root@pc01:/etc/nginx/ssl/ggc.world# acme.sh --issue -w /var/www/ggc.world/ -d www.ggc.world -d ggc.world --force --debug 2 [lun 10 feb 2020, 20.25.45, CET] Lets find script dir. [lun 10 feb 2020, 20.25.45, CET] _SCRIPT_='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 20.25.45, CET] _script='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 20.25.45, CET] _script_home='/root/.acme.sh' [lun 10 feb 2020, 20.25.45, CET] Using config home:/home/marco/webMatters/acme.sh/data [lun 10 feb 2020, 20.25.45, CET] LE_WORKING_DIR='/root/.acme.sh' https://github.com/acmesh-official/acme.sh v2.8.6 [lun 10 feb 2020, 20.25.45, CET] Running cmd: issue [lun 10 feb 2020, 20.25.45, CET] _main_domain='www.ggc.world' [lun 10 feb 2020, 20.25.45, CET] _alt_domains='ggc.world' [lun 10 feb 2020, 20.25.45, CET] Using config home:/home/marco/webMatters/acme.sh/data [lun 10 feb 2020, 20.25.45, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 20.25.45, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 20.25.45, CET] DOMAIN_PATH='/home/marco/webMatters/acme.sh/data/www.ggc.world' [lun 10 feb 2020, 20.25.45, CET] '/var/www/ggc.world/' does not contain 'dns' [lun 10 feb 2020, 20.25.45, CET] Using ACME_DIRECTORY: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 20.25.45, CET] _init api for server: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 20.25.45, CET] GET [lun 10 feb 2020, 20.25.45, CET] url='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 20.25.45, CET] timeout= [lun 10 feb 2020, 20.25.45, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.4EA4Izhqnc -g ' [lun 10 feb 2020, 20.25.46, CET] ret='0' [lun 10 feb 2020, 20.25.46, CET] response='{ "GP7Pimxr91w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" }' [lun 10 feb 2020, 20.25.46, CET] ACME_KEY_CHANGE='https://acme-v02.api.letsencrypt.org/acme/key-change' [lun 10 feb 2020, 20.25.46, CET] ACME_NEW_AUTHZ [lun 10 feb 2020, 20.25.46, CET] ACME_NEW_ORDER='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 20.25.46, CET] ACME_NEW_ACCOUNT='https://acme-v02.api.letsencrypt.org/acme/new-acct' [lun 10 feb 2020, 20.25.46, CET] ACME_REVOKE_CERT='https://acme-v02.api.letsencrypt.org/acme/revoke-cert' [lun 10 feb 2020, 20.25.46, CET] ACME_AGREEMENT='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf' [lun 10 feb 2020, 20.25.46, CET] ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 20.25.46, CET] ACME_VERSION='2' [lun 10 feb 2020, 20.25.46, CET] _on_before_issue [lun 10 feb 2020, 20.25.46, CET] _chk_main_domain='www.ggc.world' [lun 10 feb 2020, 20.25.46, CET] _chk_alt_domains='ggc.world' [lun 10 feb 2020, 20.25.46, CET] '/var/www/ggc.world/' does not contain 'no' [lun 10 feb 2020, 20.25.46, CET] Le_LocalAddress [lun 10 feb 2020, 20.25.46, CET] d='www.ggc.world' [lun 10 feb 2020, 20.25.46, CET] Check for domain='www.ggc.world' [lun 10 feb 2020, 20.25.46, CET] _currentRoot='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.46, CET] d='ggc.world' [lun 10 feb 2020, 20.25.46, CET] Check for domain='ggc.world' [lun 10 feb 2020, 20.25.46, CET] _currentRoot='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.46, CET] d [lun 10 feb 2020, 20.25.46, CET] '/var/www/ggc.world/' does not contain 'apache' [lun 10 feb 2020, 20.25.46, CET] config file is empty, can not read CA_KEY_HASH [lun 10 feb 2020, 20.25.46, CET] _saved_account_key_hash [lun 10 feb 2020, 20.25.46, CET] Using config home:/home/marco/webMatters/acme.sh/data [lun 10 feb 2020, 20.25.46, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 20.25.46, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 20.25.46, CET] _init api for server: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 20.25.46, CET] Use default length 2048 [lun 10 feb 2020, 20.25.46, CET] length='2048' [lun 10 feb 2020, 20.25.46, CET] Using config home:/home/marco/webMatters/acme.sh/data [lun 10 feb 2020, 20.25.46, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 20.25.46, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 20.25.46, CET] _createkey for file:/home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.46, CET] Use length 2048 [lun 10 feb 2020, 20.25.46, CET] Using RSA: 2048 [lun 10 feb 2020, 20.25.46, CET] Create account key ok. [lun 10 feb 2020, 20.25.46, CET] RSA key [lun 10 feb 2020, 20.25.46, CET] Registering account [lun 10 feb 2020, 20.25.46, CET] url='https://acme-v02.api.letsencrypt.org/acme/new-acct' [lun 10 feb 2020, 20.25.46, CET] payload='{"termsOfServiceAgreed": true}' [lun 10 feb 2020, 20.25.46, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.46, CET] Get nonce with HEAD. ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 20.25.46, CET] HEAD [lun 10 feb 2020, 20.25.46, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 20.25.46, CET] body [lun 10 feb 2020, 20.25.46, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.46, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g -I ' [lun 10 feb 2020, 20.25.47, CET] _ret='0' [lun 10 feb 2020, 20.25.47, CET] _headers='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:47 GMT cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0002CUfBb7M0fp8ZNCPoiCqXmjUURFLRLggSKidXjrj4LhI x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.47, CET] _CACHED_NONCE='0002CUfBb7M0fp8ZNCPoiCqXmjUURFLRLggSKidXjrj4LhI' [lun 10 feb 2020, 20.25.47, CET] nonce='0002CUfBb7M0fp8ZNCPoiCqXmjUURFLRLggSKidXjrj4LhI' [lun 10 feb 2020, 20.25.47, CET] POST [lun 10 feb 2020, 20.25.47, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-acct' [lun 10 feb 2020, 20.25.47, CET] body='{"protected": "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", "payload": "eyJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWV9", "signature": "YqdkRf57QYWEwNI3AyBRQifDaK4Mgidu_5WMAczOYKK3C98uW34lNe_wGNN-2NRMRzzQbNv3TRxMWBGvWv1kfiRMa0e3MaWsG1OAYGeaIEOFu_kDOow-di6xP38I2DKlMy5v7AOUlHojluzY8A-2yyeSv3o5ylAmN5O3vutJnZjbRk_5069pxiiBJ5PSL_Xg0dcZ5-nWs44ehoLAXaS5qfLWtse0-jF-zrb7Tw06Ejivo1IJvzWiY8UvVFb2GGq-mVeH6aJtyGuEoHpvPfGpdYprJDJWqfqGriZrp0k-tJwK6gOjkFoeM8-Y30QaXd2fQVqjriY_A6UyVNcn1m192Q"}' [lun 10 feb 2020, 20.25.47, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.47, CET] Http already initialized. [lun 10 feb 2020, 20.25.47, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.48, CET] _ret='0' [lun 10 feb 2020, 20.25.48, CET] responseHeaders='HTTP/2 201 server: nginx date: Mon, 10 Feb 2020 19:25:48 GMT content-type: application/json content-length: 523 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="terms-of-service" location: https://acme-v02.api.letsencrypt.org/acme/acct/77844847 replay-nonce: 00015NOguvHO_NjBb97gHxvrik4n11J7xPDoOg38oVAm9ZQ x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.48, CET] code='201' [lun 10 feb 2020, 20.25.48, CET] original='{ "key": { "kty": "RSA", "n": "vv9kFmUCpF03NhAkkxTSHyvcke09rxgI9ST-0U0nITvYL5hCEwSLUsZ9wtDgmookbrN6mUC9x4V0xpmaIt_RPsPAfJxkYkYxsZiWxWxrEVK_bHFrTLbbh1VEJqxzbaIgEMLYOOJxG3wbVaoV9smuwv4oB6-YdER-SN2PfZJbyv-Ewh_vqdaGQRuO6Rm804SohvqYS4nDpKgQW20bS7nbXh8z6V4N08SO2d90WP2Cnnxvm4kfTm6KRiFlNZXwcLditseb2sQ3u7dkX9cxxsl2M4oba7gjUfhrFkymrL4ZY6pXU99I7KSLAPaxcdHmeklIwa02SQI5uxUqelt8MzGPcw", "e": "AQAB" }, "contact": [], "initialIp": "2.36.58.214", "createdAt": "2020-02-10T19:25:48.06119998Z", "status": "valid" }' [lun 10 feb 2020, 20.25.48, CET] response='{"key":{"kty":"RSA","n":"vv9kFmUCpF03NhAkkxTSHyvcke09rxgI9ST-0U0nITvYL5hCEwSLUsZ9wtDgmookbrN6mUC9x4V0xpmaIt_RPsPAfJxkYkYxsZiWxWxrEVK_bHFrTLbbh1VEJqxzbaIgEMLYOOJxG3wbVaoV9smuwv4oB6-YdER-SN2PfZJbyv-Ewh_vqdaGQRuO6Rm804SohvqYS4nDpKgQW20bS7nbXh8z6V4N08SO2d90WP2Cnnxvm4kfTm6KRiFlNZXwcLditseb2sQ3u7dkX9cxxsl2M4oba7gjUfhrFkymrL4ZY6pXU99I7KSLAPaxcdHmeklIwa02SQI5uxUqelt8MzGPcw","e":"AQAB"},"contact":[],"initialIp":"2.36.58.214","createdAt":"2020-02-10T19:25:48.06119998Z","status":"valid"}' [lun 10 feb 2020, 20.25.48, CET] Registered [lun 10 feb 2020, 20.25.48, CET] responseHeaders='HTTP/2 201 server: nginx date: Mon, 10 Feb 2020 19:25:48 GMT content-type: application/json content-length: 523 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="terms-of-service" location: https://acme-v02.api.letsencrypt.org/acme/acct/77844847 replay-nonce: 00015NOguvHO_NjBb97gHxvrik4n11J7xPDoOg38oVAm9ZQ x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.48, CET] _accUri='https://acme-v02.api.letsencrypt.org/acme/acct/77844847' [lun 10 feb 2020, 20.25.48, CET] Calc CA_KEY_HASH='uX7CSpvfBkvAxaRJUWgp612i7mgQLVlCEgjqdaVxkIA=' [lun 10 feb 2020, 20.25.48, CET] ACCOUNT_THUMBPRINT='zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.48, CET] Read key length: [lun 10 feb 2020, 20.25.48, CET] Creating domain key [lun 10 feb 2020, 20.25.48, CET] Use DEFAULT_DOMAIN_KEY_LENGTH=2048 [lun 10 feb 2020, 20.25.48, CET] Using config home:/home/marco/webMatters/acme.sh/data [lun 10 feb 2020, 20.25.48, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 20.25.48, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 20.25.48, CET] _createkey for file:/home/marco/webMatters/acme.sh/data/www.ggc.world/www.ggc.world.key [lun 10 feb 2020, 20.25.48, CET] Use length 2048 [lun 10 feb 2020, 20.25.48, CET] Using RSA: 2048 [lun 10 feb 2020, 20.25.48, CET] The domain key is here: /home/marco/webMatters/acme.sh/data/www.ggc.world/www.ggc.world.key [lun 10 feb 2020, 20.25.48, CET] _createcsr [lun 10 feb 2020, 20.25.48, CET] domain='www.ggc.world' [lun 10 feb 2020, 20.25.48, CET] domainlist='ggc.world' [lun 10 feb 2020, 20.25.48, CET] csrkey='/home/marco/webMatters/acme.sh/data/www.ggc.world/www.ggc.world.key' [lun 10 feb 2020, 20.25.48, CET] csr='/home/marco/webMatters/acme.sh/data/www.ggc.world/www.ggc.world.csr' [lun 10 feb 2020, 20.25.48, CET] csrconf='/home/marco/webMatters/acme.sh/data/www.ggc.world/www.ggc.world.csr.conf' [lun 10 feb 2020, 20.25.48, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 20.25.48, CET] _idn_temp [lun 10 feb 2020, 20.25.48, CET] domainlist='ggc.world' [lun 10 feb 2020, 20.25.48, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 20.25.48, CET] _idn_temp [lun 10 feb 2020, 20.25.48, CET] Multi domain='DNS:www.ggc.world,DNS:ggc.world' [lun 10 feb 2020, 20.25.48, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 20.25.48, CET] _idn_temp [lun 10 feb 2020, 20.25.48, CET] _csr_cn='www.ggc.world' [lun 10 feb 2020, 20.25.48, CET] Getting domain auth token for each domain [lun 10 feb 2020, 20.25.48, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 20.25.48, CET] _idn_temp [lun 10 feb 2020, 20.25.48, CET] d='ggc.world' [lun 10 feb 2020, 20.25.48, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 20.25.48, CET] _idn_temp [lun 10 feb 2020, 20.25.48, CET] d [lun 10 feb 2020, 20.25.48, CET] _identifiers='{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}' [lun 10 feb 2020, 20.25.48, CET] url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 20.25.48, CET] payload='{"identifiers": [{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}]}' [lun 10 feb 2020, 20.25.48, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.48, CET] Use _CACHED_NONCE='00015NOguvHO_NjBb97gHxvrik4n11J7xPDoOg38oVAm9ZQ' [lun 10 feb 2020, 20.25.48, CET] nonce='00015NOguvHO_NjBb97gHxvrik4n11J7xPDoOg38oVAm9ZQ' [lun 10 feb 2020, 20.25.48, CET] POST [lun 10 feb 2020, 20.25.48, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 20.25.48, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxNU5PZ3V2SE9fTmpCYjk3Z0h4dnJpazRuMTFKN3hQRG9PZzM4b1ZBbTlaUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC83Nzg0NDg0NyJ9", "payload": "eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6Ind3dy5nZ2Mud29ybGQifSx7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6ImdnYy53b3JsZCJ9XX0", "signature": "jjSKwAktZQIksz3WFJy-Kn7Z0jvxbms8G3JhW4Hi2BC9Y3oAjRIAgCdftc8ukIsw5bBF_QCGgzeEh0V9lnPDcrpfdLJzVFHgbLJNcpJqp6VyDap55kTfi7CnQE0FlvnmENEJqWrhORf2K65HpEAYi8ahkeDi6hzmWdllIYvRJNfNo3_elUIzCPQ3qZAl4l9-j8XH3leUaGSkMf7ulz9HKi_ht3XQnbE-6B2ESy-r22Z4wkoaYkbGQLkVg7PWycRIgOJ1QuENbUMskL9BV2QToJ3rdyX2-1acpsBdZLdx34khk_375gVXa4RciWWTFzUiPeMKz5V3daI2zLTHpMHE9Q"}' [lun 10 feb 2020, 20.25.48, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.48, CET] Http already initialized. [lun 10 feb 2020, 20.25.48, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.49, CET] _ret='0' [lun 10 feb 2020, 20.25.49, CET] responseHeaders='HTTP/2 201 server: nginx date: Mon, 10 Feb 2020 19:25:48 GMT content-type: application/json content-length: 473 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" location: https://acme-v02.api.letsencrypt.org/acme/order/77844847/2292544107 replay-nonce: 0002Vg_sXhjEMwUUSBbFSEegwPoUJeWEr6dSG_1iu_Sqn0k x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.49, CET] code='201' [lun 10 feb 2020, 20.25.49, CET] original='{ "status": "pending", "expires": "2020-02-17T19:25:48.983057602Z", "identifiers": [ { "type": "dns", "value": "ggc.world" }, { "type": "dns", "value": "www.ggc.world" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/77844847/2292544107" }' [lun 10 feb 2020, 20.25.49, CET] response='{"status":"pending","expires":"2020-02-17T19:25:48.983057602Z","identifiers":[{"type":"dns","value":"ggc.world"},{"type":"dns","value":"www.ggc.world"}],"authorizations":["https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385","https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386"],"finalize":"https://acme-v02.api.letsencrypt.org/acme/finalize/77844847/2292544107"}' [lun 10 feb 2020, 20.25.49, CET] Le_LinkOrder='https://acme-v02.api.letsencrypt.org/acme/order/77844847/2292544107' [lun 10 feb 2020, 20.25.49, CET] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/77844847/2292544107' [lun 10 feb 2020, 20.25.49, CET] _authorizations_seg='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385,https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386' [lun 10 feb 2020, 20.25.49, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385' [lun 10 feb 2020, 20.25.49, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385' [lun 10 feb 2020, 20.25.49, CET] payload [lun 10 feb 2020, 20.25.49, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.49, CET] Use _CACHED_NONCE='0002Vg_sXhjEMwUUSBbFSEegwPoUJeWEr6dSG_1iu_Sqn0k' [lun 10 feb 2020, 20.25.49, CET] nonce='0002Vg_sXhjEMwUUSBbFSEegwPoUJeWEr6dSG_1iu_Sqn0k' [lun 10 feb 2020, 20.25.49, CET] POST [lun 10 feb 2020, 20.25.49, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944385' [lun 10 feb 2020, 20.25.49, CET] body='{"protected": "eyJub25jZSI6ICIwMDAyVmdfc1hoakVNd1VVU0JiRlNFZWd3UG9VSmVXRXI2ZFNHXzFpdV9TcW4wayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjc0Njk0NDM4NSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc4NDQ4NDcifQ", "payload": "", "signature": "fJxwHsbeg-LA-s3CXr-eT5G00H7J6m08dDc4Z7UZtdT_R6h2kMFWCCPFE2IjKQnOpb7LSWhPrdN3hX7u16wCDp2enxZMz5G2wURZ2DtAfNDhm2Dx0OhXU-XOZ_d0tAV-U-BmMlDqXsb7SiRC6SHIqML6o4St1GMcBwcKjY9PcCb8sb85BblXqTfcC-_RA4ivJm5Ok6fXlGr4IwJz2G7kdlB-k0BFyxkx_w6kooeCgrCUi48qRduPm5CANW74s9PQ1BXyfnBXswzQlqJZLqaxMnGyKQPSUDjX4sX1zADqD-RdL7imMwV40B3_2Jf3omKVtyEIqsG2RWcZ9WUp1Tq_EQ"}' [lun 10 feb 2020, 20.25.49, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.49, CET] Http already initialized. [lun 10 feb 2020, 20.25.49, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.49, CET] _ret='0' [lun 10 feb 2020, 20.25.49, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:49 GMT content-type: application/json content-length: 787 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001ni9iLrndk8vWj272mdw3G94pKgS0Dd_1N-vyAwKsYDo x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.49, CET] code='200' [lun 10 feb 2020, 20.25.49, CET] original='{ "identifier": { "type": "dns", "value": "ggc.world" }, "status": "pending", "expires": "2020-02-17T19:25:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw", "token": "MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw", "token": "MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug", "token": "MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0" } ] }' [lun 10 feb 2020, 20.25.49, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}]}' [lun 10 feb 2020, 20.25.49, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}]}' [lun 10 feb 2020, 20.25.49, CET] _d='ggc.world' [lun 10 feb 2020, 20.25.49, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386' [lun 10 feb 2020, 20.25.49, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386' [lun 10 feb 2020, 20.25.49, CET] payload [lun 10 feb 2020, 20.25.49, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.49, CET] Use _CACHED_NONCE='0001ni9iLrndk8vWj272mdw3G94pKgS0Dd_1N-vyAwKsYDo' [lun 10 feb 2020, 20.25.49, CET] nonce='0001ni9iLrndk8vWj272mdw3G94pKgS0Dd_1N-vyAwKsYDo' [lun 10 feb 2020, 20.25.49, CET] POST [lun 10 feb 2020, 20.25.49, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2746944386' [lun 10 feb 2020, 20.25.49, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxbmk5aUxybmRrOHZXajI3Mm1kdzNHOTRwS2dTMERkXzFOLXZ5QXdLc1lEbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjc0Njk0NDM4NiIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc4NDQ4NDcifQ", "payload": "", "signature": "Vocgk7MKDTd5ocGgOp59AWiJJCNoJDvqCw3ZgsfkSCBPiV8kP0_Rp9fp-WY3_Q3P_VGGANarkNwwLixOHOBojFg2d6XJNeNRaYdvJqElY_kNQ2_3ob-SH4BRZzx4QywaaDcfwPFEeC56JvAMZSsItcZhybIjTXEQqsRANmSPtYITMxvOHOrEk1Qe7eQAn5GM7OKcytxlEQcdf-8QTFkplsGqzjEPX9Ud9uG4lzuCRbWHnj2YsPYl67aivr0x0S6nc5pRTh2hhmLH8IVD_UA1oIQnChWA-jOIbO-3zUi05sm5PDvwSKKq_880aySGNuwL0au7NNjOMn-3JXXdX8iFCA"}' [lun 10 feb 2020, 20.25.49, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.49, CET] Http already initialized. [lun 10 feb 2020, 20.25.49, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.50, CET] _ret='0' [lun 10 feb 2020, 20.25.50, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:50 GMT content-type: application/json content-length: 791 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001mXto79qltD4X4gPzc7V9sWH6r_iile0BI3pzBKDTC8w x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.50, CET] code='200' [lun 10 feb 2020, 20.25.50, CET] original='{ "identifier": { "type": "dns", "value": "www.ggc.world" }, "status": "pending", "expires": "2020-02-17T19:25:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ", "token": "BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw", "token": "BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ", "token": "BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs" } ] }' [lun 10 feb 2020, 20.25.50, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}]}' [lun 10 feb 2020, 20.25.50, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}]}' [lun 10 feb 2020, 20.25.50, CET] _d='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] _authorizations_map='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}]} ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}]} ' [lun 10 feb 2020, 20.25.50, CET] d='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] Getting webroot for domain='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] _w='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] _currentRoot='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] _idn_temp [lun 10 feb 2020, 20.25.50, CET] _candindates='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}]}' [lun 10 feb 2020, 20.25.50, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/QyVUTw","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/3nyKkQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}]}' [lun 10 feb 2020, 20.25.50, CET] entry='"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"' [lun 10 feb 2020, 20.25.50, CET] token='BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs' [lun 10 feb 2020, 20.25.50, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.50, CET] keyauthorization='BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.50, CET] dvlist='www.ggc.world#BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ#http-01#/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] d='ggc.world' [lun 10 feb 2020, 20.25.50, CET] Getting webroot for domain='ggc.world' [lun 10 feb 2020, 20.25.50, CET] _w='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] _currentRoot='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 20.25.50, CET] _idn_temp [lun 10 feb 2020, 20.25.50, CET] _candindates='ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}]}' [lun 10 feb 2020, 20.25.50, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"pending","expires":"2020-02-17T19:25:48Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/XNzjgw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/Bfg1Ug","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}]}' [lun 10 feb 2020, 20.25.50, CET] entry='"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"' [lun 10 feb 2020, 20.25.50, CET] token='MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0' [lun 10 feb 2020, 20.25.50, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw' [lun 10 feb 2020, 20.25.50, CET] keyauthorization='MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.50, CET] dvlist='ggc.world#MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw#http-01#/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] d [lun 10 feb 2020, 20.25.50, CET] vlist='www.ggc.world#BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ#http-01#/var/www/ggc.world/,ggc.world#MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw#http-01#/var/www/ggc.world/,' [lun 10 feb 2020, 20.25.50, CET] d='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] d='ggc.world' [lun 10 feb 2020, 20.25.50, CET] ok, let's start to verify [lun 10 feb 2020, 20.25.50, CET] Verifying: www.ggc.world [lun 10 feb 2020, 20.25.50, CET] d='www.ggc.world' [lun 10 feb 2020, 20.25.50, CET] keyauthorization='BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.50, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.50, CET] _currentRoot='/var/www/ggc.world/' [lun 10 feb 2020, 20.25.50, CET] wellknown_path='/var/www/ggc.world//.well-known/acme-challenge' [lun 10 feb 2020, 20.25.50, CET] writing token:BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs to /var/www/ggc.world//.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs [lun 10 feb 2020, 20.25.50, CET] Changing owner/group of .well-known to root:root [lun 10 feb 2020, 20.25.50, CET] Trigger domain validation. [lun 10 feb 2020, 20.25.50, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.50, CET] _t_key_authz='BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.50, CET] _t_vtype='http-01' [lun 10 feb 2020, 20.25.50, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.50, CET] payload='{}' [lun 10 feb 2020, 20.25.50, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.50, CET] Use _CACHED_NONCE='0001mXto79qltD4X4gPzc7V9sWH6r_iile0BI3pzBKDTC8w' [lun 10 feb 2020, 20.25.50, CET] nonce='0001mXto79qltD4X4gPzc7V9sWH6r_iile0BI3pzBKDTC8w' [lun 10 feb 2020, 20.25.50, CET] POST [lun 10 feb 2020, 20.25.50, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.50, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxbVh0bzc5cWx0RDRYNGdQemM3VjlzV0g2cl9paWxlMEJJM3B6QktEVEM4dyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0Njk0NDM4Ni9hZU1HbVEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3ODQ0ODQ3In0", "payload": "e30", "signature": "CaymoGzEyFjmhG5w-p_t1iW42rKD0bhiQLjYB6s-UMAHzVIlKzSrh98ZbR3Z281p5Paj3gHwYeOc7gP19dajdBulvR-VCVcOE30ZqbzyDV2QtWi5Bh-kmZhAoBKiBTvyud85jKjESERoJYzULZ9KrZbBLeBNf0K9EDjeSWrrlXgqCJJbKAnBFR44qubzxUVDr8vQsy6IxiJoo2QZtOy-NqhdFiAMmUbp7bn1R8O8AyYc-HYdP9xlm5swSSjmdqLYcEijyr49vtCUhdM4YqgYr_FPqWcRdW4yHYYzB92rH4d8UMeNvt1ahFaWrWJnXs2dYr8_L5BdVbFtzsQXp4FdeQ"}' [lun 10 feb 2020, 20.25.50, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.50, CET] Http already initialized. [lun 10 feb 2020, 20.25.50, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.51, CET] _ret='0' [lun 10 feb 2020, 20.25.51, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:51 GMT content-type: application/json content-length: 185 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ replay-nonce: 0001AiJuXP9dzY0gUTaDy2EHqbX7knMkKa7TrU18_Wwjk94 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.51, CET] code='200' [lun 10 feb 2020, 20.25.51, CET] original='{ "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ", "token": "BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs" }' [lun 10 feb 2020, 20.25.51, CET] response='{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs"}' [lun 10 feb 2020, 20.25.51, CET] trigger validation code: 200 [lun 10 feb 2020, 20.25.51, CET] sleep 2 secs to verify [lun 10 feb 2020, 20.25.53, CET] checking [lun 10 feb 2020, 20.25.53, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.53, CET] payload [lun 10 feb 2020, 20.25.53, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.53, CET] Use _CACHED_NONCE='0001AiJuXP9dzY0gUTaDy2EHqbX7knMkKa7TrU18_Wwjk94' [lun 10 feb 2020, 20.25.53, CET] nonce='0001AiJuXP9dzY0gUTaDy2EHqbX7knMkKa7TrU18_Wwjk94' [lun 10 feb 2020, 20.25.53, CET] POST [lun 10 feb 2020, 20.25.53, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.53, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxQWlKdVhQOWR6WTBnVVRhRHkyRUhxYlg3a25Na0thN1RyVTE4X1d3ams5NCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0Njk0NDM4Ni9hZU1HbVEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3ODQ0ODQ3In0", "payload": "", "signature": "tfuzh4eHoNHDI3V8_y3ddxJXpyZI19zrUUJfQZQKhN687LDM5gxmK0oADNPwRqR6VtrS7P8yDEuC_yYaLzNH20cmlFklNbUOyZBoShG07ttna4xBvoCcW74QfqqVtBz50_ozHxZ4WB3lNly4a19-l6aHei5g3zSMUr_4-hqw9CFibL1ZWtNIUR2HWnuGp7FHoPSc-RtHGP5lQXy4AJFs2wt9QQWYd8oydPhSSxVGrP4XS8D-YUTilZlTgOjmAAz5o3q-j-mjBkyiJJsJ3BkClGjz0jGRI0b9FoSdenOAhI_VAKn6A_VjAg3b6YJoagcM41iSy9cLOUnxly5AVmeK5g"}' [lun 10 feb 2020, 20.25.53, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.53, CET] Http already initialized. [lun 10 feb 2020, 20.25.53, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.54, CET] _ret='0' [lun 10 feb 2020, 20.25.54, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:54 GMT content-type: application/json content-length: 711 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ replay-nonce: 0101AO1nMH9lewzXtkLap837a8HURhepQS80QG3xP8_F3hc x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.54, CET] code='200' [lun 10 feb 2020, 20.25.54, CET] original='{ "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused", "status": 400 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ", "token": "BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs", "validationRecord": [ { "url": "http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs", "hostname": "www.ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] }' [lun 10 feb 2020, 20.25.54, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 20.25.54, CET] original='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 20.25.54, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ","token":"BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 20.25.54, CET] error='"error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused","status": 400' [lun 10 feb 2020, 20.25.54, CET] errordetail='Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused' [lun 10 feb 2020, 20.25.54, CET] www.ggc.world:Verify error:Fetching http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs: Connection refused [lun 10 feb 2020, 20.25.54, CET] Debug: get token url. [lun 10 feb 2020, 20.25.54, CET] GET [lun 10 feb 2020, 20.25.54, CET] url='http://www.ggc.world/.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs' [lun 10 feb 2020, 20.25.54, CET] timeout=1 [lun 10 feb 2020, 20.25.54, CET] Http already initialized. [lun 10 feb 2020, 20.25.54, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g --connect-timeout 1' [lun 10 feb 2020, 20.25.54, CET] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 7 [lun 10 feb 2020, 20.25.54, CET] Here is the curl dump log: [lun 10 feb 2020, 20.25.54, CET] == Info: Trying 2.36.58.214... == Info: TCP_NODELAY set == Info: connect to 2.36.58.214 port 80 failed: Connection refused == Info: Failed to connect to www.ggc.world port 80: Connection refused == Info: Closing connection 0 [lun 10 feb 2020, 20.25.54, CET] ret='7' [lun 10 feb 2020, 20.25.54, CET] Debugging, skip removing: /var/www/ggc.world//.well-known/acme-challenge/BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs [lun 10 feb 2020, 20.25.54, CET] pid [lun 10 feb 2020, 20.25.54, CET] No need to restore nginx, skip. [lun 10 feb 2020, 20.25.54, CET] _clearupdns [lun 10 feb 2020, 20.25.54, CET] dns_entries [lun 10 feb 2020, 20.25.54, CET] skip dns. [lun 10 feb 2020, 20.25.54, CET] _on_issue_err [lun 10 feb 2020, 20.25.54, CET] Please add '--debug' or '--log' to check more details. [lun 10 feb 2020, 20.25.54, CET] See: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh [lun 10 feb 2020, 20.25.54, CET] _chk_vlist='www.ggc.world#BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ#http-01#/var/www/ggc.world/,ggc.world#MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw#http-01#/var/www/ggc.world/,' [lun 10 feb 2020, 20.25.54, CET] start to deactivate authz [lun 10 feb 2020, 20.25.54, CET] Trigger domain validation. [lun 10 feb 2020, 20.25.54, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.54, CET] _t_key_authz='BQHvJjWyo-ojkV3Xe8ostzX-w7PdhYfRJv8PT4fcvBs.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.54, CET] _t_vtype [lun 10 feb 2020, 20.25.54, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.54, CET] payload='{}' [lun 10 feb 2020, 20.25.54, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.54, CET] Use _CACHED_NONCE='0101AO1nMH9lewzXtkLap837a8HURhepQS80QG3xP8_F3hc' [lun 10 feb 2020, 20.25.54, CET] nonce='0101AO1nMH9lewzXtkLap837a8HURhepQS80QG3xP8_F3hc' [lun 10 feb 2020, 20.25.54, CET] POST [lun 10 feb 2020, 20.25.54, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944386/aeMGmQ' [lun 10 feb 2020, 20.25.54, CET] body='{"protected": "eyJub25jZSI6ICIwMTAxQU8xbk1IOWxld3pYdGtMYXA4MzdhOEhVUmhlcFFTODBRRzN4UDhfRjNoYyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0Njk0NDM4Ni9hZU1HbVEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3ODQ0ODQ3In0", "payload": "e30", "signature": "srRAz0ByZb7AvceivhXeZuxYYP5yanAfBTu-qEWvyfzbXCaGgTnvhH6Pk5GYnzZo5K81lAWRKvJDsMXOh0RdgGkJr4MsZjezk6V1L74HuhCRSeIJDv6GdSB6iBxFhV-I8qB-Cn2_x3fiDzxv594vqTRGp0ApZ8VdmERjXeKbohwdbOD2IcVS53GwYS3zY5ASS2PKCcndL4tISuLuxrbGZbj1h6RINoJoo_RbDAiDF6BfGhO6ECsyXFqOe7xmtkSBCw6_5PZC7DyY6_ZfT8eLo8-S_5nL0ChA9j4mA2n2VsudX84zj3RWFG7BVKH2TwVPriZyUz3eSvTQABuMJ0-PkA"}' [lun 10 feb 2020, 20.25.54, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.54, CET] Http already initialized. [lun 10 feb 2020, 20.25.54, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.55, CET] _ret='0' [lun 10 feb 2020, 20.25.55, CET] responseHeaders='HTTP/2 400 server: nginx date: Mon, 10 Feb 2020 19:25:54 GMT content-type: application/problem+json content-length: 144 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0002ygSGiFjn8ZpYDq5UPu0doiTAjxWmgcgEKbd2BbJN_iI ' [lun 10 feb 2020, 20.25.55, CET] code='400' [lun 10 feb 2020, 20.25.55, CET] original='{ "type": "urn:ietf:params:acme:error:malformed", "detail": "Unable to update challenge :: authorization must be pending", "status": 400 }' [lun 10 feb 2020, 20.25.55, CET] response='{ "type": "urn:ietf:params:acme:error:malformed", "detail": "Unable to update challenge :: authorization must be pending", "status": 400 }' [lun 10 feb 2020, 20.25.55, CET] Trigger domain validation. [lun 10 feb 2020, 20.25.55, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw' [lun 10 feb 2020, 20.25.55, CET] _t_key_authz='MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0.zWqxxY8AkFp_gMwmaH446H4zuJEpK-5zQrNxHYmeG34' [lun 10 feb 2020, 20.25.55, CET] _t_vtype [lun 10 feb 2020, 20.25.55, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw' [lun 10 feb 2020, 20.25.55, CET] payload='{}' [lun 10 feb 2020, 20.25.55, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data/ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 20.25.55, CET] Use _CACHED_NONCE='0002ygSGiFjn8ZpYDq5UPu0doiTAjxWmgcgEKbd2BbJN_iI' [lun 10 feb 2020, 20.25.55, CET] nonce='0002ygSGiFjn8ZpYDq5UPu0doiTAjxWmgcgEKbd2BbJN_iI' [lun 10 feb 2020, 20.25.55, CET] POST [lun 10 feb 2020, 20.25.55, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw' [lun 10 feb 2020, 20.25.55, CET] body='{"protected": "eyJub25jZSI6ICIwMDAyeWdTR2lGam44WnBZRHE1VVB1MGRvaVRBanhXbWdjZ0VLYmQyQmJKTl9pSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0Njk0NDM4NS9MMDdxVnciLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3ODQ0ODQ3In0", "payload": "e30", "signature": "o_68ZYFt27ZfkiL9iR_MpvqXdzR0Fym0rVlYpc1FM3d3pGb0d30VDZ7HxfVUKyS3mwoJlOToEeh9tkMfDSPW1-Ksaf3EGRpwGWWi5AcZXQnsxSHp4tAfpjwF0gATdmqPpkcfCcqXwOKezFDPB26uOyDzwwERir9Ra3X39wgYXELTNQi80wpPnljrWj9DA1rWuLrRXNx3x-kwTJEm78yETDYJIjLgDAeW1Wu2lBgRN6zZ-zVY209W6YEiSycpPc9fNozwEOr3pWYDCgQ049atB-eiaJiKsOhXF471n1I_Chzj9Cp7aV-GtAHq3PJLgdeUgW2JYBoc4h9Vu1_NwLCWNg"}' [lun 10 feb 2020, 20.25.55, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 20.25.55, CET] Http already initialized. [lun 10 feb 2020, 20.25.55, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data/http.header --trace-ascii /tmp/tmp.vaJayKpKr1 -g ' [lun 10 feb 2020, 20.25.55, CET] _ret='0' [lun 10 feb 2020, 20.25.55, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 19:25:55 GMT content-type: application/json content-length: 185 boulder-requester: 77844847 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw replay-nonce: 0002UnGMz5mZruARS7p3mD_NBkBWUlQ3drBo0s19lHxh_wg x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 20.25.55, CET] code='200' [lun 10 feb 2020, 20.25.55, CET] original='{ "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw", "token": "MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0" }' [lun 10 feb 2020, 20.25.55, CET] response='{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2746944385/L07qVw","token":"MMSVf-mAzIa3ssb0cAlRQ90kWcIEXeqTnoAVWgfTWw0"}' [lun 10 feb 2020, 20.25.55, CET] Diagnosis versions: openssl:openssl OpenSSL 1.1.1 11 Sep 2018 apache: apache doesn't exists. nginx: nginx version: nginx/1.14.0 (Ubuntu) built with OpenSSL 1.1.1 11 Sep 2018 TLS SNI support enabled configure arguments: --with-cc-opt='-g -O2 -fdebug-prefix-map=/build/nginx-GkiujU/nginx-1.14.0=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wdate-time -D_FORTIFY_SOURCE=2' --with-ld-opt='-Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,-z,now -fPIC' --prefix=/usr/share/nginx --conf-path=/etc/nginx/nginx.conf --http-log-path=/var/log/nginx/access.log --error-log-path=/var/log/nginx/error.log --lock-path=/var/lock/nginx.lock --pid-path=/run/nginx.pid --modules-path=/usr/lib/nginx/modules --http-client-body-temp-path=/var/lib/nginx/body --http-fastcgi-temp-path=/var/lib/nginx/fastcgi --http-proxy-temp-path=/var/lib/nginx/proxy --http-scgi-temp-path=/var/lib/nginx/scgi --http-uwsgi-temp-path=/var/lib/nginx/uwsgi --with-debug --with-pcre-jit --with-http_ssl_module --with-http_stub_status_module --with-http_realip_module --with-http_auth_request_module --with-http_v2_module --with-http_dav_module --with-http_slice_module --with-threads --with-http_addition_module --with-http_geoip_module=dynamic --with-http_gunzip_module --with-http_gzip_static_module --with-http_image_filter_module=dynamic --with-http_sub_module --with-http_xslt_module=dynamic --with-stream=dynamic --with-stream_ssl_module --with-mail=dynamic --with-mail_ssl_module socat: socat by Gerhard Rieger and contributors - see www.dest-unreach.org Usage: socat [options] options: -V print version and feature information to stdout, and exit -h|-? print a help text describing command line options and addresses -hh like -h, plus a list of all common address option names -hhh like -hh, plus a list of all available address option names -d increase verbosity (use up to 4 times; 2 are recommended) -D analyze file descriptors before loop -ly[facility] log to syslog, using facility (default is daemon) -lf log to file -ls log to stderr (default if no other log) -lm[facility] mixed log mode (stderr during initialization, then syslog) -lp set the program name used for logging -lu use microseconds for logging timestamps -lh add hostname to log messages -v verbose data traffic, text -x verbose data traffic, hexadecimal -b set data buffer size (8192) -s sloppy (continue on error) -t wait seconds before closing second channel -T total inactivity timeout in seconds -u unidirectional mode (left to right) -U unidirectional mode (right to left) -g do not check option groups -L try to obtain lock, or fail -W try to obtain lock, or wait -4 prefer IPv4 if version is not explicitly specified -6 prefer IPv6 if version is not explicitly specified bi-address: pipe[,] groups=FD,FIFO !! single-address: [,] address-head: abstract-client: groups=FD,SOCKET,RETRY,UNIX abstract-connect: groups=FD,SOCKET,RETRY,UNIX abstract-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,UNIX abstract-recv: groups=FD,SOCKET,RETRY,UNIX abstract-recvfrom: groups=FD,SOCKET,CHILD,RETRY,UNIX abstract-sendto: groups=FD,SOCKET,RETRY,UNIX create: groups=FD,REG,NAMED exec: groups=FD,FIFO,SOCKET,EXEC,FORK,TERMIOS,PTY,PARENT,UNIX fd: groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP gopen: groups=FD,FIFO,CHR,BLK,REG,SOCKET,NAMED,OPEN,TERMIOS,UNIX interface: groups=FD,SOCKET ip-datagram:: groups=FD,SOCKET,RANGE,IP4,IP6 ip-recv: groups=FD,SOCKET,RANGE,IP4,IP6 ip-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4,IP6 ip-sendto:: groups=FD,SOCKET,IP4,IP6 ip4-datagram:: groups=FD,SOCKET,RANGE,IP4 ip4-recv: groups=FD,SOCKET,RANGE,IP4 ip4-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4 ip4-sendto:: groups=FD,SOCKET,IP4 ip6-datagram:: groups=FD,SOCKET,RANGE,IP6 ip6-recv: groups=FD,SOCKET,RANGE,IP6 ip6-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP6 ip6-sendto:: groups=FD,SOCKET,IP6 open: groups=FD,FIFO,CHR,BLK,REG,NAMED,OPEN,TERMIOS openssl:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,OPENSSL openssl-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,TCP,OPENSSL pipe: groups=FD,FIFO,NAMED,OPEN proxy::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,HTTP pty groups=FD,NAMED,TERMIOS,PTY sctp-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,SCTP sctp-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,SCTP sctp4-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,SCTP sctp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,SCTP sctp6-connect:: groups=FD,SOCKET,CHILD,RETRY,IP6,SCTP sctp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP6,SCTP socket-connect::: groups=FD,SOCKET,CHILD,RETRY socket-datagram:::: groups=FD,SOCKET,RANGE socket-listen::: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE socket-recv:::: groups=FD,SOCKET,RANGE socket-recvfrom:::: groups=FD,SOCKET,CHILD,RANGE socket-sendto:::: groups=FD,SOCKET socks4::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,SOCKS4 socks4a::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,SOCKS4 stderr groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdin groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdio groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdout groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP system: groups=FD,FIFO,SOCKET,EXEC,FORK,TERMIOS,PTY,PARENT,UNIX tcp-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP tcp-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,TCP tcp4-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,TCP tcp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,TCP tcp6-connect:: groups=FD,SOCKET,CHILD,RETRY,IP6,TCP tcp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP6,TCP tun[:/] groups=FD,CHR,NAMED,OPEN,INTERFACE udp-connect:: groups=FD,SOCKET,IP4,IP6,UDP udp-datagram:: groups=FD,SOCKET,RANGE,IP4,IP6,UDP udp-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP4,IP6,UDP udp-recv: groups=FD,SOCKET,RANGE,IP4,IP6,UDP udp-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4,IP6,UDP udp-sendto:: groups=FD,SOCKET,IP4,IP6,UDP udp4-connect:: groups=FD,SOCKET,IP4,UDP udp4-datagram:: groups=FD,SOCKET,RANGE,IP4,UDP udp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP4,UDP udp4-recv: groups=FD,SOCKET,RANGE,IP4,UDP udp4-recvfrom:: groups=FD,SOCKET,CHILD,RANGE,IP4,UDP udp4-sendto:: groups=FD,SOCKET,IP4,UDP udp6-connect:: groups=FD,SOCKET,IP6,UDP udp6-datagram:: groups=FD,SOCKET,RANGE,IP6,UDP udp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP6,UDP udp6-recv: groups=FD,SOCKET,RANGE,IP6,UDP udp6-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP6,UDP udp6-sendto:: groups=FD,SOCKET,IP6,UDP unix-client: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-connect: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-listen: groups=FD,SOCKET,NAMED,LISTEN,CHILD,RETRY,UNIX unix-recv: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-recvfrom: groups=FD,SOCKET,NAMED,CHILD,RETRY,UNIX unix-sendto: groups=FD,SOCKET,NAMED,RETRY,UNIX