Created
May 30, 2017 22:01
-
-
Save sahsanu/f0993ac953dd1beee5e780f8e250bcd4 to your computer and use it in GitHub Desktop.
get cert redirecting with ip
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2017-05-30 21:51:39,452:DEBUG:certbot.main:certbot version: 0.14.2 | |
2017-05-30 21:51:39,453:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/usr/share/nginx/html/', '-d', 'redirect.27a.net', '--register-unsafely-without-email', '--dry-run'] | |
2017-05-30 21:51:39,453:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) | |
2017-05-30 21:51:39,531:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer <certbot.cli._Default object at 0x7ff712d6a590> | |
2017-05-30 21:51:39,531:DEBUG:certbot.cli:Default Detector is Namespace(account=<certbot.cli._Default object at 0x7ff712d44590>, agree_dev_preview=None, allow_subset_of_names=<certbot.cli._Default object at 0x7ff712d44190>, apache=<certbot.cli._Default object at 0x7ff712d6a890>, apache_challenge_location=<certbot.cli._Default object at 0x7ff712d714d0>, apache_ctl=<certbot.cli._Default object at 0x7ff712d3b350>, apache_dismod=<certbot.cli._Default object at 0x7ff712d6aed0>, apache_enmod=<certbot.cli._Default object at 0x7ff712d6add0>, apache_handle_modules=<certbot.cli._Default object at 0x7ff712d71650>, apache_handle_sites=<certbot.cli._Default object at 0x7ff712d717d0>, apache_init_script=<certbot.cli._Default object at 0x7ff712d719d0>, apache_le_vhost_ext=<certbot.cli._Default object at 0x7ff712d71050>, apache_logs_root=<certbot.cli._Default object at 0x7ff712d71390>, apache_server_root=<certbot.cli._Default object at 0x7ff712d71190>, apache_vhost_root=<certbot.cli._Default object at 0x7ff712d71290>, authenticator='webroot', break_my_certs=<certbot.cli._Default object at 0x7ff712d631d0>, cert_path=<certbot.cli._Default object at 0x7ff712d66d50>, certname=<certbot.cli._Default object at 0x7ff712da9f10>, chain_path=<certbot.cli._Default object at 0x7ff712d6a090>, checkpoints=<certbot.cli._Default object at 0x7ff712d66850>, config_dir=<certbot.cli._Default object at 0x7ff712d6a190>, config_file=None, configurator=<certbot.cli._Default object at 0x7ff712d6a590>, csr=<certbot.cli._Default object at 0x7ff712d66610>, debug=<certbot.cli._Default object at 0x7ff712d44c90>, debug_challenges=<certbot.cli._Default object at 0x7ff712d44d90>, dialog=None, domains='redirect.27a.net', dry_run=True, duplicate=<certbot.cli._Default object at 0x7ff712d44690>, eff_email=<certbot.cli._Default object at 0x7ff712da9790>, email=<certbot.cli._Default object at 0x7ff712da9910>, expand=<certbot.cli._Default object at 0x7ff712da9350>, force_interactive=<certbot.cli._Default object at 0x7ff712dad5d0>, fullchain_path=<certbot.cli._Default object at 0x7ff712d66f50>, func=<function certonly at 0x7ff712f96938>, hsts=<certbot.cli._Default object at 0x7ff712d636d0>, http01_port=<certbot.cli._Default object at 0x7ff712d630d0>, ifaces=<certbot.cli._Default object at 0x7ff712d66b50>, init=<certbot.cli._Default object at 0x7ff712d66950>, installer=<certbot.cli._Default object at 0x7ff712d6a590>, key_path=<certbot.cli._Default object at 0x7ff712d66e50>, logs_dir=<certbot.cli._Default object at 0x7ff712d6a390>, manual=<certbot.cli._Default object at 0x7ff712d6ab90>, manual_auth_hook=<certbot.cli._Default object at 0x7ff712d6ad90>, manual_cleanup_hook=<certbot.cli._Default object at 0x7ff712d71c10>, manual_public_ip_logging_ok=<certbot.cli._Default object at 0x7ff712d6ae50>, must_staple=<certbot.cli._Default object at 0x7ff712d633d0>, nginx=<certbot.cli._Default object at 0x7ff712d6a990>, nginx_ctl=<certbot.cli._Default object at 0x7ff712d6a910>, nginx_server_root=<certbot.cli._Default object at 0x7ff712d6ab10>, no_bootstrap=<certbot.cli._Default object at 0x7ff712d44990>, no_self_upgrade=<certbot.cli._Default object at 0x7ff712d44890>, no_verify_ssl=<certbot.cli._Default object at 0x7ff712d44e90>, noninteractive_mode=<certbot.cli._Default object at 0x7ff712dad2d0>, num=<certbot.cli._Default object at 0x7ff712d66490>, os_packages_only=<certbot.cli._Default object at 0x7ff712d44790>, post_hook=<certbot.cli._Default object at 0x7ff712d63fd0>, pre_hook=<certbot.cli._Default object at 0x7ff712d63ed0>, pref_challs=<certbot.cli._Default object at 0x7ff712d63dd0>, prepare=<certbot.cli._Default object at 0x7ff712d66a50>, quiet=<certbot.cli._Default object at 0x7ff712d44a90>, reason=<certbot.cli._Default object at 0x7ff712d66750>, redirect=<certbot.cli._Default object at 0x7ff712d634d0>, register_unsafely_without_email=True, reinstall=<certbot.cli._Default object at 0x7ff712da9090>, renew_by_default=<certbot.cli._Default object at 0x7ff712d9eb10>, renew_hook=<certbot.cli._Default object at 0x7ff712d66110>, renew_with_new_domains=<certbot.cli._Default object at 0x7ff712d44090>, rsa_key_size=<certbot.cli._Default object at 0x7ff712d632d0>, server=<certbot.cli._Default object at 0x7ff712d6a490>, staging=<certbot.cli._Default object at 0x7ff712d44b90>, standalone=<certbot.cli._Default object at 0x7ff712d6aa90>, standalone_supported_challenges=<certbot.cli._Default object at 0x7ff712d6a710>, staple=<certbot.cli._Default object at 0x7ff712d63ad0>, strict_permissions=<certbot.cli._Default object at 0x7ff712d63cd0>, text_mode=<certbot.cli._Default object at 0x7ff712dad210>, tls_sni_01_port=<certbot.cli._Default object at 0x7ff712d44f90>, tos=<certbot.cli._Default object at 0x7ff712d443d0>, uir=<certbot.cli._Default object at 0x7ff712d638d0>, update_registration=<certbot.cli._Default object at 0x7ff712da9a90>, user_agent=<certbot.cli._Default object at 0x7ff712dadb50>, validate_hooks=<certbot.cli._Default object at 0x7ff712d66210>, verb='certonly', verbose_count=<certbot.cli._Default object at 0x7ff712dad390>, webroot=True, webroot_map=<certbot.cli._Default object at 0x7ff712d6a310>, webroot_path='/usr/share/nginx/html/', work_dir=<certbot.cli._Default object at 0x7ff712d6a290>) | |
2017-05-30 21:51:39,555:DEBUG:certbot.log:Root logging level set at 20 | |
2017-05-30 21:51:39,556:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log | |
2017-05-30 21:51:39,557:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None | |
2017-05-30 21:51:39,564:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot | |
Description: Place files in webroot directory | |
Interfaces: IAuthenticator, IPlugin | |
Entry point: webroot = certbot.plugins.webroot:Authenticator | |
Initialized: <certbot.plugins.webroot.Authenticator object at 0x7ff712d6a150> | |
Prep: True | |
2017-05-30 21:51:39,565:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7ff712d6a150> and installer None | |
2017-05-30 21:51:39,886:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/directory. | |
2017-05-30 21:51:39,933:DEBUG:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging.api.letsencrypt.org | |
2017-05-30 21:51:41,526:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 473 | |
2017-05-30 21:51:41,528:DEBUG:acme.client:Received response: | |
HTTP 200 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 473 | |
Boulder-Request-Id: 09vx9PENWk3mqzUskX307U-hFA2KEBC7QU5oErUocDg | |
