.configurator.NginxConfigurator object at 0x7ffac341db00>
  17. Prep: True
  18.  
  19. * standalone
  20. Description: Spin up a temporary webserver
  21. Interfaces: IAuthenticator, IPlugin
  22. Entry point: standalone = certbot.plugins.standalone:Authenticator
  23. Initialized: <certbot.plugins.standalone.Authenticator object at 0x7ffac3693ac8>
  24. Prep: True
  25.  
  26. * webroot
  27. Description: Place files in webroot directory
  28. Interfaces: IAuthenticator, IPlugin
  29. Entry point: webroot = certbot.plugins.webroot:Authenticator
  30. Initialized: <certbot.plugins.webroot.Authenticator object at 0x7ffac31f6a20>
  31. Prep: True
  32.  
  33. How would you like to authenticate with the ACME CA?
  34. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  35. 1: Obtain certificates using a DNS TXT record (if you are using Cloudflare for
  36. DNS). (dns-cloudflare)
  37. 2: Nginx Web Server plugin - Alpha (nginx)
  38. 3: Spin up a temporary webserver (standalone)
  39. 4: Place files in webroot directory (webroot)
  40. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  41. Select the appropriate number [1-4] then [enter] (press 'c' to cancel): 2
  42. Selected authenticator <certbot_nginx.configurator.NginxConfigurator object at 0x7ffac341db00> and installer None
  43. Plugins selected: Authenticator nginx, Installer None
  44. Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7ffac3154b70>)>), contact=(), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-staging-v02.api.letsencrypt.org/acme/acct/8139868', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'), 672d3587710a6367f0dacbfae5f63a9f, Meta(creation_dt=datetime.datetime(2019, 2, 5, 21, 15, 13, tzinfo=<UTC>), creation_host='proxy'))>
  45. Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory.
  46. Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org
  47. https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 822
  48. Received response:
  49. HTTP 200
  50. Server: nginx
  51. Date: Wed, 13 Apr 2022 12:20:28 GMT
  52. Content-Type: application/json
  53. Content-Length: 822
  54. Connection: keep-alive
  55. Cache-Control: public, max-age=0, no-cache
  56. X-Frame-Options: DENY
  57. Strict-Transport-Security: max-age=604800
  58.  
  59. {
  60. "We2OCydcJk0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  61. "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
  62. "meta": {
  63. "caaIdentities": [
  64. "letsencrypt.org"
  65. ],
  66. "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
  67. "website": "https://letsencrypt.org/docs/staging-environment/"
  68. },
  69. "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
  70. "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
  71. "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
  72. "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-aaron-ari/renewalInfo/",
  73. "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
  74. }
  75. Obtaining a new certificate
  76. Requesting fresh nonce
  77. Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce.
  78. https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
  79. Received response:
  80. HTTP 200
  81. Server: nginx
  82. Date: Wed, 13 Apr 2022 12:20:28 GMT
  83. Connection: keep-alive
  84. Cache-Control: public, max-age=0, no-cache
  85. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  86. Replay-Nonce: 0002jRYhP9ovhLsI6fWqjJyGEn3D5C62w1bpIh6p-rxGUh8
  87. X-Frame-Options: DENY
  88. Strict-Transport-Security: max-age=604800
  89.  
  90.  
  91. Storing nonce: 0002jRYhP9ovhLsI6fWqjJyGEn3D5C62w1bpIh6p-rxGUh8
  92. JWS payload:
  93. b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "doublebacon.de"\n }\n ]\n}'
  94. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order:
  95. {
  96. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDJqUlloUDlvdmhMc0k2Zldxakp5R0VuM0Q1QzYydzFicEloNnAtcnhHVWg4IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
  97. "signature": "4fDaFIYSsi9OKHdQUqnI8t4hhcL14mzcjGxIlyyjGZZ4klVhwheX-52iAwTdUnKsI8J8wWXZ9sZwww8A65mY_4xXeLmu9XYvZbYKtYm8ZrjO3tmmX3geZYJZ-EUWWmbfrCJySfxmFAsgAyN_DCCZ-efMudaLBRRUbKWZfBbiBAkZNsRPR2FQ9hfwpXmVUYeT5Vd-GVJ3OMQF5tw6-S7_QJ_ubE7tyNneOmXPBVFVvrvTdzisBzjHaOslBrsm_ee-VPF7tccEyM9Jzz0T1_K6ElWeViNy4uv38Ngjr7xf9a9V64MhlW4xRh2UebtkIK7VcjizAgFjm4M-2bU-mvXgLg",
  98. "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRvdWJsZWJhY29uLmRlIgogICAgfQogIF0KfQ"
  99. }
  100. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
  101. Received response:
  102. HTTP 201
  103. Server: nginx
  104. Date: Wed, 13 Apr 2022 12:20:29 GMT
  105. Content-Type: application/json
  106. Content-Length: 349
  107. Connection: keep-alive
  108. Boulder-Requester: 8139868
  109. Cache-Control: public, max-age=0, no-cache
  110. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  111. Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/8139868/2296278888
  112. Replay-Nonce: 0001nT1cNkj2pGmyWAcu_1Borr37guHfEtQB307mAYOs1y0
  113. X-Frame-Options: DENY
  114. Strict-Transport-Security: max-age=604800
  115.  
  116. {
  117. "status": "pending",
  118. "expires": "2022-04-20T12:20:29Z",
  119. "identifiers": [
  120. {
  121. "type": "dns",
  122. "value": "doublebacon.de"
  123. }
  124. ],
  125. "authorizations": [
  126. "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658"
  127. ],
  128. "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/8139868/2296278888"
  129. }
  130. Storing nonce: 0001nT1cNkj2pGmyWAcu_1Borr37guHfEtQB307mAYOs1y0
  131. JWS payload:
  132. b''
  133. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  134. {
  135. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDFuVDFjTmtqMnBHbXlXQWN1XzFCb3JyMzdndUhmRXRRQjMwN21BWU9zMXkwIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  136. "signature": "0UTI-dY-ijTEAOmrv4RfmWvqYrlCFVKTIwAWLLpgCU4-XD1XQGXPMZqyp-5szDv-0QEa4pzIOAW39g-61KRbY7-yheJ7G3k4bIlyhITaVychjeQ-h4V_BGsqJSn0FnvqCrdk2UCdMUtoUtxwSWgrOQmslKg4sGlj7IEW73l7XrT3TeF1UZbY5TuTJR2XbTGG4hqAQdAmJnPuE7cyVQX-UebMswzWF9rTTSiVxVX2Wlv9lX4NDmfVAGLLutChvBqFW2yW6QYTmwmKuBxFYkWwDqii15zDsDjeqf2TBwXguSp5s62Ntdh4bOklvzoUJZTe0ft7E9ViRa0YzT47zNLBtQ",
  137. "payload": ""
  138. }
  139. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  140. Received response:
  141. HTTP 200
  142. Server: nginx
  143. Date: Wed, 13 Apr 2022 12:20:29 GMT
  144. Content-Type: application/json
  145. Content-Length: 816
  146. Connection: keep-alive
  147. Boulder-Requester: 8139868
  148. Cache-Control: public, max-age=0, no-cache
  149. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  150. Replay-Nonce: 0001NjFTSW1Y4zTkNZ8LS0wpdDm7xRXdXYYvi8UV6kUpU8Y
  151. X-Frame-Options: DENY
  152. Strict-Transport-Security: max-age=604800
  153.  
  154. {
  155. "identifier": {
  156. "type": "dns",
  157. "value": "doublebacon.de"
  158. },
  159. "status": "pending",
  160. "expires": "2022-04-20T12:20:29Z",
  161. "challenges": [
  162. {
  163. "type": "http-01",
  164. "status": "pending",
  165. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  166. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  167. },
  168. {
  169. "type": "dns-01",
  170. "status": "pending",
  171. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  172. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  173. },
  174. {
  175. "type": "tls-alpn-01",
  176. "status": "pending",
  177. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  178. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  179. }
  180. ]
  181. }
  182. Storing nonce: 0001NjFTSW1Y4zTkNZ8LS0wpdDm7xRXdXYYvi8UV6kUpU8Y
  183. Performing the following challenges:
  184. http-01 challenge for doublebacon.de
  185. Creating backup of /etc/nginx/modules-enabled/50-mod-mail.conf
  186. Creating backup of /etc/nginx/sites-enabled/local-pxe.doublebacon.de
  187. Creating backup of /etc/nginx/sites-enabled/meet.doublebacon.de
  188. Creating backup of /etc/nginx/sites-enabled/bitwarden.doublebacon.de
  189. Creating backup of /etc/nginx/sites-enabled/kalli.doublebacon.de
  190. Creating backup of /etc/nginx/conf.d/acme.inc
  191. Creating backup of /etc/nginx/modules-enabled/50-mod-stream.conf
  192. Creating backup of /etc/nginx/nginx.conf
  193. Creating backup of /etc/nginx/sites-enabled/jellyfin.doublebacon.de
  194. Creating backup of /etc/nginx/sites-enabled/local-sonarr.doublebacon.de
  195. Creating backup of /etc/nginx/modules-enabled/50-mod-http-geoip.conf
  196. Creating backup of /etc/nginx/sites-enabled/local-pihole1.doublebacon.de
  197. Creating backup of /etc/nginx/sites-enabled/local-prometheus.doublebacon.de
  198. Creating backup of /etc/nginx/sites-enabled/local-radarr.doublebacon.de
  199. Creating backup of /etc/nginx/sites-enabled/local-wiki.doublebacon.de
  200. Creating backup of /etc/nginx/sites-enabled/nextcloud.doublebacon.de
  201. Creating backup of /etc/nginx/sites-enabled/local-tautulli.doublebacon.de
  202. Creating backup of /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf
  203. Creating backup of /etc/nginx/sites-enabled/local-git.doublebacon.de
  204. Creating backup of /etc/nginx/sites-enabled/local-pihole2.doublebacon.de
  205. Creating backup of /etc/nginx/mime.types
  206. Creating backup of /etc/nginx/sites-enabled/request.doublebacon.de
  207. Creating backup of /etc/letsencrypt/options-ssl-nginx.conf
  208. Creating backup of /etc/nginx/sites-enabled/local-portainer.doublebacon.de
  209. Creating backup of /etc/nginx/sites-enabled/plex.doublebacon.de
  210. Creating backup of /etc/nginx/sites-enabled/local-trending.doublebacon.de
  211. Creating backup of /etc/nginx/modules-enabled/50-mod-http-image-filter.conf
  212. Creating backup of /etc/nginx/sites-enabled/local-nzbget.doublebacon.de
  213. Creating backup of /etc/nginx/sites-enabled/local-uptime.doublebacon.de
  214. Creating backup of /etc/nginx/sites-enabled/doublebacon.de
  215. Writing nginx conf tree to /etc/nginx/nginx.conf:
  216. user www-data;
  217. worker_processes auto;
  218. pid /run/nginx.pid;
  219. include /etc/nginx/modules-enabled/*.conf;
  220.  
  221. events {
  222. worker_connections 768;
  223. # multi_accept on;
  224. }
  225.  
  226. http {
  227. include /etc/letsencrypt/le_http_01_cert_challenge.conf;
  228. server_names_hash_bucket_size 128;
  229.  
  230. ##
  231. # Basic Settings
  232. ##
  233.  
  234. sendfile on;
  235. tcp_nopush on;
  236. tcp_nodelay on;
  237. keepalive_timeout 65;
  238. types_hash_max_size 2048;
  239. client_max_body_size 10M;
  240. # server_tokens off;
  241.  
  242. # server_names_hash_bucket_size 64;
  243. # server_name_in_redirect off;
  244.  
  245. include /etc/nginx/mime.types;
  246. default_type application/octet-stream;
  247.  
  248. ##
  249. # SSL Settings
  250. ##
  251.  
  252. ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3, ref: POODLE
  253. ssl_prefer_server_ciphers on;
  254. ssl_session_cache shared:SSL:10m;
  255. ssl_session_timeout 10m;
  256. ##
  257. # Logging Settings
  258. ##
  259.  
  260. access_log /var/log/nginx/access.log;
  261. error_log /var/log/nginx/error.log;
  262.  
  263. ##
  264. # Gzip Settings
  265. ##
  266.  
  267. gzip on;
  268.  
  269. # gzip_vary on;
  270. # gzip_proxied any;
  271. # gzip_comp_level 6;
  272. # gzip_buffers 16 8k;
  273. # gzip_http_version 1.1;
  274. # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript;
  275.  
  276. ##
  277. # Virtual Host Configs
  278. ##
  279.  
  280. include /etc/nginx/conf.d/*.conf;
  281. include /etc/nginx/sites-enabled/*;
  282. }
  283.  
  284. # stream {
  285. # server {
  286. # listen 222;
  287. # # server_name git.doublebacon.de;
  288. # proxy_pass 192.168.16.31:222;
  289. # }
  290. # }
  291.  
  292. #mail {
  293. # # See sample authentication script at:
  294. # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
  295. #
  296. # # auth_http localhost/auth.php;
  297. # # pop3_capabilities "TOP" "USER";
  298. # # imap_capabilities "IMAP4rev1" "UIDPLUS";
  299. #
  300. # server {
  301. # listen localhost:110;
  302. # protocol pop3;
  303. # proxy on;
  304. # }
  305. #
  306. # server {
  307. # listen localhost:143;
  308. # protocol imap;
  309. # proxy on;
  310. # }
  311. #}
  312.  
  313. Writing nginx conf tree to /etc/nginx/sites-enabled/doublebacon.de:
  314. server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot
  315.  
  316.  
  317. listen 80;
  318. include conf.d/acme.inc;
  319. server_name doublebacon.de www.doublebacon.de;
  320.  
  321. access_log /var/log/nginx/app_mydomain_com_access.log;
  322. error_log /var/log/nginx/pp_mydomain_com_error.log;
  323.  
  324. error_page 404 /404.html;
  325. root /var/www/html;
  326. error_page 500 502 503 504 /50x.html;
  327. # return 301 https://$server_name$request_uri;
  328. location = /.well-known/acme-challenge/tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs{default_type text/plain;return 200 tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs.KrIrpDtr-2rEEDKrBlHO4s06Y6Upy8uyfM2ikw56tkY;} # managed by Certbot
  329.  
  330. }
  331.  
  332.  
  333. server {
  334. listen 443 ssl; # managed by Certbot
  335.  
  336. ssl_certificate /etc/letsencrypt/live/doublebacon.de/fullchain.pem; # managed by Certbot
  337. ssl_certificate_key /etc/letsencrypt/live/doublebacon.de/privkey.pem; # managed by Certbot
  338. include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot
  339. ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot
  340.  
  341. location / {
  342. proxy_pass http://192.168.16.30:1235;
  343. }
  344. }
  345.  
  346. Waiting for verification...
  347. JWS payload:
  348. b'{\n "resource": "challenge",\n "type": "http-01"\n}'
  349. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A:
  350. {
  351. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDFOakZUU1cxWTR6VGtOWjhMUzB3cGREbTd4UlhkWFlZdmk4VVY2a1VwVThZIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzIxNzQ5NjM2NTgvWkVWYzBBIn0",
  352. "signature": "KhWXrHuHx344fE3E1u78KaIdCUcm-TrAQmXd-pe4w6UVveJNolqqFjS24JzvdH78TEuh83dV46KgFPAu45Nek4n3zE-jXEL8ZNP43w6yhy2Nyr06gC544ynNGxV_4R6uMPLz8J5m_nSD0F7nq25klXON0CnOyNvBhP9nw7ndg6bYX-Z9wcL9pNEG4P93apLCOY1UZxow9cwJwSIP6E_2ZFSDNqcRA-qhlx-R6ip53tpjILl8QMvOgb6AncmMfmYvOyGqjm-Lq0hAV0ec2JeUrSPdTTDMrt9crTD0f3ORD_b429VLGCqVdV-Vr9a-dnxryKpKWD2P-HawoUglDvroew",
  353. "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0"
  354. }
  355. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/2174963658/ZEVc0A HTTP/1.1" 200 193
  356. Received response:
  357. HTTP 200
  358. Server: nginx
  359. Date: Wed, 13 Apr 2022 12:20:30 GMT
  360. Content-Type: application/json
  361. Content-Length: 193
  362. Connection: keep-alive
  363. Boulder-Requester: 8139868
  364. Cache-Control: public, max-age=0, no-cache
  365. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658>;rel="up"
  366. Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A
  367. Replay-Nonce: 000194kHNmotFEleyIObxyOZ9gJTpJQytxechUzMzabBbT8
  368. X-Frame-Options: DENY
  369. Strict-Transport-Security: max-age=604800
  370.  
  371. {
  372. "type": "http-01",
  373. "status": "pending",
  374. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  375. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  376. }
  377. Storing nonce: 000194kHNmotFEleyIObxyOZ9gJTpJQytxechUzMzabBbT8
  378. JWS payload:
  379. b''
  380. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  381. {
  382. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDE5NGtITm1vdEZFbGV5SU9ieHlPWjlnSlRwSlF5dHhlY2hVek16YWJCYlQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  383. "signature": "jrw-nS-IWW4TgLDozRY1CQ60NgIRXy-JO3MhDUdn0SVafAUtqPQ15EepP-K7kugaYUj9yaXJJ1MbYEz0VWpZXGcmykkGzydTSUOICI8ImDApf1HPqlWtyuPE2F6TCEID6u-HxlKu_8e3Sx7DMx4Fmvq7JR5UJVRsRppdRWrLZnYnj0gvYHbnjHhitxmaM_naLogHMbX5_wscjfL_xoaPkWt4MKbaDVRSpV9QxpbjI4Sp_7TTn8QPKUUBywaOd9n1WlyySxe56L4s_9ZcXjzqHk2JGiJ83ebKtM1kLyHhfSfBBGuio4vOWtWaL8aGK6XUdM1qGjHk5G5KikN7HhvKoQ",
  384. "payload": ""
  385. }
  386. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  387. Received response:
  388. HTTP 200
  389. Server: nginx
  390. Date: Wed, 13 Apr 2022 12:20:33 GMT
  391. Content-Type: application/json
  392. Content-Length: 816
  393. Connection: keep-alive
  394. Boulder-Requester: 8139868
  395. Cache-Control: public, max-age=0, no-cache
  396. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  397. Replay-Nonce: 0001hv0hd3yU-MEFuNJiDFOy2KL38rsR29wTlwEPsQBctUw
  398. X-Frame-Options: DENY
  399. Strict-Transport-Security: max-age=604800
  400.  
  401. {
  402. "identifier": {
  403. "type": "dns",
  404. "value": "doublebacon.de"
  405. },
  406. "status": "pending",
  407. "expires": "2022-04-20T12:20:29Z",
  408. "challenges": [
  409. {
  410. "type": "http-01",
  411. "status": "pending",
  412. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  413. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  414. },
  415. {
  416. "type": "dns-01",
  417. "status": "pending",
  418. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  419. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  420. },
  421. {
  422. "type": "tls-alpn-01",
  423. "status": "pending",
  424. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  425. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  426. }
  427. ]
  428. }
  429. Storing nonce: 0001hv0hd3yU-MEFuNJiDFOy2KL38rsR29wTlwEPsQBctUw
  430. JWS payload:
  431. b''
  432. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  433. {
  434. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDFodjBoZDN5VS1NRUZ1TkppREZPeTJLTDM4cnNSMjl3VGx3RVBzUUJjdFV3IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  435. "signature": "aoxMmD3GSU4-wOBj52-etOtRJP8b0Ji02VnnDMI-w1QXDx4xYaNbXOqbltUgaErJMMX8HZp78B8lsHamkTKbar-B0vmcozBdaxYOAhE6vlajE08sopuwWfnONk2eEL3tyO58YRlyHwwMObDlAPsiRVkcS0iJG6Cmq3k0KhfToRo3H061cYLrfkAGXItJ5nTvy5VWvPgulft5oTxVNRnlcCxwzIPxzkBzViprseOH33vxUKNvoSEdvOtlTdsJA3kixQug7i7VuBbxPO_5_kEH-T--4upxgzhTEinF9S9I0y87NllFW7KRzwPdmnvXCf9AFGicJHm7isWyorA78S4Gew",
  436. "payload": ""
  437. }
  438. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  439. Received response:
  440. HTTP 200
  441. Server: nginx
  442. Date: Wed, 13 Apr 2022 12:20:36 GMT
  443. Content-Type: application/json
  444. Content-Length: 816
  445. Connection: keep-alive
  446. Boulder-Requester: 8139868
  447. Cache-Control: public, max-age=0, no-cache
  448. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  449. Replay-Nonce: 0002BK5eCRWoTXGzfcSM9W6pq-pTtbYiNi5cHmXPnyglX8o
  450. X-Frame-Options: DENY
  451. Strict-Transport-Security: max-age=604800
  452.  
  453. {
  454. "identifier": {
  455. "type": "dns",
  456. "value": "doublebacon.de"
  457. },
  458. "status": "pending",
  459. "expires": "2022-04-20T12:20:29Z",
  460. "challenges": [
  461. {
  462. "type": "http-01",
  463. "status": "pending",
  464. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  465. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  466. },
  467. {
  468. "type": "dns-01",
  469. "status": "pending",
  470. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  471. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  472. },
  473. {
  474. "type": "tls-alpn-01",
  475. "status": "pending",
  476. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  477. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  478. }
  479. ]
  480. }
  481. Storing nonce: 0002BK5eCRWoTXGzfcSM9W6pq-pTtbYiNi5cHmXPnyglX8o
  482. JWS payload:
  483. b''
  484. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  485. {
  486. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDJCSzVlQ1JXb1RYR3pmY1NNOVc2cHEtcFR0YllpTmk1Y0htWFBueWdsWDhvIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  487. "signature": "JX-ujcS9vh-w4Qv1eNK0vnfLmUNk0sCE3mCdTKizZuJmo8g9zkiP5Nnp-Lcn2SbMjsmNRYc3cYQzYuDqnh4uFubgLwkks9a-CyRDBbpHOnV9niQHkqa-MuiR3xftDRDP57B6Ek_KMBDljj6HWi1Oz4qtVwkc7Z9oZhi_Eo8xshQkahW0l90lIt4zx44mg55IcumgzkKgrsBA1wdtNYSjkOkd1oXno0ubHZt_b1V9XOi5c3iMsTQWDWTGCuXAB-x16qt2NLP-OK3AdhZavARqwx2J0fAMpiRsc0aSJAdGy7fmt5EwmRwrHwn4sDpMHJmAXG-NZN_YAD5yjHNf3DfSyQ",
  488. "payload": ""
  489. }
  490. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  491. Received response:
  492. HTTP 200
  493. Server: nginx
  494. Date: Wed, 13 Apr 2022 12:20:40 GMT
  495. Content-Type: application/json
  496. Content-Length: 816
  497. Connection: keep-alive
  498. Boulder-Requester: 8139868
  499. Cache-Control: public, max-age=0, no-cache
  500. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  501. Replay-Nonce: 0002et1osaYP60mWi_u2kKgXrYWbid--AkofQPsd2Pqquro
  502. X-Frame-Options: DENY
  503. Strict-Transport-Security: max-age=604800
  504.  
  505. {
  506. "identifier": {
  507. "type": "dns",
  508. "value": "doublebacon.de"
  509. },
  510. "status": "pending",
  511. "expires": "2022-04-20T12:20:29Z",
  512. "challenges": [
  513. {
  514. "type": "http-01",
  515. "status": "pending",
  516. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  517. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  518. },
  519. {
  520. "type": "dns-01",
  521. "status": "pending",
  522. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  523. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  524. },
  525. {
  526. "type": "tls-alpn-01",
  527. "status": "pending",
  528. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  529. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  530. }
  531. ]
  532. }
  533. Storing nonce: 0002et1osaYP60mWi_u2kKgXrYWbid--AkofQPsd2Pqquro
  534. JWS payload:
  535. b''
  536. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  537. {
  538. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDJldDFvc2FZUDYwbVdpX3Uya0tnWHJZV2JpZC0tQWtvZlFQc2QyUHFxdXJvIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  539. "signature": "gKRmfyi12jX8cjt-NscY6LOI0YF-3QonQH1NKgZ9evURwfoNpJg17r5OSkC8Kd1eBbPeWfoj0MvEda2_JXZ9Njau_ls-t-VY12D7hxZX9W8ty4ARUhZSP3xkYqPUMRfUJywIsOF9Zg5VLA4keDs0h0075YS0AW9rdPOQP8vLBqFXaht4pXP1TX6Zuw7L9tbRCOfmeXo1reFZt_hU0OR1e3WO8EAspdq6nMeTtAF9vRiNzrIdksgRohfMIb9n44ZPbL4QXvi7hwunJaozy1uBv9N_Id4tFCcQlDT2YtpHSme30FkOymDi_En0lzGn6Uv_a390wBLRe6703-0fo23Tcg",
  540. "payload": ""
  541. }
  542. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  543. Received response:
  544. HTTP 200
  545. Server: nginx
  546. Date: Wed, 13 Apr 2022 12:20:43 GMT
  547. Content-Type: application/json
  548. Content-Length: 816
  549. Connection: keep-alive
  550. Boulder-Requester: 8139868
  551. Cache-Control: public, max-age=0, no-cache
  552. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  553. Replay-Nonce: 0001t99dsfglYjTxxn2Dlzn-EUZuTzk53eOwjbdjJXD3Ecw
  554. X-Frame-Options: DENY
  555. Strict-Transport-Security: max-age=604800
  556.  
  557. {
  558. "identifier": {
  559. "type": "dns",
  560. "value": "doublebacon.de"
  561. },
  562. "status": "pending",
  563. "expires": "2022-04-20T12:20:29Z",
  564. "challenges": [
  565. {
  566. "type": "http-01",
  567. "status": "pending",
  568. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  569. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  570. },
  571. {
  572. "type": "dns-01",
  573. "status": "pending",
  574. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  575. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  576. },
  577. {
  578. "type": "tls-alpn-01",
  579. "status": "pending",
  580. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  581. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  582. }
  583. ]
  584. }
  585. Storing nonce: 0001t99dsfglYjTxxn2Dlzn-EUZuTzk53eOwjbdjJXD3Ecw
  586. JWS payload:
  587. b''
  588. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  589. {
  590. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDF0OTlkc2ZnbFlqVHh4bjJEbHpuLUVVWnVUems1M2VPd2piZGpKWEQzRWN3IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  591. "signature": "Q9Iy8asjGJqFsAQjZmqFw7rRq63FvSn5P43Siveb8bN5EObqVUP6dEBdFW6lnB22727mwcrSgdbOWkfGFJFqVe_U107miHw8YiZdwfvj0vHiiB9WVLPn648Jxnd8Z-U2y_guh8SmUFotrUvfKNZkTo00bclXrLZvk0JKcU1GVBIVS2PJHs8o8BTX3O10D0qTogTiC4zYz8lLpSWzBL5k5Q2or42k0A0QWFD4fgJltJjM1sHhY1rvLmQDtPyxIZB_BlzvTFOQaBW-CshWOrf5PVzC3s-wYuwB5M9vTTRopznxt4aYmhwV7_SJiE-Wfa2G_Z7T3GBh-Ccy5lSib4La5g",
  592. "payload": ""
  593. }
  594. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  595. Received response:
  596. HTTP 200
  597. Server: nginx
  598. Date: Wed, 13 Apr 2022 12:20:46 GMT
  599. Content-Type: application/json
  600. Content-Length: 816
  601. Connection: keep-alive
  602. Boulder-Requester: 8139868
  603. Cache-Control: public, max-age=0, no-cache
  604. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  605. Replay-Nonce: 0001X4XgQkqYHoHh0m3OtX8fpr8y9UQYgNOL78iL-mZsuuQ
  606. X-Frame-Options: DENY
  607. Strict-Transport-Security: max-age=604800
  608.  
  609. {
  610. "identifier": {
  611. "type": "dns",
  612. "value": "doublebacon.de"
  613. },
  614. "status": "pending",
  615. "expires": "2022-04-20T12:20:29Z",
  616. "challenges": [
  617. {
  618. "type": "http-01",
  619. "status": "pending",
  620. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  621. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  622. },
  623. {
  624. "type": "dns-01",
  625. "status": "pending",
  626. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  627. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  628. },
  629. {
  630. "type": "tls-alpn-01",
  631. "status": "pending",
  632. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  633. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  634. }
  635. ]
  636. }
  637. Storing nonce: 0001X4XgQkqYHoHh0m3OtX8fpr8y9UQYgNOL78iL-mZsuuQ
  638. JWS payload:
  639. b''
  640. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  641. {
  642. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDFYNFhnUWtxWUhvSGgwbTNPdFg4ZnByOHk5VVFZZ05PTDc4aUwtbVpzdXVRIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  643. "signature": "bCKvp_AA4lF0KmcmO63MVN8Hk6m549Zsqk-UbdL1KW_otr3Qc5V5jqT4HTt2ghkrimAH45Un0hBf9KM7i2Xf4NJ1QkPuSsQUNo8H6szGydpL_gthjfEOL8KoNZvuDDLlBGAdqG4y-WUcSGjHPmBYwyXtOCKeOdbG85Fo6iw3iPNqNs8hvbNm9LHZ14JfAIJU_ENSvebFE88vu1PzKD98mtTo6hmWZYWQtZYv0vj32zpbAguECMRe01-HWwFIvPNgViJx3F7Cw-RdQ-nPhkcZyQUGMEd_HxfU-kdokAUpl9ifd_7wt1UbigggSzO-r4ijdrsi9RozW1As3gausV5RjA",
  644. "payload": ""
  645. }
  646. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  647. Received response:
  648. HTTP 200
  649. Server: nginx
  650. Date: Wed, 13 Apr 2022 12:20:49 GMT
  651. Content-Type: application/json
  652. Content-Length: 816
  653. Connection: keep-alive
  654. Boulder-Requester: 8139868
  655. Cache-Control: public, max-age=0, no-cache
  656. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  657. Replay-Nonce: 00011bUuIRbdmaIYIqiCwURWTHILgj61qzxLhP63vMN6F98
  658. X-Frame-Options: DENY
  659. Strict-Transport-Security: max-age=604800
  660.  
  661. {
  662. "identifier": {
  663. "type": "dns",
  664. "value": "doublebacon.de"
  665. },
  666. "status": "pending",
  667. "expires": "2022-04-20T12:20:29Z",
  668. "challenges": [
  669. {
  670. "type": "http-01",
  671. "status": "pending",
  672. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  673. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  674. },
  675. {
  676. "type": "dns-01",
  677. "status": "pending",
  678. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  679. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  680. },
  681. {
  682. "type": "tls-alpn-01",
  683. "status": "pending",
  684. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  685. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  686. }
  687. ]
  688. }
  689. Storing nonce: 00011bUuIRbdmaIYIqiCwURWTHILgj61qzxLhP63vMN6F98
  690. JWS payload:
  691. b''
  692. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  693. {
  694. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDExYlV1SVJiZG1hSVlJcWlDd1VSV1RISUxnajYxcXp4TGhQNjN2TU42Rjk4IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  695. "signature": "WM_5BD1l8DP5omJgql004PFMPcsaz2Ac1Ekm6mPvO_aO8r9nCQZobYXmOBXaithE9D1DmNZKC7WdjQGpErn886Tpac215EzKSynzDOgTm58JWX5TJk_7PBrNiVjSC9zcT0GF83M3EvGNwKEIH5W7R3zAHFwO-ImkSGx345-wjRy7NP5mFgEFifF_8few389ShAh_NNga8FR-Um9TD-94ceXI7SFcv5ZxdJcHtJfFiaTHxoDN5PzRhgx8FqqNch0LZjes6PFMvQB7MOd61KROsnyokZmSmm4kvXnhP412CtC_xwkzFmii16iZhhADqRI4H-q0hdZn7R3EycLlwdVRsw",
  696. "payload": ""
  697. }
  698. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  699. Received response:
  700. HTTP 200
  701. Server: nginx
  702. Date: Wed, 13 Apr 2022 12:20:52 GMT
  703. Content-Type: application/json
  704. Content-Length: 816
  705. Connection: keep-alive
  706. Boulder-Requester: 8139868
  707. Cache-Control: public, max-age=0, no-cache
  708. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  709. Replay-Nonce: 0002BHlWRlZglQSiqg8WW0quf-fcIDlzt2aXn6AelSaJjto
  710. X-Frame-Options: DENY
  711. Strict-Transport-Security: max-age=604800
  712.  
  713. {
  714. "identifier": {
  715. "type": "dns",
  716. "value": "doublebacon.de"
  717. },
  718. "status": "pending",
  719. "expires": "2022-04-20T12:20:29Z",
  720. "challenges": [
  721. {
  722. "type": "http-01",
  723. "status": "pending",
  724. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  725. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  726. },
  727. {
  728. "type": "dns-01",
  729. "status": "pending",
  730. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  731. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  732. },
  733. {
  734. "type": "tls-alpn-01",
  735. "status": "pending",
  736. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  737. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  738. }
  739. ]
  740. }
  741. Storing nonce: 0002BHlWRlZglQSiqg8WW0quf-fcIDlzt2aXn6AelSaJjto
  742. JWS payload:
  743. b''
  744. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  745. {
  746. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDJCSGxXUmxaZ2xRU2lxZzhXVzBxdWYtZmNJRGx6dDJhWG42QWVsU2FKanRvIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  747. "signature": "a0tkG4-Hyr0UwAMNIg1VvZBbDTPjGsiGlhK-d83dp-FpbH310zs5OPjHbzHRxxFqaG0Rt9EuwlFEo1GE6TiN3Qa47v-sqxwC7UnN4b7SOEXqaP92fn0mXxtOcTi7xPjH4iIW0muqvyFA6hY6XoEJR4PqLXY_FjWvGCfVr6fL3ski15s3qnr0rhyfqzjNmoOIvql1WUJFbO_eT_gy9C4TQTP6Qe5al7EPAdMeflWLVxQeAIznDrjUl-CtatQgjskall-eeIQykPNWTekyeva_ZamxFn0eKxSoymKHWHd5x9Hw2x-TLjfuKvdJPkXZc7lpIF2rckUvOmmCrcTIvTtzQw",
  748. "payload": ""
  749. }
  750. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  751. Received response:
  752. HTTP 200
  753. Server: nginx
  754. Date: Wed, 13 Apr 2022 12:20:55 GMT
  755. Content-Type: application/json
  756. Content-Length: 816
  757. Connection: keep-alive
  758. Boulder-Requester: 8139868
  759. Cache-Control: public, max-age=0, no-cache
  760. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  761. Replay-Nonce: 0001bF6aH_bgbn-mCpbEmfZqu8WoLDR7H1yY8fNvuMHco0U
  762. X-Frame-Options: DENY
  763. Strict-Transport-Security: max-age=604800
  764.  
  765. {
  766. "identifier": {
  767. "type": "dns",
  768. "value": "doublebacon.de"
  769. },
  770. "status": "pending",
  771. "expires": "2022-04-20T12:20:29Z",
  772. "challenges": [
  773. {
  774. "type": "http-01",
  775. "status": "pending",
  776. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  777. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  778. },
  779. {
  780. "type": "dns-01",
  781. "status": "pending",
  782. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  783. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  784. },
  785. {
  786. "type": "tls-alpn-01",
  787. "status": "pending",
  788. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  789. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  790. }
  791. ]
  792. }
  793. Storing nonce: 0001bF6aH_bgbn-mCpbEmfZqu8WoLDR7H1yY8fNvuMHco0U
  794. JWS payload:
  795. b''
  796. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  797. {
  798. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDFiRjZhSF9iZ2JuLW1DcGJFbWZacXU4V29MRFI3SDF5WThmTnZ1TUhjbzBVIiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  799. "signature": "x3uQJt0pX03zWnQGPfUKneCMlpehDSoikMbsCo-EEqjf6s_en13Hw3vmxjrpH-Hv6O2IxvKXTdjE-CjRD_h7quXXGoitNMPACTKDdM7tGN549xgYWW_4c0sDEFZfrAcxw5DScsh6nNfcNFmcTA8cWystONCSjJjDGXgVWQB1TC1UBXIb0K6tA7KRbs2qc3OfJ2j94V21zWWRZY7SSJdpFvdck6enG-g-HZ3JwL1kUdxc3EuCsrk52ac51t9sLBCwLAAKaJdeiLBx6Vc46pci4nltfTz8ZOWW_c_PpQI1DneBSkSvw5fksQl16L7-_iJxC2JmP9YSJ1NtghaiPFQlqw",
  800. "payload": ""
  801. }
  802. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 816
  803. Received response:
  804. HTTP 200
  805. Server: nginx
  806. Date: Wed, 13 Apr 2022 12:20:59 GMT
  807. Content-Type: application/json
  808. Content-Length: 816
  809. Connection: keep-alive
  810. Boulder-Requester: 8139868
  811. Cache-Control: public, max-age=0, no-cache
  812. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  813. Replay-Nonce: 00015-BBnIspPik09o5pG3dg818Mj6mEkEejR5tw6iRQL-w
  814. X-Frame-Options: DENY
  815. Strict-Transport-Security: max-age=604800
  816.  
  817. {
  818. "identifier": {
  819. "type": "dns",
  820. "value": "doublebacon.de"
  821. },
  822. "status": "pending",
  823. "expires": "2022-04-20T12:20:29Z",
  824. "challenges": [
  825. {
  826. "type": "http-01",
  827. "status": "pending",
  828. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  829. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  830. },
  831. {
  832. "type": "dns-01",
  833. "status": "pending",
  834. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ffutig",
  835. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  836. },
  837. {
  838. "type": "tls-alpn-01",
  839. "status": "pending",
  840. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/YzU-eA",
  841. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs"
  842. }
  843. ]
  844. }
  845. Storing nonce: 00015-BBnIspPik09o5pG3dg818Mj6mEkEejR5tw6iRQL-w
  846. JWS payload:
  847. b''
  848. Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/2174963658:
  849. {
  850. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC84MTM5ODY4IiwgIm5vbmNlIjogIjAwMDE1LUJCbklzcFBpazA5bzVwRzNkZzgxOE1qNm1Fa0VlalI1dHc2aVJRTC13IiwgInVybCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzIxNzQ5NjM2NTgifQ",
  851. "signature": "QBmNyfCZtynEkK-KQ7V86jtzREAmpcqhZhxMMwlKLGTEzawnilSWYxDccxSc-jT80irHxCEIFPSIlqn8oiUg3tD5dVqEV4E87CXZDr-5r45xC1xJaSZK2LEOdX9fU_btMUbdXaQoejSfj6Vzm1iapg5hCwB_id-VV-ozBR0Qd6PBcaKH9_vGYnwAvbhArMPsmrdwVJvh3jrFX1IdCRNJHzb2gqcp0KGL3ITzM1vrJ-wvikf0jRcBDXKfZYWO8ODOH9CAkaPz8mEr7ZjieunmchowlzfCWYXg65-l7HuJg53_9oUYrj5p6VREj7bnxBhmdoRjtO3sY07fUMl3Q8_brg",
  852. "payload": ""
  853. }
  854. https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/2174963658 HTTP/1.1" 200 1043
  855. Received response:
  856. HTTP 200
  857. Server: nginx
  858. Date: Wed, 13 Apr 2022 12:21:02 GMT
  859. Content-Type: application/json
  860. Content-Length: 1043
  861. Connection: keep-alive
  862. Boulder-Requester: 8139868
  863. Cache-Control: public, max-age=0, no-cache
  864. Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
  865. Replay-Nonce: 0002rOtZFtakTqUShyykvm3iPDno8Ei0qr3ss-Hk38-aJpk
  866. X-Frame-Options: DENY
  867. Strict-Transport-Security: max-age=604800
  868.  
  869. {
  870. "identifier": {
  871. "type": "dns",
  872. "value": "doublebacon.de"
  873. },
  874. "status": "invalid",
  875. "expires": "2022-04-20T12:20:29Z",
  876. "challenges": [
  877. {
  878. "type": "http-01",
  879. "status": "invalid",
  880. "error": {
  881. "type": "urn:ietf:params:acme:error:dns",
  882. "detail": "During secondary validation: DNS problem: query timed out looking up A for doublebacon.de; DNS problem: query timed out looking up AAAA for doublebacon.de",
  883. "status": 400
  884. },
  885. "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/2174963658/ZEVc0A",
  886. "token": "tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs",
  887. "validationRecord": [
  888. {
  889. "url": "http://doublebacon.de/.well-known/acme-challenge/tWMzSqPxBt66-nk7dC2RnPQFqb7-T2jHTx6SWR3Buhs",
  890. "hostname": "doublebacon.de",
  891. "port": "80",
  892. "addressesResolved": [
  893. "79.194.153.246"
  894. ],
  895. "addressUsed": "79.194.153.246"
  896. }
  897. ],
  898. "validated": "2022-04-13T12:20:30Z"
  899. }
  900. ]
  901. }
  902. Storing nonce: 0002rOtZFtakTqUShyykvm3iPDno8Ei0qr3ss-Hk38-aJpk
  903. Reporting to user: The following errors were reported by the server:
  904.  
  905. Domain: doublebacon.de
  906. Type: None
  907. Detail: During secondary validation: DNS problem: query timed out looking up A for doublebacon.de; DNS problem: query timed out looking up AAAA for doublebacon.de
  908. Encountered exception:
  909. Traceback (most recent call last):
  910. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
  911. self._respond(aauthzrs, resp, best_effort)
  912. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 155, in _respond
  913. self._poll_challenges(aauthzrs, chall_update, best_effort)
  914. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 226, in _poll_challenges
  915. raise errors.FailedChallenges(all_failed_achalls)
  916. certbot.errors.FailedChallenges: Failed authorization procedure. doublebacon.de (http-01): urn:ietf:params:acme:error:dns :: During secondary validation: DNS problem: query timed out looking up A for doublebacon.de; DNS problem: query timed out looking up AAAA for doublebacon.de
  917.  
  918. Calling registered functions
  919. Cleaning up challenges
  920. Exiting abnormally:
  921. Traceback (most recent call last):
  922. File "/usr/bin/certbot", line 11, in <module>
  923. load_entry_point('certbot==0.27.0', 'console_scripts', 'certbot')()
  924. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1364, in main
  925. return config.func(config, plugins)
  926. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1254, in certonly
  927. lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
  928. File "/usr/lib/python3/dist-packages/certbot/main.py", line 120, in _get_and_save_cert
  929. lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  930. File "/usr/lib/python3/dist-packages/certbot/client.py", line 391, in obtain_and_enroll_certificate
  931. cert, chain, key, _ = self.obtain_certificate(domains)
  932. File "/usr/lib/python3/dist-packages/certbot/client.py", line 334, in obtain_certificate
  933. orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  934. File "/usr/lib/python3/dist-packages/certbot/client.py", line 370, in _get_order_and_authorizations
  935. authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  936. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
  937. self._respond(aauthzrs, resp, best_effort)
  938. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 155, in _respond
  939. self._poll_challenges(aauthzrs, chall_update, best_effort)
  940. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 226, in _poll_challenges
  941. raise errors.FailedChallenges(all_failed_achalls)
  942. certbot.errors.FailedChallenges: Failed authorization procedure. doublebacon.de (http-01): urn:ietf:params:acme:error:dns :: During secondary validation: DNS problem: query timed out looking up A for doublebacon.de; DNS problem: query timed out looking up AAAA for doublebacon.de
  943. Failed authorization procedure. doublebacon.de (http-01): urn:ietf:params:acme:error:dns :: During secondary validation: DNS problem: query timed out looking up A for doublebacon.de; DNS problem: query timed out looking up AAAA for doublebacon.de
  944.  
  945. IMPORTANT NOTES:
  946. - The following errors were reported by the server:
  947.  
  948. Domain: doublebacon.de
  949. Type: None
  950. Detail: During secondary validation: DNS problem: query timed out
  951. looking up A for doublebacon.de; DNS problem: query timed out
  952. looking up AAAA for doublebacon.de
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement