Advertisement
Team_SundK

Letsencrypt Log

Nov 20th, 2018
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.57 KB | None | 0 0
  1. 2018-11-20 10:13:01,877:DEBUG:certbot.main:certbot version: 0.23.0
  2. 2018-11-20 10:13:01,877:DEBUG:certbot.main:Arguments: ['-n', '--text', '--agree-tos', '--expand', '--authenticator', 'webroot', '--server', 'https://acme-v02.api.letsencrypt.org/directory', '--rsa-key-size', '4096', '--email', 'postmaster@blog.samfreaks.de', '--domains', 'blog.samfreaks.de', '--webroot-path', '/usr/local/ispconfig/interface/acme']
  3. 2018-11-20 10:13:01,878:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
  4. 2018-11-20 10:13:01,883:DEBUG:certbot.log:Root logging level set at 20
  5. 2018-11-20 10:13:01,884:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
  6. 2018-11-20 10:13:01,884:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
  7. 2018-11-20 10:13:01,884:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot
  8. Description: Place files in webroot directory
  9. Interfaces: IAuthenticator, IPlugin
  10. Entry point: webroot = certbot.plugins.webroot:Authenticator
  11. Initialized: <certbot.plugins.webroot.Authenticator object at 0x7f5a095a0f60>
  12. Prep: True
  13. 2018-11-20 10:13:01,885:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7f5a095a0f60> and installer None
  14. 2018-11-20 10:13:01,885:INFO:certbot.plugins.selection:Plugins selected: Authenticator webroot, Installer None
  15. 2018-11-20 10:13:01,889:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7f5a0853b9b0>)>), contact=('mailto:postmaster@mail.ktmsecure.de',), agreement=None, status='valid', terms_of_service_agreed=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/44791664', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'), f84482c897ff641016ba9ce0eb69c0fc, Meta(creation_dt=datetime.datetime(2018, 10, 30, 17, 6, 6, tzinfo=<UTC>), creation_host='mail.ktmsecure.de'))>
  16. 2018-11-20 10:13:01,890:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
  17. 2018-11-20 10:13:01,891:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
  18. 2018-11-20 10:13:02,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
  19. 2018-11-20 10:13:02,075:DEBUG:acme.client:Received response:
  20. HTTP 200
  21. Server: nginx
  22. Content-Type: application/json
  23. Content-Length: 658
  24. X-Frame-Options: DENY
  25. Strict-Transport-Security: max-age=604800
  26. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  27. Cache-Control: max-age=0, no-cache, no-store
  28. Pragma: no-cache
  29. Date: Tue, 20 Nov 2018 09:13:02 GMT
  30. Connection: keep-alive
  31.  
  32. b'{\n "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",\n "lIfgUX9KchY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",\n "meta": {\n "caaIdentities": [\n "letsencrypt.org"\n ],\n "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",\n "website": "https://letsencrypt.org"\n },\n "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",\n "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",\n "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",\n "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"\n}'
  33. 2018-11-20 10:13:02,079:INFO:certbot.main:Obtaining a new certificate
  34. 2018-11-20 10:13:02,529:DEBUG:certbot.crypto_util:Generating key (4096 bits): /etc/letsencrypt/keys/0029_key-certbot.pem
  35. 2018-11-20 10:13:02,536:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0029_csr-certbot.pem
  36. 2018-11-20 10:13:02,537:DEBUG:acme.client:Requesting fresh nonce
  37. 2018-11-20 10:13:02,537:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-order.
  38. 2018-11-20 10:13:02,697:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-order HTTP/1.1" 405 0
  39. 2018-11-20 10:13:02,698:DEBUG:acme.client:Received response:
  40. HTTP 405
  41. Server: nginx
  42. Content-Type: application/problem+json
  43. Content-Length: 103
  44. Allow: POST
  45. Replay-Nonce: 2UvjkwGjxJA5U6_4nHiVpUu7boJqiGu_5o35EddBHN4
  46. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  47. Cache-Control: max-age=0, no-cache, no-store
  48. Pragma: no-cache
  49. Date: Tue, 20 Nov 2018 09:13:02 GMT
  50. Connection: keep-alive
  51.  
  52. b''
  53. 2018-11-20 10:13:02,698:DEBUG:acme.client:Storing nonce: 2UvjkwGjxJA5U6_4nHiVpUu7boJqiGu_5o35EddBHN4
  54. 2018-11-20 10:13:02,698:DEBUG:acme.client:JWS payload:
  55. b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "blog.samfreaks.de"\n }\n ],\n "status": "pending",\n "resource": "new-order"\n}'
  56. 2018-11-20 10:13:02,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
  57. {
  58. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDQ3OTE2NjQiLCAibm9uY2UiOiAiMlV2amt3R2p4SkE1VTZfNG5IaVZwVXU3Ym9KcWlHdV81bzM1RWRkQkhONCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
  59. "signature": "mIrclzKe-07ZvkhZf6GUHoRWsEKLACPLwkBAwK3SQTIB7-qpzEFFE43PCOOc1y6ZlyDrujD7HC_-ciYteoW2Qye02YffuIXF1m7mUOIMTk0sgJOxSHylLpvDv7PDO4YE0CtzeNXHI31xsOML2uXjJUo64cN2qpmuie6MzTotMO5WSDZK5Ogpms2CLXJrl0URgF_cjq1n01d_kuWm8z5CYQHbFHfQXjW5F6Su3ahY1U6eKwJTiPTOml__M2u-iChERZg2nk4B0bunpUWfmDj-R4k-X9JgccuHv2kAAPXG10K0fS56QdmCOukS8yyYq1LKlcYDhYyDV3Xfkupm5mkxPOeSNN_9r5Kgi5njVILmahbQbEu2XF6hnkvP96_s7oDs0LnR74coh_dp3h2vfYk2SnR2xowOSMSHQz2q_o8N3g6UpjPgdjbo0dJoWdZqcXxp38F9nSoySyny10oZY33pQXhSmzmSd7p5EXceVb-1wgea_EFVSuYFbM1xhzilNx306m2zCTVfz40oh9szy2YgioyTNh9HitDrauQTBAD6w9uoRb6cuOvY2sRNvhRqAhY8VZ5HLKmZ3fg7hvBhlFYjw1flM4YUyFqpVTV1JGJSQZo3XS90mRcGreVF_Usm8ZBhicgTlFyZezMo1tFfAFizTuUpGH6oLrqALms-kt_EjYM",
  60. "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImJsb2cuc2FtZnJlYWtzLmRlIgogICAgfQogIF0sCiAgInN0YXR1cyI6ICJwZW5kaW5nIiwKICAicmVzb3VyY2UiOiAibmV3LW9yZGVyIgp9"
  61. }
  62. 2018-11-20 10:13:02,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 376
  63. 2018-11-20 10:13:02,949:DEBUG:acme.client:Received response:
  64. HTTP 201
  65. Server: nginx
  66. Content-Type: application/json
  67. Content-Length: 376
  68. Boulder-Requester: 44791664
  69. Location: https://acme-v02.api.letsencrypt.org/acme/order/44791664/183451111
  70. Replay-Nonce: ZHWw7n0J4BHkK-Ms_17G8ywyDpD8V_JI3nPw0BrMYpo
  71. X-Frame-Options: DENY
  72. Strict-Transport-Security: max-age=604800
  73. Expires: Tue, 20 Nov 2018 09:13:02 GMT
  74. Cache-Control: max-age=0, no-cache, no-store
  75. Pragma: no-cache
  76. Date: Tue, 20 Nov 2018 09:13:02 GMT
  77. Connection: keep-alive
  78.  
  79. b'{\n "status": "pending",\n "expires": "2018-11-27T09:13:02.833862517Z",\n "identifiers": [\n {\n "type": "dns",\n "value": "blog.samfreaks.de"\n }\n ],\n "authorizations": [\n "https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY"\n ],\n "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/44791664/183451111"\n}'
  80. 2018-11-20 10:13:02,949:DEBUG:acme.client:Storing nonce: ZHWw7n0J4BHkK-Ms_17G8ywyDpD8V_JI3nPw0BrMYpo
  81. 2018-11-20 10:13:02,949:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY.
  82. 2018-11-20 10:13:03,121:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY HTTP/1.1" 200 909
  83. 2018-11-20 10:13:03,122:DEBUG:acme.client:Received response:
  84. HTTP 200
  85. Server: nginx
  86. Content-Type: application/json
  87. Content-Length: 909
  88. X-Frame-Options: DENY
  89. Strict-Transport-Security: max-age=604800
  90. Expires: Tue, 20 Nov 2018 09:13:03 GMT
  91. Cache-Control: max-age=0, no-cache, no-store
  92. Pragma: no-cache
  93. Date: Tue, 20 Nov 2018 09:13:03 GMT
  94. Connection: keep-alive
  95.  
  96. b'{\n "identifier": {\n "type": "dns",\n "value": "blog.samfreaks.de"\n },\n "status": "pending",\n "expires": "2018-11-27T09:13:02Z",\n "challenges": [\n {\n "type": "tls-alpn-01",\n "status": "pending",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162",\n "token": "TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo"\n },\n {\n "type": "dns-01",\n "status": "pending",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576164",\n "token": "B541dZyLHg3_Cweq8f-kSR2r-_gDBAbkKYoeFoM7_a0"\n },\n {\n "type": "http-01",\n "status": "pending",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U"\n }\n ]\n}'
  97. 2018-11-20 10:13:03,122:DEBUG:acme.challenges:tls-alpn-01 was not recognized, full message: {'type': 'tls-alpn-01', 'status': 'pending', 'url': 'https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162', 'token': 'TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo'}
  98. 2018-11-20 10:13:03,123:INFO:certbot.auth_handler:Performing the following challenges:
  99. 2018-11-20 10:13:03,123:INFO:certbot.auth_handler:http-01 challenge for blog.samfreaks.de
  100. 2018-11-20 10:13:03,123:INFO:certbot.plugins.webroot:Using the webroot path /usr/local/ispconfig/interface/acme for all unmatched domains.
  101. 2018-11-20 10:13:03,124:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /usr/local/ispconfig/interface/acme/.well-known/acme-challenge
  102. 2018-11-20 10:13:03,133:DEBUG:certbot.plugins.webroot:Attempting to save validation to /usr/local/ispconfig/interface/acme/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U
  103. 2018-11-20 10:13:03,134:INFO:certbot.auth_handler:Waiting for verification...
  104. 2018-11-20 10:13:03,134:DEBUG:acme.client:JWS payload:
  105. b'{\n "resource": "challenge",\n "keyAuthorization": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U.XHsPKxUXdIo9po79sguoWOu-9BkbWVh1ShHripRsdgw",\n "type": "http-01"\n}'
  106. 2018-11-20 10:13:03,141:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166:
  107. {
  108. "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDQ3OTE2NjQiLCAibm9uY2UiOiAiWkhXdzduMEo0QkhrSy1Nc18xN0c4eXd5RHBEOFZfSkkzblB3MEJyTVlwbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGxlbmdlLy1ES1NYOFlRZnE2ekxFWC1RY0piTTBKR2FBd05PbExVVUUwQTFrTFBCRVkvOTQ2OTU3NjE2NiJ9",
  109. "signature": "au7kO9Khr5vyNtvaxtHb93xyYpfd7eHvGWNo7LpyqqL8Gwsbck_Nd2WjKvj9MBfRc33d-4FZqp-A-kPse8OZcvF3gGrmjCvU7YuzrDIYoojJ5nIS5D3-L_RQ4l6GzLQvGKmk-IvemxPctZLZzc3YlZgJ-DpBD8iq6aNDwk_ll-DAy4JP4Ps5MxU5sf7wEtr4kc6f4DYqdY34PqsxU7gznb6c9-CdxsYX42X4IyGkDOdaDLVR3em65v0YT2Lo-1KQGjjndCLf_w447fhhYKKq7O-aGkeRL0vetdUpfyZROlsinVo5RqRW0mB8CYojpQn0uHHNcbR2v9rNr-HV6Ywim4oCY9r4sP7C5frdirdtoSpdQfpeRDBY9i02x0Tt7zV9VWA1DFcWYCz0QJf38ngIIcrCw5JsANFGHrxXEh876lqHbftFXxvkopJ2u-tTG1v7MBHbRtUlobTNsGMfqT9R3zOzv7YoEDZGPnczXGihwbd7ljrskm7dB87J67jRYNw-nWsVl6YCh5WV7sQYI8v--MQZ4vEaSTR7kup4ZzQyg2OILyEzMfI34Z9qkYvRrITaRNwY8cnYnSsGmt8mN2YLpNdmYt5HEf-YS_EY0-imoNMdtHwKejEM2uZjjzbe7KnhpGJT6UImkSGiz0NVtnQc7xTacZUGw87v7-x0_pq012c",
  110. "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJrZXlBdXRob3JpemF0aW9uIjogImRGWWtBMk90OXU1QmdGZ1dzeGZheXhKdU5IUktnNHRZQzUxNF93MGNZMVUuWEhzUEt4VVhkSW85cG83OXNndW9XT3UtOUJrYldWaDFTaEhyaXBSc2RndyIsCiAgInR5cGUiOiAiaHR0cC0wMSIKfQ"
  111. }
  112. 2018-11-20 10:13:03,319:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166 HTTP/1.1" 200 223
  113. 2018-11-20 10:13:03,320:DEBUG:acme.client:Received response:
  114. HTTP 200
  115. Server: nginx
  116. Content-Type: application/json
  117. Content-Length: 223
  118. Boulder-Requester: 44791664
  119. Link: <https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY>;rel="up"
  120. Location: https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166
  121. Replay-Nonce: e3JQUzVziMC4QTLZCcOokuj8dk9BLNsElskQxJCG_0k
  122. X-Frame-Options: DENY
  123. Strict-Transport-Security: max-age=604800
  124. Expires: Tue, 20 Nov 2018 09:13:03 GMT
  125. Cache-Control: max-age=0, no-cache, no-store
  126. Pragma: no-cache
  127. Date: Tue, 20 Nov 2018 09:13:03 GMT
  128. Connection: keep-alive
  129.  
  130. b'{\n "type": "http-01",\n "status": "pending",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U"\n}'
  131. 2018-11-20 10:13:03,320:DEBUG:acme.client:Storing nonce: e3JQUzVziMC4QTLZCcOokuj8dk9BLNsElskQxJCG_0k
  132. 2018-11-20 10:13:06,324:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY.
  133. 2018-11-20 10:13:06,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /acme/authz/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY HTTP/1.1" 200 1825
  134. 2018-11-20 10:13:06,490:DEBUG:acme.client:Received response:
  135. HTTP 200
  136. Server: nginx
  137. Content-Type: application/json
  138. Content-Length: 1825
  139. X-Frame-Options: DENY
  140. Strict-Transport-Security: max-age=604800
  141. Expires: Tue, 20 Nov 2018 09:13:06 GMT
  142. Cache-Control: max-age=0, no-cache, no-store
  143. Pragma: no-cache
  144. Date: Tue, 20 Nov 2018 09:13:06 GMT
  145. Connection: keep-alive
  146.  
  147. b'{\n "identifier": {\n "type": "dns",\n "value": "blog.samfreaks.de"\n },\n "status": "invalid",\n "expires": "2018-11-27T09:13:02Z",\n "challenges": [\n {\n "type": "tls-alpn-01",\n "status": "invalid",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162",\n "token": "TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo"\n },\n {\n "type": "dns-01",\n "status": "invalid",\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576164",\n "token": "B541dZyLHg3_Cweq8f-kSR2r-_gDBAbkKYoeFoM7_a0"\n },\n {\n "type": "http-01",\n "status": "invalid",\n "error": {\n "type": "urn:ietf:params:acme:error:unauthorized",\n "detail": "Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: \\"\\u003chtml\\u003e\\\\r\\\\n\\u003chead\\u003e\\u003ctitle\\u003e404 Not Found\\u003c/title\\u003e\\u003c/head\\u003e\\\\r\\\\n\\u003cbody\\u003e\\\\r\\\\n\\u003ccenter\\u003e\\u003ch1\\u003e404 Not Found\\u003c/h1\\u003e\\u003c/center\\u003e\\\\r\\\\n\\u003chr\\u003e\\u003ccenter\\u003enginx/1.15.4\\u003c/ce\\"",\n "status": 403\n },\n "url": "https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576166",\n "token": "dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U",\n "validationRecord": [\n {\n "url": "http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U",\n "hostname": "blog.samfreaks.de",\n "port": "80",\n "addressesResolved": [\n "5.9.113.39",\n "2a01:4f8:162:542e::2"\n ],\n "addressUsed": "2a01:4f8:162:542e::2"\n }\n ]\n }\n ]\n}'
  148. 2018-11-20 10:13:06,491:DEBUG:acme.challenges:tls-alpn-01 was not recognized, full message: {'type': 'tls-alpn-01', 'status': 'invalid', 'url': 'https://acme-v02.api.letsencrypt.org/acme/challenge/-DKSX8YQfq6zLEX-QcJbM0JGaAwNOlLUUE0A1kLPBEY/9469576162', 'token': 'TT4M5rAYSPY46P1hqsE4IfGDPdFS98o6Nez_ZujfUEo'}
  149. 2018-11-20 10:13:06,493:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
  150.  
  151. Domain: blog.samfreaks.de
  152. Type: unauthorized
  153. Detail: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
  154.  
  155. To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
  156. 2018-11-20 10:13:06,494:DEBUG:certbot.error_handler:Encountered exception:
  157. Traceback (most recent call last):
  158. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 80, in handle_authorizations
  159. self._respond(aauthzrs, resp, best_effort)
  160. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 153, in _respond
  161. self._poll_challenges(aauthzrs, chall_update, best_effort)
  162. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 224, in _poll_challenges
  163. raise errors.FailedChallenges(all_failed_achalls)
  164. certbot.errors.FailedChallenges: Failed authorization procedure. blog.samfreaks.de (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
  165.  
  166. 2018-11-20 10:13:06,494:DEBUG:certbot.error_handler:Calling registered functions
  167. 2018-11-20 10:13:06,494:INFO:certbot.auth_handler:Cleaning up challenges
  168. 2018-11-20 10:13:06,495:DEBUG:certbot.plugins.webroot:Removing /usr/local/ispconfig/interface/acme/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U
  169. 2018-11-20 10:13:06,495:DEBUG:certbot.plugins.webroot:All challenges cleaned up
  170. 2018-11-20 10:13:06,496:DEBUG:certbot.log:Exiting abnormally:
  171. Traceback (most recent call last):
  172. File "/usr/bin/letsencrypt", line 11, in <module>
  173. load_entry_point('certbot==0.23.0', 'console_scripts', 'certbot')()
  174. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1266, in main
  175. return config.func(config, plugins)
  176. File "/usr/lib/python3/dist-packages/certbot/main.py", line 1157, in certonly
  177. lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
  178. File "/usr/lib/python3/dist-packages/certbot/main.py", line 118, in _get_and_save_cert
  179. lineage = le_client.obtain_and_enroll_certificate(domains, certname)
  180. File "/usr/lib/python3/dist-packages/certbot/client.py", line 350, in obtain_and_enroll_certificate
  181. cert, chain, key, _ = self.obtain_certificate(domains)
  182. File "/usr/lib/python3/dist-packages/certbot/client.py", line 294, in obtain_certificate
  183. orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  184. File "/usr/lib/python3/dist-packages/certbot/client.py", line 330, in _get_order_and_authorizations
  185. authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  186. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 80, in handle_authorizations
  187. self._respond(aauthzrs, resp, best_effort)
  188. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 153, in _respond
  189. self._poll_challenges(aauthzrs, chall_update, best_effort)
  190. File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 224, in _poll_challenges
  191. raise errors.FailedChallenges(all_failed_achalls)
  192. certbot.errors.FailedChallenges: Failed authorization procedure. blog.samfreaks.de (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://blog.samfreaks.de/.well-known/acme-challenge/dFYkA2Ot9u5BgFgWsxfayxJuNHRKg4tYC514_w0cY1U: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx/1.15.4</ce"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement