Hi,
I set geo-blocked off, but the unclear result:
"certbot renew --dry-run" worked without error
"certbot renew" failed again:
Failed to renew certificate webshare.sxces.com with error: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
After that I installed acme.sh and where able to download the cert without problems.
Here is the debug-log of the failed session:
2025-01-28 19:29:00,712:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2025-01-28 19:29:00,823:DEBUG:certbot._internal.main:certbot version: 3.1.0
2025-01-28 19:29:00,823:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/4325/bin/certbot
2025-01-28 19:29:00,823:DEBUG:certbot._internal.main:Arguments: ['--standalone', '-n', '-d', 'webshare.sxces.com', '--preconfigured-renewal']
2025-01-28 19:29:00,823:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-01-28 19:29:00,829:DEBUG:certbot._internal.log:Root logging level set at 30
2025-01-28 19:29:00,830:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-28 19:29:00,830:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Runs an HTTP server locally which serves the necessary validation files under the /.well-known/acme-challenge/ request path. Suitable if there is no HTTP server already running. HTTP challenge only (wildcards not supported).
Interfaces: Authenticator, Plugin
Entry point: EntryPoint(name='standalone', value='certbot._internal.plugins.standalone:Authenticator', group='certbot.plugins')
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x7f5f805f2390>
Prep: True
2025-01-28 19:29:00,831:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x7f5f805f2390> and installer None
2025-01-28 19:29:00,831:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-28 19:29:00,875:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/667869176', new_authzr_uri=None, terms_of_service=None), 02b766f097eb9c7a95055541121bf981, Meta(creation_dt=datetime.datetime(2022, 8, 8, 18, 0, 47, tzinfo=datetime.timezone.utc), creation_host='webshare', register_to_eff=None))>
2025-01-28 19:29:00,875:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-28 19:29:00,876:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-28 19:29:46,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-28 19:29:46,956:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:29:46 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"TTmlFu2xez4": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"profiles": {
"classic": "The same profile you're accustomed to"
},
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-28 19:29:47,015:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-28 19:30:07,573:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-28 19:30:07,575:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/webshare.sxces.com/cert14.pem is signed by the certificate's issuer.
2025-01-28 19:30:07,576:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/webshare.sxces.com/cert14.pem is: OCSPCertStatus.GOOD
2025-01-28 19:30:07,582:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-01-31 22:02:11 UTC.
2025-01-28 19:30:07,582:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2025-01-28 19:30:07,582:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for webshare.sxces.com
2025-01-28 19:30:07,647:DEBUG:acme.client:Requesting fresh nonce
2025-01-28 19:30:07,647:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-28 19:30:07,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-28 19:30:07,794:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:30:07 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: Z6auUXuuUmExJ_oSMnkmROf8GDgwAFFIzU3wCYk0_UbdH62ZS9Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2025-01-28 19:30:07,794:DEBUG:acme.client:Storing nonce: Z6auUXuuUmExJ_oSMnkmROf8GDgwAFFIzU3wCYk0_UbdH62ZS9Y
2025-01-28 19:30:07,795:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "webshare.sxces.com"\n }\n ]\n}'
2025-01-28 19:30:07,801:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIlo2YXVVWHV1VW1FeEpfb1NNbmttUk9mOEdEZ3dBRkZJelUzd0NZazBfVWJkSDYyWlM5WSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
"signature": "jYOFRKqkdJXpCG27UO7oSBxKVt7TvpdT0hqz8OA2xnW31folNqG9m-XuxCBJmNrkbZyLPkyryUwk7fBrkBC4oovqAhMXU2mLHjve2jB6RslfApeVFwtvcmVhWLfeqyFbaFkxdQJyrtrHCu9ZB1TvZ_qM9aU3EAZg_V1eboienSEQL-npRG8ipMT1PCb41YtXW1ubD3BgFvapt1nAX-exMWie_m-kwAxnMikEOpJj1_z5wFkcD-ssxd21STJ3N4MS19rlasog2i7GDCO6JNjc68ficDn4CwJ9bki7ab-SfrcihiFnj_orzx0xUnUgyyWQnvIZz3BqlW9JfQoA3Jk71Q",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIndlYnNoYXJlLnN4Y2VzLmNvbSIKICAgIH0KICBdCn0"
}
2025-01-28 19:30:08,078:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 348
2025-01-28 19:30:08,079:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 28 Jan 2025 18:30:08 GMT
Content-Type: application/json
Content-Length: 348
Connection: keep-alive
Boulder-Requester: 667869176
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/667869176/347289507865
Replay-Nonce: KY2mD_AjgjsWsjhgEVuCDXQ64ETbrDdLetJau2gQiUvP9jSty5U
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "ready",
"expires": "2025-01-30T16:07:49Z",
"identifiers": [
{
"type": "dns",
"value": "webshare.sxces.com"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/667869176/454168913575"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/667869176/347289507865"
}
2025-01-28 19:30:08,080:DEBUG:acme.client:Storing nonce: KY2mD_AjgjsWsjhgEVuCDXQ64ETbrDdLetJau2gQiUvP9jSty5U
2025-01-28 19:30:08,081:DEBUG:acme.client:JWS payload:
b''
2025-01-28 19:30:08,084:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/667869176/454168913575:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIktZMm1EX0FqZ2pzV3NqaGdFVnVDRFhRNjRFVGJyRGRMZXRKYXUyZ1FpVXZQOWpTdHk1VSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjY3ODY5MTc2LzQ1NDE2ODkxMzU3NSJ9",
"signature": "Nr5cqwpkrDyU_8bC5G95YGTIBjO2qADsVa6wA_gEpqXg7ktvpkggHz8RCyWfaxYa2g84BTzqzGFi0XMREKcfI5ZKJHiW5eKI1wXe_Hk3RL1xugOI8iInALjQJe5RVhivJxmA2TE8LZRL6VrbWG0SK-X0UcG1QlWHVRYpaYju9HwoXfXJ3RVbRY616jmhqBYOSEpZzbkNH_N1XChz_ukPn9C6nU0_GI_czp9kyw2TN4KvfknXMwk5TgHhKCHTgzEPMB1pj85Lx8Zoqa2Ad4Vbxy0vNmSUMbCgDnEh8nZIXduUNWOBrjXSqFWXgE_a85f3QLDDeAXHhsXadxrZaXPD8g",
"payload": ""
}
2025-01-28 19:30:08,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/667869176/454168913575 HTTP/1.1" 200 776
2025-01-28 19:30:08,253:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:30:08 GMT
Content-Type: application/json
Content-Length: 776
Connection: keep-alive
Boulder-Requester: 667869176
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: Z6auUXuuYliegXJDxlQcjYnhz5pKFixHQjUhMPvtjJxV1H4ciyw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "webshare.sxces.com"
},
"status": "valid",
"expires": "2025-02-03T23:01:01Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/667869176/454168913575/ejQLxw",
"status": "valid",
"validated": "2025-01-04T23:00:59Z",
"token": "YGkUwBMI5etgFKgWVTCoegeOge79QenFclSXhHLZQtg",
"validationRecord": [
{
"url": "http://webshare.sxces.com/.well-known/acme-challenge/YGkUwBMI5etgFKgWVTCoegeOge79QenFclSXhHLZQtg",
"hostname": "webshare.sxces.com",
"port": "80",
"addressesResolved": [
"87.129.184.91"
],
"addressUsed": "87.129.184.91"
}
]
}
]
}
2025-01-28 19:30:08,254:DEBUG:acme.client:Storing nonce: Z6auUXuuYliegXJDxlQcjYnhz5pKFixHQjUhMPvtjJxV1H4ciyw
2025-01-28 19:30:08,255:DEBUG:certbot._internal.client:CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----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\nKlMF5Az3u37I\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2025-01-28 19:30:08,255:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2025-01-28 19:31:38.255836
2025-01-28 19:30:08,257:DEBUG:acme.client:JWS payload:
b'{\n "csr": "MIICdTCCAV0CAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALHzWGGx_qlEIW2WIxmY2EBSpL9o32ml4Dpefx2q0Q-XluGOtnAW2b0-VJF-EJymrG2AVOTcnCtnRH6d7sHJPUBh3DdrSaJmRDDbmc4T0V31Enm6aVoydwOXk8Kk3fQ1NyrkmMSRO7FeXTqajwAqu_rx7oF2x3eQkPvbErQpwq0e2v6qbeTG27FbEBTN8LGkQMZdgrxyuRE6fhg16H6YHW7C7ehE9dkwXS_8MoB6-KxM09v_W6zUbd2t1f0RO8k-OD2ovybuHd3-FVytnyPZgJPaxax7oUzFmkR4dPSzgZrZHSIvfEutQL6z7jI55qOI3nW_aLjHTRxvNDUyAMTeku0CAwEAAaAwMC4GCSqGSIb3DQEJDjEhMB8wHQYDVR0RBBYwFIISd2Vic2hhcmUuc3hjZXMuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQCVDSjU5nJ2hC7jBo-dBjGrSBLpvxsP-UBdbYusZXwR3_tfmp9HpRM1gZ75euGaCPlW3qTi4ZIZ_T4r9JllPe8vSnfGbA32FYukrEseCofA1jFcExdFgtqIfxuCEaMZtRFBFcntaL0hPV6-6rTkTDVjtJ9yVwHK5Nt5m4XmV9kE6Y8rGX6KrSlhRhxhKiyAkSRJIo--eofHH0woalzaS5B51oUOr5Z-hN_zPx35PYbvpW-jyGJxOQnsdry8BWe-Gwny9XzbKdx4yvMf2Um6WzZoJSQXrgdxEGgt3iAT3CAFK3wV74AsvveqAJaMW-ugVomFuDIyIvb7KlMF5Az3u37I"\n}'
2025-01-28 19:30:08,260:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/667869176/347289507865:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIlo2YXVVWHV1WWxpZWdYSkR4bFFjalluaHo1cEtGaXhIUWpVaE1QdnRqSnhWMUg0Y2l5dyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvZmluYWxpemUvNjY3ODY5MTc2LzM0NzI4OTUwNzg2NSJ9",
"signature": "bG3TEmVZNDX45MHkHOKd53DenwXpWCHVeovct0S7E-bKKQ1y7megvH9_FOaGX6gHpMfFCnrO28LsBKAcwaCupreFMPhvyhV1vsKF3g8lire2WgdkIUwtAZva8bDRLmQlsGRWWdgQylyTW85YZkpHrfvqJXIvJRMGdzvfDU-XECo-_MLoBNJZ1BqJIxGVOS0Fg3CTGW_SHWJ9ngAPqEKos5486FtSc1I03U4ari9x9EfmRvx_ggekzQBn3Gnrx1MFeeRA71MOFrQja6yIXNS8GoP4MrTSGFT-aZxoW5gTqj7Q7tDOJTgpmDVd_y50ETGuFns3kkXglJdfKQKKJQ0PMw",
"payload": "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"
}
2025-01-28 19:30:08,361:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 716, in urlopen
httplib_response = self._make_request(
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 468, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 463, in _make_request
httplib_response = conn.getresponse()
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 1428, in getresponse
response.begin()
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 331, in begin
version, status, reason = self._read_status()
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 300, in _read_status
raise RemoteDisconnected("Remote end closed connection without"
http.client.RemoteDisconnected: Remote end closed connection without response
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/adapters.py", line 667, in send
resp = conn.urlopen(
^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 802, in urlopen
retries = retries.increment(
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/util/retry.py", line 552, in increment
raise six.reraise(type(error), error, _stacktrace)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/packages/six.py", line 769, in reraise
raise value.with_traceback(tb)
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 716, in urlopen
httplib_response = self._make_request(
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 468, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 463, in _make_request
httplib_response = conn.getresponse()
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 1428, in getresponse
response.begin()
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 331, in begin
version, status, reason = self._read_status()
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 300, in _read_status
raise RemoteDisconnected("Remote end closed connection without"
urllib3.exceptions.ProtocolError: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/snap/certbot/4325/bin/certbot", line 8, in
sys.exit(main())
^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 1873, in main
return config.func(config, plugins)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 1579, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 130, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/renewal.py", line 399, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/client.py", line 452, in obtain_certificate
cert, chain = self.obtain_certificate_from_csr(csr, orderr)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/client.py", line 342, in obtain_certificate_from_csr
orderr = self.acme.finalize_order(
^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 279, in finalize_order
self.begin_finalization(orderr)
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 230, in begin_finalization
res = self._post(orderr.body.finalize, wrapped_csr)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 370, in _post
return self.net.post(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 743, in post
return self._post_once(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 755, in _post_once
response = self._send_request('POST', url, data=data, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 652, in _send_request
response = self.session.request(method, url, *args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/sessions.py", line 589, in request
resp = self.send(prep, **send_kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/sessions.py", line 703, in send
r = adapter.send(request, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/adapters.py", line 682, in send
raise ConnectionError(err, request=request)
requests.exceptions.ConnectionError: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
2025-01-28 19:30:08,374:ERROR:certbot._internal.log:An unexpected error occurred:
2025-01-28 19:30:08,377:ERROR:certbot._internal.log:requests.exceptions.ConnectionError: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
2025-01-28 19:32:19,362:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2025-01-28 19:32:19,465:DEBUG:certbot._internal.main:certbot version: 3.1.0
2025-01-28 19:32:19,465:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/4325/bin/certbot
2025-01-28 19:32:19,465:DEBUG:certbot._internal.main:Arguments: ['-v', '--preconfigured-renewal']
2025-01-28 19:32:19,465:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2025-01-28 19:32:19,471:DEBUG:certbot._internal.log:Root logging level set at 20
2025-01-28 19:32:19,472:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/webshare.sxces.com.conf
2025-01-28 19:32:19,473:DEBUG:certbot._internal.plugins.selection:Requested authenticator None and installer None
2025-01-28 19:32:19,481:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80
2025-01-28 19:32:40,039:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504
2025-01-28 19:32:40,041:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/webshare.sxces.com/cert14.pem is signed by the certificate's issuer.
2025-01-28 19:32:40,043:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/webshare.sxces.com/cert14.pem is: OCSPCertStatus.GOOD
2025-01-28 19:32:40,050:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-01-31 22:02:11 UTC.
2025-01-28 19:32:40,050:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2025-01-28 19:32:40,050:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2025-01-28 19:32:40,051:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Runs an HTTP server locally which serves the necessary validation files under the /.well-known/acme-challenge/ request path. Suitable if there is no HTTP server already running. HTTP challenge only (wildcards not supported).
Interfaces: Authenticator, Plugin
Entry point: EntryPoint(name='standalone', value='certbot._internal.plugins.standalone:Authenticator', group='certbot.plugins')
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x7f43ffcc9400>
Prep: True
2025-01-28 19:32:40,051:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x7f43ffcc9400> and installer None
2025-01-28 19:32:40,051:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2025-01-28 19:32:40,096:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/667869176', new_authzr_uri=None, terms_of_service=None), 02b766f097eb9c7a95055541121bf981, Meta(creation_dt=datetime.datetime(2022, 8, 8, 18, 0, 47, tzinfo=datetime.timezone.utc), creation_host='webshare', register_to_eff=None))>
2025-01-28 19:32:40,097:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2025-01-28 19:32:40,098:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2025-01-28 19:33:26,049:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828
2025-01-28 19:33:26,050:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:33:25 GMT
Content-Type: application/json
Content-Length: 828
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"VtphhhyR50U": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"profiles": {
"classic": "The same profile you're accustomed to"
},
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2025-01-28 19:33:26,052:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for webshare.sxces.com
2025-01-28 19:33:26,185:DEBUG:acme.client:Requesting fresh nonce
2025-01-28 19:33:26,185:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2025-01-28 19:33:26,325:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2025-01-28 19:33:26,326:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:33:26 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: Z6auUXuuEr_XXxaektc8TgE6enSCEVUzjYLy61LWc19BGBfdIxE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2025-01-28 19:33:26,327:DEBUG:acme.client:Storing nonce: Z6auUXuuEr_XXxaektc8TgE6enSCEVUzjYLy61LWc19BGBfdIxE
2025-01-28 19:33:26,327:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "webshare.sxces.com"\n }\n ]\n}'
2025-01-28 19:33:26,334:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIlo2YXVVWHV1RXJfWFh4YWVrdGM4VGdFNmVuU0NFVlV6allMeTYxTFdjMTlCR0JmZEl4RSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0",
"signature": "T_UoBqNLiSq12IWa2EcE9zis9sxhpdxH4hZGMwXbxQ7dBI5fhTrbdK9zUBExyXcUJ-koT8VePxK5Jb1sARlmD5V6qwC4gAJz7FsJ_UzvF053E2abFAm8yLb57aCyyAgjNa2nEVdds23sOwA1AlJXtCYzaNgy2-MtJocBe_TCuXcHjsrNqcXvZUlqbupAxI-MGsX-080hR0Ute_lyXHUZIdxDCrHHVCmUvb2-R8LwItfrgNqY4542spEU4kPosHH1z3Ftm5qy3-aB73124q2ca5v_O_7cGHFCGy6Vj7w9wEFXevXl6ko9megRls0uXWIP-Da0iVFD6VdRB-j0jo1j_w",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIndlYnNoYXJlLnN4Y2VzLmNvbSIKICAgIH0KICBdCn0"
}
2025-01-28 19:33:26,514:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 348
2025-01-28 19:33:26,515:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Tue, 28 Jan 2025 18:33:26 GMT
Content-Type: application/json
Content-Length: 348
Connection: keep-alive
Boulder-Requester: 667869176
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/667869176/347289507865
Replay-Nonce: KY2mD_AjeZIOhBbdgDZFdDHCpJXVh7VMVycMgPuItnSvcawOwf0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "ready",
"expires": "2025-01-30T16:07:49Z",
"identifiers": [
{
"type": "dns",
"value": "webshare.sxces.com"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/667869176/454168913575"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/667869176/347289507865"
}
2025-01-28 19:33:26,516:DEBUG:acme.client:Storing nonce: KY2mD_AjeZIOhBbdgDZFdDHCpJXVh7VMVycMgPuItnSvcawOwf0
2025-01-28 19:33:26,516:DEBUG:acme.client:JWS payload:
b''
2025-01-28 19:33:26,520:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/667869176/454168913575:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIktZMm1EX0FqZVpJT2hCYmRnRFpGZERIQ3BKWFZoN1ZNVnljTWdQdUl0blN2Y2F3T3dmMCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovNjY3ODY5MTc2LzQ1NDE2ODkxMzU3NSJ9",
"signature": "M3s3tcbgIbkivf1VvEA5stiyGH2o3kXbQnd3bdtaxTNoOibMIihPkYl0Ns3lhZmxYiTh4VMJ-tKBg6xMR95GEA9oagMI-oJEpasynB8BcEoXtdU6LKCQpfEBxtCyZCLk4PYLS8hfiG69iYpqv1N8iRsiouQ4zgOOSND_BEpmbK0pzjf4E9zMYd7pMcKsHQDJXge5thHxgNczGwD2U7CmR4z1ynhiOIcWSBo3y0Nf0jPgEKnHAcNbLn2upmkv6CgWrevVUsF4l505dVh5MF1P7F0yXrgF7EY93r_SFMVsgcIlXk-HDYLH0-sHtgiReiX8A5hdepSs2bovTAd7ybYo6Q",
"payload": ""
}
2025-01-28 19:33:26,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/667869176/454168913575 HTTP/1.1" 200 776
2025-01-28 19:33:26,684:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Tue, 28 Jan 2025 18:33:26 GMT
Content-Type: application/json
Content-Length: 776
Connection: keep-alive
Boulder-Requester: 667869176
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: KY2mD_Aj1XTvqDWrJA4kS3snIUqZf9dcImR-2RuvEMbR7YHETF4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "webshare.sxces.com"
},
"status": "valid",
"expires": "2025-02-03T23:01:01Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall/667869176/454168913575/ejQLxw",
"status": "valid",
"validated": "2025-01-04T23:00:59Z",
"token": "YGkUwBMI5etgFKgWVTCoegeOge79QenFclSXhHLZQtg",
"validationRecord": [
{
"url": "http://webshare.sxces.com/.well-known/acme-challenge/YGkUwBMI5etgFKgWVTCoegeOge79QenFclSXhHLZQtg",
"hostname": "webshare.sxces.com",
"port": "80",
"addressesResolved": [
"87.129.184.91"
],
"addressUsed": "87.129.184.91"
}
]
}
]
}
2025-01-28 19:33:26,685:DEBUG:acme.client:Storing nonce: KY2mD_Aj1XTvqDWrJA4kS3snIUqZf9dcImR-2RuvEMbR7YHETF4
2025-01-28 19:33:26,685:DEBUG:certbot._internal.client:CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----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\n6kuhS0rgKdVq\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2025-01-28 19:33:26,686:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2025-01-28 19:34:56.686713
2025-01-28 19:33:26,688:DEBUG:acme.client:JWS payload:
b'{\n "csr": "MIICdTCCAV0CAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALptld71y4XPv_Q2GdDbj60S0LPx3kfgXZoBHOXLpdkfaevdlMGUKOL_KzQjOKqYMYVMZWyO5fMsZwf-6bPpfugOrMAVEmQmv0oZMSkhjblGQGIxzldPaGhPAGEzCDbgYkc4J4MMv53eeQk8s2gRm9H_Rs1nweKMZdOvu1GkBcUEacZp3oivtYFa1BfESm5WeT-ULdjxMwRawr_wfj_ydxSpPowsrEbGMW1BIl2sp1j5H45zf9swz7JBThSSNF8qc-jHYjJnnvZee_KHOwQFcU24i75BCS4SOlWmUjc6OsC3dZP5Wm-X9Uyp0N7a9IX3FnhbNy5fj-JxZqHVuZAMsCAwEAAaAwMC4GCSqGSIb3DQEJDjEhMB8wHQYDVR0RBBYwFIISd2Vic2hhcmUuc3hjZXMuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQB7p-qEhZiMuu9Yqj5huBXXakVweKKn2pHBYES5y7pp_hw0yXuBashMMCDFAUGHs1KskscttoJCjao1uJ8NhBDMswKYeMep6XlLZXuKgrMlMqjIih8GdQWhO2VZeYCDK0Xvjmbo3uFlejBacX31PkveBOsTVawODi6G8aerFcjFmkPDpZ7w9cSOvasixX10m4icL7LGl0GURNYlCV13Ujxc8zaOuS1o0KPiQLO1qLQ4Ii6IwKMFYbrm6qd100eu4bq3QNepiog4rBeP6SugEDRux52fxxNj9grN3uEZ5u20FWY0tes4fPhWjUP5m2xZKMgiocCqCUQd6kuhS0rgKdVq"\n}'
2025-01-28 19:33:26,691:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/667869176/347289507865:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjY3ODY5MTc2IiwgIm5vbmNlIjogIktZMm1EX0FqMVhUdnFEV3JKQTRrUzNzbklVcVpmOWRjSW1SLTJSdXZFTWJSN1lIRVRGNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvZmluYWxpemUvNjY3ODY5MTc2LzM0NzI4OTUwNzg2NSJ9",
"signature": "iIl5bAnWffmrbFOtuuauSHmFPHyikdYkfWMdsypoz7rQMdNSOPg4Ij-h1NWh6v-gUc8Ter24CfK-IhYPJQRH0F-ThholHDbtWxZwFjpokt5M1NZkJ9PWjayxBfTg0kDdRviDil5zIdItNQ2f5TGCaOIIII4aGQC63Tu_w7IQ0d503NhtVG2Q1acGmrWv-xEFLW0OVd0yO83q097FV1_yZSCm8Rge3J7KPlee1toLF-aGfpm9Pk9hnL0vE82Qod9rXGhl6O29d67HBBV7zL857vxJH3vVkFAQN_Sqwy0NctE3f1I_5EdBZzRZ74KD97q4qHuxHD6wkujAbZ8xwLim4w",
"payload": "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"
}
2025-01-28 19:33:26,791:ERROR:certbot._internal.renewal:Failed to renew certificate webshare.sxces.com with error: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
2025-01-28 19:33:26,804:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 716, in urlopen
httplib_response = self._make_request(
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 468, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 463, in _make_request
httplib_response = conn.getresponse()
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 1428, in getresponse
response.begin()
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 331, in begin
version, status, reason = self._read_status()
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 300, in _read_status
raise RemoteDisconnected("Remote end closed connection without"
http.client.RemoteDisconnected: Remote end closed connection without response
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/adapters.py", line 667, in send
resp = conn.urlopen(
^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 802, in urlopen
retries = retries.increment(
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/util/retry.py", line 552, in increment
raise six.reraise(type(error), error, _stacktrace)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/packages/six.py", line 769, in reraise
raise value.with_traceback(tb)
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 716, in urlopen
httplib_response = self._make_request(
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 468, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/snap/certbot/4325/lib/python3.12/site-packages/urllib3/connectionpool.py", line 463, in _make_request
httplib_response = conn.getresponse()
^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 1428, in getresponse
response.begin()
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 331, in begin
version, status, reason = self._read_status()
^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/usr/lib/python3.12/http/client.py", line 300, in _read_status
raise RemoteDisconnected("Remote end closed connection without"
urllib3.exceptions.ProtocolError: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/renewal.py", line 540, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 1529, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 130, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/renewal.py", line 399, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/client.py", line 452, in obtain_certificate
cert, chain = self.obtain_certificate_from_csr(csr, orderr)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/client.py", line 342, in obtain_certificate_from_csr
orderr = self.acme.finalize_order(
^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 279, in finalize_order
self.begin_finalization(orderr)
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 230, in begin_finalization
res = self._post(orderr.body.finalize, wrapped_csr)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 370, in _post
return self.net.post(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 743, in post
return self._post_once(*args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 755, in _post_once
response = self._send_request('POST', url, data=data, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/acme/client.py", line 652, in _send_request
response = self.session.request(method, url, *args, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/sessions.py", line 589, in request
resp = self.send(prep, **send_kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/sessions.py", line 703, in send
r = adapter.send(request, **kwargs)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/requests/adapters.py", line 682, in send
raise ConnectionError(err, request=request)
requests.exceptions.ConnectionError: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))
2025-01-28 19:33:26,804:DEBUG:certbot._internal.display.obj:Notifying user:
2025-01-28 19:33:26,805:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2025-01-28 19:33:26,805:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/webshare.sxces.com/fullchain.pem (failure)
2025-01-28 19:33:26,805:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2025-01-28 19:33:26,805:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/4325/bin/certbot", line 8, in
sys.exit(main())
^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 1873, in main
return config.func(config, plugins)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/main.py", line 1621, in renew
renewed_domains, failed_domains = renewal.handle_renewal_request(config)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/snap/certbot/4325/lib/python3.12/site-packages/certbot/_internal/renewal.py", line 568, in handle_renewal_request
raise errors.Error(
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2025-01-28 19:33:26,806:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)