Renewed My Cert, But Still Have Error in Browser About Invalid Response and Such

That's a better question for a Boost forum.

But, some clients require two calls to setup the cert chain. One for just the cert (cert.pem) and another for the intermediates (chain.pem). Perhaps Boost is one of those. I see this page that hints that is how Boost works too
https://www.boost.org/doc/libs/1_79_0/doc/html/boost_asio/reference/ssl__context.html

I find the docs sorely lacking in details so best to work with Boost experts.

4 Likes

It was working until I updated to Boost version 1.78.0 and now 1.79.0. So if it that's how it works, it could be something they changed in the previous update.

Well, at least @rg305 showed you a command to verify your chain once you get it sorted from the Boost people.

3 Likes

I have two .cer files here in addition to "fullchain.cer": "dragonosman.dynu.net.cer" and "ca.cer". I thought the latter was meant to be the cert for verifying the authority. Was I wrong? Which one do I use as the single cert file?

That should be either:

  • fullchain.cer
    OR
  • dragonosman.dynu.net.cer + fullchain.cer

Maybe you could review them and/or show them here (if you need help).
BUT BE SURE NOT TO SHOW ANYTHING THAT CONTAINS "PRIVATE"
[as that would likely have the private key - which should never be shared]

4 Likes

I don't know what the Boost API requires. I earlier provided some references for that. Once you know what needs to be done we can advise which file to use.

3 Likes

Boost.ASIO just makes use of the present system APIs for networking (APIs on the machine it's running on). There's nothing special.

I saw in post #19 your server was only sending a leaf and not the intermediates. I thought Boost was being used for your server too. I don't understand your setup to advise further.

3 Likes

Boost is a collection of libraries written by different library authors. Boost.ASIO is a low-level networking library, and Boost.Beast builds on top of it to provide HTTP/S and WebSocket stuff, taking care of all the low-level details for those for you. It's meant for library authors who understand how to use ASIO so they can build more abstraction layers on top of it. That's not me though, so I should probably use a library that already gives the right amount of abstraction.

But yeah, right now my server app uses Beast. It's a server written in Boost.Beast.

Try ssl::context::use_certificate_chain_file - 1.79.0 instead of use_certificate

3 Likes

I'm using that already. I started trying to use both the chain and the single cert in case I needed that rather than only the chain, but it gives me the same errors as before. If I should really use just the chain, then I don't know what's wrong that's making it send only one cert.

Is there no one here who's familiar with how ASIO and Beast work?

I'd be almost 100% confident that nobody here (except for yourself) has used the boost ssl libraries. Googling them returns your previous post from a few years ago: How do I use Let's Encrypt Certs with Boost.ASIO? - #49 by DragonOsman

[Your best bet is the boost users mailing list: Boost-users Info Page]

4 Likes

Can you rollback the upgrade(s)?

3 Likes

I installed socat tools for Windows but I don't know how to provide the path for acme.sh to see it. Do I just add it to the Path variable?

I already sent a message to the Boost users mailing list. No reply yet though.

I decided to try turning my code back to how it was and issuing and another certificate from acme.sh. But there's a 500 server error occurring during the run. Had to pass in --debug option to see it.

Here's the output:

 ./acme.sh --issue -d dragonosman.dynu.net --standalone --debug
 [Tue Jul 19 21:46:55 PKT 2022] Lets find script dir.
 [Tue Jul 19 21:46:56 PKT 2022] _SCRIPT_='./acme.sh'
 [Tue Jul 19 21:46:56 PKT 2022] _script='/mnt/c/Users/Osman/acme.sh/acme.sh'
 [Tue Jul 19 21:46:56 PKT 2022] _script_home='/mnt/c/Users/Osman/acme.sh'
 [Tue Jul 19 21:46:56 PKT 2022] Using default home:/root/.acme.sh
 [Tue Jul 19 21:46:56 PKT 2022] Using config home:/root/.acme.sh
 https://github.com/acmesh-official/acme.sh
 v3.0.5
 [Tue Jul 19 21:46:56 PKT 2022] Running cmd: issue
 [Tue Jul 19 21:46:56 PKT 2022] _main_domain='dragonosman.dynu.net'
 [Tue Jul 19 21:46:56 PKT 2022] _alt_domains='no'
 [Tue Jul 19 21:46:56 PKT 2022] Using config home:/root/.acme.sh
 [Tue Jul 19 21:46:56 PKT 2022] config file is empty, can not read DEFAULT_ACME_SERVER
 [Tue Jul 19 21:46:56 PKT 2022] default_acme_server
 [Tue Jul 19 21:46:56 PKT 2022] ACME_DIRECTORY='https://acme.zerossl.com/v2/DV90'
 [Tue Jul 19 21:46:56 PKT 2022] DOMAIN_PATH='/root/.acme.sh/dragonosman.dynu.net'
 [Tue Jul 19 21:46:56 PKT 2022] Le_NextRenewTime
 [Tue Jul 19 21:46:56 PKT 2022] Using ACME_DIRECTORY: https://acme.zerossl.com/v2/DV90
 [Tue Jul 19 21:46:56 PKT 2022] _init api for server: https://acme.zerossl.com/v2/DV90
 [Tue Jul 19 21:46:56 PKT 2022] GET
 [Tue Jul 19 21:46:56 PKT 2022] url='https://acme.zerossl.com/v2/DV90'
 [Tue Jul 19 21:46:56 PKT 2022] timeout=
 [Tue Jul 19 21:46:56 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:47:10 PKT 2022] ret='0'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_KEY_CHANGE='https://acme.zerossl.com/v2/DV90/keyChange'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_NEW_AUTHZ
 [Tue Jul 19 21:47:10 PKT 2022] ACME_NEW_ORDER='https://acme.zerossl.com/v2/DV90/newOrder'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_NEW_ACCOUNT='https://acme.zerossl.com/v2/DV90/newAccount'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_REVOKE_CERT='https://acme.zerossl.com/v2/DV90/revokeCert'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_AGREEMENT='https://secure.trust-provider.com/repository/docs/Legacy/20201020_Certificate_Subscriber_Agreement_v_2_4_click.pdf'
 [Tue Jul 19 21:47:10 PKT 2022] ACME_NEW_NONCE='https://acme.zerossl.com/v2/DV90/newNonce'
 [Tue Jul 19 21:47:10 PKT 2022] Using CA: https://acme.zerossl.com/v2/DV90
 [Tue Jul 19 21:47:10 PKT 2022] _on_before_issue
 [Tue Jul 19 21:47:10 PKT 2022] _chk_main_domain='dragonosman.dynu.net'
 [Tue Jul 19 21:47:10 PKT 2022] _chk_alt_domains
 [Tue Jul 19 21:47:10 PKT 2022] Le_LocalAddress
 [Tue Jul 19 21:47:10 PKT 2022] d='dragonosman.dynu.net'
 [Tue Jul 19 21:47:10 PKT 2022] Check for domain='dragonosman.dynu.net'
 [Tue Jul 19 21:47:10 PKT 2022] _currentRoot='no'
 [Tue Jul 19 21:47:10 PKT 2022] Standalone mode.
 [Tue Jul 19 21:47:10 PKT 2022] _checkport='80'
 [Tue Jul 19 21:47:10 PKT 2022] _checkaddr
 [Tue Jul 19 21:47:10 PKT 2022] Using: ss
 [Tue Jul 19 21:47:10 PKT 2022] d
 [Tue Jul 19 21:47:10 PKT 2022] _saved_account_key_hash is not changed, skip register account.
 [Tue Jul 19 21:47:10 PKT 2022] Read key length:2048
 [Tue Jul 19 21:47:10 PKT 2022] _createcsr
 [Tue Jul 19 21:47:10 PKT 2022] Single domain='dragonosman.dynu.net'
 [Tue Jul 19 21:47:11 PKT 2022] Getting domain auth token for each domain
 [Tue Jul 19 21:47:11 PKT 2022] d
 [Tue Jul 19 21:47:11 PKT 2022] url='https://acme.zerossl.com/v2/DV90/newOrder'
 [Tue Jul 19 21:47:11 PKT 2022] payload='{"identifiers": [{"type":"dns","value":"dragonosman.dynu.net"}]}'
 [Tue Jul 19 21:47:11 PKT 2022] RSA key
 [Tue Jul 19 21:47:11 PKT 2022] HEAD
 [Tue Jul 19 21:47:11 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/newNonce'
 [Tue Jul 19 21:47:11 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -I  '
 [Tue Jul 19 21:47:27 PKT 2022] _ret='0'
 [Tue Jul 19 21:47:27 PKT 2022] POST
 [Tue Jul 19 21:47:27 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/newOrder'
 [Tue Jul 19 21:47:27 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:47:45 PKT 2022] _ret='0'
 [Tue Jul 19 21:47:45 PKT 2022] code='201'
 [Tue Jul 19 21:47:45 PKT 2022] Le_LinkOrder='https://acme.zerossl.com/v2/DV90/order/6LcJ2Is8Ywo9tquj15JMnA'
 [Tue Jul 19 21:47:45 PKT 2022] Le_OrderFinalize='https://acme.zerossl.com/v2/DV90/order/6LcJ2Is8Ywo9tquj15JMnA/finalize'
 [Tue Jul 19 21:47:45 PKT 2022] url='https://acme.zerossl.com/v2/DV90/authz/pYa_nJA0m7pJKjFsLKU2vQ'
 [Tue Jul 19 21:47:45 PKT 2022] payload
 [Tue Jul 19 21:47:46 PKT 2022] POST
 [Tue Jul 19 21:47:46 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/authz/pYa_nJA0m7pJKjFsLKU2vQ'
 [Tue Jul 19 21:47:46 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:48:04 PKT 2022] _ret='0'
 [Tue Jul 19 21:48:04 PKT 2022] code='200'
 [Tue Jul 19 21:48:04 PKT 2022] d='dragonosman.dynu.net'
 [Tue Jul 19 21:48:04 PKT 2022] Getting webroot for domain='dragonosman.dynu.net'
 [Tue Jul 19 21:48:04 PKT 2022] _w='no'
 [Tue Jul 19 21:48:04 PKT 2022] _currentRoot='no'
 [Tue Jul 19 21:48:04 PKT 2022] entry='"type":"http-01","url":"https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ","status":"pending","token":"I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA"'
 [Tue Jul 19 21:48:04 PKT 2022] token='I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA'
 [Tue Jul 19 21:48:04 PKT 2022] uri='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:04 PKT 2022] keyauthorization='I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA.zKTHYw1pmWrdNdiD06pdTCbbk7Y9vC7Ojf4Y33xEBDc'
 [Tue Jul 19 21:48:04 PKT 2022] dvlist='dragonosman.dynu.net#I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA.zKTHYw1pmWrdNdiD06pdTCbbk7Y9vC7Ojf4Y33xEBDc#https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ#http-01#no'
 [Tue Jul 19 21:48:04 PKT 2022] d
 [Tue Jul 19 21:48:04 PKT 2022] vlist='dragonosman.dynu.net#I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA.zKTHYw1pmWrdNdiD06pdTCbbk7Y9vC7Ojf4Y33xEBDc#https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ#http-01#no,'
 [Tue Jul 19 21:48:04 PKT 2022] d='dragonosman.dynu.net'
 [Tue Jul 19 21:48:04 PKT 2022] ok, let's start to verify
 [Tue Jul 19 21:48:04 PKT 2022] Verifying: dragonosman.dynu.net
 [Tue Jul 19 21:48:04 PKT 2022] d='dragonosman.dynu.net'
 [Tue Jul 19 21:48:04 PKT 2022] keyauthorization='I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA.zKTHYw1pmWrdNdiD06pdTCbbk7Y9vC7Ojf4Y33xEBDc'
 [Tue Jul 19 21:48:04 PKT 2022] uri='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:04 PKT 2022] _currentRoot='no'
 [Tue Jul 19 21:48:04 PKT 2022] Standalone mode server
 [Tue Jul 19 21:48:04 PKT 2022] content='I8jvHoY3WwFMGbywFCIZq2If5Ez2bxLG0KBC3lwzNtA.zKTHYw1pmWrdNdiD06pdTCbbk7Y9vC7Ojf4Y33xEBDc'
 [Tue Jul 19 21:48:04 PKT 2022] ncaddr
 [Tue Jul 19 21:48:04 PKT 2022] startserver: 5006
 [Tue Jul 19 21:48:04 PKT 2022] Le_HTTPPort='80'
 [Tue Jul 19 21:48:04 PKT 2022] Le_Listen_V4
 [Tue Jul 19 21:48:04 PKT 2022] Le_Listen_V6
 [Tue Jul 19 21:48:04 PKT 2022] _content_len='87'
 [Tue Jul 19 21:48:04 PKT 2022] _NC='socat TCP-LISTEN:80,crlf,reuseaddr,fork'
 [Tue Jul 19 21:48:05 PKT 2022] serverproc='5796'
 [Tue Jul 19 21:48:05 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:05 PKT 2022] payload='{}'
 [Tue Jul 19 21:48:05 PKT 2022] POST
 [Tue Jul 19 21:48:05 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:05 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:48:20 PKT 2022] _ret='0'
 [Tue Jul 19 21:48:20 PKT 2022] code='200'
 [Tue Jul 19 21:48:20 PKT 2022] trigger validation code: 200
 [Tue Jul 19 21:48:20 PKT 2022] Processing, The CA is processing your order, please just wait. (1/30)
 [Tue Jul 19 21:48:20 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:48:23 PKT 2022] checking
 [Tue Jul 19 21:48:23 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:23 PKT 2022] payload
 [Tue Jul 19 21:48:23 PKT 2022] POST
 [Tue Jul 19 21:48:23 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:23 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:48:37 PKT 2022] _ret='0'
 [Tue Jul 19 21:48:37 PKT 2022] code='200'
 [Tue Jul 19 21:48:37 PKT 2022] Processing, The CA is processing your order, please just wait. (2/30)
 [Tue Jul 19 21:48:37 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:48:40 PKT 2022] checking
 [Tue Jul 19 21:48:40 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:40 PKT 2022] payload
 [Tue Jul 19 21:48:40 PKT 2022] POST
 [Tue Jul 19 21:48:40 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:48:40 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:48:58 PKT 2022] _ret='0'
 [Tue Jul 19 21:48:58 PKT 2022] code='200'
 [Tue Jul 19 21:48:58 PKT 2022] Processing, The CA is processing your order, please just wait. (3/30)
 [Tue Jul 19 21:48:58 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:49:01 PKT 2022] checking
 [Tue Jul 19 21:49:01 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:01 PKT 2022] payload
 [Tue Jul 19 21:49:01 PKT 2022] POST
 [Tue Jul 19 21:49:01 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:01 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:49:15 PKT 2022] _ret='0'
 [Tue Jul 19 21:49:15 PKT 2022] code='200'
 [Tue Jul 19 21:49:15 PKT 2022] Processing, The CA is processing your order, please just wait. (4/30)
 [Tue Jul 19 21:49:15 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:49:18 PKT 2022] checking
 [Tue Jul 19 21:49:18 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:18 PKT 2022] payload
 [Tue Jul 19 21:49:18 PKT 2022] POST
 [Tue Jul 19 21:49:18 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:18 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:49:33 PKT 2022] _ret='0'
 [Tue Jul 19 21:49:33 PKT 2022] code='200'
 [Tue Jul 19 21:49:33 PKT 2022] Processing, The CA is processing your order, please just wait. (5/30)
 [Tue Jul 19 21:49:33 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:49:36 PKT 2022] checking
 [Tue Jul 19 21:49:36 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:36 PKT 2022] payload
 [Tue Jul 19 21:49:36 PKT 2022] POST
 [Tue Jul 19 21:49:36 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:36 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:49:56 PKT 2022] _ret='0'
 [Tue Jul 19 21:49:56 PKT 2022] code='200'
 [Tue Jul 19 21:49:56 PKT 2022] Processing, The CA is processing your order, please just wait. (6/30)
 [Tue Jul 19 21:49:56 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:49:59 PKT 2022] checking
 [Tue Jul 19 21:49:59 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:59 PKT 2022] payload
 [Tue Jul 19 21:49:59 PKT 2022] POST
 [Tue Jul 19 21:49:59 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:49:59 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:50:21 PKT 2022] _ret='0'
 [Tue Jul 19 21:50:21 PKT 2022] code='200'
 [Tue Jul 19 21:50:21 PKT 2022] Processing, The CA is processing your order, please just wait. (7/30)
 [Tue Jul 19 21:50:21 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:50:24 PKT 2022] checking
 [Tue Jul 19 21:50:24 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:50:24 PKT 2022] payload
 [Tue Jul 19 21:50:24 PKT 2022] POST
 [Tue Jul 19 21:50:24 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:50:24 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:50:42 PKT 2022] _ret='0'
 [Tue Jul 19 21:50:42 PKT 2022] code='200'
 [Tue Jul 19 21:50:42 PKT 2022] Processing, The CA is processing your order, please just wait. (8/30)
 [Tue Jul 19 21:50:42 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:50:45 PKT 2022] checking
 [Tue Jul 19 21:50:45 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:50:45 PKT 2022] payload
 [Tue Jul 19 21:50:45 PKT 2022] POST
 [Tue Jul 19 21:50:45 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:50:45 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:51:01 PKT 2022] _ret='0'
 [Tue Jul 19 21:51:01 PKT 2022] code='200'
 [Tue Jul 19 21:51:01 PKT 2022] Processing, The CA is processing your order, please just wait. (9/30)
 [Tue Jul 19 21:51:01 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:51:04 PKT 2022] checking
 [Tue Jul 19 21:51:04 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:04 PKT 2022] payload
 [Tue Jul 19 21:51:04 PKT 2022] POST
 [Tue Jul 19 21:51:04 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:04 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:51:18 PKT 2022] _ret='0'
 [Tue Jul 19 21:51:18 PKT 2022] code='200'
 [Tue Jul 19 21:51:18 PKT 2022] Processing, The CA is processing your order, please just wait. (10/30)
 [Tue Jul 19 21:51:18 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:51:21 PKT 2022] checking
 [Tue Jul 19 21:51:21 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:21 PKT 2022] payload
 [Tue Jul 19 21:51:21 PKT 2022] POST
 [Tue Jul 19 21:51:21 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:21 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:51:35 PKT 2022] _ret='0'
 [Tue Jul 19 21:51:35 PKT 2022] code='200'
 [Tue Jul 19 21:51:35 PKT 2022] Processing, The CA is processing your order, please just wait. (11/30)
 [Tue Jul 19 21:51:35 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:51:38 PKT 2022] checking
 [Tue Jul 19 21:51:38 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:38 PKT 2022] payload
 [Tue Jul 19 21:51:38 PKT 2022] POST
 [Tue Jul 19 21:51:38 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:51:38 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:51:57 PKT 2022] _ret='0'
 [Tue Jul 19 21:51:57 PKT 2022] code='200'
 [Tue Jul 19 21:51:57 PKT 2022] Processing, The CA is processing your order, please just wait. (12/30)
 [Tue Jul 19 21:51:57 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:52:00 PKT 2022] checking
 [Tue Jul 19 21:52:00 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:00 PKT 2022] payload
 [Tue Jul 19 21:52:00 PKT 2022] POST
 [Tue Jul 19 21:52:00 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:00 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:52:21 PKT 2022] _ret='0'
 [Tue Jul 19 21:52:21 PKT 2022] code='200'
 [Tue Jul 19 21:52:22 PKT 2022] Processing, The CA is processing your order, please just wait. (13/30)
 [Tue Jul 19 21:52:22 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:52:25 PKT 2022] checking
 [Tue Jul 19 21:52:25 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:25 PKT 2022] payload
 [Tue Jul 19 21:52:25 PKT 2022] POST
 [Tue Jul 19 21:52:25 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:25 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:52:44 PKT 2022] _ret='0'
 [Tue Jul 19 21:52:44 PKT 2022] code='200'
 [Tue Jul 19 21:52:44 PKT 2022] Processing, The CA is processing your order, please just wait. (14/30)
 [Tue Jul 19 21:52:44 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:52:47 PKT 2022] checking
 [Tue Jul 19 21:52:47 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:47 PKT 2022] payload
 [Tue Jul 19 21:52:47 PKT 2022] POST
 [Tue Jul 19 21:52:47 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:52:47 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:53:03 PKT 2022] _ret='0'
 [Tue Jul 19 21:53:03 PKT 2022] code='200'
 [Tue Jul 19 21:53:03 PKT 2022] Processing, The CA is processing your order, please just wait. (15/30)
 [Tue Jul 19 21:53:03 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:53:06 PKT 2022] checking
 [Tue Jul 19 21:53:06 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:06 PKT 2022] payload
 [Tue Jul 19 21:53:06 PKT 2022] POST
 [Tue Jul 19 21:53:06 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:06 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:53:23 PKT 2022] _ret='0'
 [Tue Jul 19 21:53:23 PKT 2022] code='200'
 [Tue Jul 19 21:53:23 PKT 2022] Processing, The CA is processing your order, please just wait. (16/30)
 [Tue Jul 19 21:53:23 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:53:26 PKT 2022] checking
 [Tue Jul 19 21:53:26 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:26 PKT 2022] payload
 [Tue Jul 19 21:53:26 PKT 2022] POST
 [Tue Jul 19 21:53:26 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:26 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:53:38 PKT 2022] _ret='0'
 [Tue Jul 19 21:53:38 PKT 2022] code='200'
 [Tue Jul 19 21:53:38 PKT 2022] Processing, The CA is processing your order, please just wait. (17/30)
 [Tue Jul 19 21:53:38 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:53:41 PKT 2022] checking
 [Tue Jul 19 21:53:41 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:41 PKT 2022] payload
 [Tue Jul 19 21:53:41 PKT 2022] POST
 [Tue Jul 19 21:53:41 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:41 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:53:55 PKT 2022] _ret='0'
 [Tue Jul 19 21:53:55 PKT 2022] code='200'
 [Tue Jul 19 21:53:55 PKT 2022] Processing, The CA is processing your order, please just wait. (18/30)
 [Tue Jul 19 21:53:55 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:53:58 PKT 2022] checking
 [Tue Jul 19 21:53:58 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:58 PKT 2022] payload
 [Tue Jul 19 21:53:58 PKT 2022] POST
 [Tue Jul 19 21:53:58 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:53:58 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:54:18 PKT 2022] _ret='0'
 [Tue Jul 19 21:54:18 PKT 2022] code='200'
 [Tue Jul 19 21:54:18 PKT 2022] Processing, The CA is processing your order, please just wait. (19/30)
 [Tue Jul 19 21:54:18 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:54:21 PKT 2022] checking
 [Tue Jul 19 21:54:21 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:54:21 PKT 2022] payload
 [Tue Jul 19 21:54:21 PKT 2022] POST
 [Tue Jul 19 21:54:21 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:54:21 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:54:45 PKT 2022] _ret='0'
 [Tue Jul 19 21:54:45 PKT 2022] code='200'
 [Tue Jul 19 21:54:45 PKT 2022] Processing, The CA is processing your order, please just wait. (20/30)
 [Tue Jul 19 21:54:45 PKT 2022] sleep 2 secs to verify again
 [Tue Jul 19 21:54:48 PKT 2022] checking
 [Tue Jul 19 21:54:48 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:54:48 PKT 2022] payload
 [Tue Jul 19 21:54:48 PKT 2022] POST
 [Tue Jul 19 21:54:48 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:54:48 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:55:19 PKT 2022] _ret='0'
 [Tue Jul 19 21:55:19 PKT 2022] code='500'
 [Tue Jul 19 21:55:19 PKT 2022] dragonosman.dynu.net:Verify error:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>500 Internal Server Error</title></head><body><h1>Internal Server Error</h1><p>The server encountered an internal error ormisconfiguration and was unable to completeyour request.</p><p>Please contact the server administrator at [no address given] to inform them of the time this error occurred,and the actions you performed just before this error.</p><p>More information about this error may be availablein the server error log.</p><hr><address>Apache Server at acme.zerossl.com Port 443</address></body></html>
 [Tue Jul 19 21:55:19 PKT 2022] Skip for removelevel:
 [Tue Jul 19 21:55:19 PKT 2022] pid='5796'
 [Tue Jul 19 21:55:19 PKT 2022] No need to restore nginx, skip.
 [Tue Jul 19 21:55:19 PKT 2022] _clearupdns
 [Tue Jul 19 21:55:19 PKT 2022] dns_entries
 [Tue Jul 19 21:55:19 PKT 2022] skip dns.
 [Tue Jul 19 21:55:19 PKT 2022] _on_issue_err
 [Tue Jul 19 21:55:19 PKT 2022] Please add '--debug' or '--log' to check more details.
 [Tue Jul 19 21:55:19 PKT 2022] See: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh
 [Tue Jul 19 21:55:19 PKT 2022] url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:55:19 PKT 2022] payload='{}'
 [Tue Jul 19 21:55:19 PKT 2022] HEAD
 [Tue Jul 19 21:55:19 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/newNonce'
 [Tue Jul 19 21:55:19 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -I  '
 [Tue Jul 19 21:55:20 PKT 2022] _ret='0'
 [Tue Jul 19 21:55:20 PKT 2022] GET
 [Tue Jul 19 21:55:20 PKT 2022] url='https://acme.zerossl.com/v2/DV90'
 [Tue Jul 19 21:55:20 PKT 2022] timeout=
 [Tue Jul 19 21:55:20 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:55:21 PKT 2022] ret='0'
 [Tue Jul 19 21:55:21 PKT 2022] GET
 [Tue Jul 19 21:55:21 PKT 2022] url='https://acme.zerossl.com/v2/DV90/newNonce'
 [Tue Jul 19 21:55:21 PKT 2022] timeout=
 [Tue Jul 19 21:55:21 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:55:22 PKT 2022] ret='0'
 [Tue Jul 19 21:55:22 PKT 2022] Could not get nonce, let's try again.
 [Tue Jul 19 21:55:25 PKT 2022] HEAD
 [Tue Jul 19 21:55:25 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/newNonce'
 [Tue Jul 19 21:55:25 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -I  '
 [Tue Jul 19 21:55:45 PKT 2022] _ret='0'
 [Tue Jul 19 21:55:45 PKT 2022] POST
 [Tue Jul 19 21:55:45 PKT 2022] _post_url='https://acme.zerossl.com/v2/DV90/chall/wpVfu6cZZjtJ-NI9Tm29uQ'
 [Tue Jul 19 21:55:45 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
 [Tue Jul 19 21:56:01 PKT 2022] _ret='0'
 [Tue Jul 19 21:56:01 PKT 2022] code='200'
 [Tue Jul 19 21:56:02 PKT 2022] Diagnosis versions:
 openssl:openssl
 OpenSSL 3.0.2 15 Mar 2022 (Library: OpenSSL 3.0.2 15 Mar 2022)
 apache:
 apache doesn't exist.
 nginx:
 nginx doesn't exist.
 socat:
 socat by Gerhard Rieger and contributors - see www.dest-unreach.org
 socat version 1.7.4.1 on Mar 25 2022 09:51:32
    running on Linux version #1 SMP Fri Apr 2 22:23:49 UTC 2021, release 5.10.16.3-microsoft-standard-WSL2, machine x86_64
 features:
   #define WITH_STDIO 1
   #define WITH_FDNUM 1
   #define WITH_FILE 1
   #define WITH_CREAT 1
   #define WITH_GOPEN 1
   #define WITH_TERMIOS 1
   #define WITH_PIPE 1
   #define WITH_UNIX 1
   #define WITH_ABSTRACT_UNIXSOCKET 1
   #define WITH_IP4 1
   #define WITH_IP6 1
   #define WITH_RAWIP 1
   #define WITH_GENERICSOCKET 1
   #define WITH_INTERFACE 1
   #define WITH_TCP 1
   #define WITH_UDP 1
   #define WITH_SCTP 1
   #define WITH_LISTEN 1
   #define WITH_SOCKS4 1
   #define WITH_SOCKS4A 1
   #define WITH_VSOCK 1
   #define WITH_PROXY 1
   #define WITH_SYSTEM 1
   #define WITH_EXEC 1
   #undef WITH_READLINE
   #define WITH_TUN 1
   #define WITH_PTY 1
   #define WITH_OPENSSL 1
   #undef WITH_FIPS
   #define WITH_LIBWRAP 1
   #define WITH_SYCLS 1
   #define WITH_FILAN 1
   #define WITH_RETRY 1
   #define WITH_MSGLEVEL 0 /*debug*/

Any help with this appreciated. What do I need to do here?

That's not Let's Encrypt, but ZeroSSL. While we're generally happy to help with general client questions, we do not really support other CA's here.

You can however configure which CA acme.sh uses. You can do this on a per-certificate basis via the --server argument, or by changing the default CA.

acme.sh --set-default-ca --server letsencrypt
4 Likes

Yeah, I don't know why it used ZeroSSL instead of Let's Encrypt. So I can change it to Let's Encrypt by using the option you gave me there? I'll try it and get back to you. Thanks.

2 Likes

They snuck that in on one of their updates.
[somewhere in the fine print]

4 Likes

So they did.

Anyway, here's what I got now:
./acme.sh --set-default-ca --server letsencrypt

[Tue Jul 19 22:41:39 PKT 2022] Changed default CA to: https://acme-v02.api.letsencrypt.org/directory
root@Osman-PC:/mnt/c/Users/Osman/acme.sh# ./acme.sh --issue --standalone -d dragonosman.dynu.net --debug
[Tue Jul 19 22:42:04 PKT 2022] Lets find script dir.
[Tue Jul 19 22:42:04 PKT 2022] _SCRIPT_='./acme.sh'
[Tue Jul 19 22:42:04 PKT 2022] _script='/mnt/c/Users/Osman/acme.sh/acme.sh'
[Tue Jul 19 22:42:04 PKT 2022] _script_home='/mnt/c/Users/Osman/acme.sh'
[Tue Jul 19 22:42:04 PKT 2022] Using default home:/root/.acme.sh
[Tue Jul 19 22:42:04 PKT 2022] Using config home:/root/.acme.sh
https://github.com/acmesh-official/acme.sh
v3.0.5
[Tue Jul 19 22:42:04 PKT 2022] Running cmd: issue
[Tue Jul 19 22:42:04 PKT 2022] _main_domain='dragonosman.dynu.net'
[Tue Jul 19 22:42:04 PKT 2022] _alt_domains='no'
[Tue Jul 19 22:42:04 PKT 2022] Using config home:/root/.acme.sh
[Tue Jul 19 22:42:04 PKT 2022] default_acme_server='https://acme-v02.api.letsencrypt.org/directory'
[Tue Jul 19 22:42:04 PKT 2022] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory'
[Tue Jul 19 22:42:04 PKT 2022] DOMAIN_PATH='/root/.acme.sh/dragonosman.dynu.net'
[Tue Jul 19 22:42:04 PKT 2022] Le_NextRenewTime
[Tue Jul 19 22:42:04 PKT 2022] Using ACME_DIRECTORY: https://acme-v02.api.letsencrypt.org/directory
[Tue Jul 19 22:42:04 PKT 2022] _init api for server: https://acme-v02.api.letsencrypt.org/directory
[Tue Jul 19 22:42:04 PKT 2022] GET
[Tue Jul 19 22:42:04 PKT 2022] url='https://acme-v02.api.letsencrypt.org/directory'
[Tue Jul 19 22:42:04 PKT 2022] timeout=
[Tue Jul 19 22:42:05 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:07 PKT 2022] ret='0'
[Tue Jul 19 22:42:07 PKT 2022] ACME_KEY_CHANGE='https://acme-v02.api.letsencrypt.org/acme/key-change'
[Tue Jul 19 22:42:07 PKT 2022] ACME_NEW_AUTHZ
[Tue Jul 19 22:42:07 PKT 2022] ACME_NEW_ORDER='https://acme-v02.api.letsencrypt.org/acme/new-order'
[Tue Jul 19 22:42:07 PKT 2022] ACME_NEW_ACCOUNT='https://acme-v02.api.letsencrypt.org/acme/new-acct'
[Tue Jul 19 22:42:07 PKT 2022] ACME_REVOKE_CERT='https://acme-v02.api.letsencrypt.org/acme/revoke-cert'
[Tue Jul 19 22:42:07 PKT 2022] ACME_AGREEMENT='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'
[Tue Jul 19 22:42:07 PKT 2022] ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce'
[Tue Jul 19 22:42:07 PKT 2022] Using CA: https://acme-v02.api.letsencrypt.org/directory
[Tue Jul 19 22:42:07 PKT 2022] _on_before_issue
[Tue Jul 19 22:42:07 PKT 2022] _chk_main_domain='dragonosman.dynu.net'
[Tue Jul 19 22:42:07 PKT 2022] _chk_alt_domains
[Tue Jul 19 22:42:07 PKT 2022] Le_LocalAddress
[Tue Jul 19 22:42:07 PKT 2022] d='dragonosman.dynu.net'
[Tue Jul 19 22:42:07 PKT 2022] Check for domain='dragonosman.dynu.net'
[Tue Jul 19 22:42:07 PKT 2022] _currentRoot='no'
[Tue Jul 19 22:42:07 PKT 2022] Standalone mode.
[Tue Jul 19 22:42:07 PKT 2022] _checkport='80'
[Tue Jul 19 22:42:07 PKT 2022] _checkaddr
[Tue Jul 19 22:42:07 PKT 2022] Using: ss
[Tue Jul 19 22:42:07 PKT 2022] d
[Tue Jul 19 22:42:07 PKT 2022] config file is empty, can not read CA_KEY_HASH
[Tue Jul 19 22:42:07 PKT 2022] Using config home:/root/.acme.sh
[Tue Jul 19 22:42:07 PKT 2022] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory'
[Tue Jul 19 22:42:07 PKT 2022] _init api for server: https://acme-v02.api.letsencrypt.org/directory
[Tue Jul 19 22:42:07 PKT 2022] RSA key
[Tue Jul 19 22:42:07 PKT 2022] config file is empty, can not read CA_EAB_KEY_ID
[Tue Jul 19 22:42:07 PKT 2022] config file is empty, can not read CA_EAB_HMAC_KEY
[Tue Jul 19 22:42:07 PKT 2022] config file is empty, can not read CA_EMAIL
[Tue Jul 19 22:42:07 PKT 2022] Registering account: https://acme-v02.api.letsencrypt.org/directory
[Tue Jul 19 22:42:07 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/new-acct'
[Tue Jul 19 22:42:07 PKT 2022] payload='{"termsOfServiceAgreed": true}'
[Tue Jul 19 22:42:07 PKT 2022] HEAD
[Tue Jul 19 22:42:07 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-nonce'
[Tue Jul 19 22:42:07 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -I  '
[Tue Jul 19 22:42:08 PKT 2022] _ret='0'
[Tue Jul 19 22:42:08 PKT 2022] POST
[Tue Jul 19 22:42:08 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-acct'
[Tue Jul 19 22:42:08 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:10 PKT 2022] _ret='0'
[Tue Jul 19 22:42:10 PKT 2022] code='201'
[Tue Jul 19 22:42:10 PKT 2022] Registered
[Tue Jul 19 22:42:10 PKT 2022] _accUri='https://acme-v02.api.letsencrypt.org/acme/acct/638242746'
[Tue Jul 19 22:42:10 PKT 2022] Calc CA_KEY_HASH='nbeMmIFWDFD7/4fIa3IrhItIsvW/4i47Ssim1J+L+kU='
[Tue Jul 19 22:42:10 PKT 2022] ACCOUNT_THUMBPRINT='9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4'
[Tue Jul 19 22:42:10 PKT 2022] Read key length:2048
[Tue Jul 19 22:42:10 PKT 2022] _createcsr
[Tue Jul 19 22:42:10 PKT 2022] Single domain='dragonosman.dynu.net'
[Tue Jul 19 22:42:10 PKT 2022] Getting domain auth token for each domain
[Tue Jul 19 22:42:10 PKT 2022] d
[Tue Jul 19 22:42:10 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/new-order'
[Tue Jul 19 22:42:10 PKT 2022] payload='{"identifiers": [{"type":"dns","value":"dragonosman.dynu.net"}]}'
[Tue Jul 19 22:42:10 PKT 2022] POST
[Tue Jul 19 22:42:10 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-order'
[Tue Jul 19 22:42:10 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:11 PKT 2022] _ret='0'
[Tue Jul 19 22:42:11 PKT 2022] code='201'
[Tue Jul 19 22:42:11 PKT 2022] Le_LinkOrder='https://acme-v02.api.letsencrypt.org/acme/order/638242746/108253488596'
[Tue Jul 19 22:42:11 PKT 2022] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/638242746/108253488596'
[Tue Jul 19 22:42:11 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/132399006056'
[Tue Jul 19 22:42:11 PKT 2022] payload
[Tue Jul 19 22:42:11 PKT 2022] POST
[Tue Jul 19 22:42:11 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/132399006056'
[Tue Jul 19 22:42:11 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:12 PKT 2022] _ret='0'
[Tue Jul 19 22:42:12 PKT 2022] code='200'
[Tue Jul 19 22:42:12 PKT 2022] d='dragonosman.dynu.net'
[Tue Jul 19 22:42:12 PKT 2022] Getting webroot for domain='dragonosman.dynu.net'
[Tue Jul 19 22:42:12 PKT 2022] _w='no'
[Tue Jul 19 22:42:12 PKT 2022] _currentRoot='no'
[Tue Jul 19 22:42:12 PKT 2022] entry='"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ","token":"ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M"'
[Tue Jul 19 22:42:12 PKT 2022] token='ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M'
[Tue Jul 19 22:42:12 PKT 2022] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:12 PKT 2022] keyauthorization='ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M.9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4'
[Tue Jul 19 22:42:12 PKT 2022] dvlist='dragonosman.dynu.net#ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M.9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4#https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ#http-01#no'
[Tue Jul 19 22:42:12 PKT 2022] d
[Tue Jul 19 22:42:12 PKT 2022] vlist='dragonosman.dynu.net#ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M.9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4#https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ#http-01#no,'
[Tue Jul 19 22:42:12 PKT 2022] d='dragonosman.dynu.net'
[Tue Jul 19 22:42:12 PKT 2022] ok, let's start to verify
[Tue Jul 19 22:42:12 PKT 2022] Verifying: dragonosman.dynu.net
[Tue Jul 19 22:42:12 PKT 2022] d='dragonosman.dynu.net'
[Tue Jul 19 22:42:12 PKT 2022] keyauthorization='ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M.9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4'
[Tue Jul 19 22:42:12 PKT 2022] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:12 PKT 2022] _currentRoot='no'
[Tue Jul 19 22:42:12 PKT 2022] Standalone mode server
[Tue Jul 19 22:42:12 PKT 2022] content='ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M.9RhLXZmI9gqyONrvwx3W5iwJc7rQ-70VtJ-nfkOQib4'
[Tue Jul 19 22:42:12 PKT 2022] ncaddr
[Tue Jul 19 22:42:12 PKT 2022] startserver: 70
[Tue Jul 19 22:42:12 PKT 2022] Le_HTTPPort='80'
[Tue Jul 19 22:42:12 PKT 2022] Le_Listen_V4
[Tue Jul 19 22:42:12 PKT 2022] Le_Listen_V6
[Tue Jul 19 22:42:12 PKT 2022] _content_len='87'
[Tue Jul 19 22:42:12 PKT 2022] _NC='socat TCP-LISTEN:80,crlf,reuseaddr,fork'
[Tue Jul 19 22:42:13 PKT 2022] serverproc='1006'
[Tue Jul 19 22:42:13 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:13 PKT 2022] payload='{}'
[Tue Jul 19 22:42:13 PKT 2022] POST
[Tue Jul 19 22:42:13 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:13 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:14 PKT 2022] _ret='0'
[Tue Jul 19 22:42:14 PKT 2022] code='200'
[Tue Jul 19 22:42:14 PKT 2022] trigger validation code: 200
[Tue Jul 19 22:42:14 PKT 2022] Pending, The CA is processing your order, please just wait. (1/30)
[Tue Jul 19 22:42:14 PKT 2022] sleep 2 secs to verify again
[Tue Jul 19 22:42:17 PKT 2022] checking
[Tue Jul 19 22:42:17 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:17 PKT 2022] payload
[Tue Jul 19 22:42:17 PKT 2022] POST
[Tue Jul 19 22:42:17 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:17 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:18 PKT 2022] _ret='0'
[Tue Jul 19 22:42:18 PKT 2022] code='200'
[Tue Jul 19 22:42:18 PKT 2022] Pending, The CA is processing your order, please just wait. (2/30)
[Tue Jul 19 22:42:18 PKT 2022] sleep 2 secs to verify again
[Tue Jul 19 22:42:21 PKT 2022] checking
[Tue Jul 19 22:42:21 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:21 PKT 2022] payload
[Tue Jul 19 22:42:21 PKT 2022] POST
[Tue Jul 19 22:42:21 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:21 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:22 PKT 2022] _ret='0'
[Tue Jul 19 22:42:22 PKT 2022] code='200'
[Tue Jul 19 22:42:22 PKT 2022] Pending, The CA is processing your order, please just wait. (3/30)
[Tue Jul 19 22:42:22 PKT 2022] sleep 2 secs to verify again
[Tue Jul 19 22:42:25 PKT 2022] checking
[Tue Jul 19 22:42:25 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:25 PKT 2022] payload
[Tue Jul 19 22:42:26 PKT 2022] POST
[Tue Jul 19 22:42:26 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:26 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:27 PKT 2022] _ret='0'
[Tue Jul 19 22:42:27 PKT 2022] code='200'
[Tue Jul 19 22:42:27 PKT 2022] dragonosman.dynu.net:Verify error:39.48.202.121: Fetching http://dragonosman.dynu.net/.well-known/acme-challenge/ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M: Timeout during connect (likely firewall problem)
[Tue Jul 19 22:42:27 PKT 2022] Debug: get token url.
[Tue Jul 19 22:42:27 PKT 2022] GET
[Tue Jul 19 22:42:27 PKT 2022] url='http://dragonosman.dynu.net/.well-known/acme-challenge/ktJanzjrVeTDiIl-eHAw7VMCqVVcZvLvtK7OUH1S-6M'
[Tue Jul 19 22:42:27 PKT 2022] timeout=1
[Tue Jul 19 22:42:27 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  --connect-timeout 1'
[Tue Jul 19 22:42:27 PKT 2022] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 7
[Tue Jul 19 22:42:27 PKT 2022] ret='7'
[Tue Jul 19 22:42:27 PKT 2022] Skip for removelevel:
[Tue Jul 19 22:42:27 PKT 2022] pid='1006'
[Tue Jul 19 22:42:27 PKT 2022] No need to restore nginx, skip.
[Tue Jul 19 22:42:27 PKT 2022] _clearupdns
[Tue Jul 19 22:42:27 PKT 2022] dns_entries
[Tue Jul 19 22:42:27 PKT 2022] skip dns.
[Tue Jul 19 22:42:27 PKT 2022] _on_issue_err
[Tue Jul 19 22:42:27 PKT 2022] Please add '--debug' or '--log' to check more details.
[Tue Jul 19 22:42:27 PKT 2022] See: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh
[Tue Jul 19 22:42:27 PKT 2022] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:27 PKT 2022] payload='{}'
[Tue Jul 19 22:42:27 PKT 2022] POST
[Tue Jul 19 22:42:27 PKT 2022] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/132399006056/i_DkzQ'
[Tue Jul 19 22:42:27 PKT 2022] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L '
[Tue Jul 19 22:42:28 PKT 2022] _ret='0'
[Tue Jul 19 22:42:28 PKT 2022] code='400'
[Tue Jul 19 22:42:28 PKT 2022] Diagnosis versions:
openssl:openssl
OpenSSL 3.0.2 15 Mar 2022 (Library: OpenSSL 3.0.2 15 Mar 2022)
apache:
apache doesn't exist.
nginx:
nginx doesn't exist.
socat:
socat by Gerhard Rieger and contributors - see www.dest-unreach.org
socat version 1.7.4.1 on Mar 25 2022 09:51:32
   running on Linux version #1 SMP Fri Apr 2 22:23:49 UTC 2021, release 5.10.16.3-microsoft-standard-WSL2, machine x86_64
features:
  #define WITH_STDIO 1
  #define WITH_FDNUM 1
  #define WITH_FILE 1
  #define WITH_CREAT 1
  #define WITH_GOPEN 1
  #define WITH_TERMIOS 1
  #define WITH_PIPE 1
  #define WITH_UNIX 1
  #define WITH_ABSTRACT_UNIXSOCKET 1
  #define WITH_IP4 1
  #define WITH_IP6 1
  #define WITH_RAWIP 1
  #define WITH_GENERICSOCKET 1
  #define WITH_INTERFACE 1
  #define WITH_TCP 1
  #define WITH_UDP 1
  #define WITH_SCTP 1
  #define WITH_LISTEN 1
  #define WITH_SOCKS4 1
  #define WITH_SOCKS4A 1
  #define WITH_VSOCK 1
  #define WITH_PROXY 1
  #define WITH_SYSTEM 1
  #define WITH_EXEC 1
  #undef WITH_READLINE
  #define WITH_TUN 1
  #define WITH_PTY 1
  #define WITH_OPENSSL 1
  #undef WITH_FIPS
  #define WITH_LIBWRAP 1
  #define WITH_SYCLS 1
  #define WITH_FILAN 1
  #define WITH_RETRY 1
  #define WITH_MSGLEVEL 0 /*debug*/

So what do you think seems to be the issue here?

Is there some kind of inline HTTPS inspection device?

4 Likes