Replay-Nonce: 35fKKxm5wbQix6VxL3WepHes5mk-ewGlRrqEWxfefuw | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 30 May 2017 21:51:41 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:41 GMT | |
Connection: keep-alive | |
{ | |
"VjX3l6P3I5k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", | |
"key-change": "https://acme-staging.api.letsencrypt.org/acme/key-change", | |
"new-authz": "https://acme-staging.api.letsencrypt.org/acme/new-authz", | |
"new-cert": "https://acme-staging.api.letsencrypt.org/acme/new-cert", | |
"new-reg": "https://acme-staging.api.letsencrypt.org/acme/new-reg", | |
"revoke-cert": "https://acme-staging.api.letsencrypt.org/acme/revoke-cert" | |
} | |
2017-05-30 21:51:41,529:DEBUG:acme.client:Requesting fresh nonce | |
2017-05-30 21:51:41,530:DEBUG:acme.client:Sending HEAD request to https://acme-staging.api.letsencrypt.org/acme/new-reg. | |
2017-05-30 21:51:41,599:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "HEAD /acme/new-reg HTTP/1.1" 405 0 | |
2017-05-30 21:51:41,602:DEBUG:acme.client:Received response: | |
HTTP 405 | |
Server: nginx | |
Content-Type: application/problem+json | |
Content-Length: 91 | |
Allow: POST | |
Boulder-Request-Id: yuSXMGXmQUt66A5kW9vRdugKB8Xq3j-GHlkRy3cErLU | |
Replay-Nonce: 7j9HUivpMkAwP02KfzqeT0xGDVreEGspscZOeH2pr9I | |
Expires: Tue, 30 May 2017 21:51:41 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:41 GMT | |
Connection: keep-alive | |
2017-05-30 21:51:41,602:DEBUG:acme.client:Storing nonce: 7j9HUivpMkAwP02KfzqeT0xGDVreEGspscZOeH2pr9I | |
2017-05-30 21:51:41,604:DEBUG:acme.client:JWS payload: | |
{ | |
"resource": "new-reg" | |
} | |
2017-05-30 21:51:41,620:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-reg: | |
{ | |
"header": { | |
"alg": "RS256", | |
"jwk": { | |
"e": "AQAB", | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ" | |
} | |
}, | |
"protected": "eyJub25jZSI6ICI3ajlIVWl2cE1rQXdQMDJLZnpxZVQweEdEVnJlRUdzcHNjWk9lSDJwcjlJIn0", | |
"payload": "ewogICJyZXNvdXJjZSI6ICJuZXctcmVnIgp9", | |
"signature": "lt3jxtqeNskXc6Wqn--7n5zGWDH1hm4la4IwOAgUwprwk8YsxopstwE3iT5Amup8oATPQ9AU3l7kaKj_dqd51tkjpFMMG4OpYaR5pmCjUuR9a5Z10H-dBu3FxxrlEMwJreiSU2XZsCNOryOfY_tmAdtIOf_BUQ-X601UwHMdIIiSWysuK0RXDLMc3xIitZDuCiHsfjzY9Wxqp43oQjYcNTy87RQUYTybSjvhzqPYrKjvmWQRyqs9VZN6R8lklD4Fu7qoizQzo5t24cnR-bdXN9-hHprdPD_8Leqq21Nh7yD6rLJwTMaQYJQBWfoDBUP8txgSuLB5SOB-_VNKWp3rDw" | |
} | |
2017-05-30 21:51:41,723:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "POST /acme/new-reg HTTP/1.1" 201 543 | |
2017-05-30 21:51:41,725:DEBUG:acme.client:Received response: | |
HTTP 201 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 543 | |
Boulder-Request-Id: pBPk_uWmWBJ-ufz3iYYKkF-7qXBNZss7yKdujGcS9wU | |
Boulder-Requester: 2401646 | |
Link: <https://acme-staging.api.letsencrypt.org/acme/new-authz>;rel="next", <https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf>;rel="terms-of-service" | |
Location: https://acme-staging.api.letsencrypt.org/acme/reg/2401646 | |
Replay-Nonce: m_VzxLcRisubhNl_EXZ3L5cwhyT65UW5OFsOEuZYzUQ | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 30 May 2017 21:51:41 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:41 GMT | |
Connection: keep-alive | |
{ | |
"id": 2401646, | |
"key": { | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ", | |
"e": "AQAB" | |
}, | |
"contact": [], | |
"initialIp": "198.98.49.246", | |
"createdAt": "2017-05-30T21:51:41.666623538Z", | |
"Status": "valid" | |
} | |
2017-05-30 21:51:41,725:DEBUG:acme.client:Storing nonce: m_VzxLcRisubhNl_EXZ3L5cwhyT65UW5OFsOEuZYzUQ | |
2017-05-30 21:51:41,727:DEBUG:acme.client:JWS payload: | |
{ | |
"resource": "reg", | |
"agreement": "https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf", | |
"key": { | |
"e": "AQAB", | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ" | |
} | |
} | |
2017-05-30 21:51:41,732:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/reg/2401646: | |
{ | |
"header": { | |
"alg": "RS256", | |
"jwk": { | |
"e": "AQAB", | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ" | |
} | |
}, | |
"protected": "eyJub25jZSI6ICJtX1Z6eExjUmlzdWJoTmxfRVhaM0w1Y3doeVQ2NVVXNU9Gc09FdVpZelVRIn0", | |
"payload": "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", | |
"signature": "gFfuWi2ybwY-TQf96_I_Dn3cLoto4jCbdlLKzhwwaUAr6L2erSvh2h3pWrMwolkjq1vuCs8znOA-AERc7exHlCev1ldL9OLErWKn9gqZKOIQHRBAjyyhpIlQb86cklrOfHJCtUR1sUH7NGO12sRC75uflqlCfhOVLoFxLQVp5PytfwIpzot5f9aItKtCFDLuPcuOoL5-tRzNw6uN9hrVwslo3ZL8Dv0nOdQIUxt8DgiBYZWlnDmi25shBiYVZ5zBPJf7EqgdbnZ9qZAetMDjmlM2JUbU9J4y36ec6O9CdUuVZGubBDA_a-6zj1iycuI4Blu0gfy_ef6Bvl4cLASMtQ" | |
} | |
2017-05-30 21:51:41,831:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "POST /acme/reg/2401646 HTTP/1.1" 202 616 | |
2017-05-30 21:51:41,833:DEBUG:acme.client:Received response: | |
HTTP 202 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 616 | |
Boulder-Request-Id: wXcDFYOAY9BpOLx8yztlub1AVlyH9NvEMUlezxzgwQU | |
Boulder-Requester: 2401646 | |
Link: <https://acme-staging.api.letsencrypt.org/acme/new-authz>;rel="next", <https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf>;rel="terms-of-service" | |
Replay-Nonce: WiYzHGKlNmarPl4QuNnzClDntcXpAOUTHs6ZjeGuxRQ | |
Expires: Tue, 30 May 2017 21:51:41 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:41 GMT | |
Connection: keep-alive | |
{ | |
"id": 2401646, | |
"key": { | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ", | |
"e": "AQAB" | |
}, | |
"contact": [], | |
"agreement": "https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf", | |
"initialIp": "198.98.49.246", | |
"createdAt": "2017-05-30T21:51:41Z", | |
"Status": "valid" | |
} | |
2017-05-30 21:51:41,834:DEBUG:acme.client:Storing nonce: WiYzHGKlNmarPl4QuNnzClDntcXpAOUTHs6ZjeGuxRQ | |
2017-05-30 21:51:41,839:DEBUG:certbot.reporter:Reporting to user: Your account credentials have been saved in your Certbot configuration directory at /etc/letsencrypt. You should make a secure backup of this folder now. This configuration directory will also contain certificates and private keys obtained by Certbot so making regular backups of this folder is ideal. | |
2017-05-30 21:51:41,843:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, contact=(), agreement=u'https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf', key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7ff7147110d0>)>)), uri='https://acme-staging.api.letsencrypt.org/acme/reg/2401646', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf'), 61ac3980578fac4597d1f3533d1c1912, Meta(creation_host='nj.corp.sahsanu.com', creation_dt=datetime.datetime(2017, 5, 30, 21, 51, 41, tzinfo=<UTC>)))> | |
2017-05-30 21:51:41,846:INFO:certbot.main:Obtaining a new certificate | |
2017-05-30 21:51:41,847:DEBUG:acme.client:JWS payload: | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "redirect.27a.net" | |
}, | |
"resource": "new-authz" | |
} | |
2017-05-30 21:51:41,853:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/new-authz: | |
{ | |
"header": { | |
"alg": "RS256", | |
"jwk": { | |
"e": "AQAB", | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ" | |
} | |
}, | |
