Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
Error: Command failed: certbot certonly --config "/etc/letsencrypt.ini" --cert-name "npm-4" --agree-tos --email "myemail@gmail.com" --domains "*.devilsan.com" --authenticator dns-linode --dns-linode-credentials "/etc/letsencrypt/credentials/credentials-4" --dns-linode-propagation-seconds 9999
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Encountered exception during recovery: ValueError: invalid literal for int() with base 10: '[|3|4]'
An unexpected error occurred:
ValueError: invalid literal for int() with base 10: '[|3|4]'
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
at ChildProcess.exithandler (node:child_process:402:12)
at ChildProcess.emit (node:events:513:28)
at maybeClose (node:internal/child_process:1100:16)
at Process.ChildProcess._handle.onexit (node:internal/child_process:304:5)
My web server is (include version):
The operating system my web server runs on is (include version): Ubuntu 22.04.1 LTS
My hosting provider, if applicable, is: Linode
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
I am starting to use Nginx Proxy Manager.
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
Kindly wait for more knowledgeable Let's Encrypt community volunteers to assist.
Potentially useful information for them are
certbot --version
did you run the command with sudo
attach /var/log/letsencrypt/letsencrypt.log to your response
Supplemental support information.
Using this online tool https://crt.sh/ here is a list of issued certificates crt.sh | devilsan.com, the latest being 2022-12-03.
$ nmap -Pn devilsan.com
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2022-12-03 13:22 PST
Nmap scan report for devilsan.com (178.79.144.52)
Host is up (0.15s latency).
rDNS record for 178.79.144.52: 178-79-144-52.ip.linodeusercontent.com
Not shown: 992 closed ports
PORT STATE SERVICE
25/tcp filtered smtp
80/tcp open http
81/tcp open hosts2-ns
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
443/tcp open https
445/tcp filtered microsoft-ds
9101/tcp open jetdirect
Nmap done: 1 IP address (1 host up) scanned in 10.03 seconds