[root@ZZZ ~]# cat /var/log/letsencrypt/letsencrypt.log
2021-06-07 10:24:11,745:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:certbot version: 1.16.0
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/1201/bin/certbot
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Arguments: ['--apache', '-v', '--preconfigured-renewal']
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2021-06-07 10:24:12,045:DEBUG:certbot._internal.log:Root logging level set at 20
2021-06-07 10:24:12,046:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-07 10:24:12,192:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.37
2021-06-07 10:24:12,581:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10>
Prep: True
2021-06-07 10:24:12,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10> and installer <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10>
2021-06-07 10:24:12,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2021-06-07 10:24:12,590:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/125950347', new_authzr_uri=None, terms_of_service=None), 0af083edb8a9f184c91586879d3ce54a, Meta(creation_dt=datetime.datetime(2021, 6, 4, 12, 52, 9, tzinfo=<UTC>), creation_host='ZZZ.OOOO.ca', register_to_eff=None))>
2021-06-07 10:24:12,591:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2021-06-07 10:24:12,593:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2021-06-07 10:24:12,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2021-06-07 10:24:12,872:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:12 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"j5b8VYx95js": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2021-06-07 10:24:16,593:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-07 10:24:21,199:DEBUG:certbot.display.util:Notifying user: Renewing an existing certificate for ZZZ.CCCC.ca and 4 more domains
2021-06-07 10:24:21,305:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0003_key-certbot.pem
2021-06-07 10:24:21,307:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0003_csr-certbot.pem
2021-06-07 10:24:21,307:DEBUG:acme.client:Requesting fresh nonce
2021-06-07 10:24:21,307:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2021-06-07 10:24:21,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2021-06-07 10:24:21,368:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 010s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2021-06-07 10:24:21,368:DEBUG:acme.client:Storing nonce: 0104N1h1ZHMcdQdB4h87PbAubo9ULm-y5uonp_crr-qWens
2021-06-07 10:24:21,368:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ZZZ.CCCC.ca"\n },\n {\n "type": "dns",\n "value": "oldZZZ.CCCC.ca"\n },\n {\n "type": "dns",\n "value": "ZZZ.OOOO.ca"\n },\n {\n "type": "dns",\n "value": "ZZZ.info"\n },\n {\n "type": "dns",\n "value": "www.ZZZ.info"\n }\n ]\n}'
2021-06-07 10:24:21,370:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eydQ",
"signature": "yZn7wOwA",
"payload": "ewo"
}
2021-06-07 10:24:21,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 884
2021-06-07 10:24:21,476:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 884
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/125950347/10234344673
Replay-Nonce: 0103GDhFDcAjjSgy1k2snXZC9Uu6hqLz8pkL2Mslt0tnqFc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2021-06-14T13:24:21Z",
"identifiers": [
{
"type": "dns",
"value": "ZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "ZZZ.info"
},
{
"type": "dns",
"value": "ZZZ.OOOO.ca"
},
{
"type": "dns",
"value": "oldZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "www.ZZZ.info"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/125950347/10234344673"
}
2021-06-07 10:24:21,476:DEBUG:acme.client:Storing nonce: 010c
2021-06-07 10:24:21,476:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505:
{
"protected": "ey9",
"signature": "UgB5BQ",
"payload": ""
}
2021-06-07 10:24:21,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113505 HTTP/1.1" 200 758
2021-06-07 10:24:21,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0104Jc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.CCCC.ca"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113505/3XdMfg",
"token": "Mh25AA",
"validationRecord": [
{
"url": "http://ZZZ.CCCC.ca/.well-known/acme-challenge/Mh25ZnHmDCNwjQnbrgHbJJuwvjc1r5330SeGpaguoAA",
"hostname": "ZZZ.CCCC.ca",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:21,542:DEBUG:acme.client:Storing nonce: 0104AJc
2021-06-07 10:24:21,542:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,544:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511:
{
"protected": "eVy",
"signature": "oEREw",
"payload": ""
}
2021-06-07 10:24:21,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113511 HTTP/1.1" 200 746
2021-06-07 10:24:21,607:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 010
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.info"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113511/2UDmDQ",
"token": "w",
"validationRecord": [
{
"url": "http://ZZZ.info/.well-known/acme-challenge/HGDO",
"hostname": "ZZZ.info",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:21,607:DEBUG:acme.client:Storing nonce: 0103roKS4oszKGTyz43ro1moSkJYMlYtFWNJg7Lla1h7m3w
2021-06-07 10:24:21,608:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,609:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512:
{
"protected": "eyJ9",
"signature": "vBMtjQ",
"payload": ""
}
2021-06-07 10:24:21,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113512 HTTP/1.1" 200 767
2021-06-07 10:24:21,672:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 767
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 018
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "oldZZZ.CCCC.ca"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113512/bRLu5w",
"token": "cre4",
"validationRecord": [
{
"url": "http://oldZZZ.CCCC.ca/.well-known/acme-challenge/crSgshI3BN6e3xOf-RdnxRGrZGnnk3aHW1LCPJVLHe4",
"hostname": "oldZZZ.CCCC.ca",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:21,672:DEBUG:acme.client:Storing nonce: 0103yoXvYQDEu0nIxY64Fdz84P3v5fKLOEyGzEvuCeJ3048
2021-06-07 10:24:21,673:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,674:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514:
{
"protected": "ee",
"signature": "YjPw",
"payload": ""
}
2021-06-07 10:24:21,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113514 HTTP/1.1" 200 758
2021-06-07 10:24:21,736:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "www.ZZZ.info"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113514/Bbh-OQ",
"token": "9ncc",
"validationRecord": [
{
"url": "http://www.ZZZ.info/.well-known/acme-challenge/9nc-tpgvHKverKw0o5xJQzKvQplHfgRJNRTwWIeorBc",
"hostname": "www.ZZZ.info",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:21,737:DEBUG:acme.client:Storing nonce: 0103DlGwt_C3-vVQRJ1KKIBbTR7vq8aYZ1itcyOJLZuZ8_8
2021-06-07 10:24:21,737:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,738:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009:
{
"protected": "e",
"signature": "yg",
"payload": ""
}
2021-06-07 10:24:21,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13783812009 HTTP/1.1" 200 799
2021-06-07 10:24:21,803:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 799
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 01035HE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.OOOO.ca"
},
"status": "pending",
"expires": "2021-06-14T13:24:21Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
"token": "lrfRQ"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/Mb7z4g",
"token": "lrfRQ"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/RCv9Bg",
"token": "lrfRQ"
}
]
}
2021-06-07 10:24:21,803:DEBUG:acme.client:Storing nonce: 010sHE
2021-06-07 10:24:21,804:INFO:certbot._internal.auth_handler:Performing the following challenges:
2021-06-07 10:24:21,804:INFO:certbot._internal.auth_handler:http-01 challenge for ZZZ.OOOO.ca
2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: ZZZ.CCCC.ca in: /etc/httpd/conf/httpd.conf
2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:writing a pre config file with text:
RewriteEngine on
RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]
2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:writing a post config file with text:
<Directory /var/lib/letsencrypt/http_challenges>
Require all granted
</Directory>
<Location /.well-known/acme-challenge>
Require all granted
</Location>
2021-06-07 10:24:21,852:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd.conf
2021-06-07 10:24:25,189:DEBUG:acme.client:JWS payload:
b'{}'
2021-06-07 10:24:25,191:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw:
{
"protected": "eyQ",
"signature": "yWw",
"payload": "e30"
}
2021-06-07 10:24:25,256:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/13783812009/7cXosw HTTP/1.1" 200 186
2021-06-07 10:24:25,257:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:25 GMT
Content-Type: application/json
Content-Length: 186
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw
Replay-Nonce: 0104TiGG6arueQ13aIMlDEa3u7ysVlSKLwK_WGLg9aXrH70
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
"token": "Q"
}
2021-06-07 10:24:25,257:DEBUG:acme.client:Storing nonce: 0104TiGG6arueQ13aIMlDEa3u7ysVlSKLwK_WGLg9aXrH70
2021-06-07 10:24:25,257:INFO:certbot._internal.auth_handler:Waiting for verification...
2021-06-07 10:24:26,259:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,261:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505:
{
"protected": "ey9",
"signature": "qA",
"payload": ""
}
2021-06-07 10:24:26,324:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113505 HTTP/1.1" 200 758
2021-06-07 10:24:26,324:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.CCCC.ca"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113505/3XdMfg",
"token": "M",
"validationRecord": [
{
"url": "http://ZZZ.CCCC.ca/.well-known/acme-challenge/Mh25ZnHmDCNwjQnbrgHbJJuwvjc1r5330SeGpaguoAA",
"hostname": "ZZZ.CCCC.ca",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:26,324:DEBUG:acme.client:Storing nonce: 01Y
2021-06-07 10:24:26,325:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,326:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511:
{
"protected": "eyJ9",
"signature": "nWsw",
"payload": ""
}
2021-06-07 10:24:26,408:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113511 HTTP/1.1" 200 746
2021-06-07 10:24:26,409:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 01
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.info"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113511/2UDmDQ",
"token": "H",
"validationRecord": [
{
"url": "http://ZZZ.info/.well-known/acme-challenge/HG,
"hostname": "ZZZ.info",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:26,409:DEBUG:acme.client:Storing nonce: 01
2021-06-07 10:24:26,409:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,411:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512:
{
"protected": "ey9",
"signature": "uZ",
"payload": ""
}
2021-06-07 10:24:26,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113512 HTTP/1.1" 200 767
2021-06-07 10:24:26,476:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 767
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "oldZZZ.CCCC.ca"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113512/bRLu5w",
"token": "c",
"validationRecord": [
{
"url": "http://oldZZZ.CCCC.ca/.well-known/acme-challenge/crSgshI3BN6e3xOf-RdnxRGrZGnnk3aHW1LCPJVLHe4",
"hostname": "oldZZZ.CCCC.ca",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:26,476:DEBUG:acme.client:Storing nonce: 010go0
2021-06-07 10:24:26,476:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514:
{
"protected": "ey",
"signature": "qQ",
"payload": ""
}
2021-06-07 10:24:26,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113514 HTTP/1.1" 200 758
2021-06-07 10:24:26,543:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "www.ZZZ.info"
},
"status": "valid",
"expires": "2021-07-04T12:53:40Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113514/Bbh-OQ",
"token": "9nBc",
"validationRecord": [
{
"url": "http://www.ZZZ.info/.well-known/acme-challenge/9nc-tpgvHKverKw0o5xJQzKvQplHfgRJNRTwWIeorBc",
"hostname": "www.ZZZ.info",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-04T12:53:40Z"
}
]
}
2021-06-07 10:24:26,543:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:26,543:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,544:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009:
{
"protected": "ey9",
"signature": "Tw",
"payload": ""
}
2021-06-07 10:24:26,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13783812009 HTTP/1.1" 200 770
2021-06-07 10:24:26,615:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 770
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ZZZ.OOOO.ca"
},
"status": "valid",
"expires": "2021-07-07T13:24:25Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
"token": "lrfGHX2zkL6t3JB0DEivD6dA84guKoD6vd8nQ1dL9RQ",
"validationRecord": [
{
"url": "http://ZZZ.OOOO.ca/.well-known/acme-challenge/lrfGHX2zkL6t3JB0DEivD6dA84guKoD6vd8nQ1dL9RQ",
"hostname": "ZZZ.OOOO.ca",
"port": "80",
"addressesResolved": [
"129.173.20.173"
],
"addressUsed": "129.173.20.173"
}
],
"validated": "2021-06-07T13:24:25Z"
}
]
}
2021-06-07 10:24:26,615:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:26,616:DEBUG:certbot._internal.error_handler:Calling registered functions
2021-06-07 10:24:26,616:INFO:certbot._internal.auth_handler:Cleaning up challenges
2021-06-07 10:24:26,963:DEBUG:certbot._internal.client:CSR: CSR(file='/etc/letsencrypt/csr/0003_csr-certbot.pem', data=b'-----BEGIN CERTIFICATE REQUEST-----\nMI/9d/\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2021-06-07 10:24:26,964:DEBUG:acme.client:JWS payload:
b'{\n "csr": "M"\n}'
2021-06-07 10:24:26,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/1
{
"protected": "",
"signature": "",
"payload": ""
}
2021-06-07 10:24:28,151:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/finalize/125950347/10234344673 HTTP/1.1" 200 986
2021-06-07 10:24:28,151:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:28 GMT
Content-Type: application/json
Content-Length: 986
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "valid",
"expires": "2021-06-14T13:24:21Z",
"identifiers": [
{
"type": "dns",
"value": "ZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "ZZZ.info"
},
{
"type": "dns",
"value": "ZZZ.OOOO.ca"
},
{
"type": "dns",
"value": "oldZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "www.ZZZ.info"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/15",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/1",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/2",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/4",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/9"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1",
"certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/0"
}
2021-06-07 10:24:28,152:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:29,153:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:29,154:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/order/qqq:
{
"protected": "Q",
"signature": "a",
"payload": ""
}
2021-06-07 10:24:29,228:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/order/ HTTP/1.1" 200 986
2021-06-07 10:24:29,229:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:29 GMT
Content-Type: application/json
Content-Length: 986
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "valid",
"expires": "2021-06-14T13:24:21Z",
"identifiers": [
{
"type": "dns",
"value": "ZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "ZZZ.info"
},
{
"type": "dns",
"value": "ZZZ.OOOO.ca"
},
{
"type": "dns",
"value": "oldZZZ.CCCC.ca"
},
{
"type": "dns",
"value": "www.ZZZ.info"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/5",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/1",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/2",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/4",
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/9"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1",
"certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/0"
}
2021-06-07 10:24:29,229:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:29,229:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:29,231:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/cert/0zzzzzzzzzzzzzzzzzzzzzzzzzzz:
{
"protected": "aaaa",
"signature": "sss",
"payload": ""
}
2021-06-07 10:24:29,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/cert/zzzzzzzzzzzzzzzzzzzzzzzzz HTTP/1.1" 200 5682
2021-06-07 10:24:29,293:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:29 GMT
Content-Type: application/pem-certificate-chain
Content-Length: 5682
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/cert/zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz>;rel="alternate"
Replay-Nonce: zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
-----BEGIN CERTIFICATE-----
QQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
QQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
qqqqqqqqqqqqqqqqqqqqqqqqq
-----END CERTIFICATE-----
2021-06-07 10:24:29,293:DEBUG:acme.client:Storing nonce: 0103E_vE
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing new private key to /etc/letsencrypt/archive/ZZZ.CCCC.ca/privkey4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing certificate to /etc/letsencrypt/archive/ZZZ.CCCC.ca/cert4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing chain to /etc/letsencrypt/archive/ZZZ.CCCC.ca/chain4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing full chain to /etc/letsencrypt/archive/ZZZ.CCCC.ca/fullchain4.pem.
2021-06-07 10:24:29,314:DEBUG:certbot._internal.cli:Var authenticator=apache (set by user).
2021-06-07 10:24:29,314:DEBUG:certbot._internal.cli:Var installer=apache (set by user).
2021-06-07 10:24:29,315:DEBUG:certbot._internal.storage:Writing new config /etc/letsencrypt/renewal/ZZZ.CCCC.ca.conf.new.
2021-06-07 10:24:29,347:DEBUG:certbot.display.util:Notifying user:
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/ZZZ.CCCC.ca/fullchain.pem
Key is saved at: /etc/letsencrypt/live/ZZZ.CCCC.ca/privkey.pem
This certificate expires on 2021-09-05.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.
2021-06-07 10:24:29,347:DEBUG:certbot.display.util:Notifying user: Deploying certificate
2021-06-07 10:24:29,376:INFO:certbot_apache._internal.configurator:Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,385:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,437:INFO:certbot_apache._internal.configurator:Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,437:INFO:certbot_apache._internal.configurator:Enabling site /etc/httpd/conf/httpd-le-ssl.conf by adding Include to root configuration
2021-06-07 10:24:29,468:DEBUG:certbot_apache._internal.parser:Adding Include /etc/httpd/conf/httpd-le-ssl.conf to /files/etc/httpd/conf/httpd.conf
2021-06-07 10:24:29,468:DEBUG:certbot.display.util:Notifying user: Successfully deployed certificate for ZZZ.CCCC.ca to /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,510:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd.conf
2021-06-07 10:24:29,592:INFO:certbot_apache._internal.configurator:Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,654:INFO:certbot_apache._internal.configurator:Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,655:DEBUG:certbot.display.util:Notifying user: Successfully deployed certificate for oldZZZ.CCCC.ca to /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,685:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 542, in deploy_certificate
self.installer.deploy_cert(
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 518, in deploy_cert
self._deploy_cert(vhost, cert_path, key_path, chain_path, fullchain_path)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/override_centos.py", line 91, in _deploy_cert
super()._deploy_cert(*args, **kwargs)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 640, in _deploy_cert
self._add_dummy_ssl_directives(vhost.path)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 1689, in _add_dummy_ssl_directives
self.parser.add_dir(vh_path, "SSLCertificateFile",
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/parser.py", line 426, in add_dir
self.aug.set(aug_conf_path + "/directive[last() + 1]", directive)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 263, in set
self._raise_error(AugeasValueError, "Augeas.set() failed")
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 154, in _raise_error
raise errorclass(ec, fullmessage, msg, minor, details)
augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression
2021-06-07 10:24:29,685:DEBUG:certbot._internal.error_handler:Calling registered functions
2021-06-07 10:24:29,717:DEBUG:certbot.display.util:Notifying user: Could not install certificate
2021-06-07 10:24:29,717:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/1201/bin/certbot", line 8, in <module>
sys.exit(main())
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/main.py", line 15, in main
return internal_main.main(cli_args)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1552, in main
return config.func(config, plugins)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1282, in run
_install_cert(config, le_client, domains, new_lineage)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 909, in _install_cert
le_client.deploy_certificate(domains, path_provider.key_path, path_provider.cert_path,
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 542, in deploy_certificate
self.installer.deploy_cert(
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 518, in deploy_cert
self._deploy_cert(vhost, cert_path, key_path, chain_path, fullchain_path)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/override_centos.py", line 91, in _deploy_cert
super()._deploy_cert(*args, **kwargs)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 640, in _deploy_cert
self._add_dummy_ssl_directives(vhost.path)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 1689, in _add_dummy_ssl_directives
self.parser.add_dir(vh_path, "SSLCertificateFile",
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/parser.py", line 426, in add_dir
self.aug.set(aug_conf_path + "/directive[last() + 1]", directive)
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 263, in set
self._raise_error(AugeasValueError, "Augeas.set() failed")
File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 154, in _raise_error
raise errorclass(ec, fullmessage, msg, minor, details)
augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression
2021-06-07 10:24:29,718:ERROR:certbot._internal.log:An unexpected error occurred:
2021-06-07 10:24:29,718:ERROR:certbot._internal.log:augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression