SHARE
TWEET

Letsencrypt Log

Team_SundK Nov 20th, 2018 14 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. 2018-11-20 10:13:01,877:DEBUG:certbot.main:certbot version: 0.23.0
  2. 2018-11-20 10:13:01,877:DEBUG:certbot.main:Arguments: ['-n', '--text', '--agree-tos', '--expand', '--authenticator', 'webroot', '--server', 'https://acme-v02.api.letsencrypt.org/directory', '--rsa-key-size', '4096', '--email', 'postmaster@blog.samfreaks.de', '--domains', 'blog.samfreaks.de', '--webroot-path', '/usr/local/ispconfig/interface/acme']
  3. 2018-11-20 10:13:01,878:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
  4. 2018-11-20 10:13:01,883:DEBUG:certbot.log:Root logging level set at 20
  5. 2018-11-20 10:13:01,884:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
  6. 2018-11-20 10:13:01,884:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
  7. 2018-11-20 10:13:01,884:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot
  8. Description: Place files in webroot directory
  9. Interfaces: IAuthenticator, IPlugin
  10. Entry point: webroot = certbot.plugins.webroot:Authenticator
  11. Initialized: <certbot.plugins.webroot.Authenticator object at 0x7f5a095a0f60>
  12. Prep: True
  13. 2018-11-20 10:13:01,885:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7f5a095a0f60> and installer None
  14. 2018-11-20 10:13:01,885:INFO:certbot.plugins.selection:Plugins selected: Authenticator webroot, Installer None
  15. 2018-11-20 10:13:01,889:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7f5a0853b9b0>)>), contact=('mailto:postmaster@mail.ktmsecure.de',), agreement=None, status='valid', terms_of_service_agreed=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/44791664', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'), f84482c897ff641016ba9ce0eb69c0fc, Meta(creation_dt=datetime.datetime(2018, 10, 30, 17, 6, 6, tzinfo=<UTC>), creation_host='mail.ktmsecure.de'))>
  16. 2018-11-20 10:13:01,890:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
  17. 2018-11-20 10:13:01,891:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
  18. 2018-11-20 10:13:02,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
  19. 2018-11-20 10:13:02,075:DEBUG:acme.client:Received response:
  20. HTTP 200
  21. Server: nginx
  22. Content-Type: application/json
  23. Content-Length: 658
  24. X-Frame-Options: DENY
  25. Strict-Transport-Security: max-age=604800
  26. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  27. Cache-Control: max-age=0, no-cache, no-store
  28. Pragma: no-cache
  29. Date: Tue, 20 Nov 2018 09:13:02 GMT
  30. Connection: keep-alive
  31.  
  32. b'{\n  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",\n  "lIfgUX9KchY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",\n  "meta": {\n    "caaIdentities": [\n      "letsencrypt.org"\n    ],\n    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",\n    "website": "https://letsencrypt.org"\n  },\n  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",\n  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",\n  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",\n  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"\n}'
  33. 2018-11-20 10:13:02,079:INFO:certbot.main:Obtaining a new certificate
  34. 2018-11-20 10:13:02,529:DEBUG:certbot.crypto_util:Generating key (4096 bits): /etc/letsencrypt/keys/0029_key-certbot.pem
  35. 2018-11-20 10:13:02,536:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0029_csr-certbot.pem
  36. 2018-11-20 10:13:02,537:DEBUG:acme.client:Requesting fresh nonce
  37. 2018-11-20 10:13:02,537:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-order.
  38. 2018-11-20 10:13:02,697:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-order HTTP/1.1" 405 0
  39. 2018-11-20 10:13:02,698:DEBUG:acme.client:Received response:
  40. HTTP 405
  41. Server: nginx
  42. Content-Type: application/problem+json
  43. Content-Length: 103
  44. Allow: POST
  45. Replay-Nonce: 2UvjkwGjxJA5U6_4nHiVpUu7boJqiGu_5o35EddBHN4
  46. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  47. Cache-Control: max-age=0, no-cache, no-store
  48. Pragma: no-cache
  49. Date: Tue, 20 Nov 2018 09:13:02 GMT
  50. Connection: keep-alive
  51.  
