Advertisement
Guest User

Untitled

a guest
Mar 29th, 2019
164
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.93 KB | None | 0 0
  1. 2019-03-29 17:02:24,525:DEBUG:certbot.main:certbot version: 0.28.0
  2. 2019-03-29 17:02:24,590:DEBUG:certbot.main:Arguments: []
  3. 2019-03-29 17:02:24,641:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
  4. 2019-03-29 17:02:25,163:DEBUG:certbot.log:Root logging level set at 20
  5. 2019-03-29 17:02:25,219:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
  6. 2019-03-29 17:02:25,248:DEBUG:certbot.plugins.selection:Requested authenticator None and installer None
  7. 2019-03-29 17:02:26,383:DEBUG:certbot_apache.configurator:Apache version is 2.4.25
  8. 2019-03-29 17:02:32,755:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
  9. Description: Apache Web Server plugin - Beta
  10. Interfaces: IAuthenticator, IInstaller, IPlugin
  11. Entry point: apache = certbot_apache.entrypoint:ENTRYPOINT
  12. Initialized: <certbot_apache.override_debian.DebianConfigurator object at 0xb62ce470>
  13. Prep: True
  14. 2019-03-29 17:02:32,819:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_apache.override_debian.DebianConfigurator object at 0xb62ce470> and installer <certbot_apache.override_debian.DebianConfigurator object at 0xb62ce470>
  15. 2019-03-29 17:02:32,824:INFO:certbot.plugins.selection:Plugins selected: Authenticator apache, Installer apache
  16. 2019-03-29 17:02:32,969:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0xb6344e10>)>), terms_of_service_agreed=None, status=None, only_return_existing=None, contact=('mailto:zach.johnson070@gmail.com',), agreement='https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf'), uri='https://acme-v01.api.letsencrypt.org/acme/reg/8501472', terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf', new_authzr_uri='https://acme-v01.api.letsencrypt.org/acme/new-authz'), 54477d4fa2299fa274955f6b83645040, Meta(creation_dt=datetime.datetime(2017, 1, 19, 3, 46, 59, tzinfo=<UTC>), creation_host='colossus'))>
  17. 2019-03-29 17:02:33,045:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
  18. 2019-03-29 17:02:33,223:DEBUG:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
  19. 2019-03-29 17:02:34,076:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
  20. 2019-03-29 17:02:34,098:DEBUG:acme.client:Received response:
  21. HTTP 200
  22. Server: nginx
  23. Content-Type: application/json
  24. Content-Length: 658
  25. X-Frame-Options: DENY
  26. Strict-Transport-Security: max-age=604800
  27. Expires: Fri, 29 Mar 2019 23:02:34 GMT
  28. Cache-Control: max-age=0, no-cache, no-store
  29. Pragma: no-cache
  30. Date: Fri, 29 Mar 2019 23:02:34 GMT
  31. Connection: keep-alive
  32.  
  33. {
  34. "jjnf74J6yRE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  35. "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  36. "meta": {
  37. "caaIdentities": [
  38. "letsencrypt.org"
  39. ],
  40. "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
  41. "website": "https://letsencrypt.org"
  42. },
  43. "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  44. "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  45. "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  46. "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
  47. }
  48. 2019-03-29 17:02:48,717:INFO:certbot.storage:Attempting to parse the version 0.29.1 renewal configuration file found at /etc/letsencrypt/renewal/thezachcave.com.conf with version 0.28.0 of Certbot. This might not work.
  49. 2019-03-29 17:02:48,840:INFO:certbot.main:Obtaining a new certificate
  50. 2019-03-29 17:02:54,034:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0111_key-certbot.pem
  51. 2019-03-29 17:02:54,207:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0111_csr-certbot.pem
  52. 2019-03-29 17:02:54,221:DEBUG:acme.client:Requesting fresh nonce
  53. 2019-03-29 17:02:54,225:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
  54. 2019-03-29 17:02:54,428:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
  55. 2019-03-29 17:02:54,448:DEBUG:acme.client:Received response:
  56. HTTP 200
  57. Server: nginx
  58. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
  59. Replay-Nonce: Rg8LaFAMIGGtUMUOjxperKY8yGCWpM77UVqnHWTDtAA
  60. X-Frame-Options: DENY
  61. Strict-Transport-Security: max-age=604800
  62. Content-Length: 0
  63. Expires: Fri, 29 Mar 2019 23:02:54 GMT
  64. Cache-Control: max-age=0, no-cache, no-store
  65. Pragma: no-cache
  66. Date: Fri, 29 Mar 2019 23:02:54 GMT
  67. Connection: keep-alive
  68.  
  69.  
  70. 2019-03-29 17:02:54,454:DEBUG:acme.client:Storing nonce: Rg8LaFAMIGGtUMUOjxperKY8yGCWpM77UVqnHWTDtAA
  71. 2019-03-29 17:02:54,464:DEBUG:acme.client:JWS payload:
  72. b'{\n "identifiers": [\n {\n "value": "thezachcave.com",\n "type": "dns"\n }\n ]\n}'
  73. 2019-03-29 17:02:54,629:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
  74. {
  75. "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInZhbHVlIjogInRoZXphY2hjYXZlLmNvbSIsCiAgICAgICJ0eXBlIjogImRucyIKICAgIH0KICBdCn0",
  76. "signature": "qfC81eb9U1bzf6Zk7B861W9KXZ-QusMbBSFrIDlDiR9KA01Uq_nKXmJmi7slaXG3splZ1bez0xADA8aD3G-_bqMnTEu8M0xjjnq0-ZP9NmG_TZbJBep6rCzJpn8yoIYrd73ki4JK5ZjPwID8l4EGS8jte-ZK8NJoOBMMnHpboUKJGUjZPWpSWGPiHvoRRBPtYWbUKKCTUUWGEtG8wzirnTsMw-ji3B_mzswJUoq6X-ikXyKifzYFJAnMCfIK1Fvfd4FITEX8ZNFPx_fs9g8s65t-6Um6TRjcSFhQSrN1UAB3AEpCq0lHFQ2eOFM-S78hKuSVKip88pHLvmi8B38yjA",
  77. "protected": "eyJub25jZSI6ICJSZzhMYUZBTUlHR3RVTVVPanhwZXJLWTh5R0NXcE03N1VWcW5IV1REdEFBIiwgImFsZyI6ICJSUzI1NiIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAxLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9yZWcvODUwMTQ3MiJ9"
  78. }
  79. 2019-03-29 17:02:54,883:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 373
  80. 2019-03-29 17:02:54,906:DEBUG:acme.client:Received response:
  81. HTTP 201
  82. Server: nginx
  83. Content-Type: application/json
  84. Content-Length: 373
  85. Boulder-Requester: 8501472
  86. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
  87. Location: https://acme-v02.api.letsencrypt.org/acme/order/8501472/376785446
  88. Replay-Nonce: QUyquRPGK1O4MuM3mjkwmUMX6k3jSxjsOrU17xgDgy0
  89. X-Frame-Options: DENY
  90. Strict-Transport-Security: max-age=604800
  91. Expires: Fri, 29 Mar 2019 23:02:54 GMT
  92. Cache-Control: max-age=0, no-cache, no-store
  93. Pragma: no-cache
  94. Date: Fri, 29 Mar 2019 23:02:54 GMT
  95. Connection: keep-alive
  96.  
  97. {
  98. "status": "pending",
  99. "expires": "2019-04-05T23:02:54.209193503Z",
  100. "identifiers": [
  101. {
  102. "type": "dns",
  103. "value": "thezachcave.com"
  104. }
  105. ],
  106. "authorizations": [
  107. "https://acme-v02.api.letsencrypt.org/acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM"
  108. ],
  109. "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/8501472/376785446"
  110. }
  111. 2019-03-29 17:02:54,912:DEBUG:acme.client:Storing nonce: QUyquRPGK1O4MuM3mjkwmUMX6k3jSxjsOrU17xgDgy0
  112. 2019-03-29 17:02:54,921:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM.
  113. 2019-03-29 17:02:55,126:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM HTTP/1.1" 200 910
  114. 2019-03-29 17:02:55,146:DEBUG:acme.client:Received response:
  115. HTTP 200
  116. Server: nginx
  117. Content-Type: application/json
  118. Content-Length: 910
  119. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
  120. X-Frame-Options: DENY
  121. Strict-Transport-Security: max-age=604800
  122. Expires: Fri, 29 Mar 2019 23:02:55 GMT
  123. Cache-Control: max-age=0, no-cache, no-store
  124. Pragma: no-cache
  125. Date: Fri, 29 Mar 2019 23:02:55 GMT
  126. Connection: keep-alive
  127.  
  128. {
  129. "identifier": {
  130. "type": "dns",
  131. "value": "thezachcave.com"
  132. },
  133. "status": "pending",
  134. "expires": "2019-04-05T23:02:54Z",
  135. "challenges": [
  136. {
  137. "type": "http-01",
  138. "status": "pending",
  139. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582",
  140. "token": "Pgxn2EIYkExRhWa5nmQmlbOG0BqXAsSOrdhFwxin_no"
  141. },
  142. {
  143. "type": "tls-alpn-01",
  144. "status": "pending",
  145. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311583",
  146. "token": "I4q_vyIVn-lvy1a8Cmob09q9IkLVpADbn2SPhxD3nCU"
  147. },
  148. {
  149. "type": "dns-01",
  150. "status": "pending",
  151. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311584",
  152. "token": "7AXxxcRkuaT25UKjbf5Jmp_v0X6M5Sfi_1nBFxI9lTQ"
  153. }
  154. ]
  155. }
  156. 2019-03-29 17:02:55,170:INFO:certbot.auth_handler:Performing the following challenges:
  157. 2019-03-29 17:02:55,177:INFO:certbot.auth_handler:http-01 challenge for thezachcave.com
  158. 2019-03-29 17:02:57,210:INFO:certbot_apache.override_debian:Enabled Apache rewrite module
  159. 2019-03-29 17:03:00,376:DEBUG:certbot_apache.http_01:Adding a temporary challenge validation Include for name: None in: /etc/apache2/sites-enabled/000-default.conf
  160. 2019-03-29 17:03:00,392:DEBUG:certbot_apache.http_01:writing a pre config file with text:
  161. RewriteEngine on
  162. RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]
  163.  
  164. 2019-03-29 17:03:00,398:DEBUG:certbot_apache.http_01:writing a post config file with text:
  165. <Directory /var/lib/letsencrypt/http_challenges>
  166. Require all granted
  167. </Directory>
  168. <Location /.well-known/acme-challenge>
  169. Require all granted
  170. </Location>
  171.  
  172. 2019-03-29 17:03:00,629:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/000-default.conf
  173. 2019-03-29 17:03:05,916:INFO:certbot.auth_handler:Waiting for verification...
  174. 2019-03-29 17:03:05,937:DEBUG:acme.client:JWS payload:
  175. b'{\n "resource": "challenge",\n "keyAuthorization": "Pgxn2EIYkExRhWa5nmQmlbOG0BqXAsSOrdhFwxin_no.aZyxqSRnUx8q5jAMW52Nq_cB4R7hnkRN307oYAAjQME",\n "type": "http-01"\n}'
  176. 2019-03-29 17:03:06,049:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582:
  177. {
  178. "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJrZXlBdXRob3JpemF0aW9uIjogIlBneG4yRUlZa0V4UmhXYTVubVFtbGJPRzBCcVhBc1NPcmRoRnd4aW5fbm8uYVp5eHFTUm5VeDhxNWpBTVc1Mk5xX2NCNFI3aG5rUk4zMDdvWUFBalFNRSIsCiAgInR5cGUiOiAiaHR0cC0wMSIKfQ",
  179. "signature": "Hl_GcMzw6HjAgOsZ-rbaeou6fdHmcbFR1ri9Tyf3DPLisGEgRFjxw5h5FlKOV37Wy6T4GUzd1FXT8J06xCxtIgOy9MMiVOu6gqqwxEbY7J2lJTBit0TZso0k7SISzrCqGaVIwL0JbMXivGqeXZ1_kkF6WF_yRKzGnI8tBS0gpjoccJ-4IGuLkIbYCygQoI_-ST9gQVKjtH1h8CniBXI9axd9rzFdhAS7dT3qnMH9HGOo0njqcDtpHnOnsuYtsJDgrjX7ZGe5DGihD8az0SweucUNlab5G-oRupfi9sZm_jtSWYT5e9PwI8bqOEVWJCLrfwHJnhm6Oq0LURelX-zn6w",
  180. "protected": "eyJub25jZSI6ICJRVXlxdVJQR0sxTzRNdU0zbWprd21VTVg2azNqU3hqc09yVTE3eGdEZ3kwIiwgImFsZyI6ICJSUzI1NiIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGxlbmdlL2ZZWE5JY0Y5Z05UWkdMelZVSWRBR2M5VG10STNGRWUyU08xaXlkZVYxbE0vMTQxNzUzMTE1ODIiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy84NTAxNDcyIn0"
  181. }
  182. 2019-03-29 17:03:06,283:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582 HTTP/1.1" 200 224
  183. 2019-03-29 17:03:06,306:DEBUG:acme.client:Received response:
  184. HTTP 200
  185. Server: nginx
  186. Content-Type: application/json
  187. Content-Length: 224
  188. Boulder-Requester: 8501472
  189. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM>;rel="up"
  190. Location: https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582
  191. Replay-Nonce: PNXMC0FrI1Rarc8l2QqJYP4g4QMw7lMeNKo_6ngstM4
  192. X-Frame-Options: DENY
  193. Strict-Transport-Security: max-age=604800
  194. Expires: Fri, 29 Mar 2019 23:03:06 GMT
  195. Cache-Control: max-age=0, no-cache, no-store
  196. Pragma: no-cache
  197. Date: Fri, 29 Mar 2019 23:03:06 GMT
  198. Connection: keep-alive
  199.  
  200. {
  201. "type": "http-01",
  202. "status": "pending",
  203. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582",
  204. "token": "Pgxn2EIYkExRhWa5nmQmlbOG0BqXAsSOrdhFwxin_no"
  205. }
  206. 2019-03-29 17:03:06,312:DEBUG:acme.client:Storing nonce: PNXMC0FrI1Rarc8l2QqJYP4g4QMw7lMeNKo_6ngstM4
  207. 2019-03-29 17:03:09,331:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM.
  208. 2019-03-29 17:03:09,608:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM HTTP/1.1" 200 1099
  209. 2019-03-29 17:03:09,627:DEBUG:acme.client:Received response:
  210. HTTP 200
  211. Server: nginx
  212. Content-Type: application/json
  213. Content-Length: 1099
  214. Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
  215. X-Frame-Options: DENY
  216. Strict-Transport-Security: max-age=604800
  217. Expires: Fri, 29 Mar 2019 23:03:09 GMT
  218. Cache-Control: max-age=0, no-cache, no-store
  219. Pragma: no-cache
  220. Date: Fri, 29 Mar 2019 23:03:09 GMT
  221. Connection: keep-alive
  222.  
  223. {
  224. "identifier": {
  225. "type": "dns",
  226. "value": "thezachcave.com"
  227. },
  228. "status": "invalid",
  229. "expires": "2019-04-05T23:02:54Z",
  230. "challenges": [
  231. {
  232. "type": "http-01",
  233. "status": "invalid",
  234. "error": {
  235. "type": "urn:ietf:params:acme:error:connection",
  236. "detail": "unknownHost :: No valid IP addresses found for thezachcave.com",
  237. "status": 400
  238. },
  239. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311582",
  240. "token": "Pgxn2EIYkExRhWa5nmQmlbOG0BqXAsSOrdhFwxin_no"
  241. },
  242. {
  243. "type": "tls-alpn-01",
  244. "status": "invalid",
  245. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311583",
  246. "token": "I4q_vyIVn-lvy1a8Cmob09q9IkLVpADbn2SPhxD3nCU"
  247. },
  248. {
  249. "type": "dns-01",
  250. "status": "invalid",
  251. "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/fYXNIcF9gNTZGLzVUIdAGc9TmtI3FEe2SO1iydeV1lM/14175311584",
  252. "token": "7AXxxcRkuaT25UKjbf5Jmp_v0X6M5Sfi_1nBFxI9lTQ"
  253. }
  254. ]
  255. }
  256. 2019-03-29 17:03:09,661:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
  257.  
  258. Domain: thezachcave.com
  259. Type: connection
  260. Detail: unknownHost :: No valid IP addresses found for thezachcave.com
  261.  
  262. To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided.
  263. 2019-03-29 17:03:09,676:DEBUG:certbot.error_handler:Encountered exception:
  264. Traceback (most recent call last):
  265. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
  266. self._respond(aauthzrs, resp, best_effort)
  267. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 161, in _respond
  268. self._poll_challenges(aauthzrs, chall_update, best_effort)
  269. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 232, in _poll_challenges
  270. raise errors.FailedChallenges(all_failed_achalls)
  271. certbot.errors.FailedChallenges: Failed authorization procedure. thezachcave.com (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: unknownHost :: No valid IP addresses found for thezachcave.com
  272.  
  273. 2019-03-29 17:03:09,681:DEBUG:certbot.error_handler:Calling registered functions
  274. 2019-03-29 17:03:09,685:INFO:certbot.auth_handler:Cleaning up challenges
  275. 2019-03-29 17:03:16,385:DEBUG:certbot.log:Exiting abnormally:
  276. Traceback (most recent call last):
  277. File "/usr/bin/letsencrypt", line 11, in <module>
  278. load_entry_point('certbot==0.28.0', 'console_scripts', 'certbot')()
  279. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1340, in main
  280. return config.func(config, plugins)
  281. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1094, in run
  282. certname, lineage)
  283. File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
  284. lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  285. File "/usr/lib/python3/dist-packages/certbot/client.py", line 392, in obtain_and_enroll_certificate
  286. cert, chain, key, _ = self.obtain_certificate(domains)
  287. File "/usr/lib/python3/dist-packages/certbot/client.py", line 335, in obtain_certificate
  288. orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  289. File "/usr/lib/python3/dist-packages/certbot/client.py", line 371, in _get_order_and_authorizations
  290. authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  291. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
  292. self._respond(aauthzrs, resp, best_effort)
  293. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 161, in _respond
  294. self._poll_challenges(aauthzrs, chall_update, best_effort)
  295. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 232, in _poll_challenges
  296. raise errors.FailedChallenges(all_failed_achalls)
  297. certbot.errors.FailedChallenges: Failed authorization procedure. thezachcave.com (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: unknownHost :: No valid IP addresses found for thezachcave.com
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement