Hi MikeMcQ,
Thanks again. A little unsure how much of the log you need - here is a bit more, but I'm removing the payload keys (unsure if that would be a security risk or not).
CURL OUTPUT curl -I https://letsencrypt.org:
HTTP/2 200
age: 65833
cache-control: public, max-age=0, must-revalidate
content-security-policy: default-src 'none'; font-src 'self'; style-s
CURL OUTPUT curl https://acme-v02.api.letsencrypt.org/directory:
{
"HEcRSMQyXLE": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017-w-v1.3-notice.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
LOG OUTPUT
2022-08-19 15:10:34,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/137572949586 HTTP/1.1" 200 766
2022-08-19 15:10:34,737:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 19 Aug 2022 07:10:34 GMT
Content-Type: application/json
Content-Length: 766
Connection: keep-alive
Boulder-Requester: 117921551
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce:
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "mail.acer-isu.com"
},
"status": "valid",
"expires": "2022-09-01T19:07:26Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/137572949586/ToVhlw",
"token": "",
"validationRecord": [
{
"url": "http://mail.acer-isu.com/.well-known/acme-challenge/jUnqH2SqHhyRwwnHV8VH0gRigDVnaHaWE9ci_vJbniQ",
"hostname": "mail.acer-isu.com",
"port": "80",
"addressesResolved": [
"60.250.195.22"
],
"addressUsed": "60.250.195.22"
}
],
"validated": "2022-08-02T19:07:25Z"
}
]
}
2022-08-19 15:10:34,738:DEBUG:acme.client:Storing nonce: 0101hZW_ubPcWZo5u7j5chWaUYse1ZN1LQN0N_qtcxz-HZE
2022-08-19 15:10:34,739:DEBUG:acme.client:JWS payload:
b''
2022-08-19 15:10:34,741:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/137572949596:
{
"protected": ""
"signature": "",
"payload": ""
}
2022-08-19 15:10:34,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/137572949596 HTTP/1.1" 200 763
2022-08-19 15:10:34,927:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 19 Aug 2022 07:10:34 GMT
Content-Type: application/json
Content-Length: 763
Connection: keep-alive
Boulder-Requester: 117921551
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0102UQrmoDcR8Ttt-wjB4i42uuuQCh8HZKcuKCUKBVrT_WI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "www.acer-isu.com"
},
"status": "valid",
"expires": "2022-09-01T19:07:26Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/137572949596/Xm_g1w",
"token": "nABgNMHcfxLi2R2S7NEgdN1gJHNc_QRJ7hFUFj6GL0o",
"validationRecord": [
{
"url": "http://www.acer-isu.com/.well-known/acme-challenge/nABgNMHcfxLi2R2S7NEgdN1gJHNc_QRJ7hFUFj6GL0o",
"hostname": "www.acer-isu.com",
"port": "80",
"addressesResolved": [
"60.250.195.22"
],
"addressUsed": "60.250.195.22"
}
],
"validated": "2022-08-02T19:07:25Z"
}
]
}
2022-08-19 15:10:34,927:DEBUG:acme.client:Storing nonce: 0102UQrmoDcR8Ttt-wjB4i42uuuQCh8HZKcuKCUKBVrT_WI
2022-08-19 15:10:34,928:DEBUG:certbot._internal.client:CSR: CSR(file='/etc/letsencrypt/csr/0055_csr-certbot.pem', data=b'-----BEGIN CERTIFICATE REQUEST-----\n\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2022-08-19 15:10:34,930:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2022-08-19 15:12:04.930062
2022-08-19 15:10:34,932:DEBUG:acme.client:JWS payload:
b'{\n "csr": ""\n}'
2022-08-19 15:10:34,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/117921551/116333749927:
{
"protected": ""
"signature": "",
"payload": ""
}
2022-08-19 15:10:35,070:ERROR:certbot._internal.renewal:Failed to renew certificate acer-isu.com with error: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
2022-08-19 15:10:35,084:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 600, in urlopen
chunked=chunked)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 384, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 380, in _make_request
httplib_response = conn.getresponse()
File "/usr/lib64/python3.6/http/client.py", line 1365, in getresponse
response.begin()
File "/usr/lib64/python3.6/http/client.py", line 320, in begin
version, status, reason = self._read_status()
File "/usr/lib64/python3.6/http/client.py", line 281, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1")
File "/usr/lib64/python3.6/socket.py", line 586, in readinto
return self._sock.recv_into(b)
File "/usr/lib64/python3.6/ssl.py", line 971, in recv_into
return self.read(nbytes, buffer)
File "/usr/lib64/python3.6/ssl.py", line 833, in read
return self._sslobj.read(len, buffer)
File "/usr/lib64/python3.6/ssl.py", line 590, in read
v = self._sslobj.read(len, buffer)
ConnectionResetError: [Errno 104] Connection reset by peer
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/requests/adapters.py", line 449, in send
timeout=timeout
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 638, in urlopen
_stacktrace=sys.exc_info()[2])
File "/usr/lib/python3.6/site-packages/urllib3/util/retry.py", line 368, in increment
raise six.reraise(type(error), error, _stacktrace)
File "/usr/lib/python3.6/site-packages/urllib3/packages/six.py", line 692, in reraise
raise value.with_traceback(tb)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 600, in urlopen
chunked=chunked)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 384, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 380, in _make_request
httplib_response = conn.getresponse()
File "/usr/lib64/python3.6/http/client.py", line 1365, in getresponse
response.begin()
File "/usr/lib64/python3.6/http/client.py", line 320, in begin
version, status, reason = self._read_status()
File "/usr/lib64/python3.6/http/client.py", line 281, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1")
File "/usr/lib64/python3.6/socket.py", line 586, in readinto
return self._sock.recv_into(b)
File "/usr/lib64/python3.6/ssl.py", line 971, in recv_into
return self.read(nbytes, buffer)
File "/usr/lib64/python3.6/ssl.py", line 833, in read
return self._sslobj.read(len, buffer)
File "/usr/lib64/python3.6/ssl.py", line 590, in read
v = self._sslobj.read(len, buffer)
urllib3.exceptions.ProtocolError: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 440, in obtain_certificate
cert, chain = self.obtain_certificate_from_csr(csr, orderr)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 339, in obtain_certificate_from_csr
orderr, deadline, fetch_alternative_chains=self.config.preferred_chain is not None)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 978, in finalize_order
orderr, deadline, fetch_alternative_chains)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 793, in finalize_order
self._post(orderr.body.finalize, wrapped_csr)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 101, in _post
return self.net.post(*args, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1269, in post
return self._post_once(*args, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1282, in _post_once
response = self._send_request('POST', url, data=data, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1174, in _send_request
response = self.session.request(method, url, *args, **kwargs)
File "/usr/lib/python3.6/site-packages/requests/sessions.py", line 533, in request
resp = self.send(prep, **send_kwargs)
File "/usr/lib/python3.6/site-packages/requests/sessions.py", line 646, in send
r = adapter.send(request, **kwargs)
File "/usr/lib/python3.6/site-packages/requests/adapters.py", line 498, in send
raise ConnectionError(err, request=request)
requests.exceptions.ConnectionError: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
2022-08-19 15:10:35,084:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/mail.acer-isu.com.conf
2022-08-19 15:10:35,112:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2022-08-19 15:10:35,335:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2022-08-19 15:10:35,337:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/mail.acer-isu.com/cert6.pem is signed by the certificate's issuer.
2022-08-19 15:10:35,338:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/mail.acer-isu.com/cert6.pem is: OCSPCertStatus.GOOD
2022-08-19 15:10:35,340:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2022-09-01 18:07:44 UTC.
2022-08-19 15:10:35,340:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2022-08-19 15:10:35,341:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer None
2022-08-19 15:10:35,488:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.37
2022-08-19 15:10:35,860:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: Installer, Authenticator, Plugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f4cac0c7e80>
Prep: True
2022-08-19 15:10:35,861:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f4cac0c7e80> and installer None
2022-08-19 15:10:35,861:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer None
2022-08-19 15:10:35,869:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/117921551', new_authzr_uri=None, terms_of_service=None), 70d40c13a35806fad44ce45aa94bee6f, Meta(creation_dt=datetime.datetime(2021, 4, 3, 12, 31, 16, tzinfo=), creation_host='mail.acer-isu.com', register_to_eff=None))>
2022-08-19 15:10:35,871:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2022-08-19 15:10:35,873:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2022-08-19 15:10:36,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 672
2022-08-19 15:10:36,375:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 19 Aug 2022 07:10:36 GMT
Content-Type: application/json
Content-Length: 672
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"-5wQOiSUvB0": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017-w-v1.3-notice.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2022-08-19 15:10:36,377:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for mail.acer-isu.com
2022-08-19 15:10:36,735:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0056_key-certbot.pem
2022-08-19 15:10:36,737:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0056_csr-certbot.pem
2022-08-19 15:10:36,737:DEBUG:acme.client:Requesting fresh nonce
2022-08-19 15:10:36,738:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2022-08-19 15:10:36,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2022-08-19 15:10:36,903:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 19 Aug 2022 07:10:36 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 01026MWPMbyo5UQ7pu57uZk0sFj02FBecjeVJR17FiBr3z8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2022-08-19 15:10:36,904:DEBUG:acme.client:Storing nonce: 01026MWPMbyo5UQ7pu57uZk0sFj02FBecjeVJR17FiBr3z8
2022-08-19 15:10:36,904:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "mail.acer-isu.com"\n }\n ]\n}'
2022-08-19 15:10:36,908:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": ""
"signature": ""
}
2022-08-19 15:10:37,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 340
2022-08-19 15:10:37,148:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Fri, 19 Aug 2022 07:10:37 GMT
Content-Type: application/json
Content-Length: 340
Connection: keep-alive
Boulder-Requester: 117921551
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/117921551/116333757217
Replay-Nonce: 0101KkjLemQTeXr7C7yu7Mbn_uYRzJKCe66fkMNXwDYiW68
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "ready",
"expires": "2022-08-22T05:19:54Z",
"identifiers": [
{
"type": "dns",
"value": "mail.acer-isu.com"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/137572949586"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/117921551/116333757217"
}
2022-08-19 15:10:37,148:DEBUG:acme.client:Storing nonce: 0101KkjLemQTeXr7C7yu7Mbn_uYRzJKCe66fkMNXwDYiW68
2022-08-19 15:10:37,149:DEBUG:acme.client:JWS payload:
b''
2022-08-19 15:10:37,152:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/137572949586:
{
"protected": ""
"signature": ""
"payload": ""
}
2022-08-19 15:10:37,355:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/137572949586 HTTP/1.1" 200 766
2022-08-19 15:10:37,356:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Fri, 19 Aug 2022 07:10:37 GMT
Content-Type: application/json
Content-Length: 766
Connection: keep-alive
Boulder-Requester: 117921551
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 010221Z4xUu_c3kNV72b3h2BLNgFLDUX-3duFYClwW0jDUk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "mail.acer-isu.com"
},
"status": "valid",
"expires": "2022-09-01T19:07:26Z",
"challenges": [
{
"type": "http-01",
"status": "valid",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/137572949586/ToVhlw",
"token": "jUnqH2SqHhyRwwnHV8VH0gRigDVnaHaWE9ci_vJbniQ",
"validationRecord": [
{
"url": "http://mail.acer-isu.com/.well-known/acme-challenge/jUnqH2SqHhyRwwnHV8VH0gRigDVnaHaWE9ci_vJbniQ",
"hostname": "mail.acer-isu.com",
"port": "80",
"addressesResolved": [
"60.250.195.22"
],
"addressUsed": "60.250.195.22"
}
],
"validated": "2022-08-02T19:07:25Z"
}
]
}
2022-08-19 15:10:37,356:DEBUG:acme.client:Storing nonce: 010221Z4xUu_c3kNV72b3h2BLNgFLDUX-3duFYClwW0jDUk
2022-08-19 15:10:37,357:DEBUG:certbot._internal.client:CSR: CSR(file='/etc/letsencrypt/csr/0056_csr-certbot.pem', data=b'-----BEGIN CERTIFICATE REQUEST-----\n\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2022-08-19 15:10:37,357:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2022-08-19 15:12:07.357880
2022-08-19 15:10:37,358:DEBUG:acme.client:JWS payload:
b'{\n "csr": ""\n}'
2022-08-19 15:10:37,361:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/117921551/116333757217:
{
"protected": ""
"signature": "",
"payload": ""
}
2022-08-19 15:10:37,499:ERROR:certbot._internal.renewal:Failed to renew certificate mail.acer-isu.com with error: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
2022-08-19 15:10:37,500:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 600, in urlopen
chunked=chunked)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 384, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 380, in _make_request
httplib_response = conn.getresponse()
File "/usr/lib64/python3.6/http/client.py", line 1365, in getresponse
response.begin()
File "/usr/lib64/python3.6/http/client.py", line 320, in begin
version, status, reason = self._read_status()
File "/usr/lib64/python3.6/http/client.py", line 281, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1")
File "/usr/lib64/python3.6/socket.py", line 586, in readinto
return self._sock.recv_into(b)
File "/usr/lib64/python3.6/ssl.py", line 971, in recv_into
return self.read(nbytes, buffer)
File "/usr/lib64/python3.6/ssl.py", line 833, in read
return self._sslobj.read(len, buffer)
File "/usr/lib64/python3.6/ssl.py", line 590, in read
v = self._sslobj.read(len, buffer)
ConnectionResetError: [Errno 104] Connection reset by peer
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/requests/adapters.py", line 449, in send
timeout=timeout
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 638, in urlopen
_stacktrace=sys.exc_info()[2])
File "/usr/lib/python3.6/site-packages/urllib3/util/retry.py", line 368, in increment
raise six.reraise(type(error), error, _stacktrace)
File "/usr/lib/python3.6/site-packages/urllib3/packages/six.py", line 692, in reraise
raise value.with_traceback(tb)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 600, in urlopen
chunked=chunked)
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 384, in _make_request
six.raise_from(e, None)
File "", line 3, in raise_from
File "/usr/lib/python3.6/site-packages/urllib3/connectionpool.py", line 380, in _make_request
httplib_response = conn.getresponse()
File "/usr/lib64/python3.6/http/client.py", line 1365, in getresponse
response.begin()
File "/usr/lib64/python3.6/http/client.py", line 320, in begin
version, status, reason = self._read_status()
File "/usr/lib64/python3.6/http/client.py", line 281, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), "iso-8859-1")
File "/usr/lib64/python3.6/socket.py", line 586, in readinto
return self._sock.recv_into(b)
File "/usr/lib64/python3.6/ssl.py", line 971, in recv_into
return self.read(nbytes, buffer)
File "/usr/lib64/python3.6/ssl.py", line 833, in read
return self._sslobj.read(len, buffer)
File "/usr/lib64/python3.6/ssl.py", line 590, in read
v = self._sslobj.read(len, buffer)
urllib3.exceptions.ProtocolError: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 440, in obtain_certificate
cert, chain = self.obtain_certificate_from_csr(csr, orderr)
File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 339, in obtain_certificate_from_csr
orderr, deadline, fetch_alternative_chains=self.config.preferred_chain is not None)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 978, in finalize_order
orderr, deadline, fetch_alternative_chains)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 793, in finalize_order
self._post(orderr.body.finalize, wrapped_csr)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 101, in _post
return self.net.post(*args, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1269, in post
return self._post_once(*args, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1282, in _post_once
response = self._send_request('POST', url, data=data, **kwargs)
File "/usr/lib/python3.6/site-packages/acme/client.py", line 1174, in _send_request
response = self.session.request(method, url, *args, **kwargs)
File "/usr/lib/python3.6/site-packages/requests/sessions.py", line 533, in request
resp = self.send(prep, **send_kwargs)
File "/usr/lib/python3.6/site-packages/requests/sessions.py", line 646, in send
r = adapter.send(request, **kwargs)
File "/usr/lib/python3.6/site-packages/requests/adapters.py", line 498, in send
raise ConnectionError(err, request=request)
requests.exceptions.ConnectionError: ('Connection aborted.', ConnectionResetError(104, 'Connection reset by peer'))
2022-08-19 15:10:37,501:DEBUG:certbot._internal.display.obj:Notifying user:
2022-08-19 15:10:37,501:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed:
2022-08-19 15:10:37,501:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/acer-isu.com/fullchain.pem (failure)
/etc/letsencrypt/live/mail.acer-isu.com/fullchain.pem (failure)
2022-08-19 15:10:37,502:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2022-08-19 15:10:37,502:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in
load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main
return config.func(config, plugins)
File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew
renewal.handle_renewal_request(config)
File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request
len(renew_failures), len(parse_failures)))
certbot.errors.Error: 2 renew failure(s), 0 parse failure(s)
2022-08-19 15:10:37,503:ERROR:certbot._internal.log:2 renew failure(s), 0 parse failure(s)