-
-
Save Flobin/2681fb3cfb6fa85ad91d1f320b5d01db to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2018-02-06 09:47:42,132:DEBUG:certbot.main:certbot version: 0.19.0 | |
2018-02-06 09:47:42,133:DEBUG:certbot.main:Arguments: ['--nginx', '-d', 'davlstudio.com', '-d', 'www.davlstudio.com'] | |
2018-02-06 09:47:42,133:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) | |
2018-02-06 09:47:42,154:DEBUG:certbot.log:Root logging level set at 20 | |
2018-02-06 09:47:42,155:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log | |
2018-02-06 09:47:42,156:DEBUG:certbot.plugins.selection:Requested authenticator nginx and installer nginx | |
2018-02-06 09:47:42,352:DEBUG:certbot.plugins.selection:Single candidate plugin: * nginx | |
Description: Nginx Web Server plugin - Alpha | |
Interfaces: IAuthenticator, IInstaller, IPlugin | |
Entry point: nginx = certbot_nginx.configurator:NginxConfigurator | |
Initialized: <certbot_nginx.configurator.NginxConfigurator object at 0x7f9552ee1250> | |
Prep: True | |
2018-02-06 09:47:42,353:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_nginx.configurator.NginxConfigurator object at 0x7f9552ee1250> and installer <certbot_nginx.configurator.NginxConfigurator object at 0x7f9552ee1250> | |
2018-02-06 09:47:42,354:INFO:certbot.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx | |
2018-02-06 09:47:42,359:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(status=u'valid', contact=(u'mailto:robinberghuys@gmail.com',), agreement=u'https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf', key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7f9552ed5c10>)>)), uri=u'https://acme-v01.api.letsencrypt.org/acme/reg/28881903', new_authzr_uri=u'https://acme-v01.api.letsencrypt.org/acme/new-authz', terms_of_service=u'https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'), ed2632619de61e042436b4f82db7d724, Meta(creation_host=u'davlstudio', creation_dt=datetime.datetime(2018, 2, 5, 10, 36, 12, tzinfo=<UTC>)))> | |
2018-02-06 09:47:42,360:DEBUG:acme.client:Sending GET request to https://acme-v01.api.letsencrypt.org/directory. | |
2018-02-06 09:47:42,363:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v01.api.letsencrypt.org | |
2018-02-06 09:47:42,563:DEBUG:urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 562 | |
2018-02-06 09:47:42,564:DEBUG:acme.client:Received response: | |
HTTP 200 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 562 | |
Replay-Nonce: --r36Jp1gIhtjAzL7vwidIQIOMZJf4f-ADaOS3fq_t0 | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 06 Feb 2018 09:47:42 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 06 Feb 2018 09:47:42 GMT | |
Connection: keep-alive | |
{ | |
"NpW_nwt_hmo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", | |
"key-change": "https://acme-v01.api.letsencrypt.org/acme/key-change", | |
"meta": { | |
"terms-of-service": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf" | |
}, | |
"new-authz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", | |
"new-cert": "https://acme-v01.api.letsencrypt.org/acme/new-cert", | |
"new-reg": "https://acme-v01.api.letsencrypt.org/acme/new-reg", | |
"revoke-cert": "https://acme-v01.api.letsencrypt.org/acme/revoke-cert" | |
} | |
2018-02-06 09:47:42,565:INFO:certbot.main:Obtaining a new certificate | |
2018-02-06 09:47:42,565:DEBUG:acme.client:Requesting fresh nonce | |
2018-02-06 09:47:42,566:DEBUG:acme.client:Sending HEAD request to https://acme-v01.api.letsencrypt.org/acme/new-authz. | |
2018-02-06 09:47:42,764:DEBUG:urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "HEAD /acme/new-authz HTTP/1.1" 405 0 | |
2018-02-06 09:47:42,766:DEBUG:acme.client:Received response: | |
HTTP 405 | |
Server: nginx | |
Content-Type: application/problem+json | |
Content-Length: 91 | |
Allow: POST | |
Replay-Nonce: blfK0EnFgS8fvdcW7QxuTI_qeS3ypfQrRZN3lxe-ouM | |
Expires: Tue, 06 Feb 2018 09:47:42 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 06 Feb 2018 09:47:42 GMT | |
Connection: keep-alive | |
2018-02-06 09:47:42,766:DEBUG:acme.client:Storing nonce: blfK0EnFgS8fvdcW7QxuTI_qeS3ypfQrRZN3lxe-ouM | |
2018-02-06 09:47:42,766:DEBUG:acme.client:JWS payload: | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "davlstudio.com" | |
}, | |
"resource": "new-authz" | |
} | |
2018-02-06 09:47:42,773:DEBUG:acme.client:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz: | |
{ | |
"protected": "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", | |
"payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAiZGF2bHN0dWRpby5jb20iCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ", | |
"signature": "V0zlq7ZZ2MV64NdxKwaeV6p76Chn2_fUQW39e8BJVvcCVKoqjwjcptlcCcAS7jplnF94WSb8YY32ImegNBr6K3kOd0eeayw-4hSAbT2yR_JU2aQIsux_iDMmOI4ae-DhG8fxF9t8QcaPnwRe2O2TG3k_X8f3Xmuak43SSK8-LV6qRFy8SuxmU2QXjVySKb6oBSrE3GkEoyHfw4RMC8RSe2OrOAPAcf0jFYn8bsOs5hKKBevXE8EmKYO16LCfelEaAeUN7Y7hWuI7t9-RUCbTzhroAnhqKilBCKcKqSvSS9EJmQcns0gFd16GR4Cop5i91kMPdwfJNJE_cR7HF3Vseg" | |
} | |
2018-02-06 09:47:43,060:DEBUG:urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "POST /acme/new-authz HTTP/1.1" 201 719 | |
2018-02-06 09:47:43,061:DEBUG:acme.client:Received response: | |
HTTP 201 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 719 | |
Boulder-Requester: 28881903 | |
Link: <https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next" | |
Location: https://acme-v01.api.letsencrypt.org/acme/authz/9x-e_fLoSNbWrnG9j_En3jw0dlm51EsUr90PxkdFk2I | |
Replay-Nonce: ydCtgWMRbp2051Pa2melyg8qkDhs_JnBozX-VMkwj8E | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 06 Feb 2018 09:47:43 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 06 Feb 2018 09:47:43 GMT | |
Connection: keep-alive | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "davlstudio.com" | |
}, | |
"status": "pending", | |
"expires": "2018-02-12T10:36:15Z", | |
"challenges": [ | |
{ | |
"type": "dns-01", | |
"status": "pending", | |
"uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/9x-e_fLoSNbWrnG9j_En3jw0dlm51EsUr90PxkdFk2I/3352197118", | |
"token": "4_56zsjQGbtp8Hg10surbBq5B7LTp2p6u_95Bc_isME" | |
}, | |
{ | |
"type": "http-01", | |
"status": "pending", | |
"uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/9x-e_fLoSNbWrnG9j_En3jw0dlm51EsUr90PxkdFk2I/3352197120", | |
"token": "VouZcpdtnCUIxu2n_srUTs8hEFmacjMaoW917Rom5B0" | |
} | |
], | |
"combinations": [ | |
[ | |
1 | |
], | |
[ | |
0 | |
] | |
] | |
} | |
2018-02-06 09:47:43,062:DEBUG:acme.client:Storing nonce: ydCtgWMRbp2051Pa2melyg8qkDhs_JnBozX-VMkwj8E | |
2018-02-06 09:47:43,063:DEBUG:acme.client:JWS payload: | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "www.davlstudio.com" | |
}, | |
"resource": "new-authz" | |
} | |
2018-02-06 09:47:43,066:DEBUG:acme.client:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz: | |
{ | |
"protected": "eyJub25jZSI6ICJ5ZEN0Z1dNUmJwMjA1MVBhMm1lbHlnOHFrRGhzX0puQm96WC1WTWt3ajhFIiwgImFsZyI6ICJSUzI1NiIsICJqd2siOiB7ImUiOiAiQVFBQiIsICJrdHkiOiAiUlNBIiwgIm4iOiAiNGxzVFI0OEw1NWo0TVpQWjdzRTNMazlrSEJPbkdMYWtLQjdNZWczb2ZuS0I1eTJrMGpEb0lmZTdLVDZ2M2oxSGQwc2R4WHQ1LTk4TDU2SjFhM2RJY1FMUUIxY2JOZV9JeE1hNzMwX1hTdFNicmotcjE1SjZaZUFlM2trYmV5MnNvQW51dUxBY3dRclBMaDIyakR3M3RrcWxiVllMYWtwS09VenJfWUw4Qm14LV9jUUZCWThwTXlqMkwtTFREQjBXbWs4WmtUdTVodm93TU1FNUJWMjNMZDBOZEpiclpsbzAwWjNTZnFIWFcydWdrUjlia3lMaXZtSXVOTElEeEhrUWxHSmZ2OFRIMmp1aXM1amVMVXNVSDJKVE9MQWpzMl9YeldHRENVQ2lraW9iYm5qX3E5MktRNm8xYWFLOXNGanBKbVJRdVlndHFRN3hQdjVzSTZFRTN3In19", | |
"payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAid3d3LmRhdmxzdHVkaW8uY29tIgogIH0sIAogICJyZXNvdXJjZSI6ICJuZXctYXV0aHoiCn0", | |
"signature": "ZawQA2K6hUR0xndpXTa1SBPhzA5YMVZu3vtpm_mfNnYZOq1qcjtebd6jy4BISArR2MHy7SFLL9XhK13LCH31wac5TsKjGVwK56KamEtCLhiKZZrmnjM-x2W3MwXDr_sQHfpMVw8RLvDWSs03vXn-0SVlsl8-qaALh_3uNpwYF-usLQJfhro0cpikfY_Y9rn40orLu4l-Bp4AWH77ZbGsxfMCXPprty5LMXTltTLuOpQMPx108ElN1esvD1slGCoyOQ7JW8FVgfwbqvQalZJEB7zsUVqx8OPpcGkaRLBNVr-Tb9R47jTXesClNSb4pfY8qm7_sgKfZuZeiyaXy4Oyaw" | |
} | |
2018-02-06 09:47:43,353:DEBUG:urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "POST /acme/new-authz HTTP/1.1" 201 723 | |
2018-02-06 09:47:43,354:DEBUG:acme.client:Received response: | |
HTTP 201 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 723 | |
Boulder-Requester: 28881903 | |
Link: <https://acme-v01.api.letsencrypt.org/acme/new-cert>;rel="next" | |
Location: https://acme-v01.api.letsencrypt.org/acme/authz/6WkuCk4_egru9OaWa2I_gKQ3MiTeracs1R_NsbbXlNo | |
Replay-Nonce: SWdAjdwN76xnY7041H5lMTapym9FIiwIziAoNOw0ono | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 06 Feb 2018 09:47:43 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 06 Feb 2018 09:47:43 GMT | |
Connection: keep-alive | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "www.davlstudio.com" | |
}, | |
"status": "pending", | |
"expires": "2018-02-12T10:36:16Z", | |
"challenges": [ | |
{ | |
"type": "http-01", | |
"status": "pending", | |
"uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/6WkuCk4_egru9OaWa2I_gKQ3MiTeracs1R_NsbbXlNo/3352197192", | |
"token": "dTm-DiFshPoZKX_FC0z_2oo0p27L9ma-bsX6Oe-0T28" | |
}, | |
{ | |
"type": "dns-01", | |
"status": "pending", | |
"uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/6WkuCk4_egru9OaWa2I_gKQ3MiTeracs1R_NsbbXlNo/3352197193", | |
"token": "zmAzLJ4IXaUvxaGeS01QoB4fIckGmQsPLBBZgrkBB78" | |
} | |
], | |
"combinations": [ | |
[ | |
0 | |
], | |
[ | |
1 | |
] | |
] | |
} | |
2018-02-06 09:47:43,354:DEBUG:acme.client:Storing nonce: SWdAjdwN76xnY7041H5lMTapym9FIiwIziAoNOw0ono | |
2018-02-06 09:47:43,355:INFO:certbot.auth_handler:Performing the following challenges: | |
2018-02-06 09:47:43,355:CRITICAL:certbot.auth_handler:Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. | |
2018-02-06 09:47:43,356:DEBUG:certbot.log:Exiting abnormally: | |
Traceback (most recent call last): | |
File "/usr/bin/certbot", line 11, in <module> | |
load_entry_point('certbot==0.19.0', 'console_scripts', 'certbot')() | |
File "/usr/lib/python2.7/dist-packages/certbot/main.py", line 861, in main | |
return config.func(config, plugins) | |
File "/usr/lib/python2.7/dist-packages/certbot/main.py", line 698, in run | |
certname, lineage) | |
File "/usr/lib/python2.7/dist-packages/certbot/main.py", line 85, in _get_and_save_cert | |
lineage = le_client.obtain_and_enroll_certificate(domains, certname) | |
File "/usr/lib/python2.7/dist-packages/certbot/client.py", line 357, in obtain_and_enroll_certificate | |
certr, chain, key, _ = self.obtain_certificate(domains) | |
File "/usr/lib/python2.7/dist-packages/certbot/client.py", line 318, in obtain_certificate | |
self.config.allow_subset_of_names) | |
File "/usr/lib/python2.7/dist-packages/certbot/auth_handler.py", line 68, in get_authorizations | |
self._choose_challenges(domains) | |
File "/usr/lib/python2.7/dist-packages/certbot/auth_handler.py", line 103, in _choose_challenges | |
self.authzr[dom].body.combinations) | |
File "/usr/lib/python2.7/dist-packages/certbot/auth_handler.py", line 374, in gen_challenge_path | |
return _find_smart_path(challbs, preferences, combinations) | |
File "/usr/lib/python2.7/dist-packages/certbot/auth_handler.py", line 411, in _find_smart_path | |
_report_no_chall_path() | |
File "/usr/lib/python2.7/dist-packages/certbot/auth_handler.py", line 442, in _report_no_chall_path | |
raise errors.AuthorizationError(msg) | |
AuthorizationError: Client with the currently selected authenticator does not support any combination of challenges that will satisfy the CA. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment