Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
A section of the logs available for 06 June 2019 for letsencrypt certbot
2019-06-11 12:19:22,109:DEBUG:certbot.error_handler:Calling registered functions
2019-06-11 12:19:22,109:INFO:certbot.auth_handler:Cleaning up challenges
2019-06-11 12:19:22,483:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1119, in run
certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. monkeymind.ltd (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/IGGNzIRBo4KVLEQQDAD8YF1kr0AZhJAGH0AI2SJjNo4 [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
2019-06-11 12:28:40,340:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:28:40,341:DEBUG:certbot.main:Arguments: ['--apache', '--debug-challenges']
2019-06-11 12:28:40,342:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:28:40,356:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:28:40,357:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:28:40,358:DEBUG:certbot.plugins.selection:Requested authenticator apache and installer apache
2019-06-11 12:28:40,415:ERROR:certbot.util:Error while running apache2ctl configtest.
Action 'configtest' failed.
The Apache error log may have more information.
AH00526: Syntax error on line 224 of /etc/apache2/apache2.conf:
ServerAlias only used in <VirtualHost>
2019-06-11 12:28:40,416:DEBUG:certbot.plugins.disco:Misconfigured PluginEntryPoint#apache: Error while running apache2ctl configtest.
Action 'configtest' failed.
The Apache error log may have more information.
AH00526: Syntax error on line 224 of /etc/apache2/apache2.conf:
ServerAlias only used in <VirtualHost>
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot_apache/configurator.py", line 2212, in config_test
util.run_script(self.option("conftest_cmd"))
File "/usr/lib/python3/dist-packages/certbot/util.py", line 86, in run_script
raise errors.SubprocessError(msg)
certbot.errors.SubprocessError: Error while running apache2ctl configtest.
Action 'configtest' failed.
The Apache error log may have more information.
AH00526: Syntax error on line 224 of /etc/apache2/apache2.conf:
ServerAlias only used in <VirtualHost>
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/plugins/disco.py", line 132, in prepare
self._initialized.prepare()
File "/usr/lib/python3/dist-packages/certbot_apache/configurator.py", line 235, in prepare
self.config_test()
File "/usr/lib/python3/dist-packages/certbot_apache/configurator.py", line 2214, in config_test
raise errors.MisconfigurationError(str(err))
certbot.errors.MisconfigurationError: Error while running apache2ctl configtest.
Action 'configtest' failed.
The Apache error log may have more information.
AH00526: Syntax error on line 224 of /etc/apache2/apache2.conf:
ServerAlias only used in <VirtualHost>
2019-06-11 12:28:40,418:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache.entrypoint:ENTRYPOINT
Initialized: <certbot_apache.override_debian.DebianConfigurator object at 0x7f381e13aa58>
Prep: Error while running apache2ctl configtest.
Action 'configtest' failed.
The Apache error log may have more information.
AH00526: Syntax error on line 224 of /etc/apache2/apache2.conf:
ServerAlias only used in <VirtualHost>
2019-06-11 12:28:40,420:DEBUG:certbot.plugins.selection:Selected authenticator None and installer None
2019-06-11 12:29:27,159:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:29:27,161:DEBUG:certbot.main:Arguments: ['--apache', '--debug-challenges']
2019-06-11 12:29:27,162:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:29:27,181:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:29:27,182:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:29:27,184:DEBUG:certbot.plugins.selection:Requested authenticator apache and installer apache
2019-06-11 12:29:27,276:DEBUG:certbot_apache.configurator:Apache version is 2.4.18
2019-06-11 12:29:27,761:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache.entrypoint:ENTRYPOINT
Initialized: <certbot_apache.override_debian.DebianConfigurator object at 0x7fc1f7a4ea58>
Prep: True
2019-06-11 12:29:27,763:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_apache.override_debian.DebianConfigurator object at 0x7fc1f7a4ea58> and installer <certbot_apache.override_debian.DebianConfigurator object at 0x7fc1f7a4ea58>
2019-06-11 12:29:27,764:INFO:certbot.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2019-06-11 12:29:27,769:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(uri='https://acme-v02.api.letsencrypt.org/acme/acct/54902181', body=Registration(agreement=None, key=None, external_account_binding=None, status=None, terms_of_service_agreed=None, only_return_existing=None, contact=()), new_authzr_uri=None, terms_of_service=None), 1cdb68af2b011dc00edb19ff8799bc78, Meta(creation_dt=datetime.datetime(2019, 4, 9, 17, 56, 18, tzinfo=<UTC>), creation_host='monkeymind-wp'))>
2019-06-11 12:29:27,771:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2019-06-11 12:29:27,775:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2019-06-11 12:29:28,025:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2019-06-11 12:29:28,026:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 658
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:29:28 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:28 GMT
Connection: keep-alive
{
"8BYtLRDvVTg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2019-06-11 12:29:30,266:INFO:certbot.main:Obtaining a new certificate
2019-06-11 12:29:30,495:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0008_key-certbot.pem
2019-06-11 12:29:30,498:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0008_csr-certbot.pem
2019-06-11 12:29:30,499:DEBUG:acme.client:Requesting fresh nonce
2019-06-11 12:29:30,499:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-06-11 12:29:30,694:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-06-11 12:29:30,695:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0KFwKuzD9BpzsW5YMGAE4BN5HJVU4CrReLgmgLK7av0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Content-Length: 0
Expires: Tue, 11 Jun 2019 12:29:30 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:30 GMT
Connection: keep-alive
2019-06-11 12:29:30,695:DEBUG:acme.client:Storing nonce: 0KFwKuzD9BpzsW5YMGAE4BN5HJVU4CrReLgmgLK7av0
2019-06-11 12:29:30,696:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "value": "monkeymind.ltd",\n "type": "dns"\n }\n ]\n}'
2019-06-11 12:29:30,700:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInZhbHVlIjogIm1vbmtleW1pbmQubHRkIiwKICAgICAgInR5cGUiOiAiZG5zIgogICAgfQogIF0KfQ",
"protected": "eyJub25jZSI6ICIwS0Z3S3V6RDlCcHpzVzVZTUdBRTRCTjVISlZVNENyUmVMZ21nTEs3YXYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzU0OTAyMTgxIn0",
"signature": "YNKsgDE8f8w9FyjjD2PVXBTyTEbyBi1-fZB802KkRrr1s8S02k45sbuhSXlcDx72Q9-yIG0KzFH9HhduUd5HjJsvMlcyD4MTB1sPp5AYJAJ9EKlT9K4o18tdPyAxEZqnj7CWbnpgWukRjyE6242WD6nq8Zpr7-Y8aAY5t66OjwXTW1VDkRqQRxc1Els5oEf4OqwR2L-wKBCRXdwLLVayCQHTDEuXhl1TQAa_FpnfOB9BS84Y6TxIVqgmLjTfCsjSZZ7BrQbaab5oxY_UXmFYu1zXdBadVyTOlMCzSS8x6nwHVtRPoZTQrYiWj_tjdn_HN7Q7wpyHCrVUNsr4KFmEYg"
}
2019-06-11 12:29:30,939:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 373
2019-06-11 12:29:30,940:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Content-Type: application/json
Content-Length: 373
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/54902181/543391102
Replay-Nonce: TiDmJQ0wwWqabNQBFG1JaOTppP9pMBqzO96NRiTr6Gc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:29:30 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:30 GMT
Connection: keep-alive
{
"status": "pending",
"expires": "2019-06-18T12:29:30.817757903Z",
"identifiers": [
{
"type": "dns",
"value": "monkeymind.ltd"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/54902181/543391102"
}
2019-06-11 12:29:30,940:DEBUG:acme.client:Storing nonce: TiDmJQ0wwWqabNQBFG1JaOTppP9pMBqzO96NRiTr6Gc
2019-06-11 12:29:30,941:DEBUG:acme.client:JWS payload:
b''
2019-06-11 12:29:30,943:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8:
{
"payload": "",
"protected": "eyJub25jZSI6ICJUaURtSlEwd3dXcWFiTlFCRkcxSmFPVHBwUDlwTUJxek85Nk5SaVRyNkdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei8zUHBnZmk1U2draFlCVzFoemRyN0VmZEJ6bF9vcWJENzMwX0Qyc1hfUk04IiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSJ9",
"signature": "D6KTnoLdsdPh1yln5bvSov913PbLv5a2cnPdRR2dXNxcg4CbyK6Pm-EtaP7NRqkUZJWPytVAsxpn-2slEZ2TfefH5VOzRxBRvOatt1lu5453SurpUA6bRUWFc4btdvhOQJz21Bn9v2p6kibQnBt17f4Ucc8B4HbmAyi2oqZe_D3oPodXWYb5tYei58_lNwtbGlfUjZrhCkiIFiAwK-pK6GOOEQbdOll1k_rImqS7eBKGGf5qTC8wyewmhFN_iJF2mDwlD9ChT9mA2GTVkfPfwZxNZANeVOoGtrZTHA5qQnADK4Xvj8lWsbTjfHnzeMnRUiTB4vyptk7mxFPrjZ27JQ"
}
2019-06-11 12:29:31,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8 HTTP/1.1" 200 909
2019-06-11 12:29:31,146:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 909
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 24L3dI7mHW9T10_FSlQAqKfE1WgrGlIbGzbuufpHE0I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:29:31 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:31 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "monkeymind.ltd"
},
"status": "pending",
"expires": "2019-06-18T12:29:30Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859",
"token": "jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052860",
"token": "85RfnXL5tbUShf1ZQxgri5eDXhBVvENdkxbY_BQZHog"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052861",
"token": "90YhYW3_rUMP4ncsevvvbP6tIU5d-f_PSWeKlDaIV6M"
}
]
}
2019-06-11 12:29:31,147:DEBUG:acme.client:Storing nonce: 24L3dI7mHW9T10_FSlQAqKfE1WgrGlIbGzbuufpHE0I
2019-06-11 12:29:31,147:INFO:certbot.auth_handler:Performing the following challenges:
2019-06-11 12:29:31,148:INFO:certbot.auth_handler:http-01 challenge for monkeymind.ltd
2019-06-11 12:29:31,210:DEBUG:certbot_apache.http_01:Adding a temporary challenge validation Include for name: monkeymind.ltd in: /etc/apache2/sites-enabled/000-default-le-ssl.conf
2019-06-11 12:29:31,211:DEBUG:certbot_apache.http_01:Adding a temporary challenge validation Include for name: None in: /etc/apache2/sites-enabled/000-default.conf
2019-06-11 12:29:31,211:DEBUG:certbot_apache.http_01:writing a pre config file with text:
RewriteEngine on
RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]
2019-06-11 12:29:31,212:DEBUG:certbot_apache.http_01:writing a post config file with text:
<Directory /var/lib/letsencrypt/http_challenges>
Require all granted
</Directory>
<Location /.well-known/acme-challenge>
Require all granted
</Location>
2019-06-11 12:29:31,231:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/000-default-le-ssl.conf
2019-06-11 12:29:31,232:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/000-default.conf
2019-06-11 12:29:34,411:INFO:certbot.auth_handler:Waiting for verification...
2019-06-11 12:29:35,898:DEBUG:acme.client:JWS payload:
b'{\n "keyAuthorization": "jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE.kpuHAlyDzLs6Yu3yrXZvkcwP0PacwUvULa3aNxXxo0s",\n "type": "http-01",\n "resource": "challenge"\n}'
2019-06-11 12:29:35,901:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859:
{
"payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogImpud0JGajlKS1MtUXd5WVJkR2xRZzd2WEQ1R3JXQ3F2SFEwZzUzMEJsVkUua3B1SEFseUR6THM2WXUzeXJYWnZrY3dQMFBhY3dVdlVMYTNhTnhYeG8wcyIsCiAgInR5cGUiOiAiaHR0cC0wMSIsCiAgInJlc291cmNlIjogImNoYWxsZW5nZSIKfQ",
"protected": "eyJub25jZSI6ICIyNEwzZEk3bUhXOVQxMF9GU2xRQXFLZkUxV2dyR2xJYkd6YnV1ZnBIRTBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbGVuZ2UvM1BwZ2ZpNVNna2hZQlcxaHpkcjdFZmRCemxfb3FiRDczMF9EMnNYX1JNOC8xNjkzOTA1Mjg1OSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNTQ5MDIxODEifQ",
"signature": "Dckt28uE0DkaODCZfcstfff-jv2WJwyuSHU9ch6Zhi0VRIwhX3wPWjCYkArdRdXfAuuIhSkffbi6-S-n26KHztzaHWT_b8ICnhwTtzr9xHns1b6JGhAWBnEwUEWy54w5qAknWZ6q1KmRBSfKT3WJMD68dvjzHryI_vlZPx5bYibcP3-RtQ3niUq-PxJSLPca6GlEchzGDzNJFnyHVHUOSmvujl_vd-s-18ftBH_qTfcbJvKUfqfXMvZKJTkd0RYP1MnPe6KplE68kGEdQv70qa54UblD_0a8SkJ40rU34QASli20gMeRA0wIlM1mnj7TWWre5OugU7tFlFowSQj2PQ"
}
2019-06-11 12:29:36,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859 HTTP/1.1" 200 224
2019-06-11 12:29:36,129:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 224
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859
Replay-Nonce: 5iqgNWutHg3YRKi7j045-527QHcudApaYZs3F7e5zAw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:29:36 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:36 GMT
Connection: keep-alive
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859",
"token": "jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE"
}
2019-06-11 12:29:36,130:DEBUG:acme.client:Storing nonce: 5iqgNWutHg3YRKi7j045-527QHcudApaYZs3F7e5zAw
2019-06-11 12:29:39,134:DEBUG:acme.client:JWS payload:
b''
2019-06-11 12:29:39,136:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8:
{
"payload": "",
"protected": "eyJub25jZSI6ICI1aXFnTld1dEhnM1lSS2k3ajA0NS01MjdRSGN1ZEFwYVlaczNGN2U1ekF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei8zUHBnZmk1U2draFlCVzFoemRyN0VmZEJ6bF9vcWJENzMwX0Qyc1hfUk04IiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSJ9",
"signature": "r6lDdCg7Yw3AtWjOJ_-VLy7QAG8fps-8gOIp_XvH49w6HflAK7y9NXxxFCb0-WZF-E8jEHkvewaRBM4YMGp8mWhV5GeC3jYl_5o2y3CWLQDfbCjui-uLgjQkzvR3fyN0qyGaIkvSeGeo3_4rmcP599ILmCPE9rMQs34fOI3YgmOegfdBdeJDmEDrQji_lflK9xN4RNJ3TzgmGy_IRJeKU3RDdJTKRhFAJh4Ck9YYIqS8BqGjhaPpi8lbvcuCrbyN-dzhRhzcs_Xjqp7k-oSdqeyJcEa1b2LhLzJ9b53kmxN_MGoPGEq_vycKJelQWm2ZDwE-Y6KXWkxKwph2KSi-yg"
}
2019-06-11 12:29:39,358:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8 HTTP/1.1" 200 1734
2019-06-11 12:29:39,359:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 1734
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: sykyzZG3Rrw7FhFMhAPAL7JHkitHC8NtIZHqq2Rryag
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:29:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:29:39 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "monkeymind.ltd"
},
"status": "invalid",
"expires": "2019-06-18T12:29:30Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE [178.62.11.8]: \"\u003c!DOCTYPE html\u003e\\n\u003chtml lang=\\\"en-GB\\\" prefix=\\\"og: http://ogp.me/ns#\\\"\u003e\\n\u003chead\u003e\\n\\t\\n\\t\\t\u003cmeta charset=\\\"UTF-8\\\"/\u003e\\n\\t\\t\u003clink rel=\\\"profile\\\" href\"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052859",
"token": "jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE",
"validationRecord": [
{
"url": "http://monkeymind.ltd/.well-known/acme-challenge/jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE",
"hostname": "monkeymind.ltd",
"port": "80",
"addressesResolved": [
"178.62.11.8"
],
"addressUsed": "178.62.11.8"
}
]
},
{
"type": "dns-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052860",
"token": "85RfnXL5tbUShf1ZQxgri5eDXhBVvENdkxbY_BQZHog"
},
{
"type": "tls-alpn-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/3Ppgfi5SgkhYBW1hzdr7EfdBzl_oqbD730_D2sX_RM8/16939052861",
"token": "90YhYW3_rUMP4ncsevvvbP6tIU5d-f_PSWeKlDaIV6M"
}
]
}
2019-06-11 12:29:39,359:DEBUG:acme.client:Storing nonce: sykyzZG3Rrw7FhFMhAPAL7JHkitHC8NtIZHqq2Rryag
2019-06-11 12:29:39,361:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
Domain: monkeymind.ltd
Type: unauthorized
Detail: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2019-06-11 12:29:39,361:DEBUG:certbot.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. monkeymind.ltd (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
2019-06-11 12:29:39,362:DEBUG:certbot.error_handler:Calling registered functions
2019-06-11 12:29:39,362:INFO:certbot.auth_handler:Cleaning up challenges
2019-06-11 12:29:39,681:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1119, in run
certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. monkeymind.ltd (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/jnwBFj9JKS-QwyYRdGlQg7vXD5GrWCqvHQ0g530BlVE [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
2019-06-11 12:31:38,226:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:31:38,228:DEBUG:certbot.main:Arguments: ['--webroot', '--debug-challenges']
2019-06-11 12:31:38,229:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:31:38,251:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:31:38,253:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:31:38,255:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
2019-06-11 12:31:38,255:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1101, in run
installer, authenticator = plug_sel.choose_configurator_plugins(config, plugins, "run")
File "/usr/lib/python3/dist-packages/certbot/plugins/selection.py", line 210, in choose_configurator_plugins
raise errors.MissingCommandlineFlag(msg)
certbot.errors.MissingCommandlineFlag: With the webroot plugin, you probably want to use the "certonly" command, eg:
certbot certonly --webroot
(Alternatively, add a --installer flag. See https://eff.org/letsencrypt-plugins
and "--help plugins" for more information.)
2019-06-11 12:32:11,234:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:32:11,235:DEBUG:certbot.main:Arguments: ['--webroot']
2019-06-11 12:32:11,236:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:32:11,252:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:32:11,254:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:32:11,256:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
2019-06-11 12:32:11,256:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: IAuthenticator, IPlugin
Entry point: webroot = certbot.plugins.webroot:Authenticator
Initialized: <certbot.plugins.webroot.Authenticator object at 0x7f10c1b63898>
Prep: True
2019-06-11 12:32:11,257:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7f10c1b63898> and installer None
2019-06-11 12:32:11,258:INFO:certbot.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2019-06-11 12:32:11,262:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(terms_of_service=None, uri='https://acme-v02.api.letsencrypt.org/acme/acct/54902181', body=Registration(terms_of_service_agreed=None, key=None, contact=(), agreement=None, external_account_binding=None, status=None, only_return_existing=None), new_authzr_uri=None), 1cdb68af2b011dc00edb19ff8799bc78, Meta(creation_dt=datetime.datetime(2019, 4, 9, 17, 56, 18, tzinfo=<UTC>), creation_host='monkeymind-wp'))>
2019-06-11 12:32:11,265:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2019-06-11 12:32:11,268:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2019-06-11 12:32:11,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2019-06-11 12:32:11,487:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 658
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:32:11 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:11 GMT
Connection: keep-alive
{
"Y_KpZDY7MY8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2019-06-11 12:32:11,488:DEBUG:certbot.display.ops:No installer, picking names manually
2019-06-11 12:32:20,181:INFO:certbot.main:Obtaining a new certificate
2019-06-11 12:32:20,367:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0009_key-certbot.pem
2019-06-11 12:32:20,371:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0009_csr-certbot.pem
2019-06-11 12:32:20,373:DEBUG:acme.client:Requesting fresh nonce
2019-06-11 12:32:20,373:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-06-11 12:32:20,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-06-11 12:32:20,660:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 1T-X7OuQLXHTd5-N9oOk7vi9SYGiriA65_qhH7nBWBM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Content-Length: 0
Expires: Tue, 11 Jun 2019 12:32:20 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:20 GMT
Connection: keep-alive
2019-06-11 12:32:20,660:DEBUG:acme.client:Storing nonce: 1T-X7OuQLXHTd5-N9oOk7vi9SYGiriA65_qhH7nBWBM
2019-06-11 12:32:20,661:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "value": "monkeymind.ltd",\n "type": "dns"\n }\n ]\n}'
2019-06-11 12:32:20,664:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"signature": "B7M8aSiOM-m6goESi7asPVn37c8T_kso4csfZywF9FhAyLs6jU7OTofb1PqgAYFe9tC4YDP9HVOFzUqMK9errucs-rAejX9xULZidoT7Wkfm7MdORMBnf1YcybMXlQJSKP6MSKWGcowjNCfqxfhNldUJ6mwEMacCd1RD2ivxRtcHXhkTIibUNJVrlZFKRogU39M4BKzZKqffliMlOg7WHNgwkDb4Wns6kA6De5Jcb2scngwVpYDDA4U44EIm729BNWiKBx_WmwS_tGs3C3l5Fi43eUCjvpxIfcjwS4080o9Av-oDjT32QsViWZdsQCJ31Ri6iEff6bpIze9oZWECYg",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInZhbHVlIjogIm1vbmtleW1pbmQubHRkIiwKICAgICAgInR5cGUiOiAiZG5zIgogICAgfQogIF0KfQ",
"protected": "eyJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJhbGciOiAiUlMyNTYiLCAibm9uY2UiOiAiMVQtWDdPdVFMWEhUZDUtTjlvT2s3dmk5U1lHaXJpQTY1X3FoSDduQldCTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0"
}
2019-06-11 12:32:20,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 373
2019-06-11 12:32:20,905:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Content-Type: application/json
Content-Length: 373
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/54902181/543400480
Replay-Nonce: 1g3gSyg8JZq2oUop3xdwdi-je-0ZRNghjV45g1pBKdM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:32:20 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:20 GMT
Connection: keep-alive
{
"status": "pending",
"expires": "2019-06-18T12:32:20.786847728Z",
"identifiers": [
{
"type": "dns",
"value": "monkeymind.ltd"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/54902181/543400480"
}
2019-06-11 12:32:20,906:DEBUG:acme.client:Storing nonce: 1g3gSyg8JZq2oUop3xdwdi-je-0ZRNghjV45g1pBKdM
2019-06-11 12:32:20,906:DEBUG:acme.client:JWS payload:
b''
2019-06-11 12:32:20,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM:
{
"signature": "sUE8cPEZX3KXaygR33D4OXe2Q3wXX3yCCU6SQ5bpOxT9bPs9CzsQRxJn1_e9BsT7dNPifWDaETVeeaco9UlGF_JAISOj3RGvVOz06GTHFyKKcYo_JG4-N4buWrY29sQS9gpDeIuPcP8flA0lmu_Bd4zr2YrpB78K2RXg9SiRX1NJqDLN-5L7k3uvvIk5zhwwBG9yQD7rxK9xj7Pl0t4WmKo1LkNECloVkACGEbwXBspsEne-VnXLBJNgJENE0JmZMH9byxrn5glJAfC79D_Nn5Uz759b1CouRvOge-DK8bLmd6AKo65nXHfou36aZ8-Ykm-rVlDwMzyr5nBxFB2wzg",
"payload": "",
"protected": "eyJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJhbGciOiAiUlMyNTYiLCAibm9uY2UiOiAiMWczZ1N5ZzhKWnEyb1VvcDN4ZHdkaS1qZS0wWlJOZ2hqVjQ1ZzFwQktkTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovYURka1l2SFNxUjZHclBPY2JQU3B4R1h2YUNzOEJHM0F0NXB6MzNSY1BrTSJ9"
}
2019-06-11 12:32:21,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM HTTP/1.1" 200 909
2019-06-11 12:32:21,112:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 909
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 9G9Bi8my03-iPZaCp3pthz7nWrp_rvLcwfobVfeYx38
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:32:21 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:21 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "monkeymind.ltd"
},
"status": "pending",
"expires": "2019-06-18T12:32:20Z",
"challenges": [
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145198",
"token": "b_cd9ed9YY3FU4ClzWd_YW7Xg0Ysl-y6QAiOYhN3_04"
},
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199",
"token": "SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145200",
"token": "reHhnpfhEKf8juphxmaoBX7McB8ZhW24wndP1asQa64"
}
]
}
2019-06-11 12:32:21,112:DEBUG:acme.client:Storing nonce: 9G9Bi8my03-iPZaCp3pthz7nWrp_rvLcwfobVfeYx38
2019-06-11 12:32:21,113:INFO:certbot.auth_handler:Performing the following challenges:
2019-06-11 12:32:21,113:INFO:certbot.auth_handler:http-01 challenge for monkeymind.ltd
2019-06-11 12:32:39,612:DEBUG:certbot.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge
2019-06-11 12:32:39,617:DEBUG:certbot.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g
2019-06-11 12:32:39,617:INFO:certbot.auth_handler:Waiting for verification...
2019-06-11 12:32:39,618:DEBUG:acme.client:JWS payload:
b'{\n "keyAuthorization": "SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g.kpuHAlyDzLs6Yu3yrXZvkcwP0PacwUvULa3aNxXxo0s",\n "type": "http-01",\n "resource": "challenge"\n}'
2019-06-11 12:32:39,620:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199:
{
"signature": "Gnvl6ve8cj3AHQicNOc-qUHZWn7ZCWhV0ub2Bs3rNd7wNlFO72TjUngGAxA7O4rtwC91LiXTZc52pa2p1eUrUWuePBH3FAeE9YK6YfAw0sDMqsjmt-ZZfg6z5jxUyYb6aTr9WOAMDehFyoULleUQG8ZiBSUt0VoEF1nLC0Cj9FWsslxj8Ki3ln7fU0UBLevB-4lwt4sVxqnxxGA3BR4goXiJqgjFt0qT0OTl8mHwRIqnevPCYQw5YCTGlVaTvhIB0JzNKAuWefbrpH0kRqyujuoE0C-jyEXI6t3s5jUMqji99IuT1_HXZgGgwPES3dJXZAr9-bTgl2C0r0Yy-viAAA",
"payload": "ewogICJrZXlBdXRob3JpemF0aW9uIjogIlNIVFRTLU1kQzdHZ1BfeWZTYnYwa1VVZ214M2hLQVQ3WVdobGhUZU12LWcua3B1SEFseUR6THM2WXUzeXJYWnZrY3dQMFBhY3dVdlVMYTNhTnhYeG8wcyIsCiAgInR5cGUiOiAiaHR0cC0wMSIsCiAgInJlc291cmNlIjogImNoYWxsZW5nZSIKfQ",
"protected": "eyJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJhbGciOiAiUlMyNTYiLCAibm9uY2UiOiAiOUc5Qmk4bXkwMy1pUFphQ3AzcHRoejduV3JwX3J2TGN3Zm9iVmZlWXgzOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGxlbmdlL2FEZGtZdkhTcVI2R3JQT2NiUFNweEdYdmFDczhCRzNBdDVwejMzUmNQa00vMTY5MzkxNDUxOTkifQ"
}
2019-06-11 12:32:39,849:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199 HTTP/1.1" 200 224
2019-06-11 12:32:39,851:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 224
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199
Replay-Nonce: mfUWQhwE53lojuCpkMKieNzesAAHzoUPzB9OtlilXRg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:32:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:39 GMT
Connection: keep-alive
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199",
"token": "SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g"
}
2019-06-11 12:32:39,851:DEBUG:acme.client:Storing nonce: mfUWQhwE53lojuCpkMKieNzesAAHzoUPzB9OtlilXRg
2019-06-11 12:32:42,855:DEBUG:acme.client:JWS payload:
b''
2019-06-11 12:32:42,860:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM:
{
"signature": "MSsFXfi3gxmLJKfsOrmxxTa0x1IAW6wfk8O6T2K9PV0juViY7bNH0XY8mnvEzzATB7tac4RJqER7Ijeom4ETG1h1TJo0-YZWXCNnirETWT7ZytQuss8dZaMaP1EvRVGdBXvZtKMCBYQOCdQAUc6sASATs2D0MGYpMN5N_d5FmlPwXKtZ7UYRseyY9cwGJa5n6y8nXiGwJhlzIsUBG8BKSwsv2JS90Q_Of-Z1RBZwxgh5OjuXbAx7RF2V1L3m_i5dyjsdmoJNZL1ZJml0ZLRpdr1m45QMjDMpGBCHFyn4R0qfEMwP5a7nDcOaKVAVvpZ1v_QKt09Do3lCWe-vLXoYew",
"payload": "",
"protected": "eyJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJhbGciOiAiUlMyNTYiLCAibm9uY2UiOiAibWZVV1Fod0U1M2xvanVDcGtNS2llTnplc0FBSHpvVVB6QjlPdGxpbFhSZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovYURka1l2SFNxUjZHclBPY2JQU3B4R1h2YUNzOEJHM0F0NXB6MzNSY1BrTSJ9"
}
2019-06-11 12:32:43,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM HTTP/1.1" 200 1734
2019-06-11 12:32:43,114:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 1734
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: ss5t6ZAPCGHWYWgmFOzRreq8TS_HUqs6LL5_i8MgKdQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:32:43 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:32:43 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "monkeymind.ltd"
},
"status": "invalid",
"expires": "2019-06-18T12:32:20Z",
"challenges": [
{
"type": "dns-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145198",
"token": "b_cd9ed9YY3FU4ClzWd_YW7Xg0Ysl-y6QAiOYhN3_04"
},
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g [178.62.11.8]: \"\u003c!DOCTYPE html\u003e\\n\u003chtml lang=\\\"en-GB\\\" prefix=\\\"og: http://ogp.me/ns#\\\"\u003e\\n\u003chead\u003e\\n\\t\\n\\t\\t\u003cmeta charset=\\\"UTF-8\\\"/\u003e\\n\\t\\t\u003clink rel=\\\"profile\\\" href\"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145199",
"token": "SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g",
"validationRecord": [
{
"url": "http://monkeymind.ltd/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g",
"hostname": "monkeymind.ltd",
"port": "80",
"addressesResolved": [
"178.62.11.8"
],
"addressUsed": "178.62.11.8"
}
]
},
{
"type": "tls-alpn-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/aDdkYvHSqR6GrPOcbPSpxGXvaCs8BG3At5pz33RcPkM/16939145200",
"token": "reHhnpfhEKf8juphxmaoBX7McB8ZhW24wndP1asQa64"
}
]
}
2019-06-11 12:32:43,114:DEBUG:acme.client:Storing nonce: ss5t6ZAPCGHWYWgmFOzRreq8TS_HUqs6LL5_i8MgKdQ
2019-06-11 12:32:43,115:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
Domain: monkeymind.ltd
Type: unauthorized
Detail: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2019-06-11 12:32:43,116:DEBUG:certbot.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. monkeymind.ltd (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
2019-06-11 12:32:43,116:DEBUG:certbot.error_handler:Calling registered functions
2019-06-11 12:32:43,117:INFO:certbot.auth_handler:Cleaning up challenges
2019-06-11 12:32:43,117:DEBUG:certbot.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g
2019-06-11 12:32:43,117:DEBUG:certbot.plugins.webroot:All challenges cleaned up
2019-06-11 12:32:43,118:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. monkeymind.ltd (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from http://monkeymind.ltd/.well-known/acme-challenge/SHTTS-MdC7GgP_yfSbv0kUUgmx3hKAT7YWhlhTeMv-g [178.62.11.8]: "<!DOCTYPE html>\n<html lang=\"en-GB\" prefix=\"og: http://ogp.me/ns#\">\n<head>\n\t\n\t\t<meta charset=\"UTF-8\"/>\n\t\t<link rel=\"profile\" href"
2019-06-11 12:34:40,183:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:34:40,185:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/var/www/html']
2019-06-11 12:34:40,185:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:34:40,200:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:34:40,202:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:34:40,203:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
2019-06-11 12:34:40,203:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1101, in run
installer, authenticator = plug_sel.choose_configurator_plugins(config, plugins, "run")
File "/usr/lib/python3/dist-packages/certbot/plugins/selection.py", line 210, in choose_configurator_plugins
raise errors.MissingCommandlineFlag(msg)
certbot.errors.MissingCommandlineFlag: With the webroot plugin, you probably want to use the "certonly" command, eg:
certbot certonly --webroot
(Alternatively, add a --installer flag. See https://eff.org/letsencrypt-plugins
and "--help plugins" for more information.)
2019-06-11 12:34:56,384:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:34:56,385:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/var/www/html']
2019-06-11 12:34:56,386:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:34:56,402:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:34:56,403:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:34:56,404:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
2019-06-11 12:34:56,405:DEBUG:certbot.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: IAuthenticator, IPlugin
Entry point: webroot = certbot.plugins.webroot:Authenticator
Initialized: <certbot.plugins.webroot.Authenticator object at 0x7f705c90f8d0>
Prep: True
2019-06-11 12:34:56,406:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x7f705c90f8d0> and installer None
2019-06-11 12:34:56,406:INFO:certbot.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2019-06-11 12:34:56,411:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, contact=(), external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/54902181', new_authzr_uri=None, terms_of_service=None), 1cdb68af2b011dc00edb19ff8799bc78, Meta(creation_host='monkeymind-wp', creation_dt=datetime.datetime(2019, 4, 9, 17, 56, 18, tzinfo=<UTC>)))>
2019-06-11 12:34:56,412:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2019-06-11 12:34:56,415:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2019-06-11 12:34:56,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2019-06-11 12:34:56,640:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 658
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:34:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:34:56 GMT
Connection: keep-alive
{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
"tR2OhI8SR9s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2019-06-11 12:34:56,641:DEBUG:certbot.display.ops:No installer, picking names manually
2019-06-11 12:35:02,625:INFO:certbot.main:Obtaining a new certificate
2019-06-11 12:35:03,050:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0010_key-certbot.pem
2019-06-11 12:35:03,056:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0010_csr-certbot.pem
2019-06-11 12:35:03,058:DEBUG:acme.client:Requesting fresh nonce
2019-06-11 12:35:03,058:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-06-11 12:35:03,262:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-06-11 12:35:03,263:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hAHL5PQT38tXvIkhTYOhCKj7izHuwcHnJvjE_m3wYkA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Content-Length: 0
Expires: Tue, 11 Jun 2019 12:35:03 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:35:03 GMT
Connection: keep-alive
2019-06-11 12:35:03,264:DEBUG:acme.client:Storing nonce: hAHL5PQT38tXvIkhTYOhCKj7izHuwcHnJvjE_m3wYkA
2019-06-11 12:35:03,265:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "monkeymind.ltd"\n }\n ]\n}'
2019-06-11 12:35:03,271:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm1vbmtleW1pbmQubHRkIgogICAgfQogIF0KfQ",
"signature": "qkMePILETQixbX0KhaBUMyA0FJdNb2zWRlk7hRmDa_tPbqpJLDd88Gh6l1HFUnVsTxkC4ysVExBykJV4s3R5YqQFx2quX1DdOqEvE3kEm7wZulw6VQZ8HPn8W9Hi2Ve1rI_uUA2LIEu2q08jQn4JRcD1hBJZlwVTZdIE7HMTp2EwJlv1abe6kkwRx3h4M_71VPd2Ycf7vSe5WEIWWiipkntqHmK_iXUeyNRjreAWZ9_9Ao75_CnNf0zIEEA5WuFRRPlEokLErB4xPBvE_jouucSKQEOvFmMR5mZILm4lnWuMK0fOz37K5pJb7QDpRtRId3pRqxCQTl3lB3bmrgE9dQ",
"protected": "eyJub25jZSI6ICJoQUhMNVBRVDM4dFh2SWtoVFlPaENLajdpekh1d2NIbkp2akVfbTN3WWtBIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0"
}
2019-06-11 12:35:03,738:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 429 201
2019-06-11 12:35:03,740:DEBUG:acme.client:Received response:
HTTP 429
Server: nginx
Content-Type: application/problem+json
Content-Length: 201
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4RALfoVXu7vWlCsdbGJA3n1de17s7kofOcqQcyWsA2Q
Expires: Tue, 11 Jun 2019 12:35:03 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:35:03 GMT
Connection: close
{
"type": "urn:ietf:params:acme:error:rateLimited",
"detail": "Error creating new order :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/",
"status": 429
}
2019-06-11 12:35:03,740:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 385, in _get_order_and_authorizations
orderr = self.acme.new_order(csr_pem)
File "/usr/lib/python3/dist-packages/acme/client.py", line 870, in new_order
return self.client.new_order(csr_pem)
File "/usr/lib/python3/dist-packages/acme/client.py", line 652, in new_order
response = self._post(self.directory['newOrder'], order)
File "/usr/lib/python3/dist-packages/acme/client.py", line 95, in _post
return self.net.post(*args, **kwargs)
File "/usr/lib/python3/dist-packages/acme/client.py", line 1185, in post
return self._post_once(*args, **kwargs)
File "/usr/lib/python3/dist-packages/acme/client.py", line 1202, in _post_once
response = self._check_response(response, content_type=content_type)
File "/usr/lib/python3/dist-packages/acme/client.py", line 1054, in _check_response
raise messages.Error.from_json(jobj)
acme.messages.Error: urn:ietf:params:acme:error:rateLimited :: There were too many requests of a given type :: Error creating new order :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/
2019-06-11 12:35:03,745:ERROR:certbot.log:An unexpected error occurred:
2019-06-11 12:35:03,745:ERROR:certbot.log:There were too many requests of a given type :: Error creating new order :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/
2019-06-11 12:59:42,675:DEBUG:certbot.main:certbot version: 0.31.0
2019-06-11 12:59:42,677:DEBUG:certbot.main:Arguments: ['--apache']
2019-06-11 12:59:42,678:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-06-11 12:59:42,695:DEBUG:certbot.log:Root logging level set at 20
2019-06-11 12:59:42,696:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-06-11 12:59:42,697:DEBUG:certbot.plugins.selection:Requested authenticator apache and installer apache
2019-06-11 12:59:42,798:DEBUG:certbot_apache.configurator:Apache version is 2.4.18
2019-06-11 12:59:43,247:DEBUG:certbot.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache.entrypoint:ENTRYPOINT
Initialized: <certbot_apache.override_debian.DebianConfigurator object at 0x7fe44d29aa58>
Prep: True
2019-06-11 12:59:43,250:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_apache.override_debian.DebianConfigurator object at 0x7fe44d29aa58> and installer <certbot_apache.override_debian.DebianConfigurator object at 0x7fe44d29aa58>
2019-06-11 12:59:43,250:INFO:certbot.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2019-06-11 12:59:43,255:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(new_authzr_uri=None, terms_of_service=None, body=Registration(only_return_existing=None, agreement=None, status=None, key=None, contact=(), external_account_binding=None, terms_of_service_agreed=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/54902181'), 1cdb68af2b011dc00edb19ff8799bc78, Meta(creation_host='monkeymind-wp', creation_dt=datetime.datetime(2019, 4, 9, 17, 56, 18, tzinfo=<UTC>)))>
2019-06-11 12:59:43,257:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2019-06-11 12:59:43,260:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2019-06-11 12:59:43,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2019-06-11 12:59:43,482:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 658
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Tue, 11 Jun 2019 12:59:43 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:59:43 GMT
Connection: keep-alive
{
"ZYxWXVVVDmo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2019-06-11 12:59:47,097:INFO:certbot.main:Obtaining a new certificate
2019-06-11 12:59:47,285:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0011_key-certbot.pem
2019-06-11 12:59:47,287:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0011_csr-certbot.pem
2019-06-11 12:59:47,288:DEBUG:acme.client:Requesting fresh nonce
2019-06-11 12:59:47,288:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-06-11 12:59:47,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-06-11 12:59:47,506:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: Zl6ZSF2QakTG9QrEXM2exlr4Ryye42ORvqp3T5kYE3I
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Content-Length: 0
Expires: Tue, 11 Jun 2019 12:59:47 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:59:47 GMT
Connection: keep-alive
GNU nano 2.5.3 File: letsencrypt.log
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
"tR2OhI8SR9s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2019-06-11 12:34:56,641:DEBUG:certbot.display.ops:No installer, picking names manually
2019-06-11 12:35:02,625:INFO:certbot.main:Obtaining a new certificate
2019-06-11 12:35:03,050:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0010_key-certbot.pem
2019-06-11 12:35:03,056:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0010_csr-certbot.pem
2019-06-11 12:35:03,058:DEBUG:acme.client:Requesting fresh nonce
2019-06-11 12:35:03,058:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-06-11 12:35:03,262:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-06-11 12:35:03,263:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: hAHL5PQT38tXvIkhTYOhCKj7izHuwcHnJvjE_m3wYkA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Content-Length: 0
Expires: Tue, 11 Jun 2019 12:35:03 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:35:03 GMT
Connection: keep-alive
2019-06-11 12:35:03,264:DEBUG:acme.client:Storing nonce: hAHL5PQT38tXvIkhTYOhCKj7izHuwcHnJvjE_m3wYkA
2019-06-11 12:35:03,265:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "monkeymind.ltd"\n }\n ]\n}'
2019-06-11 12:35:03,271:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm1vbmtleW1pbmQubHRkIgogICAgfQogIF0KfQ",
"signature": "qkMePILETQixbX0KhaBUMyA0FJdNb2zWRlk7hRmDa_tPbqpJLDd88Gh6l1HFUnVsTxkC4ysVExBykJV4s3R5YqQFx2quX1DdOqEvE3kEm7wZulw6VQZ8HPn8W9Hi2Ve1rI_uUA2LIEu2q08jQn4JRcD1hBJZlwVTZdIE7HMTp2EwJlv1abe6kkwRx3h4M_71VPd2Ycf7vSe5WEIWWiipkntqHmK_iXUeyNRjreA$
"protected": "eyJub25jZSI6ICJoQUhMNVBRVDM4dFh2SWtoVFlPaENLajdpekh1d2NIbkp2akVfbTN3WWtBIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC81NDkwMjE4MSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2V$
}
2019-06-11 12:35:03,738:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 429 201
2019-06-11 12:35:03,740:DEBUG:acme.client:Received response:
HTTP 429
Server: nginx
Content-Type: application/problem+json
Content-Length: 201
Boulder-Requester: 54902181
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 4RALfoVXu7vWlCsdbGJA3n1de17s7kofOcqQcyWsA2Q
Expires: Tue, 11 Jun 2019 12:35:03 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 11 Jun 2019 12:35:03 GMT
Connection: close
{
"type": "urn:ietf:params:acme:error:rateLimited",
"detail": "Error creating new order :: too many failed authorizations recently: see https://letsencrypt.org/docs/rate-limits/",
"status": 429
}
2019-06-11 12:35:03,740:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.