2020-07-09 14:21:00,616:DEBUG:certbot._internal.main:certbot version: 1.5.0
2020-07-09 14:21:00,617:DEBUG:certbot._internal.main:Arguments: []
2020-07-09 14:21:00,617:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2020-07-09 14:21:00,658:DEBUG:certbot._internal.log:Root logging level set at 20
2020-07-09 14:21:00,658:INFO:certbot._internal.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2020-07-09 14:21:00,686:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7f8c95efbd10> and installer <certbot._internal.cli.cli_utils._Default object at 0x7f8c95efbd10>
2020-07-09 14:21:00,753:DEBUG:certbot.ocsp:Querying OCSP for /etc/letsencrypt/archive/fmk.sk/cert7.pem
2020-07-09 14:21:00,753:DEBUG:certbot.ocsp:openssl ocsp -no_nonce -issuer /etc/letsencrypt/archive/fmk.sk/chain7.pem -cert /etc/letsencrypt/archive/fmk.sk/cert7.pem -CAfile /etc/letsencrypt/archive/fmk.sk/chain7.pem -verify_other /etc/letsencrypt/archive/fmk.sk/chain7.pem -trust_other -timeout 10 -header Host ocsp.int-x3.letsencrypt.org -url http://ocsp.int-x3.letsencrypt.org
2020-07-09 14:21:00,816:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2020-07-10 14:19:48 UTC.
2020-07-09 14:21:00,816:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2020-07-09 14:21:00,817:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2020-07-09 14:21:01,020:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.41
2020-07-09 14:21:02,770:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f8c95fcce10>
Prep: True
2020-07-09 14:21:02,771:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f8c95fcce10>
Prep: True
2020-07-09 14:21:02,772:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f8c95fcce10> and installer <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7f8c95fcce10>
2020-07-09 14:21:02,772:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2020-07-09 14:21:02,777:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, terms_of_service_agreed=None, agreement=None, only_return_existing=None, contact=(), key=None, external_account_binding=None), uri=u'https://acme-v02.api.letsencrypt.org/acme/acct/44312682', new_authzr_uri=None, terms_of_service=None), e1556381b2753bdc6055c8d2e9351c76, Meta(creation_host=u'fmk.ucm.sk', creation_dt=datetime.datetime(2018, 10, 22, 17, 52, 17, tzinfo=<UTC>)))>
2020-07-09 14:21:02,781:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2020-07-09 14:21:02,792:INFO:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2020-07-09 14:21:03,460:DEBUG:urllib3.connectionpool:"GET /directory HTTP/1.1" 200 658
2020-07-09 14:21:03,461:DEBUG:acme.client:Received response:
HTTP 200
content-length: 658
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
cache-control: public, max-age=0, no-cache
date: Thu, 09 Jul 2020 12:21:04 GMT
x-frame-options: DENY
content-type: application/json
{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"nPcUGuk99Vw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2020-07-09 14:21:03,462:INFO:certbot._internal.main:Renewing an existing certificate
2020-07-09 14:21:03,767:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0023_key-certbot.pem
2020-07-09 14:21:03,772:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0023_csr-certbot.pem
2020-07-09 14:21:03,773:DEBUG:acme.client:Requesting fresh nonce
2020-07-09 14:21:03,773:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2020-07-09 14:21:03,934:DEBUG:urllib3.connectionpool:"HEAD /acme/new-nonce HTTP/1.1" 200 0
2020-07-09 14:21:03,934:DEBUG:acme.client:Received response:
HTTP 200
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
cache-control: public, max-age=0, no-cache
date: Thu, 09 Jul 2020 12:21:05 GMT
x-frame-options: DENY
replay-nonce: 0002eRzKG4zPN63hFGHtO_or4Yy3UNeTqmLYKWrEKbvTuqQ
2020-07-09 14:21:03,935:DEBUG:acme.client:Storing nonce: 0002eRzKG4zPN63hFGHtO_or4Yy3UNeTqmLYKWrEKbvTuqQ
2020-07-09 14:21:03,935:DEBUG:acme.client:JWS payload:
{
"identifiers": [
{
"type": "dns",
"value": "fmk.sk"
}
]
}
2020-07-09 14:21:03,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJub25jZSI6ICIwMDAyZVJ6S0c0elBONjNoRkdIdE9fb3I0WXkzVU5lVHFtTFlLV3JFS2J2VHVxUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzQ0MzEyNjgyIiwgImFsZyI6ICJSUzI1NiJ9",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwgCiAgICAgICJ2YWx1ZSI6ICJmbWsuc2siCiAgICB9CiAgXQp9",
"signature": "G3HFMwdjaPKSdCOq7yscIglVF_VIn9olVmY1hfAdd47fRVCXcphUhw9EptHe5udSdJO9bxZwZAREwCFOzn1t9hWSMYxwxJcLGeKRxOYRtgRWkW36hNMVBoIdi9H9HgmRWXkvpTz0q_SIISyq_fWv4qUP8RCfUux9nGi_aSeGk0Sa7Vp0UJaPToM1zJtvUvEiBDyMtLuDethBH-6NUbqSjDGfaqkMYTVCojMhAN2OjxYSFQWxKL6gBXVE39JBuiYJs1Z8gz4kCsGJjh40UpU4AsrtzBq3cXnUgXTCbuyrnFMk1henTqwL-jC-VGoLn8gfyRav80ilr_I4cE09iNmsuQ"
}
2020-07-09 14:21:04,571:DEBUG:urllib3.connectionpool:"POST /acme/new-order HTTP/1.1" 201 336
2020-07-09 14:21:04,572:DEBUG:acme.client:Received response:
HTTP 201
content-length: 336
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
location: https://acme-v02.api.letsencrypt.org/acme/order/44312682/4126020811
boulder-requester: 44312682
date: Thu, 09 Jul 2020 12:21:06 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0002lvtQvl5BfTHqxiUND6ngMP2aBmpOuBs67Mq_1gKFbpM
{
"status": "pending",
"expires": "2020-07-16T12:21:05.966566064Z",
"identifiers": [
{
"type": "dns",
"value": "fmk.sk"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/5767739734"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/44312682/4126020811"
}
2020-07-09 14:21:04,572:DEBUG:acme.client:Storing nonce: 0002lvtQvl5BfTHqxiUND6ngMP2aBmpOuBs67Mq_1gKFbpM
2020-07-09 14:21:04,573:DEBUG:acme.client:JWS payload:
2020-07-09 14:21:04,577:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/5767739734:
{
"protected": "eyJub25jZSI6ICIwMDAybHZ0UXZsNUJmVEhxeGlVTkQ2bmdNUDJhQm1wT3VCczY3TXFfMWdLRmJwTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvNTc2NzczOTczNCIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC80NDMxMjY4MiIsICJhbGciOiAiUlMyNTYifQ",
"payload": "",
"signature": "WEwS_r6RwUtVvSXR0p2cfe7DxOuVIfAfs6kMZFpdtgk9OQyuCn7X4ahhou8vWnILgSKt_6BD7wv8uyQihbKpABlbJmhLJHaNPcmP-junRyxlFyNOcbjNBNOe-qufeC8PpxHtm2OA2uZ9A5Vbxsk63zjf1iqWateOlugwOkHNCwBAtYejokH51A8_cIOLAMHrpoGuKPx4lQIMja4v55eHFfLii97LzEx7XRI8sWVkjisRZ8p5hf1GO92mNR32nBxJzna1FETnRC3yXnE-K1264CaewPFtUed9TH9yJOfdz4nthVSSTPRXvgnu8UEroo__-8yxm6Z-9T28e-U9WmYREA"
}
2020-07-09 14:21:04,857:DEBUG:urllib3.connectionpool:"POST /acme/authz-v3/5767739734 HTTP/1.1" 200 784
2020-07-09 14:21:04,858:DEBUG:acme.client:Received response:
HTTP 200
content-length: 784
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
boulder-requester: 44312682
date: Thu, 09 Jul 2020 12:21:06 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0002ATA9-FLK-qPBoS868wBrIru0BkF_-lHFbhbo6Rq5Pjg
{
"identifier": {
"type": "dns",
"value": "fmk.sk"
},
"status": "pending",
"expires": "2020-07-16T12:21:05Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/PwNqPw",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/-8xhvw",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
}
]
}
2020-07-09 14:21:04,859:DEBUG:acme.client:Storing nonce: 0002ATA9-FLK-qPBoS868wBrIru0BkF_-lHFbhbo6Rq5Pjg
2020-07-09 14:21:04,861:INFO:certbot._internal.auth_handler:Performing the following challenges:
2020-07-09 14:21:04,861:INFO:certbot._internal.auth_handler:http-01 challenge for fmk.sk
2020-07-09 14:21:05,245:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: fmk.sk in: /etc/httpd/sites-enabled/fmk.ucm.sk.conf
2020-07-09 14:21:05,245:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: fmk.sk in: /etc/httpd/sites-enabled/fmk.ucm.sk.conf
2020-07-09 14:21:05,246:DEBUG:certbot_apache._internal.http_01:writing a pre config file with text:
RewriteEngine on
RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]
2020-07-09 14:21:05,246:DEBUG:certbot_apache._internal.http_01:writing a post config file with text:
<Directory /var/lib/letsencrypt/http_challenges>
Require all granted
</Directory>
<Location /.well-known/acme-challenge>
Require all granted
</Location>
2020-07-09 14:21:05,301:DEBUG:certbot.reverter:Creating backup of /etc/httpd/sites-enabled/fmk.ucm.sk.conf
2020-07-09 14:21:08,659:INFO:certbot._internal.auth_handler:Waiting for verification...
2020-07-09 14:21:08,661:DEBUG:acme.client:JWS payload:
{}
2020-07-09 14:21:08,667:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug:
{
"protected": "eyJub25jZSI6ICIwMDAyQVRBOS1GTEstcVBCb1M4Njh3QnJJcnUwQmtGXy1sSEZiaGJvNlJxNVBqZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvNTc2NzczOTczNC9ya196dWciLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNDQzMTI2ODIiLCAiYWxnIjogIlJTMjU2In0",
"payload": "e30",
"signature": "Nmm_2ArXfrGrRXz9dUy_B5eRn4NzOcfO97CpXqRmuQwjSLFBXeO5LsRkfrAbOmqKi2wT5E5io2274ikLi5Hh8WFiyk3KVuwivvYcBhyLTCpke6QAP2KD9fqzxwpfhMS_3sIpc0dhTNfdDA0IKgYiToqaqWMQNbp0_NWgF-VK6Zf-TVu30h9Z7gry-q4P-tqjvovFsS5oVgow36iwtG4voX73Ez717EAPNhxj7367LRuf_ojRznnPo6s4cjRovrwkSMZu_T_kkC0-4xUyAIv-bGKuGrdearDe9QLwFlwBsrayakMw_i-kSlJD5cQYPaGst4mEz6E3zqjsye6NvQeP_A"
}
2020-07-09 14:21:09,022:DEBUG:urllib3.connectionpool:"POST /acme/chall-v3/5767739734/rk_zug HTTP/1.1" 200 185
2020-07-09 14:21:09,023:DEBUG:acme.client:Received response:
HTTP 200
content-length: 185
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/5767739734>;rel="up"
location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug
boulder-requester: 44312682
date: Thu, 09 Jul 2020 12:21:10 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0001LeK3CENauroKjpPI0E3op2d-ZH0X-A5tiSxcTQBPO7Y
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
}
2020-07-09 14:21:09,024:DEBUG:acme.client:Storing nonce: 0001LeK3CENauroKjpPI0E3op2d-ZH0X-A5tiSxcTQBPO7Y
2020-07-09 14:21:10,026:DEBUG:acme.client:JWS payload:
2020-07-09 14:21:10,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/5767739734:
{
"protected": "eyJub25jZSI6ICIwMDAxTGVLM0NFTmF1cm9LanBQSTBFM29wMmQtWkgwWC1BNXRpU3hjVFFCUE83WSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvNTc2NzczOTczNCIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC80NDMxMjY4MiIsICJhbGciOiAiUlMyNTYifQ",
"payload": "",
"signature": "Mly2Z3tEm37aURBFOkhSxoEDdbyipAK_bZamJTF7wQo-4JgdJpmFowjNNv2T_WxOToD8aPUJNggRU7MrqsZQRI3lbilZR8TgQyOXsQWk9Le8f76jYIvyYi78yMeAwaPygrT8tNODkme-0xiM18ObVWzgQLN5rVDd0G5VUSfp_OZlzIukswU-mtRZKJHcW1mnhu2XuCmApTpy99gp7vnqeY0A9tf9q7ZRXIGgneTHAaDeniNuIgVw6UtMamIA0YOfu_SVT69gthVo1PRGckD4GQY3CJ1gXrYH-7_f49rJXpegw_NQxd_G_MTKCw-9-w-vCAepK9JSx1EwNAtLO8btPg"
}
2020-07-09 14:21:10,234:DEBUG:urllib3.connectionpool:"POST /acme/authz-v3/5767739734 HTTP/1.1" 200 784
2020-07-09 14:21:10,235:DEBUG:acme.client:Received response:
HTTP 200
content-length: 784
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
boulder-requester: 44312682
date: Thu, 09 Jul 2020 12:21:11 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0001HbcpcX6y6lSVNJuRxA3eQ_OIqyfw0Lom-EfV4Dl3Ylc
{
"identifier": {
"type": "dns",
"value": "fmk.sk"
},
"status": "pending",
"expires": "2020-07-16T12:21:05Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/PwNqPw",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/-8xhvw",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo"
}
]
}
2020-07-09 14:21:10,236:DEBUG:acme.client:Storing nonce: 0001HbcpcX6y6lSVNJuRxA3eQ_OIqyfw0Lom-EfV4Dl3Ylc
2020-07-09 14:21:13,241:DEBUG:acme.client:JWS payload:
2020-07-09 14:21:13,248:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/5767739734:
{
"protected": "eyJub25jZSI6ICIwMDAxSGJjcGNYNnk2bFNWTkp1UnhBM2VRX09JcXlmdzBMb20tRWZWNERsM1lsYyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvNTc2NzczOTczNCIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC80NDMxMjY4MiIsICJhbGciOiAiUlMyNTYifQ",
"payload": "",
"signature": "lG-yo0d9HDOqvtq9L_wl0vbxBfGfYOB-uy_M3EJZv1Pqg_S9yvAj_tVFD-jSGN8lYE3bVbAnhS_jUORHLCK1pWVwfFdKeGNFCsa6DO4VscpqhqWiNonigB57i83_hC7F3y6qci8yijhaKNuilsZMuUNgR7lB9ChAPC1MrTSF7WzVpB9AsULeWTE91z3vN5LmB-NQLzF4s0tVw_XUwlw2M7yLnf0p0V0GY_FZTvQc6LRxpBFdQ_vUBzjadcDDeFR7kDMBp-eyygl7ltiKEsaSuxuRGxEW_S_ueVueJjvSUTXSUcidVU0XVYSSPNcoM6fOm9jnL9trt9nzQ2cMzlOUQw"
}
2020-07-09 14:21:13,453:DEBUG:urllib3.connectionpool:"POST /acme/authz-v3/5767739734 HTTP/1.1" 200 941
2020-07-09 14:21:13,454:DEBUG:acme.client:Received response:
HTTP 200
content-length: 941
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
boulder-requester: 44312682
date: Thu, 09 Jul 2020 12:21:14 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0001iQw7ArE1S25zS-YPXvDdoBKKU3PPqkkCu5oZNHsbpKE
{
"identifier": {
"type": "dns",
"value": "fmk.sk"
},
"status": "invalid",
"expires": "2020-07-16T12:21:05Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "Fetching http://fmk.sk/.well-known/acme-challenge/8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo: Error getting validation data",
"status": 400
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/5767739734/rk_zug",
"token": "8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo",
"validationRecord": [
{
"url": "http://fmk.sk/.well-known/acme-challenge/8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo",
"hostname": "fmk.sk",
"port": "80",
"addressesResolved": [
"193.87.59.85"
],
"addressUsed": "193.87.59.85"
}
]
}
]
}
2020-07-09 14:21:13,454:DEBUG:acme.client:Storing nonce: 0001iQw7ArE1S25zS-YPXvDdoBKKU3PPqkkCu5oZNHsbpKE
2020-07-09 14:21:13,455:WARNING:certbot._internal.auth_handler:Challenge failed for domain fmk.sk
2020-07-09 14:21:13,456:INFO:certbot._internal.auth_handler:http-01 challenge for fmk.sk
2020-07-09 14:21:13,456:DEBUG:certbot._internal.reporter:Reporting to user: The following errors were reported by the server:
Domain: fmk.sk
Type: connection
Detail: Fetching http://fmk.sk/.well-known/acme-challenge/8tBackykbaQq1aw_J3mYjj9h_Akyh70RrArnWmQrQxo: Error getting validation data
To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided.
2020-07-09 14:21:13,457:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 180, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
AuthorizationError: Some challenges have failed.
2020-07-09 14:21:13,457:DEBUG:certbot._internal.error_handler:Calling registered functions
2020-07-09 14:21:13,458:INFO:certbot._internal.auth_handler:Cleaning up challenges
2020-07-09 14:21:14,228:WARNING:certbot._internal.renewal:Attempting to renew cert (fmk.sk) from /etc/letsencrypt/renewal/fmk.sk.conf produced an unexpected error: Some challenges have failed.. Skipping.
2020-07-09 14:21:14,231:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 448, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1176, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 116, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 306, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/usr/lib/python2.7/site-packages/certbot/_internal/client.py", line 343, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python2.7/site-packages/certbot/_internal/client.py", line 390, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 180, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
AuthorizationError: Some challenges have failed.
2020-07-09 14:21:14,231:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2020-07-09 14:21:14,231:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/fmk.sk/fullchain.pem (failure)
2020-07-09 14:21:14,236:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/bin/certbot", line 9, in <module>
load_entry_point('certbot==1.5.0', 'console_scripts', 'certbot')()
File "/usr/lib/python2.7/site-packages/certbot/main.py", line 15, in main
return internal_main.main(cli_args)
File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1347, in main
return config.func(config, plugins)
File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1255, in renew
renewal.handle_renewal_request(config)
File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 473, in handle_renewal_request
len(renew_failures), len(parse_failures)))
Error: 1 renew failure(s), 0 parse failure(s)
2020-07-09 14:21:14,238:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)