Yup 
2019-09-28 22:34:42,720:DEBUG:certbot.main:certbot version: 0.31.0
2019-09-28 22:34:42,721:DEBUG:certbot.main:Arguments: []
2019-09-28 22:34:42,721:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2019-09-28 22:34:42,727:DEBUG:certbot.log:Root logging level set at 20
2019-09-28 22:34:42,727:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2019-09-28 22:34:42,728:DEBUG:certbot.plugins.selection:Requested authenticator None and installer None
2019-09-28 22:34:49,965:DEBUG:certbot.plugins.selection:Single candidate plugin: * nginx
Description: Nginx Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: nginx = certbot_nginx.configurator:NginxConfigurator
Initialized: <certbot_nginx.configurator.NginxConfigurator object at 0x7fa24bc5ec50>
Prep: True
2019-09-28 22:34:49,968:DEBUG:certbot.plugins.selection:Selected authenticator <certbot_nginx.configurator.NginxConfigurator object at 0x7fa24bc5ec50> and installer <certbot_nginx.configurator.NginxConfigurator object at 0x7fa24bc5ec50>
2019-09-28 22:34:49,968:INFO:certbot.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx
2019-09-28 22:34:49,972:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v01.api.letsencrypt.org/acme/reg/1690363', new_authzr_uri=None, terms_of_service=None), 8ffbfcc2a88125b899a281120a5f6b44, Meta(creation_dt=datetime.datetime(2016, 5, 8, 0, 4, 40, tzinfo=<UTC>), creation_host='localhost'))>
2019-09-28 22:34:49,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2019-09-28 22:34:49,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2019-09-28 22:34:50,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2019-09-28 22:34:50,539:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 29 Sep 2019 04:34:50 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"-wCRDQDMjr0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2019-09-28 22:34:53,647:INFO:certbot.renewal:Cert not yet due for renewal
2019-09-28 22:34:56,782:INFO:certbot.main:Renewing an existing certificate
2019-09-28 22:34:56,909:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0351_key-certbot.pem
2019-09-28 22:34:56,916:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0351_csr-certbot.pem
2019-09-28 22:34:56,917:DEBUG:acme.client:Requesting fresh nonce
2019-09-28 22:34:56,917:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2019-09-28 22:34:56,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2019-09-28 22:34:56,997:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 29 Sep 2019 04:34:56 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0001OA4r3gOvAATu2FdWQIfWkBMvNKzfXl57pyBimSJFUCU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2019-09-28 22:34:56,998:DEBUG:acme.client:Storing nonce: 0001OA4r3gOvAATu2FdWQIfWkBMvNKzfXl57pyBimSJFUCU
2019-09-28 22:34:56,998:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ackis.duckdns.org"\n }\n ]\n}'
2019-09-28 22:34:57,002:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy8xNjkwMzYzIiwgIm5vbmNlIjogIjAwMDFPQTRyM2dPdkFBVHUyRmRXUUlmV2tCTXZOS3pmWGw1N3B5QmltU0pGVUNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"signature": "i3xY8Za3EJpPSRCVge1Ftoh0QPO7W8yYZWn3wyCkJLMhaoFoXjcFwT_sHvBWcP3uqwnJl7p8coAXGKoa7HeicB4a_tP_vu5VMkqRyIvVkJbL3XHbdsip10SYkdw5iZvohcpw6HoxcBMQBFr4Eu_Q-u8s9fVmqHZfa-2eYZvCU00ZyHWtJoT9eu0u3_XRYi-TtuIUyJGs5v2RDz5XJ7XCnotHq1F9T6S_6bMMFm_pGSsF5eElKdDe0zrJc9TAXQgx5MwEF9WsuLjElcYHySRbPN8nVO_C-VbK1pjsXZnj94zyXjGdtVx7A1YUr6rnbkEm179bf9iqnkF6bjq-ihsTPw",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFja2lzLmR1Y2tkbnMub3JnIgogICAgfQogIF0KfQ"
}
2019-09-28 22:34:57,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2019-09-28 22:34:57,171:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 29 Sep 2019 04:34:57 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 1690363
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1690363/1181990325
Replay-Nonce: 0001f_1G6ByXf7TGvPXrqOcvJHm_cOm3zB08AqJN1CyOvtM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2019-10-06T04:34:57.126079845Z",
"identifiers": [
{
"type": "dns",
"value": "ackis.duckdns.org"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/549729261"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1690363/1181990325"
}
2019-09-28 22:34:57,171:DEBUG:acme.client:Storing nonce: 0001f_1G6ByXf7TGvPXrqOcvJHm_cOm3zB08AqJN1CyOvtM
2019-09-28 22:34:57,172:DEBUG:acme.client:JWS payload:
b''
2019-09-28 22:34:57,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/549729261:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy8xNjkwMzYzIiwgIm5vbmNlIjogIjAwMDFmXzFHNkJ5WGY3VEd2UFhycU9jdkpIbV9jT20zekIwOEFxSk4xQ3lPdnRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NDk3MjkyNjEifQ",
"signature": "iOZCWnfF1hu4p1edwrHy7bATuqzndx7C99b5SdPynik_8mYw-Vg_92MJI-RcWF4ZtndfKwVC6trC5hww95_bxpd2SR92eyovER1w_aBt9t0sst8g29q1iPtF0OtlY7rfcLiMPAM2hFzTIiAJTmZmesshN8kFnbwRaRw3b0S9B5uJuBtuGz4iM3ayioaZ6xLqATOSsYR9U0YTe_x5CSEJbqUjHSSmK6aa1i7uA1QoZztYX7GKXY1-hGmemyS7l6csPRc2DS-fG97ixYgnDNYWhwQnqvqPfhBv4eYOv7eLp5pfLjMWYk2kEYLsxmvdSqFwpQ-C1HbEuSQZdVYucG_5pA",
"payload": ""
}
2019-09-28 22:34:57,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/549729261 HTTP/1.1" 200 792
2019-09-28 22:34:57,259:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 29 Sep 2019 04:34:57 GMT
Content-Type: application/json
Content-Length: 792
Connection: keep-alive
Boulder-Requester: 1690363
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 00024gmwHBBMnFWB6NLJwoHgiDZ3AsRTfrUcImi65u__OJs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ackis.duckdns.org"
},
"status": "pending",
"expires": "2019-10-06T04:34:57Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/4EZyKA",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/T4uEqA",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/CXnUTw",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
}
]
}
2019-09-28 22:34:57,259:DEBUG:acme.client:Storing nonce: 00024gmwHBBMnFWB6NLJwoHgiDZ3AsRTfrUcImi65u__OJs
2019-09-28 22:34:57,260:INFO:certbot.auth_handler:Performing the following challenges:
2019-09-28 22:34:57,260:INFO:certbot.auth_handler:http-01 challenge for ackis.duckdns.org
2019-09-28 22:34:57,387:DEBUG:certbot_nginx.http_01:Generated server block:
[]
2019-09-28 22:34:57,387:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/plex
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/znc
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/channydraws-dev
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/asf
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/sonarr
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/grafana
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/denon
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/home
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/monit
2019-09-28 22:34:57,388:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/transmission
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/calibre
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/hdhrextend
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/nextcloud
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/webmin
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/include.whitelist
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/lidarr
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/plexwebtools
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/glances
2019-09-28 22:34:57,389:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/internet
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/mf4890
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/ubooquity
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/datacrow
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/canon
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/radarr
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/wiki
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/sabnzbd
2019-09-28 22:34:57,390:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/chantelle
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/channydraws
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/usbserver
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/mylar
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/zoneminder2
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/plexpy
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/oleary
2019-09-28 22:34:57,391:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/ombi
2019-09-28 22:34:57,392:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/obi200
2019-09-28 22:34:57,392:DEBUG:certbot_nginx.parser:Writing nginx conf tree to /etc/nginx/nginx.conf:
user www-data;
worker_processes 4;
pid /run/nginx.pid;
events {
worker_connections 1024;
# multi_accept on;
}
http {
include /etc/letsencrypt/le_http_01_cert_challenge.conf;
server_names_hash_bucket_size 128;
##
# Basic Settings
##
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
server_tokens off;
# server_names_hash_bucket_size 64;
# server_name_in_redirect off;
include /etc/nginx/mime.types;
default_type application/octet-stream;
##
# Gzip Settings
##
gzip on;
gzip_disable "msie6";
# gzip_vary on;
# gzip_proxied any;
# gzip_comp_level 6;
# gzip_buffers 16 8k;
# gzip_http_version 1.1;
# gzip_types text/plain text/css application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript;
##
# nginx-naxsi config
##
# Uncomment it if you installed nginx-naxsi
##
#include /etc/nginx/naxsi_core.rules;
##
# nginx-passenger config
##
# Uncomment it if you installed nginx-passenger
##
#passenger_root /usr;
#passenger_ruby /usr/bin/ruby;
##
# Virtual Host Configs
##
# include /etc/nginx/conf.d/*.conf;
include /etc/nginx/sites-enabled/*;
}
#mail {
# # See sample authentication script at:
# # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript
#
# # auth_http localhost/auth.php;
# # pop3_capabilities "TOP" "USER";
# # imap_capabilities "IMAP4rev1" "UIDPLUS";
#
# server {
# listen localhost:110;
# protocol pop3;
# proxy on;
# }
#
# server {
# listen localhost:143;
# protocol imap;
# proxy on;
# }
#}
2019-09-28 22:34:57,394:DEBUG:certbot_nginx.parser:Writing nginx conf tree to /etc/nginx/sites-enabled/internet:
# HTTP server - redirect to HTTPS
server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot
listen 80;
listen [::]:80;
server_name www.ackis.duckdns.org ackis.duckdns.org;
location / {
return 301 https://ackis.duckdns.org$request_uri;
}
access_log syslog:server=localhost,tag=nginx_access_internet,severity=info;
error_log syslog:server=localhost,tag=nginx_error_internet;
location = /.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4{default_type text/plain;return 200 ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4.WQr5aZhiL_lm2g0Gd4sKtM4CUAKHTqL_jIdP25wamqc;} # managed by Certbot
}
# www domain - redirect to domain without www
server {
listen 443 ssl;
listen [::]:443 ssl;
server_name www.ackis.duckdns.org;
return 301 https://ackis.duckdns.org$request_uri;
access_log syslog:server=localhost,tag=nginx_access_internet,severity=info;
error_log syslog:server=localhost,tag=nginx_error_internet;
ssl_certificate /etc/letsencrypt/live/www.ackis.duckdns.org/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/www.ackis.duckdns.org/privkey.pem;
}
server {
listen 443 ssl default_server;
listen [::]:443 ssl;
server_name ackis.duckdns.org;
access_log syslog:server=localhost,tag=nginx_access_internet,severity=info;
error_log syslog:server=localhost,tag=nginx_error_internet;
ssl_certificate /etc/letsencrypt/live/ackis.duckdns.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/ackis.duckdns.org/privkey.pem; # managed by Certbot
ssl_stapling on;
ssl_stapling_verify on;
server_tokens off;
etag off;
add_header Strict-Transport-Security "max-age=31536000;";
add_header X-Frame-Options SAMEORIGIN;
add_header X-Content-Type-Options nosniff;
add_header X-XSS-Protection "1; mode=block";
# location ^~ /.well-known/acme-challenge/ {
# default_type "text/plain";
# root /var/www/internet;
# }
#
# location = /.well-known/acme-challenge/ {
# return 404;
# }
location ~* /\.\./ {
deny all;
return 404;
}
location ~* "^(?:.+\.(?:htaccess|make|txt|test|markdown|md|engine|inc|info|install|module|profile|po|sh|.*sql|theme|tpl(?:\.php)?|xtmpl)|code-style\.pl|/Entries.*|/Repository|/Root|/Tag|/Template|^#.*#$|\.php(~|\.sw[op]|\.bak|\.orig\.save))$" {
return 404;
}
location = /favicon.ico {
try_files /favicon.ico =204;
}
location / {
root /var/www/internet;
index index.html;
}
location /nginx_status {
access_log syslog:server=localhost,tag=nginx_access_admin,severity=info;
error_log syslog:server=localhost,tag=nginx_error_admin;
allow 192.168.0.0/24;
deny all;
auth_basic "Restricted access";
auth_basic_user_file /etc/nginx/auth/admin.htpasswd;
stub_status on;
}
}
2019-09-28 22:35:04,454:INFO:certbot.auth_handler:Waiting for verification...
2019-09-28 22:35:04,455:DEBUG:acme.client:JWS payload:
b'{\n "resource": "challenge",\n "keyAuthorization": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4.WQr5aZhiL_lm2g0Gd4sKtM4CUAKHTqL_jIdP25wamqc",\n "type": "http-01"\n}'
2019-09-28 22:35:04,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/4EZyKA:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy8xNjkwMzYzIiwgIm5vbmNlIjogIjAwMDI0Z213SEJCTW5GV0I2TkxKd29IZ2lEWjNBc1JUZnJVY0ltaTY1dV9fT0pzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My81NDk3MjkyNjEvNEVaeUtBIn0",
"signature": "L8CDWJxsfXlUeuJtOy18CCDAxQKfjYbFPT2b8M4n8vIZaBfMGLqFtIx011CphgKQXKDnRchUZ30XjgfOuup3Zq6aZClB4Q7oCipUvlt40oBj9fnUy01BcbyB6in_AOe9b0d8D9fD7kgBxjRczVOcCnNwhU4RxW92i9UF5CI-1kBvPG1FUcoGKDPlinyH70lVikJBXOfWL-EeQdFV920vzITI9CCrP3c_vVHSrpkZlF00ejgci4EfFmGszvHzwKbBcX1elndooLuuNUANTsNetKF10cdrKYN-ezfj7XSDWfd_58kmmtGuBua7CtLUQTCIcV15dBylMcUjjKF_LW5bww",
"payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJrZXlBdXRob3JpemF0aW9uIjogIkJ5clJNQ0tKN2sxeU5iR21iN3JGY0w0MThIN3VxeVZQcjFWb1ZSU3lkVzQuV1FyNWFaaGlMX2xtMmcwR2Q0c0t0TTRDVUFLSFRxTF9qSWRQMjV3YW1xYyIsCiAgInR5cGUiOiAiaHR0cC0wMSIKfQ"
}
2019-09-28 22:35:04,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/549729261/4EZyKA HTTP/1.1" 200 184
2019-09-28 22:35:04,715:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 29 Sep 2019 04:35:04 GMT
Content-Type: application/json
Content-Length: 184
Connection: keep-alive
Boulder-Requester: 1690363
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/549729261>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/4EZyKA
Replay-Nonce: 0001Kv0tFbHGPHxJM1-RJDuW5j82fnVAyQhiGt5tAUcmEqg
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/4EZyKA",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
}
2019-09-28 22:35:04,715:DEBUG:acme.client:Storing nonce: 0001Kv0tFbHGPHxJM1-RJDuW5j82fnVAyQhiGt5tAUcmEqg
2019-09-28 22:35:07,718:DEBUG:acme.client:JWS payload:
b''
2019-09-28 22:35:07,721:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/549729261:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy8xNjkwMzYzIiwgIm5vbmNlIjogIjAwMDFLdjB0RmJIR1BIeEpNMS1SSkR1VzVqODJmblZBeVFoaUd0NXRBVWNtRXFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NDk3MjkyNjEifQ",
"signature": "Y3rhkBBjI5Ja7IiAqw6DSTKGsuzf6p4B58MREd5qnJ3jjHuNnA3Y6UGZr8s_3BdjeKTM_3X595LP7kJ5xI4HfXsQG3W0d0APUlImR2zho7H01QmNpDXcKC_Cv6tZZNvQHoMuJgm-BAqgq4kRUwqt2AsZh3fIWnTfSSqwlXmwbpEQca4AtQy1FAKuDXqgwlJs1Clx9YiZ8KYVXRi8D_6jA2_phSBu78oHBAUK8sPyDL78KaS-Z-MCrqH0Yvc-y5iQF5EkQ_YOtXNmMdWhytjAxrYj0_U4TZIROmfPSCqw1tidChqkiEfvariCRCwJFZyQptu0vyLfS5GAwG8lLhjkjw",
"payload": ""
}
2019-09-28 22:35:07,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/549729261 HTTP/1.1" 200 2010
2019-09-28 22:35:07,817:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 29 Sep 2019 04:35:07 GMT
Content-Type: application/json
Content-Length: 2010
Connection: keep-alive
Boulder-Requester: 1690363
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0001xYwB5iUfLLzbA9MlCr59vbWXEWu7WGhDXjDZCXC5Eqw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "ackis.duckdns.org"
},
"status": "invalid",
"expires": "2019-10-06T04:34:57Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from https://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4 [174.3.126.96]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e404 Not Found\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e404 Not Found\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccenter\u003enginx\u003c/center\u003e\\r\\n\"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/4EZyKA",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4",
"validationRecord": [
{
"url": "http://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4",
"hostname": "ackis.duckdns.org",
"port": "80",
"addressesResolved": [
"174.3.126.96"
],
"addressUsed": "174.3.126.96"
},
{
"url": "https://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4",
"hostname": "ackis.duckdns.org",
"port": "443",
"addressesResolved": [
"174.3.126.96"
],
"addressUsed": "174.3.126.96"
}
]
},
{
"type": "dns-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/T4uEqA",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
},
{
"type": "tls-alpn-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/549729261/CXnUTw",
"token": "ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4"
}
]
}
2019-09-28 22:35:07,817:DEBUG:acme.client:Storing nonce: 0001xYwB5iUfLLzbA9MlCr59vbWXEWu7WGhDXjDZCXC5Eqw
2019-09-28 22:35:07,818:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:
Domain: ackis.duckdns.org
Type: unauthorized
Detail: Invalid response from https://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4 [174.3.126.96]: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx</center>\r\n"
To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2019-09-28 22:35:07,821:DEBUG:certbot.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. ackis.duckdns.org (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from https://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4 [174.3.126.96]: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx</center>\r\n"
2019-09-28 22:35:07,821:DEBUG:certbot.error_handler:Calling registered functions
2019-09-28 22:35:07,821:INFO:certbot.auth_handler:Cleaning up challenges
2019-09-28 22:35:15,758:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1119, in run
certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 116, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/usr/lib/python3/dist-packages/certbot/renewal.py", line 310, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. ackis.duckdns.org (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: Invalid response from https://ackis.duckdns.org/.well-known/acme-challenge/ByrRMCKJ7k1yNbGmb7rFcL418H7uqyVPr1VoVRSydW4 [174.3.126.96]: "<html>\r\n<head><title>404 Not Found</title></head>\r\n<body>\r\n<center><h1>404 Not Found</h1></center>\r\n<hr><center>nginx</center>\r\n"