HTTPSConnectionPool(host='acme-v02.api.letsencrypt.org', port=443): Read timed out

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is: PITNZL.co.nz

I ran this command: certbot certonly -a webroot --webroot-path=/usr/share/nginx/html -d pitnzl.co.nz -d kb.pitnzl.co.nz -d media.pitnzl.co.nz

It produced this output:
Plugins selected: Authenticator webroot, Installer None
Obtaining a new certificate
Performing the following challenges:
http-01 challenge for kb.pitnzl.co.nz
http-01 challenge for media.pitnzl.co.nz
http-01 challenge for pitnzl.co.nz
Using the webroot path /usr/share/nginx/html for all unmatched domains.
Waiting for verification…
Cleaning up challenges
An unexpected error occurred:
Traceback (most recent call last):
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 384, in _make_request
six.raise_from(e, None)
File “”, line 2, in raise_from
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 380, in _make_request
httplib_response = conn.getresponse()
File “/usr/lib/python3.5/http/client.py”, line 1198, in getresponse
response.begin()
File “/usr/lib/python3.5/http/client.py”, line 297, in begin
version, status, reason = self._read_status()
File “/usr/lib/python3.5/http/client.py”, line 258, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), “iso-8859-1”)
File “/usr/lib/python3.5/socket.py”, line 576, in readinto
return self._sock.recv_into(b)
File “/usr/lib/python3/dist-packages/urllib3/contrib/pyopenssl.py”, line 307, in recv_into
raise timeout(‘The read operation timed out’)
socket.timeout: The read operation timed out

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File “/usr/lib/python3/dist-packages/requests/adapters.py”, line 449, in send
timeout=timeout
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 638, in urlopen
_stacktrace=sys.exc_info()[2])
File “/usr/lib/python3/dist-packages/urllib3/util/retry.py”, line 367, in increment
raise six.reraise(type(error), error, _stacktrace)
File “/usr/lib/python3/dist-packages/six.py”, line 686, in reraise
raise value
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 600, in urlopen
chunked=chunked)
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 386, in _make_request
self._raise_timeout(err=e, url=url, timeout_value=read_timeout)
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 306, in _raise_timeout
raise ReadTimeoutError(self, url, “Read timed out. (read timeout=%s)” % timeout_value)
urllib3.exceptions.ReadTimeoutError: HTTPSConnectionPool(host=‘acme-v02.api.letsencrypt.org’, port=443): Read timed out. (read timeout=45)

During handling of the above exception, another exception occurred:

requests.exceptions.ReadTimeout: HTTPSConnectionPool(host=‘acme-v02.api.letsencrypt.org’, port=443): Read timed out. (read timeout=45)
Please see the logfiles in /var/log/letsencrypt for more details.

My web server is (include version): nginx version: nginx/1.16.0

The operating system my web server runs on is (include version): Debian GNU/Linux 9 (stretch)

My hosting provider, if applicable, is:

I can login to a root shell on my machine (yes or no, or I don’t know):Yes

I’m using a control panel to manage my site (no, or provide the name and version of the control panel):
No
The version of my client is (e.g. output of certbot --version or certbot-auto --version if you’re using Certbot):certbot 0.28.0

Can the computer connect to other websites?

What does “curl -v https://acme-v02.api.letsencrypt.org/directory” show?

1 Like

Hi Matt

Can connect without issue to other web sites on port 80 and 443

Attached is log

curl -v https://acme-v02.api.letsencrypt.org/directory

* Trying 59.151.178.102…

* TCP_NODELAY set

* Connected to acme-v02.api.letsencrypt.org (59.151.178.102) port 443 (#0)

* ALPN, offering h2

* ALPN, offering http/1.1

* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH

* successfully set certificate verify locations:

* CAfile: /etc/ssl/certs/ca-certificates.crt

CApath: /etc/ssl/certs

* TLSv1.2 (OUT), TLS header, Certificate Status (22):

* TLSv1.2 (OUT), TLS handshake, Client hello (1):

* TLSv1.2 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Client hello (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS change cipher, Client hello (1):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384

* ALPN, server accepted to use http/1.1

* Server certificate:

* subject: CN=acme-v02.api.letsencrypt.org

* start date: May 10 04:39:46 2019 GMT

* expire date: Aug 8 04:39:46 2019 GMT

* subjectAltName: host “acme-v02.api.letsencrypt.org” matched cert’s "acme-v02.api.letsencrypt.org"

* issuer: C=US; O=Let’s Encrypt; CN=Let’s Encrypt Authority X3

* SSL certificate verify ok.

> GET /directory HTTP/1.1

> Host: acme-v02.api.letsencrypt.org

> User-Agent: curl/7.52.1

> Accept: /

>

< HTTP/1.1 200 OK

< Server: nginx

< Content-Type: application/json

< Content-Length: 658

< X-Frame-Options: DENY

< Strict-Transport-Security: max-age=604800

< Expires: Fri, 07 Jun 2019 19:51:45 GMT

< Cache-Control: max-age=0, no-cache, no-store

< Pragma: no-cache

< Date: Fri, 07 Jun 2019 19:51:45 GMT

< Connection: keep-alive

<

{

"bnUwoMckgjU": “Adding random entries to the directory”,

"keyChange": “https://acme-v02.api.letsencrypt.org/acme/key-change”,

"meta": {

"caaIdentities": [

"letsencrypt.org"

],

"termsOfService": “https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf”,

"website": "https://letsencrypt.org"

},

"newAccount": “https://acme-v02.api.letsencrypt.org/acme/new-acct”,

"newNonce": “https://acme-v02.api.letsencrypt.org/acme/new-nonce”,

"newOrder": “https://acme-v02.api.letsencrypt.org/acme/new-order”,

"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"

* Curl_http_done: called premature == 0

* Connection #0 to host acme-v02.api.letsencrypt.org left intact

(Attachment letsencrypt.log is missing)

letsencrypt.log

2019-06-08 08:06:29,113:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/acme/authz/IZHdyeTV4ZHpbjNSqT3fLMtqCvLTBI_oDakTnxc5AkE.
2019-06-08 08:06:29,406:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 “GET /acme/authz/IZHdyeTV4ZHpbjNSqT3fLMtqCvLTBI_oDakTnxc5AkE HTTP/1.1” 200 1567
2019-06-08 08:06:29,407:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Content-Type: application/json
Content-Length: 1567
Link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
Expires: Fri, 07 Jun 2019 20:06:29 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 07 Jun 2019 20:06:29 GMT
Connection: keep-alive

{
“identifier”: {
“type”: “dns”,
“value”: “pitnzl.co.nz”
},
“status”: “valid”,
“expires”: “2019-07-07T09:58:03Z”,
“challenges”: [
{
“type”: “http-01”,
“status”: “valid”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/challenge/IZHdyeTV4ZHpbjNSqT3fLMtqCvLTBI_oDakTnxc5AkE/16781051980”,
“token”: “dwWazdMgZ31ntXorNPbj10JzXS-fP5qqF2imav78VCY”,
“validationRecord”: [
{
“url”: “http://pitnzl.co.nz/.well-known/acme-challenge/dwWazdMgZ31ntXorNPbj10JzXS-fP5qqF2imav78VCY”,
“hostname”: “pitnzl.co.nz”,
“port”: “80”,
“addressesResolved”: [
“222.152.251.198”
],
“addressUsed”: “222.152.251.198”
},
{
“url”: “https://pitnzl.co.nz/.well-known/acme-challenge/dwWazdMgZ31ntXorNPbj10JzXS-fP5qqF2imav78VCY”,
“hostname”: “pitnzl.co.nz”,
“port”: “443”,
“addressesResolved”: [
“222.152.251.198”
],
“addressUsed”: “222.152.251.198”
}
]
},
{
“type”: “tls-alpn-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/challenge/IZHdyeTV4ZHpbjNSqT3fLMtqCvLTBI_oDakTnxc5AkE/16781051981”,
“token”: “dZZDzebz2lZSHTJfOixYak3ZCj0FB2g_vQaE6rtawe8”
},
{
“type”: “dns-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/challenge/IZHdyeTV4ZHpbjNSqT3fLMtqCvLTBI_oDakTnxc5AkE/16781051982”,
“token”: “RbRCcPZWG_jI5OpGhnE4jdyuIYWXqRDxu2-w_tkpwIk”
}
]
}
2019-06-08 08:06:29,408:DEBUG:certbot.error_handler:Calling registered functions
2019-06-08 08:06:29,408:INFO:certbot.auth_handler:Cleaning up challenges
2019-06-08 08:06:29,408:DEBUG:certbot.plugins.webroot:Removing /usr/share/nginx/html/.well-known/acme-challenge/njW00Ldm8iDG7YnwGV-bzx7ZZzOQi78ewA8FAYQopWc
2019-06-08 08:06:29,409:DEBUG:certbot.plugins.webroot:Removing /usr/share/nginx/html/.well-known/acme-challenge/TKZyHo9fFknoUmRlKYu5-sx70YLCyDh-YI9UKz8RRuI
2019-06-08 08:06:29,409:DEBUG:certbot.plugins.webroot:Removing /usr/share/nginx/html/.well-known/acme-challenge/dwWazdMgZ31ntXorNPbj10JzXS-fP5qqF2imav78VCY
2019-06-08 08:06:29,410:DEBUG:certbot.plugins.webroot:All challenges cleaned up
2019-06-08 08:06:29,410:DEBUG:certbot.client:CSR: CSR(file=’/etc/letsencrypt/csr/0011_csr-certbot.pem’, data=b’-----BEGIN CERTIFICATE REQUEST-----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\nUXagvh4acXMDB2Ja5ubLlXttIm6eyhJd7zL3djs6YOL1BCoCuqEM6w==\n-----END CERTIFICATE REQUEST-----\n’, form=‘pem’)
2019-06-08 08:06:29,412:DEBUG:acme.client:JWS payload:
b’{\n “resource”: “new-cert”,\n “csr”: “MIIClDCCAXwCAQIwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOAm7636xRb5xL56GJLe38Bon4XZ8ybxbs0dd538VL9bRpBnPez7zZkOl2ms_6KA6mc45Y6v8IB2RW4iD0UfBngwrmTN6k2smZaN50vhQjS_uLlVaiCnCUKwmbVWpmlYXVi8lQk2fWutmgoRgLS1CJ2vi6RjR8tYF1envOErxK9aU-JBTpNh2wrOPkY-BxmpHKJDuhgzMeNx92Da9ptzEGK-fZdrOCHXYbXN_21RTpRYHuLQO4uZ0iLh9GgPDlpoVjM25EtSxDouylD-jLG66AB97AkPUUdaXVpQGFDfciebnZ-3VWMsXRnVuyERfHOrjFD3ZCjatYHSj3NJMuK7cpkCAwEAAaBPME0GCSqGSIb3DQEJDjFAMD4wPAYDVR0RBDUwM4IMcGl0bnpsLmNvLm56gg9rYi5waXRuemwuY28ubnqCEm1lZGlhLnBpdG56bC5jby5uejANBgkqhkiG9w0BAQsFAAOCAQEAjScifV0O2URS8YxafQxm4HlOPjuR1qYuoJOJVPk0uXlAXNUYvr-gaNqQ62YwEzMWKVq_ebVAUmPndnBH1q045YePLhpVvEGEaVQwcIRnsqdJMeoaVegeiaAV9-D_YQEEUBa5Wpj3H51yAA3Idp7W1Drniot7BMV6ogbfmuV_CgM-Fq3oto7ckUo9xhFwpOdQS6Oyp8JSDdzcFfVMkfza17I6i2VbiYof3HWxMVFkBAujFJxd6ppwCGyjlVjHq79UK7jnl3p3_mdx5plhJN18wi3K6uigviLuUXagvh4acXMDB2Ja5ubLlXttIm6eyhJd7zL3djs6YOL1BCoCuqEM6w”\n}’
2019-06-08 08:06:29,415:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/58739224/522660455:
{
“payload”: “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”,
“protected”: “eyJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvZmluYWxpemUvNTg3MzkyMjQvNTIyNjYwNDU1IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzU4NzM5MjI0IiwgIm5vbmNlIjogImxxLXRsNWhGZ24taS1HR1NHTFFkaE9GaFFLSUVyLXQ3cTRic1RDNmNua00iLCAiYWxnIjogIlJTMjU2In0”,
“signature”: “kVqPsp4Nkncmmxdo-ubcooIvwjsBPxKfqQodQWZyFYxNgmztPk7VcnIkmRofCjI0TBjeOPjCKaoSLkWMwifEeuhWCq8eArUm0xJnPKtAt5LyO2I88EczZAwhEbUzQ7vpr-muiyLzUj1SquOTOH9G24YvJgIgtLB_1wZCcXgg8j_lZuCwU0ONAzzbKz8uCM4Il5RQH6WR8Pjz5IHwLk4fiezaNPxcTkrr2dAk2TJ1DK4E86z3am7UQIcZbnoW-Zr0B_b72_UdW98APe64PtwJjC-mKuOefdlfgeorcHqfgOsMPMThVyfQjsgIPaEwGcMsxnQozslXOcEUENylzOZ-ew”
}
2019-06-08 08:07:14,447:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 384, in _make_request
six.raise_from(e, None)
File “”, line 2, in raise_from
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 380, in _make_request
httplib_response = conn.getresponse()
File “/usr/lib/python3.5/http/client.py”, line 1198, in getresponse
response.begin()
File “/usr/lib/python3.5/http/client.py”, line 297, in begin
version, status, reason = self._read_status()
File “/usr/lib/python3.5/http/client.py”, line 258, in _read_status
line = str(self.fp.readline(_MAXLINE + 1), “iso-8859-1”)
File “/usr/lib/python3.5/socket.py”, line 576, in readinto
return self._sock.recv_into(b)
File “/usr/lib/python3/dist-packages/urllib3/contrib/pyopenssl.py”, line 307, in recv_into
raise timeout(‘The read operation timed out’)
socket.timeout: The read operation timed out

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File “/usr/lib/python3/dist-packages/requests/adapters.py”, line 449, in send
timeout=timeout
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 638, in urlopen
_stacktrace=sys.exc_info()[2])
File “/usr/lib/python3/dist-packages/urllib3/util/retry.py”, line 367, in increment
raise six.reraise(type(error), error, _stacktrace)
File “/usr/lib/python3/dist-packages/six.py”, line 686, in reraise
raise value
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 600, in urlopen
chunked=chunked)
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 386, in _make_request
self._raise_timeout(err=e, url=url, timeout_value=read_timeout)
File “/usr/lib/python3/dist-packages/urllib3/connectionpool.py”, line 306, in _raise_timeout
raise ReadTimeoutError(self, url, “Read timed out. (read timeout=%s)” % timeout_value)
urllib3.exceptions.ReadTimeoutError: HTTPSConnectionPool(host=‘acme-v02.api.letsencrypt.org’, port=443): Read timed out. (read timeout=45)

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File “/usr/bin/certbot”, line 11, in
load_entry_point(‘certbot==0.28.0’, ‘console_scripts’, ‘certbot’)()
File “/usr/lib/python3/dist-packages/certbot/main.py”, line 1340, in main
return config.func(config, plugins)
File “/usr/lib/python3/dist-packages/certbot/main.py”, line 1225, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File “/usr/lib/python3/dist-packages/certbot/main.py”, line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File “/usr/lib/python3/dist-packages/certbot/client.py”, line 392, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File “/usr/lib/python3/dist-packages/certbot/client.py”, line 351, in obtain_certificate
cert, chain = self.obtain_certificate_from_csr(csr, orderr)
File “/usr/lib/python3/dist-packages/certbot/client.py”, line 283, in obtain_certificate_from_csr
orderr = self.acme.finalize_order(orderr, deadline)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 862, in finalize_order
return self.client.finalize_order(orderr, deadline)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 716, in finalize_order
self._post(orderr.body.finalize, wrapped_csr)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 94, in _post
return self.net.post(*args, **kwargs)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 1130, in post
return self._post_once(*args, **kwargs)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 1146, in _post_once
response = self._send_request(‘POST’, url, data=data, **kwargs)
File “/usr/lib/python3/dist-packages/acme/client.py”, line 1046, in _send_request
response = self.session.request(method, url, *args, **kwargs)
File “/usr/lib/python3/dist-packages/requests/sessions.py”, line 533, in request
resp = self.send(prep, **send_kwargs)
File “/usr/lib/python3/dist-packages/requests/sessions.py”, line 646, in send
r = adapter.send(request, **kwargs)
File “/usr/lib/python3/dist-packages/requests/adapters.py”, line 529, in send
raise ReadTimeout(e, request=request)
requests.exceptions.ReadTimeout: HTTPSConnectionPool(host=‘acme-v02.api.letsencrypt.org’, port=443): Read timed out. (read timeout=45)
2019-06-08 08:07:14,603:ERROR:certbot.log:An unexpected error occurred:

Check this thread: Cannot get new certificate, readtimeout error

Thank you _az , setting my mtu 1300 solved the problem

Again thank you very much

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.