"protected": "eyJub25jZSI6ICJXaVl6SEdLbE5tYXJQbDRRdU5uekNsRG50Y1hwQU9VVEhzNlpqZUd1eFJRIn0", | |
"payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAicmVkaXJlY3QuMjdhLm5ldCIKICB9LCAKICAicmVzb3VyY2UiOiAibmV3LWF1dGh6Igp9", | |
"signature": "Rjuo9qm6ISdDmodKsj-4lf4cnsSzPIxuHd8I10ghb5jW0TOWvsNWQCiTHEt4Z3bY7nyfBuddvYTPpssVvrKBPPNvb4OVCjfnpzxjZ5wMX8bWGxt_vbt27ik7Ek7Hi3_JpPZ2d4xn7SpO3_hqWzJU33iCeLHfB0yu2EAu40UeLV0Cy9M0jebUebObFKAJpcuBeYWHEtIj3RL1z5p9bym94_oJpmIvgz-GhOGg7uFJe1H3IanKJyuEXgqIMPkWZiyaGW0E736iBMtmCitAYyfoHJUd_kOUExP7cV4i4lH7GGB07AhPMQpzysM8OA5rXvjAEyBkZWgrqol10iqLTEpltg" | |
} | |
2017-05-30 21:51:41,963:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "POST /acme/new-authz HTTP/1.1" 201 1010 | |
2017-05-30 21:51:41,970:DEBUG:acme.client:Received response: | |
HTTP 201 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 1010 | |
Boulder-Request-Id: 1L9QP693nicguat3ikstNfkvrR6dNZmQnmI4GHumBwE | |
Boulder-Requester: 2401646 | |
Link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next" | |
Location: https://acme-staging.api.letsencrypt.org/acme/authz/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8 | |
Replay-Nonce: utKARMQGLFbUmaOFADdIjOtDjCzhYw4Nn3Q_jdqx7Yo | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 30 May 2017 21:51:41 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:41 GMT | |
Connection: keep-alive | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "redirect.27a.net" | |
}, | |
"status": "pending", | |
"expires": "2017-06-06T21:51:41.907843278Z", | |
"challenges": [ | |
{ | |
"type": "tls-sni-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442836", | |
"token": "5wec4PNRSya_yhtsGpujPPNkfPaX-xUj8wdTu_LoaMk" | |
}, | |
{ | |
"type": "http-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837", | |
"token": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE" | |
}, | |
{ | |
"type": "dns-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442838", | |
"token": "WJGQ4f82Ld5NSw18L31ez6VRDPYr3G7sFOpzmFC_Bmw" | |
} | |
], | |
"combinations": [ | |
[ | |
2 | |
], | |
[ | |
1 | |
], | |
[ | |
0 | |
] | |
] | |
} | |
2017-05-30 21:51:41,970:DEBUG:acme.client:Storing nonce: utKARMQGLFbUmaOFADdIjOtDjCzhYw4Nn3Q_jdqx7Yo | |
2017-05-30 21:51:41,991:INFO:certbot.auth_handler:Performing the following challenges: | |
2017-05-30 21:51:41,991:INFO:certbot.auth_handler:http-01 challenge for redirect.27a.net | |
2017-05-30 21:51:41,992:INFO:certbot.plugins.webroot:Using the webroot path /usr/share/nginx/html for all unmatched domains. | |
2017-05-30 21:51:41,992:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/.well-known/acme-challenge | |
2017-05-30 21:51:41,999:DEBUG:certbot.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/.well-known/acme-challenge/4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE | |
2017-05-30 21:51:42,000:INFO:certbot.auth_handler:Waiting for verification... | |
2017-05-30 21:51:42,000:DEBUG:acme.client:JWS payload: | |
{ | |
"keyAuthorization": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE.keLSC3fehY9YdXzTeRXnKRBgN4iDkqgUWKdSlRrOq8U", | |
"type": "http-01", | |
"resource": "challenge" | |
} | |
2017-05-30 21:51:42,009:DEBUG:acme.client:Sending POST request to https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837: | |
{ | |
"header": { | |
"alg": "RS256", | |
"jwk": { | |
"e": "AQAB", | |
"kty": "RSA", | |
"n": "z84ktp9sKbkgwCh-D0CTUB_Dd61658jhkhX3oa1VbO3Jh_HqHbJa4401Ry2vn8co3wjalY7F2fpkrALwZaVsmm2uV-3Khg1wUWhwc5p_gFQv6QyowdfKSACJ-kleda_7VZcDWcq68fwVHDYucC2EzFb1xVeFfy7aGtE-EmWIDc6xs3SzAv5VyDqOCtWEUjSf6G7kaEy_aflETdwQSQAQIWerhyBk_cIJMfKNkujxIBnL03VmHinspIlNB2DBpdDNO1B_7gxaJrIN8vPhDhfqfB_yuP0KyLPiqRmdZ4Q1mpwrJ7zXKe70tM6M8qJhaPkQreD1kmLE6Jf5HMNpLCeufQ" | |
} | |
}, | |
"protected": "eyJub25jZSI6ICJ1dEtBUk1RR0xGYlVtYU9GQURkSWpPdERqQ3poWXc0Tm4zUV9qZHF4N1lvIn0", | |
"payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIjRabDhIdXBXVV8xYkU2SGczTHNHMnRoUm8zYUgxdW1LUkhkX2ItWmdEVUUua2VMU0MzZmVoWTlZZFh6VGVSWG5LUkJnTjRpRGtxZ1VXS2RTbFJyT3E4VSIsIAogICJ0eXBlIjogImh0dHAtMDEiLCAKICAicmVzb3VyY2UiOiAiY2hhbGxlbmdlIgp9", | |
"signature": "O5snyYipOyjuyG2TIHHNW7wZJvk6_3VCETRNoXXhZCJQ58MC0fb-tPvYbzRi47S3mPpizrou971W_qEbLykmHyn9BLYoKFKpIK5qsmCNEXIHgHL0C_04Iq1rRtANTOlMtKwLe42C2OLN6WHvkDCuiMHdDvPIt06BjGSl83PYjvKZ6oDnuMSipcRCT_0nt34IALoaP8ohlGktPhDWCd3apAH7Nr-u4ugJtcZLPHp2YRqYnlriQg3R755jlVcSh3jZ9a8OiQCv0wb8sHv9O49NwJLnh4S6LlXBK7sNkfrtlt9v3gwRHRRc0U3jwzy164eS6aZOGwCtjCMDIHMgP-mltg" | |
} | |
2017-05-30 21:51:42,107:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "POST /acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837 HTTP/1.1" 202 338 | |
2017-05-30 21:51:42,108:DEBUG:acme.client:Received response: | |
HTTP 202 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 338 | |
Boulder-Request-Id: rcUJTAHNgjK99GQil_EfWtLKmlyj4-wST0qu3Xi2xT8 | |
Boulder-Requester: 2401646 | |
Link: <https://acme-staging.api.letsencrypt.org/acme/authz/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8>;rel="up" | |
Location: https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837 | |
Replay-Nonce: 93KwyygyIdk2mBBXSE0rs6sRmXe5ZSoOKkSQfptdC_o | |
Expires: Tue, 30 May 2017 21:51:42 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:42 GMT | |
Connection: keep-alive | |
{ | |
"type": "http-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837", | |
"token": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE", | |
"keyAuthorization": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE.keLSC3fehY9YdXzTeRXnKRBgN4iDkqgUWKdSlRrOq8U" | |
} | |
2017-05-30 21:51:42,109:DEBUG:acme.client:Storing nonce: 93KwyygyIdk2mBBXSE0rs6sRmXe5ZSoOKkSQfptdC_o | |
2017-05-30 21:51:45,112:DEBUG:acme.client:Sending GET request to https://acme-staging.api.letsencrypt.org/acme/authz/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8. | |
2017-05-30 21:51:45,242:DEBUG:requests.packages.urllib3.connectionpool:https://acme-staging.api.letsencrypt.org:443 "GET /acme/authz/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8 HTTP/1.1" 200 1944 | |
2017-05-30 21:51:45,247:DEBUG:acme.client:Received response: | |
HTTP 200 | |
Server: nginx | |
Content-Type: application/json | |
Content-Length: 1944 | |
Boulder-Request-Id: EuDVhMfj84mZ9l_6iR9mrn5hZOvIozBKpmAtB7QhXGA | |
Link: <https://acme-staging.api.letsencrypt.org/acme/new-cert>;rel="next" | |
Replay-Nonce: tLxL2CclxGDtJlMGijeZDwbxQpewJS7lFzEWkUBjkKk | |
X-Frame-Options: DENY | |
Strict-Transport-Security: max-age=604800 | |
Expires: Tue, 30 May 2017 21:51:45 GMT | |
Cache-Control: max-age=0, no-cache, no-store | |
Pragma: no-cache | |
Date: Tue, 30 May 2017 21:51:45 GMT | |
Connection: keep-alive | |
{ | |
"identifier": { | |
"type": "dns", | |
"value": "redirect.27a.net" | |
}, | |
"status": "invalid", | |
"expires": "2017-06-06T21:51:41Z", | |
"challenges": [ | |
{ | |
"type": "tls-sni-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442836", | |
"token": "5wec4PNRSya_yhtsGpujPPNkfPaX-xUj8wdTu_LoaMk" | |
}, | |
{ | |
"type": "http-01", | |
"status": "invalid", | |
"error": { | |
"type": "urn:acme:error:connection", | |
"detail": "Could not connect to 198.98.49.246", | |
"status": 400 | |
}, | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442837", | |
"token": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE", | |
"keyAuthorization": "4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE.keLSC3fehY9YdXzTeRXnKRBgN4iDkqgUWKdSlRrOq8U", | |
"validationRecord": [ | |
{ | |
"url": "http://198.98.49.246/.well-known/acme-challenge/4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE", | |
"hostname": "198.98.49.246", | |
"port": "80", | |
"addressesResolved": [], | |
"addressUsed": "", | |
"addressesTried": [] | |
}, | |
{ | |
"url": "http://redirect.27a.net/.well-known/acme-challenge/4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE", | |
"hostname": "redirect.27a.net", | |
"port": "80", | |
"addressesResolved": [ | |
"163.172.166.61" | |
], | |
"addressUsed": "163.172.166.61", | |
"addressesTried": [] | |
} | |
] | |
}, | |
{ | |
"type": "dns-01", | |
"status": "pending", | |
"uri": "https://acme-staging.api.letsencrypt.org/acme/challenge/iWCIhJ_R8aBm9AWnTx-nejfkFR2mopUyMtZItOtnsJ8/41442838", | |
"token": "WJGQ4f82Ld5NSw18L31ez6VRDPYr3G7sFOpzmFC_Bmw" | |
} | |
], | |
"combinations": [ | |
[ | |
2 | |
], | |
[ | |
1 | |
], | |
[ | |
0 | |
] | |
] | |
} | |
2017-05-30 21:51:45,252:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server: | |
Domain: redirect.27a.net | |
Type: connection | |
Detail: Could not connect to 198.98.49.246 | |
To fix these errors, please make sure that your domain name was entered correctly and the DNS A record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided. | |
2017-05-30 21:51:45,252:INFO:certbot.auth_handler:Cleaning up challenges | |
2017-05-30 21:51:45,253:DEBUG:certbot.plugins.webroot:Removing /usr/share/nginx/html/.well-known/acme-challenge/4Zl8HupWU_1bE6Hg3LsG2thRo3aH1umKRHd_b-ZgDUE | |
2017-05-30 21:51:45,254:INFO:certbot.plugins.webroot:Unable to clean up challenge directory /usr/share/nginx/html/.well-known/acme-challenge | |
2017-05-30 21:51:45,254:DEBUG:certbot.plugins.webroot:Error was: [Errno 39] Directory not empty: '/usr/share/nginx/html/.well-known/acme-challenge' | |
2017-05-30 21:51:45,256:DEBUG:certbot.log:Exiting abnormally: | |
Traceback (most recent call last): | |
File "/root/.local/share/letsencrypt/bin/letsencrypt", line 11, in <module> | |
sys.exit(main()) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 742, in main | |
return config.func(config, plugins) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 682, in certonly | |
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/main.py", line 82, in _get_and_save_cert | |
lineage = le_client.obtain_and_enroll_certificate(domains, certname) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/client.py", line 344, in obtain_and_enroll_certificate | |
certr, chain, key, _ = self.obtain_certificate(domains) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/client.py", line 313, in obtain_certificate | |
self.config.allow_subset_of_names) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 81, in get_authorizations | |
self._respond(resp, best_effort) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 138, in _respond | |
self._poll_challenges(chall_update, best_effort) | |
File "/root/.local/share/letsencrypt/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 202, in _poll_challenges | |
raise errors.FailedChallenges(all_failed_achalls) | |
FailedChallenges: Failed authorization procedure. redirect.27a.net (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Could not connect to 198.98.49.246 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment