i’ve rerun
sudo certbot certonly --webroot -w /var/www/mydomain -d brandolin1.homepc.it
i now got this output
Plugins selected: Authenticator webroot, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for brandolin1.homepc.it
Using the webroot path /var/www/mydomain for all unmatched domains.
Waiting for verification...
Cleaning up challenges
Failed authorization procedure. brandolin1.homepc.it (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://brandolin1.homepc.it/.well-known/acme-challenge/lmP-P85wiAupdG7ot4oaJQnXqf2xKesN9m3PEK5JkME: Error getting validation data
IMPORTANT NOTES:
- The following errors were reported by the server:
Domain: brandolin1.homepc.it
Type: connection
Detail: Fetching
http://brandolin1.homepc.it/.well-known/acme-challenge/lmP-P85wiAupdG7ot4oaJQnXqf2xKesN9m3PEK5JkME:
Error getting validation data
and this log
2018-11-26 11:59:07,766:DEBUG:certbot.main:certbot version: 0.28.0
2018-11-26 11:59:07,773:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/var/www/$
2018-11-26 11:59:07,778:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(Plugi$
2018-11-26 11:59:07,835:DEBUG:certbot.log:Root logging level set at 20
2018-11-26 11:59:07,841:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/le$
2018-11-26 11:59:07,845:DEBUG:certbot.plugins.selection:Requested authenticator webr$
2018-11-26 11:59:07,846:DEBUG:certbot.plugins.selection:Single candidate plugin: * w$
Description: Place files in webroot directory
Interfaces: IAuthenticator, IPlugin
Entry point: webroot = certbot.plugins.webroot:Authenticator
Initialized: <certbot.plugins.webroot.Authenticator object at 0x75a0c990>
Prep: True
2018-11-26 11:59:07,853:DEBUG:certbot.plugins.selection:Selected authenticator <cert$
2018-11-26 11:59:07,853:INFO:certbot.plugins.selection:Plugins selected: Authenticat$
2018-11-26 11:59:07,874:DEBUG:certbot.main:Picked account: <Account(RegistrationReso$
2018-11-26 11:59:07,883:DEBUG:acme.client:Sending GET request to https://acme-v02.ap$
2018-11-26 11:59:07,910:DEBUG:requests.packages.urllib3.connectionpool:Starting new $
2018-11-26 11:59:08,259:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:08,262:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 658
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:08 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:08 GMT
Connection: keep-alive
{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017$
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
"zNs0zDm675c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-d$
}
2018-11-26 11:59:08,265:INFO:certbot.main:Obtaining a new certificate
2018-11-26 11:59:14,177:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/l$
2018-11-26 11:59:14,212:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr$
2018-11-26 11:59:14,216:DEBUG:acme.client:Requesting fresh nonce
2018-11-26 11:59:14,217:DEBUG:acme.client:Sending HEAD request to https://acme-v02.a$
2018-11-26 11:59:14,407:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:14,410:DEBUG:acme.client:Received response:
HTTP 204
Server: nginx
Replay-Nonce: u2clhIWbj17_5lWOR_ks-Y3nK9LVwlRVQyGcm7OdjyE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:14 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:14 GMT
Connection: keep-alive
2018-11-26 11:59:14,410:DEBUG:acme.client:Storing nonce: u2clhIWbj17_5lWOR_ks-Y3nK9L$
2018-11-26 11:59:14,412:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "value": "brandolin1.homepc.it",\n "type"$
2018-11-26 11:59:14,450:DEBUG:acme.client:Sending POST request to https://acme-v02.a$
{
"signature": "bM4AU2iQk5Qke2JVx0CWb5M3hzLZdeQmgmYk5DoewJl_5SspwPSKpKpe8UYpLtGVivBi$
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInZhbHVlIjogImJyYW5kb2xpbj$
"protected": "eyJhbGciOiAiUlMyNTYiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNl$
}
2018-11-26 11:59:14,689:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:14,692:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Content-Type: application/json
Content-Length: 379
Boulder-Requester: 46476295
Location: https://acme-v02.api.letsencrypt.org/acme/order/46476295/192740227
Replay-Nonce: bdt_AnVMZKY2kkjUSr_tBEOu3Ic_D1DKvl-YvRvLGtQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:14 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:14 GMT
Connection: keep-alive
{
"status": "pending",
"expires": "2018-12-03T11:59:14.597785905Z",
"identifiers": [
{
"type": "dns",
"value": "brandolin1.homepc.it"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz/7u5ViBrCGVsqAfTfDjV72uMyTsd1oBs$
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/46476295/192740227"
}
2018-11-26 11:59:14,693:DEBUG:acme.client:Storing nonce: bdt_AnVMZKY2kkjUSr_tBEOu3Ic$
2018-11-26 11:59:14,694:DEBUG:acme.client:Sending GET request to https://acme-v02.ap$
2018-11-26 11:59:14,886:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:14,889:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 912
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:14 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:14 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "brandolin1.homepc.it"
},
"status": "pending",
"expires": "2018-12-03T11:59:14Z",
"challenges": [
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "r9uBgqJ9eevxnrH1SP7dMiVNB4Pp4PDM6J9ZIC91XAk"
},
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "lmP-P85wiAupdG7ot4oaJQnXqf2xKesN9m3PEK5JkME"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "MLm0x6nRRVD3rNkEEt6V6hFVbU1NWU6RdOxSLq8H0jk"
}
]
}
2018-11-26 11:59:14,892:INFO:certbot.auth_handler:Performing the following challenge$
2018-11-26 11:59:14,893:INFO:certbot.auth_handler:http-01 challenge for brandolin1.h$
2018-11-26 11:59:14,894:INFO:certbot.plugins.webroot:Using the webroot path /var/www$
2018-11-26 11:59:14,895:DEBUG:certbot.plugins.webroot:Creating root challenges valid$
2018-11-26 11:59:14,916:DEBUG:certbot.plugins.webroot:Attempting to save validation $
2018-11-26 11:59:14,918:INFO:certbot.auth_handler:Waiting for verification...
2018-11-26 11:59:14,919:DEBUG:acme.client:JWS payload:
b'{\n "resource": "challenge",\n "type": "http-01",\n "keyAuthorization": "lmP-P8$
2018-11-26 11:59:14,951:DEBUG:acme.client:Sending POST request to https://acme-v02.a$
{
"signature": "OoyvqlRqaSwLYlRtUfm6pdAMwGLCW37qYDt2WGlo_CU4pzntIaPDwWaiQpFDG59x_s8y$
"payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiLAogIC$
"protected": "eyJhbGciOiAiUlMyNTYiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNl$
}
2018-11-26 11:59:15,163:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:15,165:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 223
Boulder-Requester: 46476295
Link: <https://acme-v02.api.letsencrypt.org/acme/authz/7u5ViBrCGVsqAfTfDjV72uMyTsd1o$
Location: https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDjV72u$
Replay-Nonce: 96CdQcxeeeRuH5rSRiQImkbuFgeTjpqZiA5v49hal2s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:15 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:15 GMT
Connection: keep-alive
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDjV72u$
"token": "lmP-P85wiAupdG7ot4oaJQnXqf2xKesN9m3PEK5JkME"
}
2018-11-26 11:59:15,166:DEBUG:acme.client:Storing nonce: 96CdQcxeeeRuH5rSRiQImkbuFge$
2018-11-26 11:59:18,172:DEBUG:acme.client:Sending GET request to https://acme-v02.ap$
2018-11-26 11:59:18,372:DEBUG:requests.packages.urllib3.connectionpool:https://acme-$
2018-11-26 11:59:18,377:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 1540
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Mon, 26 Nov 2018 11:59:18 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 26 Nov 2018 11:59:18 GMT
Connection: keep-alive
{
"identifier": {
"type": "dns",
"value": "brandolin1.homepc.it"
},
"status": "invalid",
"expires": "2018-12-03T11:59:14Z",
"challenges": [
{
"type": "tls-alpn-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "r9uBgqJ9eevxnrH1SP7dMiVNB4Pp4PDM6J9ZIC91XAk"
},
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "Fetching http://brandolin1.homepc.it/.well-known/acme-challenge/l$
"status": 400
},
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "lmP-P85wiAupdG7ot4oaJQnXqf2xKesN9m3PEK5JkME",
"validationRecord": [
{
"url": "http://brandolin1.homepc.it/.well-known/acme-challenge/lmP-P85wiAu$
"hostname": "brandolin1.homepc.it",
"port": "80",
"addressesResolved": [
"151.49.220.132"
],
"addressUsed": "151.49.220.132"
}
]
},
{
"type": "dns-01",
"status": "invalid",
"url": "https://acme-v02.api.letsencrypt.org/acme/challenge/7u5ViBrCGVsqAfTfDj$
"token": "MLm0x6nRRVD3rNkEEt6V6hFVbU1NWU6RdOxSLq8H0jk"
}
]
}
2018-11-26 11:59:18,384:DEBUG:certbot.reporter:Reporting to user: The following erro$
Domain: brandolin1.homepc.it
Type: connection
Detail: Fetching http://brandolin1.homepc.it/.well-known/acme-challenge/lmP-P85wiAup$
To fix these errors, please make sure that your domain name was entered correctly an$
2018-11-26 11:59:18,389:DEBUG:certbot.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_$
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 161, in _respo$
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 232, in _poll_$
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. brandolin1.homepc.i$
2018-11-26 11:59:18,390:DEBUG:certbot.error_handler:Calling registered functions
2018-11-26 11:59:18,391:INFO:certbot.auth_handler:Cleaning up challenges
2018-11-26 11:59:18,392:DEBUG:certbot.plugins.webroot:Removing /var/www/mydomain/.we$
2018-11-26 11:59:18,394:DEBUG:certbot.plugins.webroot:All challenges cleaned up
2018-11-26 11:59:18,396:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in <module>
load_entry_point('certbot==0.28.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1340, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1225, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_$
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 392, in obtain_and_e$
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 335, in obtain_certi$
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_o$
File "/usr/lib/python3/dist-packages/certbot/client.py", line 371, in _get_order_a$
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_$
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 161, in _respo$
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 232, in _poll_$
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. brandolin1.homepc.i$
I see a number of http 200, 204s and 205s which make me think the connection went through to the rpi, but i’m missing some data ni the folders. is that a correct assessment?
edit
just now i was getting a weird error by nginx when accessing it internally.
I’ve checked the relevant sites-enabled file , and realised i was missing a " } ". now internally the reverse proxying works.
however now the test by Juergen responds with
restarting the router. i can’t find anything further to edit in it’s interface. -.-