  52. b''
  53. 2018-11-20 10:13:02,698:DEBUG:acme.client:Storing nonce: 2UvjkwGjxJA5U6_4nHiVpUu7boJqiGu_5o35EddBHN4
  54. 2018-11-20 10:13:02,698:DEBUG:acme.client:JWS payload:
  55. b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "blog.samfreaks.de"\n    }\n  ],\n  "status": "pending",\n  "resource": "new-order"\n}'
  56. 2018-11-20 10:13:02,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
  57. {
  58.   "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDQ3OTE2NjQiLCAibm9uY2UiOiAiMlV2amt3R2p4SkE1VTZfNG5IaVZwVXU3Ym9KcWlHdV81bzM1RWRkQkhONCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  59.   "signature": "mIrclzKe-07ZvkhZf6GUHoRWsEKLACPLwkBAwK3SQTIB7-qpzEFFE43PCOOc1y6ZlyDrujD7HC_-ciYteoW2Qye02YffuIXF1m7mUOIMTk0sgJOxSHylLpvDv7PDO4YE0CtzeNXHI31xsOML2uXjJUo64cN2qpmuie6MzTotMO5WSDZK5Ogpms2CLXJrl0URgF_cjq1n01d_kuWm8z5CYQHbFHfQXjW5F6Su3ahY1U6eKwJTiPTOml__M2u-iChERZg2nk4B0bunpUWfmDj-R4k-X9JgccuHv2kAAPXG10K0fS56QdmCOukS8yyYq1LKlcYDhYyDV3Xfkupm5mkxPOeSNN_9r5Kgi5njVILmahbQbEu2XF6hnkvP96_s7oDs0LnR74coh_dp3h2vfYk2SnR2xowOSMSHQz2q_o8N3g6UpjPgdjbo0dJoWdZqcXxp38F9nSoySyny10oZY33pQXhSmzmSd7p5EXceVb-1wgea_EFVSuYFbM1xhzilNx306m2zCTVfz40oh9szy2YgioyTNh9HitDrauQTBAD6w9uoRb6cuOvY2sRNvhRqAhY8VZ5HLKmZ3fg7hvBhlFYjw1flM4YUyFqpVTV1JGJSQZo3XS90mRcGreVF_Usm8ZBhicgTlFyZezMo1tFfAFizTuUpGH6oLrqALms-kt_EjYM",
  60.   "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImJsb2cuc2FtZnJlYWtzLmRlIgogICAgfQogIF0sCiAgInN0YXR1cyI6ICJwZW5kaW5nIiwKICAicmVzb3VyY2UiOiAibmV3LW9yZGVyIgp9"
  61. }
  62. 2018-11-20 10:13:02,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 376
  63. 2018-11-20 10:13:02,949:DEBUG:acme.client:Received response:
  64. HTTP 201
  65. Server: nginx
  66. Content-Type: application/json
  67. Content-Length: 376
  68. Boulder-Requester: 44791664
  69. Location: https://acme-v02.api.letsencrypt.org/acme/order/44791664/183451111
  70. Replay-Nonce: ZHWw7n0J4BHkK-Ms_17G8ywyDpD8V_JI3nPw0BrMYpo
  71. X-Frame-Options: DENY
  72. Strict-Transport-Security: max-age=604800
  73. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  74. Cache-Control: max-age=0, no-cache, no-store
  75. Pragma: no-cache
  76. Date: Tue, 20 Nov 2018 09:13:02 GMT
  77. Connection: keep-alive
  78.  
  79. b'{\n  "status": "pending",\n  "expires": "2018-11-27T09:13:02.833862517Z",\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "blog.samfreaks.de"\n    }\n  ],\n  "authorizations": [\n    "https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY"\n  ],\n  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/44791664/183451111"\n}'
  80. 2018-11-20 10:13:02,949:DEBUG:acme.client:Storing nonce: ZHWw7n0J4BHkK-Ms_17G8ywyDpD8V_JI3nPw0BrMYpo
  81. 2018-11-20 10:13:02,949:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY.
  82. 2018-11-20 10:13:03,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY HTTP/1.1" 200 909
  83. 2018-11-20 10:13:03,122:DEBUG:acme.client:Received response:
  84. HTTP 200
  85. Server: nginx
  86. Content-Type: application/json
  87. Content-Length: 909
  88. X-Frame-Options: DENY
  89. Strict-Transport-Security: max-age=604800
  90. Expires: Tue, 20 Nov 2018 09:13:03 GMT
  91. Cache-Control: max-age=0, no-cache, no-store
  92. Pragma: no-cache
  93. Date: Tue, 20 Nov 2018 09:13:03 GMT
  94. Connection: keep-alive
  95.  
  96. b'{\n  "identifier": {\n    "type": "dns",\n    "value": "blog.samfreaks.de"\n  },\n  "status": "pending",\n  "expires": "2018-11-27T09:13:02Z",\n  "challenges": [\n    {\n      "type": "tls-alpn-01",\n      "status": "pending",\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162",\n      "token": "TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo"\n    },\n    {\n      "type": "dns-01",\n      "status": "pending",\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576164",\n      "token": "B541dZyLHg3_Cweq8f-kSR2r-_gDBAbkKYoeFoM7_a0"\n    },\n    {\n      "type": "http-01",\n      "status": "pending",\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n      "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U"\n    }\n  ]\n}'
  97. 2018-11-20 10:13:03,122:DEBUG:acme.challenges:tls-alpn-01 was not recognized, full message: {'type': 'tls-alpn-01', 'status': 'pending', 'url': 'https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162', 'token': 'TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo'}
  98. 2018-11-20 10:13:03,123:INFO:certbot.auth_handler:Performing the following challenges:
  99. 2018-11-20 10:13:03,123:INFO:certbot.auth_handler:http-01 challenge for blog.samfreaks.de
  100. 2018-11-20 10:13:03,123:INFO:certbot.plugins.webroot:Using the webroot path /usr/local/ispconfig/interface/acme for all unmatched domains.
  101. 2018-11-20 10:13:03,124:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /usr/local/ispconfig/interface/acme/.well-known/acme-challenge
  102. 2018-11-20 10:13:03,133:DEBUG:certbot.plugins.webroot:Attempting to save validation to /usr/local/ispconfig/interface/acme/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U
  103. 2018-11-20 10:13:03,134:INFO:certbot.auth_handler:Waiting for verification...
  104. 2018-11-20 10:13:03,134:DEBUG:acme.client:JWS payload:
  105. b'{\n  "resource": "challenge",\n  "keyAuthorization": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U.XHsPKxUXdIo9po79sguoWOu-9BkbWVh1ShHripRsdgw",\n  "type": "http-01"\n}'
  106. 2018-11-20 10:13:03,141:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166:
  107. {
  108.   "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDQ3OTE2NjQiLCAibm9uY2UiOiAiWkhXdzduMEo0QkhrSy1Nc18xN0c4eXd5RHBEOFZfSkkzblB3MEJyTVlwbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGxlbmdlLy1ES1NYOFlRZnE2ekxFWC1RY0piTTBKR2FBd05PbExVVUUwQTFrTFBCRVkvOTQ2OTU3NjE2NiJ9",
  109.   "signature": "au7kO9Khr5vyNtvaxtHb93xyYpfd7eHvGWNo7LpyqqL8Gwsbck_Nd2WjKvj9MBfRc33d-4FZqp-A-kPse8OZcvF3gGrmjCvU7YuzrDIYoojJ5nIS5D3-L_RQ4l6GzLQvGKmk-IvemxPctZLZzc3YlZgJ-DpBD8iq6aNDwk_ll-DAy4JP4Ps5MxU5sf7wEtr4kc6f4DYqdY34PqsxU7gznb6c9-CdxsYX42X4IyGkDOdaDLVR3em65v0YT2Lo-1KQGjjndCLf_w447fhhYKKq7O-aGkeRL0vetdUpfyZROlsinVo5RqRW0mB8CYojpQn0uHHNcbR2v9rNr-HV6Ywim4oCY9r4sP7C5frdirdtoSpdQfpeRDBY9i02x0Tt7zV9VWA1DFcWYCz0QJf38ngIIcrCw5JsANFGHrxXEh876lqHbftFXxvkopJ2u-tTG1v7MBHbRtUlobTNsGMfqT9R3zOzv7YoEDZGPnczXGihwbd7ljrskm7dB87J67jRYNw-nWsVl6YCh5WV7sQYI8v--MQZ4vEaSTR7kup4ZzQyg2OILyEzMfI34Z9qkYvRrITaRNwY8cnYnSsGmt8mN2YLpNdmYt5HEf-YS_EY0-imoNMdtHwKejEM2uZjjzbe7KnhpGJT6UImkSGiz0NVtnQc7xTacZUGw87v7-x0_pq012c",
  110.   "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJrZXlBdXRob3JpemF0aW9uIjogImRGWWtBMk90OXU1QmdGZ1dzeGZheXhKdU5IUktnNHRZQzUxNF93MGNZMVUuWEhzUEt4VVhkSW85cG83OXNndW9XT3UtOUJrYldWaDFTaEhyaXBSc2RndyIsCiAgInR5cGUiOiAiaHR0cC0wMSIKfQ"
  111. }
  112. 2018-11-20 10:13:03,319:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166 HTTP/1.1" 200 223
  113. 2018-11-20 10:13:03,320:DEBUG:acme.client:Received response:
  114. HTTP 200
  115. Server: nginx
  116. Content-Type: application/json
  117. Content-Length: 223
  118. Boulder-Requester: 44791664
  119. Link: <https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY>;rel="up"
  120. Location: https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166
  121. Replay-Nonce: e3JQUzVziMC4QTLZCcOokuj8dk9BLNsElskQxJCG_0k
  122. X-Frame-Options: DENY
  123. Strict-Transport-Security: max-age=604800
  124. Expires: Tue, 20 Nov 2018 09:13:03 GMT
  125. Cache-Control: max-age=0, no-cache, no-store
  126. Pragma: no-cache
  127. Date: Tue, 20 Nov 2018 09:13:03 GMT
  128. Connection: keep-alive
  129.  
  130. b'{\n  "type": "http-01",\n  "status": "pending",\n  "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n  "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U"\n}'
  131. 2018-11-20 10:13:03,320:DEBUG:acme.client:Storing nonce: e3JQUzVziMC4QTLZCcOokuj8dk9BLNsElskQxJCG_0k
  132. 2018-11-20 10:13:06,324:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY.
  133. 2018-11-20 10:13:06,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY HTTP/1.1" 200 1825
  134. 2018-11-20 10:13:06,490:DEBUG:acme.client:Received response:
  135. HTTP 200
  136. Server: nginx
  137. Content-Type: application/json
  138. Content-Length: 1825
  139. X-Frame-Options: DENY
  140. Strict-Transport-Security: max-age=604800
  141. Expires: Tue, 20 Nov 2018 09:13:06 GMT
  142. Cache-Control: max-age=0, no-cache, no-store
  143. Pragma: no-cache
  144. Date: Tue, 20 Nov 2018 09:13:06 GMT
  145. Connection: keep-alive
  146.  
  147. b'{\n  "identifier": {\n    "type": "dns",\n    "value": "blog.samfreaks.de"\n  },\n  "status": "invalid",\n  "expires": "2018-11-27T09:13:02Z",\n  "challenges": [\n    {\n      "type": "tls-alpn-01",\n      "status": "invalid",\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162",\n      "token": "TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo"\n    },\n    {\n      "type": "dns-01",\n      "status": "invalid",\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576164",\n      "token": "B541dZyLHg3_Cweq8f-kSR2r-_gDBAbkKYoeFoM7_a0"\n    },\n    {\n      "type": "http-01",\n      "status": "invalid",\n      "error": {\n        "type": "urn:ietf:params:acme:error:unauthorized",\n        "detail": "Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: \\"\\u003chtml\\u003e\\\\r\\\\n\\u003chead\\u003e\\u003ctitle\\u003e404 Not Found\\u003c/title\\u003e\\u003c/head\\u003e\\\\r\\\\n\\u003cbody\\u003e\\\\r\\\\n\\u003ccenter\\u003e\\u003ch1\\u003e404 Not Found\\u003c/h1\\u003e\\u003c/center\\u003e\\\\r\\\\n\\u003chr\\u003e\\u003ccenter\\u003enginx/1.15.4\\u003c/ce\\"",\n        "status": 403\n      },\n      "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n      "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U",\n      "validationRecord": [\n        {\n          "url": "http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U",\n          "hostname": "blog.samfreaks.de",\n          "port": "80",\n          "addressesResolved": [\n            "5.9.113.39",\n            "2a01:4f8:162:542e::2"\n          ],\n          "addressUsed": "2a01:4f8:162:542e::2"\n        }\n      ]\n    }\n  ]\n}'
  148. 2018-11-20 10:13:06,491:DEBUG:acme.challenges:tls-alpn-01 was not recognized, full message: {'type': 'tls-alpn-01', 'status': 'invalid', 'url': 'https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162', 'token': 'TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo'}
  149. 2018-11-20 10:13:06,493:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
  150.  
  151. Domain: blog.samfreaks.de
  152. Type:   unauthorized
  153. Detail: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
  154.  
  155. To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
  156. 2018-11-20 10:13:06,494:DEBUG:certbot.error_handler:Encountered exception:
  157. Traceback (most recent call last):
  158.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 80, in handle_authorizations
  159.     self._respond(aauthzrs, resp, best_effort)
  160.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 153, in _respond
  161.     self._poll_challenges(aauthzrs, chall_update, best_effort)
  162.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 224, in _poll_challenges
  163.     raise errors.FailedChallenges(all_failed_achalls)
  164. certbot.errors.FailedChallenges: Failed authorization procedure. blog.samfreaks.de (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
  165.  
  166. 2018-11-20 10:13:06,494:DEBUG:certbot.error_handler:Calling registered functions
  167. 2018-11-20 10:13:06,494:INFO:certbot.auth_handler:Cleaning up challenges
  168. 2018-11-20 10:13:06,495:DEBUG:certbot.plugins.webroot:Removing /usr/local/ispconfig/interface/acme/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U
  169. 2018-11-20 10:13:06,495:DEBUG:certbot.plugins.webroot:All challenges cleaned up
  170. 2018-11-20 10:13:06,496:DEBUG:certbot.log:Exiting abnormally:
  171. Traceback (most recent call last):
  172.   File "/usr/bin/letsencrypt", line 11, in <module>
  173.     load_entry_point('certbot==0.23.0', 'console_scripts', 'certbot')()
  174.   File "/usr/lib/python3/dist-packages/certbot/main.py", line 1266, in main
  175.     return config.func(config, plugins)
  176.   File "/usr/lib/python3/dist-packages/certbot/main.py", line 1157, in certonly
  177.     lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
  178.   File "/usr/lib/python3/dist-packages/certbot/main.py", line 118, in _get_and_save_cert
  179.     lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  180.   File "/usr/lib/python3/dist-packages/certbot/client.py", line 350, in obtain_and_enroll_certificate
  181.     cert, chain, key, _ = self.obtain_certificate(domains)
  182.   File "/usr/lib/python3/dist-packages/certbot/client.py", line 294, in obtain_certificate
  183.     orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  184.   File "/usr/lib/python3/dist-packages/certbot/client.py", line 330, in _get_order_and_authorizations
  185.     authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  186.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 80, in handle_authorizations
  187.     self._respond(aauthzrs, resp, best_effort)
  188.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 153, in _respond
  189.     self._poll_challenges(aauthzrs, chall_update, best_effort)
  190.   File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 224, in _poll_challenges
  191.     raise errors.FailedChallenges(all_failed_achalls)
  192. certbot.errors.FailedChallenges: Failed authorization procedure. blog.samfreaks.de (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top