2022-11-14 12:55:45,507:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-14 12:55:45,508:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-14 12:55:45,508:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-14 12:55:45,508:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-14 12:55:45,523:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-14 12:55:45,524:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-14 12:55:45,525:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-14 12:55:45,525:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-14 12:55:45,525:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-15 04:25:45,213:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-15 04:25:45,213:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-15 04:25:45,213:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-15 04:25:45,213:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-15 04:25:45,228:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-15 04:25:45,229:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-15 04:25:45,229:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-15 04:25:45,229:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-15 04:25:45,229:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-15 20:49:33,561:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-15 20:49:33,561:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-15 20:49:33,561:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-15 20:49:33,562:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-15 20:49:33,575:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-15 20:49:33,577:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-15 20:49:33,577:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-15 20:49:33,577:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-15 20:49:33,577:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-16 09:06:45,173:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-16 09:06:45,173:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-16 09:06:45,173:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-16 09:06:45,173:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-16 09:06:45,188:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-16 09:06:45,190:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-16 09:06:45,190:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-16 09:06:45,190:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-16 09:06:45,190:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-16 13:36:14,570:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-16 13:36:14,571:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-16 13:36:14,571:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-16 13:36:14,571:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-16 13:36:14,584:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-16 13:36:14,585:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-16 13:36:14,586:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-16 13:36:14,586:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-16 13:36:14,586:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-17 01:35:53,543:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 01:35:53,543:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 01:35:53,543:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 01:35:53,544:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 01:35:53,558:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 01:35:53,560:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 01:35:53,560:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 01:35:53,561:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 01:35:53,561:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 01:36:01,368:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 01:36:01,373:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 01:36:01,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 01:36:01,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:01 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9qs2AK7Xmd8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 01:36:04,355:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 01:36:04,356:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 01:36:04,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 01:36:04,438:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977bM5hlFcqfDaj4kxr0KSk07mvdI-Il6xVISg2mS85aBU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 01:36:04,439:DEBUG:acme.client:Storing nonce: F977bM5hlFcqfDaj4kxr0KSk07mvdI-Il6xVISg2mS85aBU 2022-11-17 01:36:04,439:DEBUG:acme.client:JWS payload: b'{\n "contact": [\n "mailto:system@terziu.net"\n ],\n "termsOfServiceAgreed": true\n}' 2022-11-17 01:36:04,442:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct: { "protected": "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", "signature": "Gigm2N8ZFITMAuldxwduePDaVTdXe1fICnMVkE8UMWaRRJHjtxlgIzBdykLqIGB_Duhj926xBC4_67hpMg2XH812bug2l6KVe9Zfk3NMt33Vp0IORM_PXj1-_5i4iNDQpKrq27MUvWAdR6oyjP-Fj_eGgiEZ67XN_CflfQd_P0jZRcHtNTZ7OvJi_KVprmjnPHNTwYL_7EfI9tAiQUK64jrIilitO3qpK0bRZ9gCaTGnfJ2Tm_Vzq3aVBBs7FyFzOW9XLEwiDTd5es9Mj3vYeO_HQPriiUVnMAj9N_aWCYSnLFen_DWKXo-KRIitxSdF4E0u99CbHG-e125jxKzFiA", "payload": "ewogICJjb250YWN0IjogWwogICAgIm1haWx0bzpzeXN0ZW1AdGVyeml1Lm5ldCIKICBdLAogICJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUKfQ" } 2022-11-17 01:36:04,553:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 559 2022-11-17 01:36:04,554:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 01:36:04 GMT Content-Type: application/json Content-Length: 559 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="terms-of-service" Location: https://acme-v02.api.letsencrypt.org/acme/acct/827696447 Replay-Nonce: C400F6_QjUH_5Mr31oNpGL1GsZ3wxCWEewWRruEFyxiK3ZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "key": { "kty": "RSA", "n": "jt6Y86IGr178eLFtzExqTj3iCsQeIUEp2KyY6OmWmKe_uJJ-4L6Dvqraf4wGr46ul9-8Pwa9HdKxyVLH-Y-alpLjWOYfjugLuiNZdlnzf3ruy_vY8XtJJ4TNAdaqHdrtEuJ5Vj3HRcTeVXcWUrlicIQFXIzUWkZ9yP7dSAFhu4zJU3KoMw2Sza13DLv8qjRZIgQoZss5jHeSZ82Az1fYZTFxBmsYBqEqVaCCAY2aMhWsbgeXxrznOZrym7RlNCxmFxpw8GxAZ6cIWqx2pwgkDj61ASrxAGcxo3LS0E9zr__zYhN9vJVDH1rZDlfQSwWzXvpvzRPI28hrPul-DUiPmQ", "e": "AQAB" }, "contact": [ "mailto:system@terziu.net" ], "initialIp": "24.144.144.21", "createdAt": "2022-11-17T01:36:04.51208654Z", "status": "valid" } 2022-11-17 01:36:04,554:DEBUG:acme.client:Storing nonce: C400F6_QjUH_5Mr31oNpGL1GsZ3wxCWEewWRruEFyxiK3ZU 2022-11-17 01:36:09,787:DEBUG:certbot._internal.display.obj:Notifying user: Account registered. 2022-11-17 01:36:09,788:DEBUG:certbot._internal.main:Picked account: )>), contact=('mailto:system@terziu.net',), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/827696447', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf'), 415c38ff61cbd9100ef27cec657b2d59, Meta(creation_dt=datetime.datetime(2022, 11, 17, 1, 36, 4, tzinfo=), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 01:36:09,789:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 01:36:09,938:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0000_key-certbot.pem 2022-11-17 01:36:09,949:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0000_csr-certbot.pem 2022-11-17 01:36:09,954:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 01:36:09,957:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBGNl9RalVIXzVNcjMxb05wR0wxR3NaM3d4Q1dFZXdXUnJ1RUZ5eGlLM1pVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c9Gpz6X6XA5TnPL0lC3Q9DyK9z1El5scjxfpzSosw_E9l-fC3AXsxi0S1VuI8qqhPc94LPKuG9dXDBWNxgUQNPLBf2GoiDGe2SPIBzN-jJ9PE2WMUQQxQsMUGPr1nFfXNPbPL4kE_0LQCKHVwE3WG9pjtFiyYnfXAqcfFHNqSli88wNTk0tOrbkk2PYGhIJaJUZ0zI0fndo_cVWG6lyz_R1Atkjza1rAScXY-sdxd1tpeq0j8taNm3V0jQ5KAnV08MrX2CbGt4DR-GwDBQRVj19MlztgA3Tgztw6gDVE6Qo7ZoKbpFr4vD8L93BnaleOcY4nGlBmBJNS4BE_cFZFLQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 01:36:10,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 01:36:10,093:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 01:36:10 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: F977zepRDCWP19gkM3PGfwO3nIenbJXdNxnyycvTy6eJoyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 01:36:10,093:DEBUG:acme.client:Storing nonce: F977zepRDCWP19gkM3PGfwO3nIenbJXdNxnyycvTy6eJoyA 2022-11-17 01:36:10,095:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:36:10,097:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5Nzd6ZXBSRENXUDE5Z2tNM1BHZndPM25JZW5iSlhkTnhueXljdlR5NmVKb3lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "dOZkU1Ey9e-WXU-ETq_ahc3uY1x4Ny3fgC7_CZvzOO4Kkcma6vzbDgL34Y4zbwFKCcdtEyfQi6P4RPIA_CCv0P-upnCZb0Vg171gD6nBqcJM8_kfB8o3RhNjDxCwSGO74tDDohTiTUOgliYvM7koPMK77pyIdnjccV2UHk-2v3Y5ll1-6KDB_uf-ULjFIjOwqKfcyD3hFhDuMEKB-A_tlubFHt_JrgdmGqc0bw593LE54g2WovgP8NawbZ8F2TpUNAM4QDBWyQgnphaQyk4LubEvtUReusOk3PWpK71k05KgqX9PhyaNkJobK9HF0_E63ar9s0H1ajSJEBe_4KD2og", "payload": "" } 2022-11-17 01:36:10,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 01:36:10,186:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:10 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977ISh3ARNu8rCw690w4b2axbvXKKPopTG5BTfjrb-JPPc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 01:36:10,186:DEBUG:acme.client:Storing nonce: F977ISh3ARNu8rCw690w4b2axbvXKKPopTG5BTfjrb-JPPc 2022-11-17 01:36:10,186:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:36:10,188:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5NzdJU2gzQVJOdThyQ3c2OTB3NGIyYXhidlhLS1BvcFRHNUJUZmpyYi1KUFBjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "BW802UNCblELDCFcgiviKVk2PSBiai5kv88qcE5Mbaq3xmq35NtFR6Ni0D0CSpT7j2PyUrQ8sNHlDDKyJbInTNchcSz2r-9NICZvS0c4mKG9oHrLNcDncq-MaIOI6Hd3K6WrceOqYusiLSYb_J6IPiL5USpnMTY-CXDiq6IthDWTksyKebd0gAzrssJigUhRyhDgSUzF-v_V8tE1TvjYaUUjQJpp53pQILKtn7UrXyXfo_Q6g4ag8nPl8GJrvhN86ucaUUkc9i-sOFTtsapLo6bl3z_SegXWSeFtU5JrAEGkHXNk0gYEsEmQOFY_A4PLRRdazazrEAQAzsLpyJ8jSg", "payload": "" } 2022-11-17 01:36:10,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 01:36:10,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:10 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712PnKZsGZ2CYdCMooPWT0ptEmJt3_JqCgbmZMprCysru0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 01:36:10,282:DEBUG:acme.client:Storing nonce: 2712PnKZsGZ2CYdCMooPWT0ptEmJt3_JqCgbmZMprCysru0 2022-11-17 01:36:10,282:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:36:10,289:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJQbktac0daMkNZZENNb29QV1QwcHRFbUp0M19KcUNnYm1aTXByQ3lzcnUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "PPkfl0s9L1PUaff0sVF8gEMuHthf3tzlkF4gZOLjLx_S_6R3R2nqEfTPPVOY6AmkVbbWe0sFxArLtBr0UFqcp5JCctdP-XiUTi0jnv1-jA-tqQxf2FrfhqvgVsvY_KX4sU_BCrFCAoCf11c9EbBc-uZ4B6As1705bBiLOX9pLYqbQvf10m5eeJQ9NhaRGdfVabuFkYoJykup9V8PmTVroWeKTrbQJj9oKwG6QuxuS_708c9mdHPrfTBF_u9_r_W_vTK_uBoNQn6qrsKoxo6wd4jgN4T_GWsZm-aQBIJDCv4PBZJvR-KlbwbD4poXtiD4kjrL3TmtiyFq5ytjN8Z_Ig", "payload": "" } 2022-11-17 01:36:10,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 01:36:10,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:10 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977DPGju-1DCnXak5nryuV77f789I8N1HDV4CHZowQmaj4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 01:36:10,375:DEBUG:acme.client:Storing nonce: F977DPGju-1DCnXak5nryuV77f789I8N1HDV4CHZowQmaj4 2022-11-17 01:36:10,376:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:36:10,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5NzdEUEdqdS0xRENuWGFrNW5yeXVWNzdmNzg5SThOMUhEVjRDSFpvd1FtYWo0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "N1P5kFWZghVkuixvmJpoKE1BGH91GUscP0DwiFlYKJc3aimTeTMJja01Z81icv7IlLBcsYvOPo3_rVLZhn40SkBZVOJfyr3S9Mh6NFjH_34t3D1N2uFuvfUGoOKWIs9eQboFIrPnqr9IAjp3gJyCZnBleacQaaBRs79TjykPPFYWkhuvnFL4xeKZI5OJ7Ragfpvr7TsnZ1yKRyMlIP_HE66hZI6blsFjIQp-91nJM2BsBmcVDBRCCI6WpBdfQf5G6OBnhydZZMTgWuwShX1y2EkS7WWZkRJjfc1j9C1QLU_BaL6ecaELDa6g5SoVuzTUALs3dO4VtclZe9CfwN6V3A", "payload": "" } 2022-11-17 01:36:10,463:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 01:36:10,464:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:36:10 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C4000Q7JjCZf9Ev7dRkNsRU_NTeDTN5_OMOk1C3xWP9WUE4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 01:36:10,464:DEBUG:acme.client:Storing nonce: C4000Q7JjCZf9Ev7dRkNsRU_NTeDTN5_OMOk1C3xWP9WUE4 2022-11-17 01:36:10,464:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 01:36:10,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 01:36:10,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 01:36:10,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 01:36:10,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 01:36:10,469:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:36:10,976:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:36:10,985:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:10,985:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 01:36:10,986:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 01:36:10,990:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:36:11,316:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:36:11,320:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:11,325:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:36:11,737:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:36:11,738:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:11,744:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:36:12,053:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:36:12,056:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:12,064:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:36:12,400:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:36:12,401:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:12,403:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:36:12,407:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:35,821:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 01:38:35,822:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 01:38:35,822:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 01:38:35,822:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 01:38:35,835:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 01:38:35,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 01:38:35,836:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 01:38:35,837:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 01:38:35,837:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 01:38:35,923:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 01:38:35,924:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 01:38:35,926:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 01:38:36,234:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 01:38:36,238:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:36 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZBV6YgGtASM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 01:38:36,239:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 01:38:36,681:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0001_key-certbot.pem 2022-11-17 01:38:36,690:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0001_csr-certbot.pem 2022-11-17 01:38:36,693:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 01:38:36,693:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 01:38:36,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 01:38:36,767:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAbtlzrUb8s6u4qVZyogYBHVfGiXD5tNZqdN8dUD_Y3is X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 01:38:36,768:DEBUG:acme.client:Storing nonce: 1DFAbtlzrUb8s6u4qVZyogYBHVfGiXD5tNZqdN8dUD_Y3is 2022-11-17 01:38:36,768:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 01:38:36,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFERkFidGx6clViOHM2dTRxVlp5b2dZQkhWZkdpWEQ1dE5acWROOGRVRF9ZM2lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Ppwf5BOBo_xwFJxFVFEFEmUvVMkzDVkUHr1MCNVfRCvDP3K1ve9-PlnpvS-Ay6lm1dz5h3lTaeoVIS1vYscSCNSfDGO3xFN_-EwjULZy1dNM21yUbngEpnlRz2dbJIAYyv0-kISo8RLljblbBqUxpWy_YTeHee0i0_7BSZAUaYQ7vEUwEbSROaI_7jZGLUZ8CbquHV-SKK8cUweRaXlbUpdFiCiA8QACQquT0dAbQBklO-mkiDj5ys4jurJlF_uQbo5RovWtBbwBWVfjawfhKrOERp7sOSUnhiRr1JdZ97L-KY5ZQQlf4wSOdjHF2xrKKfSBQ5XQ3R1_FmiT5i0Zuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 01:38:36,924:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 01:38:36,924:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 01:38:36 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: C878aQbY3CAe6N7PIdPMtUnU0YLP2UFjWDRDHrt62VArq3c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 01:38:36,925:DEBUG:acme.client:Storing nonce: C878aQbY3CAe6N7PIdPMtUnU0YLP2UFjWDRDHrt62VArq3c 2022-11-17 01:38:36,925:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:38:36,927:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhhUWJZM0NBZTZON1BJZFBNdFVuVTBZTFAyVUZqV0RSREhydDYyVkFycTNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "hD5D1PMMu0VJrG8nSkGO-JzhP2azbynCkqF6NyDY7gatFkRAYFhMOp0YpjplyCjJsUIN0yZq2vV4C2kxljrvqPge3AJMhBmzZnn7DhWyIfKkcIHgBgS-w7yxtAs6xxbMR1w1vsbwiQOW2Cu7VMAzc4s8Obq0rsmrSI3_aTRoJsQw7sUwRNf4JCBMMhfJVPuTN67su-xW9wnaOQim0TSz-NsMCyq4b5uvVjOuC_uFdBLwGcbVmRd6mmL3QsihKPbA3FPO4ZmsbB_i3h1CdGZ151xTT8R_WiJBgst5s2Yez49nZCtvqFewnB8OjeZWtOXbLjYmMFYp_KbS_ExXakDsgw", "payload": "" } 2022-11-17 01:38:37,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 01:38:37,015:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:36 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878y5RblkZNQv5abvv8WqaezPA4hnK9wSYDLI1-GRG0Ewg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 01:38:37,016:DEBUG:acme.client:Storing nonce: C878y5RblkZNQv5abvv8WqaezPA4hnK9wSYDLI1-GRG0Ewg 2022-11-17 01:38:37,016:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:38:37,018:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4Nzh5NVJibGtaTlF2NWFidnY4V3FhZXpQQTRobks5d1NZRExJMS1HUkcwRXdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "H1bDYjLHDCnyIJQU6Ebk2OCkSPUaDYYfZDrLuNHrcklcQbX14nDpejrBQ0Ben4rPs4nWQq9RmTt6W6NlaI8JIT3CtmNEqz3tw5ML-dOP5xPIk_s8V-SD39ldd9LIvEjI9vz74rXeP6gBk5-gj5Ge7xLVgxntOccx0h0Lq9L9ZBEj0cGZc7xfvHpC1JUcSVyDZHYL6UzjOMpDyKWl0l-IpTO1DHPQfmxALLX7bsXS-pinhkZn7sO6-Ux5rgvrD_ysa8_CZ9j_Ng6cCe_WFZjpfWJRYqn4IUN7KiIs3mGGgQkJ7KUNBulS_yoB6Vx4D1tclemylBeX7DM0AHy-5d0HmQ", "payload": "" } 2022-11-17 01:38:37,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 01:38:37,125:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:37 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADkd8HKj8tP_8gB4TKtvxyu45839rET3z3cUMJ3R0g1gg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 01:38:37,125:DEBUG:acme.client:Storing nonce: 1AADkd8HKj8tP_8gB4TKtvxyu45839rET3z3cUMJ3R0g1gg 2022-11-17 01:38:37,126:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:38:37,128:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQURrZDhIS2o4dFBfOGdCNFRLdHZ4eXU0NTgzOXJFVDN6M2NVTUozUjBnMWdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "T9ss95zxtOTHKNcPsFSwz0yGNa7_AR3bZtT3_4LUl4yhAtoshEXq0ADEgfOzagdB-eRlUVnhVxEGG1ftytuCakvOeeqxW5x3x-SkhXF9ci51a0pg6MSVHWULPQrVnWYy9K7t4R4xHnF4oZdWBtnRMIlQlcb6L_gm6eB0tDX8A5gIM-rOFQmwyrDsgaftjZSnVAyS9dLbVqDNJz4WCSq4qtbSzhelDka-Y9jZEuIXnXkalSGn6iB0viZaKFRqCs1jFXiV5lDWUlvRObxNEhLwtLljIIcJPvapLf5RpkfW8YqTm3XKis8HhC9lKbgzInmHXepGMWAQSTuBG7HyaemCbQ", "payload": "" } 2022-11-17 01:38:37,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 01:38:37,220:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:37 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 327CXZKMWZqoBq3u__ginjhNak49eRIY7cdFNfogEDzn_c8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 01:38:37,220:DEBUG:acme.client:Storing nonce: 327CXZKMWZqoBq3u__ginjhNak49eRIY7cdFNfogEDzn_c8 2022-11-17 01:38:37,221:DEBUG:acme.client:JWS payload: b'' 2022-11-17 01:38:37,224:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjMyN0NYWktNV1pxb0JxM3VfX2dpbmpoTmFrNDllUklZN2NkRk5mb2dFRHpuX2M4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "exjKVQUs6lDxpmY9pWTpzNIy-9gDH1wP0Y4PY-zJ3kYMk6AtWSbhRiBwtGfjt8mvid7e5QdObJoZVgirtJ_qFciXGQiCti5ZTwxVzQoMySQ9Zi3uJ81w7CJq7h155ei_YjBlTHe-cuULjz402r1IcFxJU3P-adu2e2jLkXjsNihY8hixsBhZLHPClrFHhdIX4Gzr6GDoCpjHAZMD_OCWYwT6f5iTLuglmhggm5XQXMxGPji5kaRriurdhI4qrHn-tgZS5D3UnR9C_wL_-uEqRblwRDkAT3Hw8mhGsd2mbX8Z4_8gvltnHtF72Sd1gwGA6LBQupwALkKzEROfDNa2NA", "payload": "" } 2022-11-17 01:38:37,326:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 01:38:37,327:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 01:38:37 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C8783Mesq6C7jSalhG9WJN2Xnorm4EO4aAYhMY2GXqujNNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 01:38:37,327:DEBUG:acme.client:Storing nonce: C8783Mesq6C7jSalhG9WJN2Xnorm4EO4aAYhMY2GXqujNNU 2022-11-17 01:38:37,328:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 01:38:37,328:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 01:38:37,328:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 01:38:37,328:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 01:38:37,328:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 01:38:37,333:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:38:37,672:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:38:37,676:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:37,677:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 01:38:37,677:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 01:38:37,684:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:38:37,998:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:38:37,999:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:38,006:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:38:38,428:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:38:38,430:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:38,436:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:38:38,794:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:38:38,797:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:38,804:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 01:38:39,196:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 01:38:39,198:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:39,199:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 01:38:39,201:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:28,792:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:20:28,793:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:20:28,793:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:20:28,793:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:20:28,806:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:20:28,808:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:20:28,808:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:20:28,808:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:20:28,808:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:20:28,897:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:20:28,899:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:20:28,900:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:20:29,378:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:20:29,380:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:29 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "N-CsprCMkAc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:20:29,381:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:20:29,616:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0002_key-certbot.pem 2022-11-17 02:20:29,622:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0002_csr-certbot.pem 2022-11-17 02:20:29,625:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:20:29,625:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:20:29,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:20:29,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712eaXAonA034bAzenFERTa7Mo-qq1DIG_irQj2i2EWyac X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:20:29,701:DEBUG:acme.client:Storing nonce: 2712eaXAonA034bAzenFERTa7Mo-qq1DIG_irQj2i2EWyac 2022-11-17 02:20:29,701:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:20:29,707:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJlYVhBb25BMDM0YkF6ZW5GRVJUYTdNby1xcTFESUdfaXJRajJpMkVXeWFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NU5FBsQDwY-cyyygrFL9ND_ek7nOjmwF6laPlnlBfXiy5KG7VVp3-dcE_7VpAvklyX9bO1ZksvDW4Ugj0tqnGt5eayfsfT3EaTTC6wM7FoGzfbOjtkHV6teK5okiMvVMXZz-ZvwxVCo8JbiRYQgcaRbDhVSzfbxMrONEtXx5T5pO5wP7lJ7mdFpkAf89oZUQehq4TbDOgAZlMiS4ZRvwUAfuH8RlqLWlqJ4bpyVjx37IQhaC-BBRR-cri5_Q5ujhJZIUv8BgyP2q2WjHVJhiH5FXwpFZQe4QD_SJRDfkz5Ul0aIOj6szoQ08_iyA-EK8jlcmn5u0yz6vPZerYBjXbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:20:29,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:20:29,792:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:20:29 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: F9779inTu0u2Aj5dhs6UyNap2jdJMrOcwYVOT10CYpjlWy8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:20:29,792:DEBUG:acme.client:Storing nonce: F9779inTu0u2Aj5dhs6UyNap2jdJMrOcwYVOT10CYpjlWy8 2022-11-17 02:20:29,793:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:20:29,796:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5Nzc5aW5UdTB1MkFqNWRoczZVeU5hcDJqZEpNck9jd1lWT1QxMENZcGpsV3k4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "JzyflJf8tqfiPwllq-J1Nxwv-nAF1T1S3BqDknBfWIj-EVgONbS7hOsyxQS_OHNrYS_elvrO9RFwpuceKAMurEHp2Y8Y3dNUegJMN4SyyLmvWkMmu6zsotyWQ_RP_vdcHEpFkSZvcDiMMD9xTfJmpEdgbJkIIQwOHn7ZkSC4gvI5gsXGA0YMa3G7-k5iG1AMfQ1R_oAtJD53zgv4HxgRaiDpWgwn0mWCGbBEp5f1tahhiEaSM_bkf-13QTyC0f1n0MzwxEcyumerrcVZaoc-twUJkTTlaNgJfMoKPzjxE8Vvx0VcQrkFuUhOoT4jt7OorbX1Zu0Ubt_6HdzPhsMD5g", "payload": "" } 2022-11-17 02:20:29,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:20:29,880:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:29 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712yB-WQzJJfvw5JiUVRalyqslQ4N397-89SpGT-CuJ1ko X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:20:29,881:DEBUG:acme.client:Storing nonce: 2712yB-WQzJJfvw5JiUVRalyqslQ4N397-89SpGT-CuJ1ko 2022-11-17 02:20:29,881:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:20:29,884:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJ5Qi1XUXpKSmZ2dzVKaVVWUmFseXFzbFE0TjM5Ny04OVNwR1QtQ3VKMWtvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "bkSNMT11py-pi19Vrolgha_lERGQsM9YzHvRe4y6L8aiSwxWiLj6FHL2-UX6iP9q-PCeUHuXMIBvxG_KxrjIC-EpUt9YKhKQgrZXSERRVTGnBaOPkW3wiwlN4xuTRJNU0bTj9PfxVCZwaxfwTgnNaYMELoRZ_civswrcmOXKUbYr5LEDPi4wCKW87KNcnBin6OyZNi2BTkwxpWsitkFoX756XhvfUs7jxorWp5O3qlnojTFmCO5zo5up8UildQovLeQ5miDAcfKcQTtxu2B4VWJTAw6HjlzVAdGg0JLghmdmxQ66dnnYVUoy19o74hDTKrmuDbIAVotyCvn5hgasJg", "payload": "" } 2022-11-17 02:20:29,970:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:20:29,971:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:29 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400dJOFeMAEXgiQpIkcHCsEeHNvht1ZiLjCta_ezv7OU-s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:20:29,971:DEBUG:acme.client:Storing nonce: C400dJOFeMAEXgiQpIkcHCsEeHNvht1ZiLjCta_ezv7OU-s 2022-11-17 02:20:29,972:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:20:29,975:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBkSk9GZU1BRVhnaVFwSWtjSENzRWVITnZodDFaaUxqQ3RhX2V6djdPVS1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "Iuz1cFU__fu2cc3m-IJVoyX5hIgBcIqNsMUB3pvJ-rEsqwtOpoAJN7uuqV2D1ZvaAFUwQhnBI9qx0N6jLeb_-o0Yr-eD13iKVpNVqEeCSrgjMbqrC2sZYnSWFdJ-onnofFOn4bTLmM6253niqSKMmGJ7bXr_KF1m0QG2iRUNzNHm5_BYDr7zUtcCrCvRGlH5IE6X0Ny9Pg5YxtANBKnND76Otwv4S8JtKJEvjxsv3LYRwkmIccx1ORorWdREu1_q4yxsEioZsbm5yYd79Awbuy3nR4-cEZk3GCu9JjJ0t2jdNKDPd71Z-X-V-LuSpH-AyT7rVgtmlgntpnj6KbOxew", "payload": "" } 2022-11-17 02:20:30,052:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:20:30,053:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:30 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712sKF-TOaK-eq-0kGceFCCQd0lcNaaQEMU_S4nfvmTm8A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:20:30,054:DEBUG:acme.client:Storing nonce: 2712sKF-TOaK-eq-0kGceFCCQd0lcNaaQEMU_S4nfvmTm8A 2022-11-17 02:20:30,054:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:20:30,057:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJzS0YtVE9hSy1lcS0wa0djZUZDQ1FkMGxjTmFhUUVNVV9TNG5mdm1UbThBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "URvss3MKc3RvVk9Hu1om-idz7j_EFftVjwJV8uKab4Lpl3QsRNnnW81scib9CIrkmhuZk1CtmQRKlEfEARJJ6YdxCuFK91oL4_S6ibQhnkQwAijWfQw62vWbe-5UjmwjhZi3ST9OiDaKj_L8cYewXv6kZTGO5Nx92Fr0IEztvtDS7RUmxR0tviIcOIhTdJzQoLd1Irxy-21exRD8rpxJ5M9kykNGhTHOffkc9EsZHJvgCt-bhFfZLcTVVK_to8piMQkDvQahONBvYkXqEAk9TliFNzx9xT5t0AkH930_GBM8a65Y_fO7VA6MJ5qv2QkusB8-vARTZc3e0YNeZAhXIQ", "payload": "" } 2022-11-17 02:20:30,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:20:30,139:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:20:30 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEYmdGc9hR5TKMGYVhJi-V3d3dYhGId439X2JCaQCD0Nw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:20:30,139:DEBUG:acme.client:Storing nonce: A5FEYmdGc9hR5TKMGYVhJi-V3d3dYhGId439X2JCaQCD0Nw 2022-11-17 02:20:30,140:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:20:30,140:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:20:30,141:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:20:30,141:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:20:30,141:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:20:30,148:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:20:30,555:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:20:30,560:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:30,560:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:20:30,560:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:20:30,567:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:20:30,912:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:20:30,915:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:30,922:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:20:31,240:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:20:31,242:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:31,248:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:20:31,613:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:20:31,614:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:31,619:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:20:31,909:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:20:31,910:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:31,912:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:20:31,913:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:21,656:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:38:21,656:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:38:21,656:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:38:21,657:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:38:21,672:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:38:21,674:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:38:21,674:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:38:21,675:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:38:21,675:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:38:21,764:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:38:21,766:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:38:21,768:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:38:22,301:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:38:22,302:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:22 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "H1DA2U57Lbs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:38:22,304:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:38:22,706:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0003_key-certbot.pem 2022-11-17 02:38:22,712:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0003_csr-certbot.pem 2022-11-17 02:38:22,715:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:38:22,715:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:38:22,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:38:22,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400eO1IoVb2YNJnj7Fuv4a-_npx7mMyTaifb-1zgdtvs6Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:38:22,799:DEBUG:acme.client:Storing nonce: C400eO1IoVb2YNJnj7Fuv4a-_npx7mMyTaifb-1zgdtvs6Y 2022-11-17 02:38:22,799:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:38:22,804:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBlTzFJb1ZiMllOSm5qN0Z1djRhLV9ucHg3bU15VGFpZmItMXpnZHR2czZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a0IeahI33mjczpTNyD4cWDNA4P_UvsCNSLBdffso5M-MeFglWkjngtW5lnUJ9nk_lfvklBDJKQV3YuoRlxQ2nbvplIMY1aErZbI9H_DIkEVmeBZrhKPy3blkp_wMqv7y5aVSbKtBAXB6WTBG6Lw9MKfAvlAlyy3clCfOoND7OzY_1MxjOJ7vdRoR3UNSYlvdMx7cg0Nw_-rY9fvCEHPvIL3-aI5duPrpCF6usLdvAqyAkiPKNgwL0WTB85E12VXgj6kvbLEAlmRZOYusJJUw8bsPwPOW5SO064hJxzr_ozySXAACqJZrw9Gir8v1XmdzvrIedy0zxkVuaN7dR3dKmA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:38:22,900:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:38:22,900:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:38:22 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: 2712nhjjh_ItLzDTZG28EWapzgCfgTLh6M9n7NVJ7pD2nss X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:38:22,901:DEBUG:acme.client:Storing nonce: 2712nhjjh_ItLzDTZG28EWapzgCfgTLh6M9n7NVJ7pD2nss 2022-11-17 02:38:22,901:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:38:22,904:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJuaGpqaF9JdEx6RFRaRzI4RVdhcHpnQ2ZnVExoNk05bjdOVko3cEQybnNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "WCuBL4Id-O4Jdvqy56T4c0CgkpxtDoSI7JjutVJ7M1168oRhYaZslM9vE4Jzni5tUMamHeB3ZkmgpS_rWxGIfhX4mGU4c8cLyh5WWp_QZ91H5w-ObZBJaJ1et5PTz_O_Bzoczv9U0Lxyaif1jStSUvpuHsfyB9LbpBlNMJTY3JnI9BHM-HptbwF-V1fZuPUdRvThno2vEWsWcaacZ3tEzh6SAYOWBO1ULhVpMr_Fu3KNHg4slEg9KwsWdHAKKtPx-ul6d5xVIXfZQyDXVIw_8s0gVsEoN14T-5yL7cz53lk21lOT7JHxwbMC54FQot-S-JTSEn7FmWifqqSpqOxN-g", "payload": "" } 2022-11-17 02:38:23,032:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:38:23,033:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:22 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977xxJT-1X8-SkZRBaOFoJHY0Y6WoPIWEG3CSC9yfck0QU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:38:23,034:DEBUG:acme.client:Storing nonce: F977xxJT-1X8-SkZRBaOFoJHY0Y6WoPIWEG3CSC9yfck0QU 2022-11-17 02:38:23,034:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:38:23,039:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5Nzd4eEpULTFYOC1Ta1pSQmFPRm9KSFkwWTZXb1BJV0VHM0NTQzl5ZmNrMFFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "CM6SrvJP4J9LKfgXYz-2dUFLhzrwyAGzGDEU5dPYoByLzctEo-iI3__uRW5T0P3iofwa2V79UzY1ZzSO8Sitd_-GW_nAFKpODerrJt3WNQ94FmmophjiyEIHadYmPJRTRdEanFzZB4ApqLoG8HoZlGKz21NTZ8B-la6ONq9zUsEsBS0X_sShTfD0jUSslFAHYpicVncmrNrsAR6k0wLLAquaXKISk37jI_gGExXpwUFkdjjwFqk9u2iDqTBjNAJBhEyvXvtQ85e9S4LYD_6WgjSfT6vjQxvu54OqL_Rh08Yi3MJ5aMHDUyZibYL7VI2iVO8TkwNcz6K8HsCw0aQyLQ", "payload": "" } 2022-11-17 02:38:23,127:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:38:23,127:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:23 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712y_MOWomnlzayVl3YhCVuYRgMXEwELJgFy2x--pgS-fQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:38:23,127:DEBUG:acme.client:Storing nonce: 2712y_MOWomnlzayVl3YhCVuYRgMXEwELJgFy2x--pgS-fQ 2022-11-17 02:38:23,127:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:38:23,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJ5X01PV29tbmx6YXlWbDNZaENWdVlSZ01YRXdFTEpnRnkyeC0tcGdTLWZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "EupnAOoKNpLtZUqMoCjcMuWPBHhNBf2RjAjRf6KOyBP0OCuIcl6N0ZljXi_VRY2OeAjhB5oqpGO9YfpbMrR8fmETI1UzPvBPZilQ1KdoUecMdOcchOGftEg0iMD3SgLXHWZzwQtNmT1Hd9o8C0Isr2b1-R-dIVSUSM6142a1X6HY4TRMmiRVs0Auh7_kn1sqWU8wg64lyZ0sMEyhtWvUYVEwVyl7azu2MAxm6ws8L3j3V23D7NinuB-H4XLILvEew4nM3yhkNfqIEPMWox7UWt6kCUSvtGrRiD30ZGuSHfcF3ayE5iw4r8DsBagzJ6iXPcyqTnNfqkscrwVmvi3nnA", "payload": "" } 2022-11-17 02:38:23,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:38:23,214:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:23 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEYumaU18IUKQnG8cMTjPGIGM7papB6tGrxTXQYL0J9N4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:38:23,214:DEBUG:acme.client:Storing nonce: A5FEYumaU18IUKQnG8cMTjPGIGM7papB6tGrxTXQYL0J9N4 2022-11-17 02:38:23,215:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:38:23,218:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkE1RkVZdW1hVTE4SVVLUW5HOGNNVGpQR0lHTTdwYXBCNnRHcnhUWFFZTDBKOU40IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "FYCRhI5LWBaDnvr-Ojz-XunnzqOyN6j7ccM9qIUDql4U6t-iJUVqNvxViJzsx4qEoCPYArReDXA0cbN8EVXOdRyq7DTqiX7TANr1kL0ykm0jFMR6-X8OjO-YdnHW8gfzFgvBnK0_D5OsEpkn__7T9wzCrqjfZT9ijFJXL2Xoea3NJzrXeNsZ3YA0YsYNz4k42iCBGWfn0hN3EKnAYsbQIhhUqZKw0SiJD2zjH9ngZ79yZmoU0oOWmEQOJnDBdYLcBqgJP0xtFXbHKMjOdOijFWL64WGVqZKsL-2Nx--O8f_pYdk1rHx6dYUXsCGXPCtdIaM0Ni51dQaA20aP44heqQ", "payload": "" } 2022-11-17 02:38:23,304:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:38:23,304:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:38:23 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977RlWQ8EHO1rvQ0pPepXhstrw-NrgeBQixkNiipvRG2r0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:38:23,305:DEBUG:acme.client:Storing nonce: F977RlWQ8EHO1rvQ0pPepXhstrw-NrgeBQixkNiipvRG2r0 2022-11-17 02:38:23,306:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:38:23,306:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:38:23,306:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:38:23,306:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:38:23,307:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:38:23,315:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:38:23,680:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:38:23,688:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:23,689:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:38:23,689:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:38:23,692:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:38:24,016:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:38:24,018:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:24,023:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:38:24,373:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:38:24,375:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:24,380:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:38:24,704:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:38:24,705:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:24,710:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:38:25,034:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:38:25,035:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:25,037:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:38:25,044:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:29,401:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:41:29,401:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:41:29,401:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:41:29,402:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:41:29,416:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:41:29,418:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:41:29,419:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:41:29,419:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:41:29,419:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:41:29,507:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:41:29,508:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:41:29,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:41:29,818:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:41:29,819:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:29 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8csY4ad6HZw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:41:29,822:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:41:30,476:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0004_key-certbot.pem 2022-11-17 02:41:30,483:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0004_csr-certbot.pem 2022-11-17 02:41:30,485:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:41:30,485:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:41:30,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:41:30,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977tz6c3dfpaveEpDZCxgbBjSgqi-s64H0ZdZmDMQAUt4U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:41:30,561:DEBUG:acme.client:Storing nonce: F977tz6c3dfpaveEpDZCxgbBjSgqi-s64H0ZdZmDMQAUt4U 2022-11-17 02:41:30,561:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:41:30,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5Nzd0ejZjM2RmcGF2ZUVwRFpDeGdiQmpTZ3FpLXM2NEgwWmRabURNUUFVdDRVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JNhidiqHAMldX_-8sZ9te0g7m6lgl3jf_fH7zNNqE5lBL3HmH2tjnXXrgSmXWeBDY3y8K7TsojL4b25FTVmp2eNrOVB3dI9x4DvXTbyI5jujp4fYfxiOWMoBNHHp-bwmtRTfN7dVQ_ULohqYhz4oPzO0zGjKORkzhPvFC0A0n55iGYdOVYU9qlrlNa_40kWGShAIexvXh-nZiwFvsVzujbpic1H3HeFO2oDp548xgO3aXtl4gVbvQnwl-aYECw64bZ02Y_mYGNqRru_-xh1eYTsgZ479hbUO0xzbcQnW4xAfnEXSZAe04lDtX_5Ehuh8E6YMdbZvx53wXrmooCbl1w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:41:30,653:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:41:30,654:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: C4002d5MQBmqxf_4g5Rar_z2-f_-sb1OuVzAk7BvbbrhVZg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:41:30,654:DEBUG:acme.client:Storing nonce: C4002d5MQBmqxf_4g5Rar_z2-f_-sb1OuVzAk7BvbbrhVZg 2022-11-17 02:41:30,655:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:41:30,658:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDAyZDVNUUJtcXhmXzRnNVJhcl96Mi1mXy1zYjFPdVZ6QWs3QnZiYnJoVlpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "It8KadrHqFm6y_a5YD2a1OUG97dBykyH5n3_mWemdjs2ttW_5c3On81P5C4JHyohgDf1536sM3V-r5FvVnMKLTiOAAlherI0U_bj5O6g5GkUQXh6db4pAkN6e5BET3V_vNwbw17xNJrDJHlCv-P7j6os4ROao4qQmNSJkMmUoSyRrC4fz_6Z1U2gPV_cC3F0K4neLWsYtMvsZLfRuJ2qhZb-qk5T5fys5sNC_-i96-tq4xHqSsuIYsNuRy8H5GuZoIdxboMIekDAsWcSIk45jJmWZw_kIPlMl6_ob2NtG8KZ9By06cCQAITCAxqo8JFb9uwJZorSETRiu9Fbcmqh0A", "payload": "" } 2022-11-17 02:41:30,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:41:30,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712oY30FWNVZtKXZz13fDaY3MFyk98d6ji6LhlAMEOsBnw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:41:30,738:DEBUG:acme.client:Storing nonce: 2712oY30FWNVZtKXZz13fDaY3MFyk98d6ji6LhlAMEOsBnw 2022-11-17 02:41:30,739:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:41:30,741:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjI3MTJvWTMwRldOVlp0S1haejEzZkRhWTNNRnlrOThkNmppNkxobEFNRU9zQm53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "Z0YLKOtI8uAIVQ29rUT3oOsTs32vg4rTjvcjGpOJZN7KYualpI_GIEiD6qzgv6T9crfv1F8la9tfnAUjBCFGzfxGEGaGCenr0_396SnxnT2LBUqWo_BCwOE3irtwfyXICSleMF-ZF_KNheSxvWejcZ2aGNAYrI7AoLunOB6Uwr-9W2RAPxx74rxLHD1p-l0yJcYV_V3_ngdwnCWsES51aHr1Yh56EPKYpMUy2TqMCpxeIy4nnloTuGYZutnSl8rIeb2YP290c4aQHvafdqa6DgTQv1z1QrO6JxMXktEBfhGFfMtjC6WXnwiQBznd54ScIEXjMnBCa2vtOH1RnZO7LQ", "payload": "" } 2022-11-17 02:41:30,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:41:30,820:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400dPJ-WsPClOSrQ-aVmISC8iG4bxqXOu3hFzsbuma7gCc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:41:30,820:DEBUG:acme.client:Storing nonce: C400dPJ-WsPClOSrQ-aVmISC8iG4bxqXOu3hFzsbuma7gCc 2022-11-17 02:41:30,821:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:41:30,822:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBkUEotV3NQQ2xPU3JRLWFWbUlTQzhpRzRieHFYT3UzaEZ6c2J1bWE3Z0NjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "M03VwoOHCWn_lfuyjVFEErddZJmLtCbg8sVc11-EmZCikcR8gvqaKn017T441JpdPDGbscfazTrMl3jf4GeZjqft5VBx7ZrrQe0xx5jUWfPT5K8EeLaYYs9HgDgZMblz4z_wFZwJZoohFHWTkejDJm1hxBqcMknhqlXdbRUuOXNZ_CQvCWB-n6BZSPdDa3s-TS4QYgo_jcnlmY0fLJS-zF1i7qlogRHDf68uSPJVPbAVeVmMz02pM_-UW3S0Ce0WPlfJaG4emxKQ1VTZPHxKdIpYoMLTTH1GoCj5bMkkFDbewqXBT2wTxh9KPm-BpfnDM334zQ3a-Z4He6X5-coB3Q", "payload": "" } 2022-11-17 02:41:30,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:41:30,899:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400fd8xBRdAhFv671X9NvIOpZbSEJMCCLf5SYD7VInl5uw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:41:30,899:DEBUG:acme.client:Storing nonce: C400fd8xBRdAhFv671X9NvIOpZbSEJMCCLf5SYD7VInl5uw 2022-11-17 02:41:30,899:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:41:30,901:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBmZDh4QlJkQWhGdjY3MVg5TnZJT3BaYlNFSk1DQ0xmNVNZRDdWSW5sNXV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "GviDLZJQmHQXQr1S__nd6OTp1f31q_bY2FocNbI-CCoIaATd1bs6k9gPZWOgiol38tEXGcUp3vrACQkiXAVnmwA_k9hwatV2nmLZq_iMDzv8NEykc6PV9vn9KM4b1BPR0S-FqC18cI6pLhtIcuqxanCvoViflarm99xUNKEdPa7kDFPkHhHoAVpJKW_B-mq4ZmkCUQYtBomlEhDpXPkqkouhKHwCsB5wlXS2OQpCplxVIzqYcfECSqsXdFD3jRGOwvkEIOnGCB22Du1we4tqeDNW9ruhC_YHceNDedt-PgzzbNWC50uTxkStHgfEyI5Rnxji2aYi3K5vu-sFmboqHA", "payload": "" } 2022-11-17 02:41:30,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:41:30,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:41:30 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEQ3zsY2XiBoqnJPtcGh83_XYGwKa67Fq-9sZ889tcUFI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:41:30,979:DEBUG:acme.client:Storing nonce: A5FEQ3zsY2XiBoqnJPtcGh83_XYGwKa67Fq-9sZ889tcUFI 2022-11-17 02:41:30,979:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:41:30,980:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:41:30,980:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:41:30,980:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:41:30,980:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:41:30,988:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:41:31,461:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:41:31,473:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:31,473:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:41:31,474:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:41:31,481:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:41:31,768:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:41:31,770:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:31,778:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:41:32,080:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:41:32,082:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:32,087:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:41:32,505:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:41:32,506:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:32,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:41:32,789:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:41:32,791:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:32,792:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:41:32,796:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:26,174:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:48:26,174:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:48:26,174:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:48:26,174:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:48:26,190:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:48:26,192:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:48:26,192:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:48:26,193:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:48:26,193:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:48:26,284:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:48:26,285:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:48:26,288:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:48:26,815:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:48:26,816:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:26 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PSDIUkybrsw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:48:26,817:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:48:27,632:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0005_key-certbot.pem 2022-11-17 02:48:27,639:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0005_csr-certbot.pem 2022-11-17 02:48:27,642:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:48:27,642:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:48:27,710:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:48:27,711:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFA7hlVeCb2QJkyCB7WNRX-_rlnAmG2LfFMf6kYSANWPFU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:48:27,711:DEBUG:acme.client:Storing nonce: 1DFA7hlVeCb2QJkyCB7WNRX-_rlnAmG2LfFMf6kYSANWPFU 2022-11-17 02:48:27,712:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:48:27,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFERkE3aGxWZUNiMlFKa3lDQjdXTlJYLV9ybG5BbUcyTGZGTWY2a1lTQU5XUEZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "alw5ivD2oyvl_KHsQPPOQmTIzuHA9Ut2y76pjDfP7t5ZDQaLJ7lc71xyW3WVyQS2jfQSbs44bi_blXc7X6z5dFFQ5vo9hvUb3u4KR6qr637ww4ZYhlf1EnMewFnOhk2Yw2jFmKX5619YdUhIWnBLFckvJmaf4GJwNi2MxvhF9NBV2OLdVAaM7o7aCCHMeOmhGhrhz8khjo3KLXedFvuhX2Zq1Ym67dUATEgVuZEqnGqtg9IdWWuOzG_Wyn3N0sNRsuyHdWc1CaYFUemNShwwSxxfHEFalThvOF0-by_4WVylo1KA3Fu79NqJfl5eGEHD-QSz6TduxKG075OqW3SIDw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:48:27,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:48:27,872:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:48:27 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: 1DFAfbiO92Cd1ND-81Zo95ZK5TWy-DANEWItrIvA8ljDlNc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:48:27,873:DEBUG:acme.client:Storing nonce: 1DFAfbiO92Cd1ND-81Zo95ZK5TWy-DANEWItrIvA8ljDlNc 2022-11-17 02:48:27,873:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:48:27,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFERkFmYmlPOTJDZDFORC04MVpvOTVaSzVUV3ktREFORVdJdHJJdkE4bGpEbE5jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "dS_138PypLE2nBU388opWBKMIMtCmwImT16huiuYjFXSUCvRYSEvvI6XRstiwmoDmDS4Mn86NY_6jRO4HrhyieXmAN_V_Wt5KNmD4xJB3bdLSSsISgVGDFGzQy_SgAYh60sxPh5XE9t18GC-SnP4irRSSWljUxpzjh6CgisvmMnL1FQIYNObxQBLaYnhmCpcUiACuKe5l0uQpfZdKI5F_JP5PjE6TQJSRXiDQWNaS93tr2uya9NLnIFMEhtwucji_7JTfWifyAFFUo7-EBt51fSOzMscaHwqI_tqC1AUTXZKSTUUu9UsAYrh5dqlt5XffkIr2qU6ZyL41MKrnnH73Q", "payload": "" } 2022-11-17 02:48:27,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:48:27,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:27 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C8786ifRxq-R5EjCJeSGc0aAdMcCbylILHDqY0QK7fjvTio X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:48:27,978:DEBUG:acme.client:Storing nonce: C8786ifRxq-R5EjCJeSGc0aAdMcCbylILHDqY0QK7fjvTio 2022-11-17 02:48:27,978:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:48:27,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4Nzg2aWZSeHEtUjVFakNKZVNHYzBhQWRNY0NieWxJTEhEcVkwUUs3Zmp2VGlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "fn3f5aU_ABKX1mH1z8w2bgHx4OC_sMdSnUM447AHp8V7R9lv-ctBHgOTvbj5TLiw7ggiOBVK2xvlKwB4V_a6mVIOIl0K4MLYA_utdcBMK6KtmS1utkNgUZ9Dvo0d7Janz_yTzOODULG-kSfbNaSdhH2v5iqFI7rVMnY0IVrsXIU-xYjHlaCGaAbjMXFL487y2nApXMfaL4KfGHyQ6GGjVLwUpa5USbj8qtea90_dk2ksO3nF5k3FiugQcvzlyD0sQ72X4T9J2aH5Ev_1nC7LL-nYZrmMTb9UxbUjB815xIHW0p4cvG-ORKaf-JFZNkrEC5BvzYSnmu5SaNdOuqogbA", "payload": "" } 2022-11-17 02:48:28,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:48:28,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:28 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 327CPusZqTYMOnhwNK4Ns5_9GOeHOX1WqFFhpdg-k_8wnEk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:48:28,070:DEBUG:acme.client:Storing nonce: 327CPusZqTYMOnhwNK4Ns5_9GOeHOX1WqFFhpdg-k_8wnEk 2022-11-17 02:48:28,071:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:48:28,075:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjMyN0NQdXNacVRZTU9uaHdOSzROczVfOUdPZUhPWDFXcUZGaHBkZy1rXzh3bkVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "dZ4khLqzUVLuRlkYE6Fruh-5jG6h6HK0FkCdHBTP6V5kYUVnyOkd86ilDm5QF4DfFWPXJjSgK55igOIc43_O6xphICLguZuHsithEmnVmnQqCZRHiseKIg-4Vn0I0ow3z3VJ1mpl-TA09DP_x2S6fZcXvj8TI7-Qdmx1772jWa00e8A78HCZj12FNSazFPAtQNAm_fWbZOzN9AfhbYgP1Q9H2C7h2JfuGpUN9QRCXzcOMrufduj2xDcxeO3guu9W8UN9Qny00V8rNAdcjmSgD5xb9SYnfzRPBsJjweR3XygOwokL3wq6TIyewtcDlHD_ogdL8kDWbnopn3UgiOlg6g", "payload": "" } 2022-11-17 02:48:28,158:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:48:28,159:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:28 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADdZI2J9ewRDZ_L8i5xzSwETiGecFAhkzxVvyZZvjI-e8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:48:28,159:DEBUG:acme.client:Storing nonce: 1AADdZI2J9ewRDZ_L8i5xzSwETiGecFAhkzxVvyZZvjI-e8 2022-11-17 02:48:28,160:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:48:28,162:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQURkWkkySjlld1JEWl9MOGk1eHpTd0VUaUdlY0ZBaGt6eFZ2eVpadmpJLWU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "bxOZv-NSIPqTpITZBCOQFNXiV5TzH5IKMugrdil8rF4LJGIYkAbTq23o_qR7dN2QQhqWgkZMuYv8rWqFgFj7K5O6kx6hDl_OHb_S_hDVVj48aCtE3Q9AMELOopIimD2X6Z8OU-BWMk4VvnsYddyKyZpaX_EXSFl7MOBtGxmQnH3S3mySdN4dkHZeXRKT-jilZM6vVhJmb9kjxqIAuIcmowM44zfJ0j8lCr0VEBEA7hKE_6fKDM6J3VmmwHa5qcpQn-zCsC4Yz2wDDE6SkzTz9GhbGxuAdy9d4s47YN3hE2aNomhVMDCsGESjswrrF75_CnL_AXaOskKR-UzbKSfjTA", "payload": "" } 2022-11-17 02:48:28,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:48:28,251:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:48:28 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADpAfnbJxWlTaYQg4PJg0jmb-vlnCVfJ3MK30AsE2qVQo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:48:28,251:DEBUG:acme.client:Storing nonce: 1AADpAfnbJxWlTaYQg4PJg0jmb-vlnCVfJ3MK30AsE2qVQo 2022-11-17 02:48:28,252:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:48:28,252:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:48:28,252:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:48:28,252:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:48:28,252:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:48:28,260:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:48:28,789:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:48:28,797:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:28,798:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:48:28,798:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:48:28,804:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:48:29,117:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:48:29,119:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:29,129:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:48:29,436:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:48:29,438:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:29,446:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:48:29,746:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:48:29,748:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:29,756:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:48:30,087:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:48:30,094:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:30,096:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:48:30,104:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:45,754:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:56:45,754:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:56:45,754:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:56:45,755:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:56:45,767:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:56:45,769:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:56:45,769:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:56:45,769:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:56:45,769:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:56:45,854:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:56:45,856:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:56:45,858:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:56:46,134:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:56:46,135:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:46 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "61mqGlh4XLw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:56:46,137:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:56:46,849:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0006_key-certbot.pem 2022-11-17 02:56:46,855:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0006_csr-certbot.pem 2022-11-17 02:56:46,858:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:56:46,858:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:56:46,928:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:56:46,928:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878Z4uHYtfwyDM-PMLrd-a0MgssY6Rar4haiE6Let4227k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:56:46,929:DEBUG:acme.client:Storing nonce: C878Z4uHYtfwyDM-PMLrd-a0MgssY6Rar4haiE6Let4227k 2022-11-17 02:56:46,929:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:56:46,934:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhaNHVIWXRmd3lETS1QTUxyZC1hME1nc3NZNlJhcjRoYWlFNkxldDQyMjdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FLQSOzXbvjnxHP7dWGK4KZFpt2PAILMMkKRpMn8EYwNo43QwFjD3V1QXcHuAFKpwIEXLj3kMP4lIk5Z63lxGTzw2Gd38S5v70kCpEuERynYEAAVq4Q35xdfr4g1-ujVIQR8HwX6pdkaNYC9C84LTjurt2eXthRB2g7gXouvqlHGEJbMQvOww-Osbro6gGLp5B4HT-YDW8TNNa44Wn07SNizNnc3QFjff2aFNkQXFjytxlSu820UE7vnxpN0RawfOBr7Hil1hsazEs8vEhxnKFdwfwKcuSTOXg2wdahqrNDgz_RViXCqQ4wNjRzarrq_uofV2_zTxGyTvNH69hlH-0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:56:47,082:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:56:47,082:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:56:47 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: 1AADyBgatvC86aAftlBW3i1KrEkCxaNWF_mse2xyUAvRuLg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:56:47,083:DEBUG:acme.client:Storing nonce: 1AADyBgatvC86aAftlBW3i1KrEkCxaNWF_mse2xyUAvRuLg 2022-11-17 02:56:47,083:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:56:47,085:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQUR5QmdhdHZDODZhQWZ0bEJXM2kxS3JFa0N4YU5XRl9tc2UyeHlVQXZSdUxnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "Cuer5M5ick5qQDPR2g0lJGfWd9Vq9e2Tlik5dU-cWes1SBpQpuXO2EVvWY4v1dIvoU9YKOTpARLkcquRcmZbVdRNOqyMlOmPe8L-MU86gMpCp2CYF_rcVJUCdOxt5r4683mjA5TujcfzXc_6t02j-Xbdh9r-yUJadoWa669zcTBEykLcJUVTvnTNmZ7mhx_dg-aRBYnvqNPs9zbascBaW9f9wdvBATo7YwvXQuHIyRP8mS45tBHBZ0rv7khgXolC0cof-WNyoPBOeegu_jPG0ZZBtafM4uivNFKjft4GhhT8aIDUTBeDXDuDi4OP2H9wyL9WKSGwfomaPLgdNWsKyw", "payload": "" } 2022-11-17 02:56:47,181:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:56:47,182:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:47 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AAD7lEYGU4B_JbcdcsGON9fl7WJ4F-NJ0gCHOQXEa-WDls X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:56:47,182:DEBUG:acme.client:Storing nonce: 1AAD7lEYGU4B_JbcdcsGON9fl7WJ4F-NJ0gCHOQXEa-WDls 2022-11-17 02:56:47,183:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:56:47,187:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQUQ3bEVZR1U0Ql9KYmNkY3NHT045Zmw3V0o0Ri1OSjBnQ0hPUVhFYS1XRGxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "D319zk1jhIbDnQ85NUvYIvVzRZMtcPOVS5ZN5LkNKxmoI2liIlik7AoZGTT-cXjHxrJ48liZexz9uccrHROB5Gh8v-1KNmT1s3qKRK5_g40SdErW1gR52YzbxulRWg1yPGCg685G-xyjU6GY7qXU_N70HeOUPQ8SlWM5kHAelTM0v-wAGowM-U-aoVgx0GDvtLb85laR0uQ8gyFMyfZbnYFfljEJAdX64d5mj95MkATOsaxHaoFF75VSglMO0BlhlAJu5yh-4_tlAvgvTVXwiSbCg_iEVLvIKAurAC820tRwiMKAdiT4qp03IQjAJhgvqldWLIrowoGyeA9q4asLag", "payload": "" } 2022-11-17 02:56:47,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:56:47,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:47 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADnC3MPWTCFylCz0vNpSuQ4NlFk4N0WGQ0ofG5c726WNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:56:47,287:DEBUG:acme.client:Storing nonce: 1AADnC3MPWTCFylCz0vNpSuQ4NlFk4N0WGQ0ofG5c726WNU 2022-11-17 02:56:47,288:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:56:47,291:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQURuQzNNUFdUQ0Z5bEN6MHZOcFN1UTRObEZrNE4wV0dRMG9mRzVjNzI2V05VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "Ke00eTLAZ67nlSVdYGfwv8BVW5qGdtAkYizb3_UQDVuEajAWtQCR9eWK4FdSsY5r_mvvSuxNFYWXa-UdQO1NwRnQ13v9Q7n3PxBZe-WtzPhN_KQ5RAVAqIM7OGXYeGzlCURfB_b-n5HZA9vRjNu3T54kJ-SUPCUyHAecLCtoGGyriJDA7WHOesFzisVeQMwRKzh2p9H_GbwEZ6MfEtJK6LNA14JuRaKmGrZVzggGZLGcDf0VYdR09Obp2njtULyKnI1ej61euq4eldl76GlaIQesoKHVA4vkn9bXKnW1SDwwaNFUBmdT3oPiZhJcsw6eDQXgWwRJV3pfjviGjz5NVg", "payload": "" } 2022-11-17 02:56:47,375:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:56:47,376:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:47 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADUHLfZCqSL5NSDXFNiTw0PqTUyBoFWEs8WvDOyNk47FQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:56:47,376:DEBUG:acme.client:Storing nonce: 1AADUHLfZCqSL5NSDXFNiTw0PqTUyBoFWEs8WvDOyNk47FQ 2022-11-17 02:56:47,377:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:56:47,380:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQURVSExmWkNxU0w1TlNEWEZOaVR3MFBxVFV5Qm9GV0VzOFd2RE95Tms0N0ZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "QjriF_ODpdkOPeCrCtv2GLCeT_3Sa5muNJLgtgNmcvZOplzInD9JpAYKgAxADI-65yV3T1dwF2fZd_CtJy5yBKb1g4T_fsyNma-kDc7s2IleVQ2N4YY7tMhT0tzMFVpqMrvWW0g-4yWZ4HzuBqyO6AfG307fn2nEuizYP4AAUQ-zV8iE2I1FHUsn01oOMsYstE-3xohfHgNqgl5qWZwA5g2HEaMwn_fguldVWorazrWbCPPWSivblgqbgbNsFqO_G0mzq8uo_OZnMf32W3VzRWiEW5R3-YSUlMVMrcSCSjQCATtxV8XoUV_IB0qNuDgjsNDhNUYA1HFDmFDTxlnFjQ", "payload": "" } 2022-11-17 02:56:47,463:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:56:47,464:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:56:47 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADFCCEg9MF13m1BcSxVyGecsoxPsCuIfhX81J8QRWagqY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:56:47,464:DEBUG:acme.client:Storing nonce: 1AADFCCEg9MF13m1BcSxVyGecsoxPsCuIfhX81J8QRWagqY 2022-11-17 02:56:47,465:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:56:47,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:56:47,465:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:56:47,466:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:56:47,466:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:56:47,475:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:56:47,823:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:56:47,826:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:47,826:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:56:47,826:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:56:47,830:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:56:48,154:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:56:48,155:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:48,161:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:56:48,479:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:56:48,480:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:48,485:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:56:49,080:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:56:49,081:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:49,086:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:56:49,424:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:56:49,426:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:49,428:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:56:49,431:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:19,414:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:57:19,414:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:57:19,414:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:57:19,414:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:57:19,427:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:57:19,429:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:57:19,429:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:57:19,429:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:57:19,429:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:57:19,531:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:57:19,533:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:57:19,535:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:57:19,838:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:57:19,839:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:19 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dNk7WQzOpBk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:57:19,840:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:57:20,034:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0007_key-certbot.pem 2022-11-17 02:57:20,040:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0007_csr-certbot.pem 2022-11-17 02:57:20,042:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:57:20,043:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:57:20,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:57:20,112:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878WF-KVsvnhH0JBC6q2_ZGijAo_nVLJIL_vdyNsgg1HXw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:57:20,113:DEBUG:acme.client:Storing nonce: C878WF-KVsvnhH0JBC6q2_ZGijAo_nVLJIL_vdyNsgg1HXw 2022-11-17 02:57:20,113:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:57:20,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhXRi1LVnN2bmhIMEpCQzZxMl9aR2lqQW9fblZMSklMX3ZkeU5zZ2cxSFh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZSWgVDAvKN50HChl2wPeAKZV0_5SgM8IVNvLLNQF0-edShzng0peK-gXa85jR_OnKMEhwr0TEuO1ThrUP51bTi7nRIO_8xWc4QfYE_WtZYKmJuDwpFtXbQn3U3f8ueU3nQ9H65mCstOxQVY5T46V3fvIT1PE6xLj6fIrXQtQvka1i_OFWZvkHlNE6Z2WNdC4GLYcS_my1piHjlDuHFnpgRyqm08mwNBLKXCSwezzNYeqFNqSHybW00t-3tdln5wYitMSbkNuu64NY9ChZZ_q9939qOwWs_6TvUeYYAzbuaUEuu0qq7v7gUrCT68dFRewC9iH1rEQbislx2A2SHX-kw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:57:20,270:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:57:20,271:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: 1DFAWc_NB6WYeQHzu3nrAVDpaCX6V4hpbxC_hE6gcqc0ASg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:57:20,271:DEBUG:acme.client:Storing nonce: 1DFAWc_NB6WYeQHzu3nrAVDpaCX6V4hpbxC_hE6gcqc0ASg 2022-11-17 02:57:20,272:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:57:20,275:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFERkFXY19OQjZXWWVRSHp1M25yQVZEcGFDWDZWNGhwYnhDX2hFNmdjcWMwQVNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "eZjyPq25mepBOwLbYolXTHxqa80NxNkgBZr9yGegm_S2vNtEPzKmLUO9rmG3cAsZlFayxaSKVUCF69Cb7QXioob84BwnJasvMJ2_DGXtCXG6lmkYf_U20kupkXclIQI7qIrnHgKANGhPCNU0zvZoAOKoaKIysvtGU6MCzTZt72ZSJYbWCs3zjpd-YhT032_IstW3ZI9ctTaBKNsX-zP-8KOugn46h23R3YZiRCM3urK-pFTWrIpWWp2yj4kE4kVVXCWQyxg5ugDrBYHI2P4Jf09vt7UcvfKNm0woXWk5_FBU6kqkHCFoQ0xcd7MCChz3PGOiD2kBNIgejU1d4FB1-w", "payload": "" } 2022-11-17 02:57:20,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:57:20,374:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADmvoju9dsR6PLBoouMidJOlIPOifF_dUc1b9jOextl-w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:57:20,374:DEBUG:acme.client:Storing nonce: 1AADmvoju9dsR6PLBoouMidJOlIPOifF_dUc1b9jOextl-w 2022-11-17 02:57:20,374:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:57:20,376:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQURtdm9qdTlkc1I2UExCb291TWlkSk9sSVBPaWZGX2RVYzFiOWpPZXh0bC13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "DUvWK_Hrael94ceVIDbbq-L7C6EXyKEz-vb5L_okyiI1PdAtX_Bkw_8kuV6XiEUw_ynadcZRh3L2Xc4h-sbJKL7EHbWbgapyrL_5Hx49gk1rdfiNO0K6II3zNwP0vaUloIQ9jWAANZGPd7LlDmE7-2UypVc4oT_eil_N29z9VFMlZH3vm0dSc9ReZsOJMOwbrrWeSd4X81NJgNAL_K5JAxQ0mkap9FxFWbje-xDlfscqO9-of0MqLPI_XSLlBu7DoKbW7Quj8EQvx-QOGLvWsO7EC96YgE4K038qJly-n0xC2t6QcenD0DodC3GsIp7YVPFldFvxpH5ogk6dal9X6g", "payload": "" } 2022-11-17 02:57:20,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:57:20,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878DF7_YiYx3is9hfAD5Sk9nOvKXsr27OYD-F7xtrzGeq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:57:20,462:DEBUG:acme.client:Storing nonce: C878DF7_YiYx3is9hfAD5Sk9nOvKXsr27OYD-F7xtrzGeq4 2022-11-17 02:57:20,462:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:57:20,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhERjdfWWlZeDNpczloZkFENVNrOW5PdktYc3IyN09ZRC1GN3h0cnpHZXE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "f7XC3GevNPWj1ncpjL54Wa1Kh_-dRKF-kW_HisLtkEFEQjGPGxEl1Gbi5gW4guWG4mS3x-3PuePhke3Nzxbl7KE-XKa1GmRfXbf7XBweKPIv-njHM1lX6ez6JhBkaMOnji-QFhBApKKOrgc-YJuJ5VRZBWWvE9N78XYjKzfElbJkR3b2jvLOVIjPHAyddHmFgerwoAXa-HHrv1JltJpXy9cVx4MPpW8eaUGXvuH21eYO0iH-vy9TEZfx4MRvcli40KFt8KfpWq2Jn5NqduJQzqBKimdF7DNZEHxfmX8hfGfUFKgzvas06lvnzxFozvxpiSOuej28VXkJTfUlkHsEWg", "payload": "" } 2022-11-17 02:57:20,551:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:57:20,551:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADvzigsfRdGFCFoSL-_NQ30Tbl7nlJ63E36VCF1nXm7X4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:57:20,552:DEBUG:acme.client:Storing nonce: 1AADvzigsfRdGFCFoSL-_NQ30Tbl7nlJ63E36VCF1nXm7X4 2022-11-17 02:57:20,552:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:57:20,554:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQUR2emlnc2ZSZEdGQ0ZvU0wtX05RMzBUYmw3bmxKNjNFMzZWQ0YxblhtN1g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "LRkEej74Jc_gnCHHuMywgPJw4qSW_iD9l1lALB9D1rAsvkSB3eMczhWgiH7zrETk1j8HcH4BQqRgXHDLR-WXN98XuVhbEIakQNtoE7b6kNPDKMfq4u_qoZyObO-_cfM9bR0zK6s6YF15NoZEowUapzxaqM_ICBFGLKkjzkUe1ue4SHFrcVP2fvbcr5wS8vY9X7v9jCqZ5NZINVluNcmjJD6l1NImKTqGf5489vG8N4ZHGguDnFgE8KrkCQbUGhDvZyEZg1iWZ5Qi4vkC33vRH2VaeP2XcZFRNtBNg3kw_8agPaFAMqgep_D8jhM7oZ9LtTfRhpt4iHFsHt1KqG-lBQ", "payload": "" } 2022-11-17 02:57:20,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:57:20,652:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:57:20 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878UJEYN9nzUMqfx61hK9EI6L94KiqKyiUVdWUUt4Y-8gg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:57:20,652:DEBUG:acme.client:Storing nonce: C878UJEYN9nzUMqfx61hK9EI6L94KiqKyiUVdWUUt4Y-8gg 2022-11-17 02:57:20,653:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:57:20,653:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:57:20,653:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:57:20,653:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:57:20,653:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:57:20,657:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:57:20,956:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:57:20,964:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:20,964:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:57:20,964:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:57:20,971:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:57:21,314:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:57:21,315:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:21,322:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:57:21,661:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:57:21,663:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:21,667:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:57:21,985:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:57:21,986:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:21,991:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:57:22,301:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:57:22,303:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:22,305:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:57:22,307:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:45,390:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 02:59:45,390:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 02:59:45,390:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 02:59:45,390:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 02:59:45,403:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 02:59:45,404:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 02:59:45,404:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 02:59:45,405:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 02:59:45,405:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 02:59:45,490:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 02:59:45,492:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 02:59:45,494:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 02:59:45,787:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 02:59:45,787:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:45 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "N_wqTG9C2TE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 02:59:45,788:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 02:59:46,142:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0008_key-certbot.pem 2022-11-17 02:59:46,148:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0008_csr-certbot.pem 2022-11-17 02:59:46,150:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 02:59:46,151:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 02:59:46,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 02:59:46,226:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977rMEGrIGlOfjJ-OK8nlYJFDmKKuJd1BAueu8AzsrySBo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 02:59:46,227:DEBUG:acme.client:Storing nonce: F977rMEGrIGlOfjJ-OK8nlYJFDmKKuJd1BAueu8AzsrySBo 2022-11-17 02:59:46,227:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 02:59:46,232:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5NzdyTUVHcklHbE9makotT0s4bmxZSkZEbUtLdUpkMUJBdWV1OEF6c3J5U0JvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VJJ27hMbTQwxUNJM3mzRiNRm7rtGyciLCAzhpDMiHbsJg5uN41Y-RwJ44QWsyRAayJY3q4RBIITqHkhUHsomDIIjY2JuCZ9hTJAyzeiwWuut9ixn1tXTsTzsGVb_jc1v8t-_w6aknJ2Nj7nnRnighEd84rBHM_aiOyP0L7jEyWhhhTwIR-9wab7awly6jHlou1nssGKiMLc7XD1ofOhG-RQw5OsNK3xg2p_0VPTAx6c7rzUrQ3P6dqGlGYNN4ZFJPkB9z_1cyW2sXSzY918xJTpD5JfTDQwMJ0etRZkXeEjq2dmk4TomItX2YiD03cRQvgPoNYxsqAagsy12navcGg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 02:59:46,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 02:59:46,314:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: F9777XllFKmg88PvUHzUNVMGdk6cHNxLA7nNDXYl_XERB7g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 02:59:46,314:DEBUG:acme.client:Storing nonce: F9777XllFKmg88PvUHzUNVMGdk6cHNxLA7nNDXYl_XERB7g 2022-11-17 02:59:46,314:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:59:46,316:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5Nzc3WGxsRkttZzg4UHZVSHpVTlZNR2RrNmNITnhMQTduTkRYWWxfWEVSQjdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "YF6qfrFXCKhBn7qhYKNymITWkQnOcEPVEEqwNqmgnyP2ZpSVJPRv6VVlBVu2A9aMgPlxWLmuSnxlaAQk-q5XU3r36Vcj1AO7WG0mlij1ocYcxfiDQUQyw4vIqGCoD9a9Pf015de4T06geMceNjtE7YAML4yRzmlI6kFBejhpVxLkivsNtjxkRNtELbzMQp_rk-EBNOz51ljVYdACodOUSLT8RUqj8meEWMbvVILr-anNw0peLBey1b6Me1lxfInKiXuCQO9ibYvon8crxdDU1anvZvb83FI1nL99PlNkefkQotO4qLPbHy2YBHCTaUY3H_ILS7W524i8yc2Dmz3isA", "payload": "" } 2022-11-17 02:59:46,399:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 02:59:46,400:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400-5iHX0YswjMNAQxdZClEMt7ejoHPWvITV0z5MrIG4zI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 02:59:46,400:DEBUG:acme.client:Storing nonce: C400-5iHX0YswjMNAQxdZClEMt7ejoHPWvITV0z5MrIG4zI 2022-11-17 02:59:46,401:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:59:46,403:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDAtNWlIWDBZc3dqTU5BUXhkWkNsRU10N2Vqb0hQV3ZJVFYwejVNcklHNHpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "RMx-zfTqRfcUs14M748ggokiHFK0viq77XVpl0zc68vYpkNGaxFLpqNL06CnKSeUsvvf5XKCywDmilK1SzRSs_XU5GID97uSa0F4ZnLJJKFraagK1wwxeBRCBggrVwLorrdcussWIb-0jyQxeXkyb2pATNTazrmoq3NGjZ6Ty1VJF5TSUuNA_9Kp65rsrg1lnf5Wpuab426viABweuC8pj40QA1khZBMFxa7OLePnRYAz1q5JlgjJ6gg1O6oJ98H2cZeUdZG4XJIJagEyfUkFtuZxNyoDgxItVzwGktb_rNSzn5sHS15_jDGioh6C2wq_tozuL6C63KRZgbi9-DhvQ", "payload": "" } 2022-11-17 02:59:46,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 02:59:46,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEm8fppBv6WT5uSpcVnPmji46q9ybLkCDXJdbrxAukmWY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 02:59:46,489:DEBUG:acme.client:Storing nonce: A5FEm8fppBv6WT5uSpcVnPmji46q9ybLkCDXJdbrxAukmWY 2022-11-17 02:59:46,490:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:59:46,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkE1RkVtOGZwcEJ2NldUNXVTcGNWblBtamk0NnE5eWJMa0NEWEpkYnJ4QXVrbVdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "iENomUoIJK1mm1Yixp94GIdqukBrBT6oBbdYBSUQvJdv9Z5l6FoUiOqGsG9r6FMXY1H1XsLADV0y-LXlPFYufXkJr02S4TH4EpfVG8HoHBKl9cJvWb1ppUrqoRCnVYM51TSSdpdWyxWNyTRquSIqO2CnfN9bKl2ghhazqY_oB79gHZMRcxNPu1Wp2otgKpnFgtV6xCd2hcRMdVEXU9ke0WQYNxRcAh2Q6HHfKWNjpyZYXNkSsqhxJMJczsUvzU3jOUP2NMuBFFjaGq6GJLXSsQqSTWhnV8AOf3dTKJeJh1loUDKwzYqnjsFhtIIuF1tvuNpmEuAB3COgVsrnpxBJgQ", "payload": "" } 2022-11-17 02:59:46,572:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 02:59:46,573:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400jdnA0FyxYjvnSrU58VjfMPmPplauSHlJ2MOTwLL-dOQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 02:59:46,573:DEBUG:acme.client:Storing nonce: C400jdnA0FyxYjvnSrU58VjfMPmPplauSHlJ2MOTwLL-dOQ 2022-11-17 02:59:46,573:DEBUG:acme.client:JWS payload: b'' 2022-11-17 02:59:46,575:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM0MDBqZG5BMEZ5eFlqdm5TclU1OFZqZk1QbVBwbGF1U0hsSjJNT1R3TEwtZE9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "RPOKK6XPLp6CkeYeYY3FXMhkf3O8w7DEj9jcYkFKLgX87FlEST92lgWZnbHozOFoE9yU8CfPz9tD4fMcRI4JefeSomDfNag2atA2Q09ImrL0h6eAyaCcIOGXe01ud0Hx6hKsoyAmVu_E2YbC_YHwBNwUNDmWoyfhQCeSYg0PLvI53tQqNwibfL7HaUKGFojEH99LzLccsAIDWjb7q-GAHqyk_jX1hhyE7ymIr0QC8c2By761OYuMlRhzb5VBshGQpy2vDhyc2cSZ-zRY0blRwkvXdrtVnxItSmTPAMQ3YUuUxIDNeHe2c6eUmwRIXDslQBsCia7IrqtNGwCvdipUUQ", "payload": "" } 2022-11-17 02:59:46,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 02:59:46,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 02:59:46 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2712xNGbEysIEXbbdGqwDzBtY4CNQRTWF74wV2N8U1ykeXo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 02:59:46,656:DEBUG:acme.client:Storing nonce: 2712xNGbEysIEXbbdGqwDzBtY4CNQRTWF74wV2N8U1ykeXo 2022-11-17 02:59:46,656:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 02:59:46,656:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:59:46,656:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:59:46,656:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 02:59:46,657:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 02:59:46,662:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:59:46,940:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:59:46,945:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:46,946:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 02:59:46,946:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 02:59:46,954:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:59:47,245:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:59:47,247:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:47,253:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:59:47,527:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:59:47,530:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:47,534:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:59:47,826:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:59:47,828:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:47,832:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 02:59:48,223:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 02:59:48,224:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:48,225:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 02:59:48,227:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:07:52,317:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 03:07:52,317:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 03:07:52,329:DEBUG:certbot._internal.main:Arguments: ['-q'] 2022-11-17 03:07:52,330:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 03:07:52,409:DEBUG:certbot._internal.log:Root logging level set at 40 2022-11-17 03:07:52,430:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-17 03:07:52,430:DEBUG:certbot._internal.display.obj:Notifying user: No renewals were attempted. 2022-11-17 03:07:52,430:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2022-11-17 03:07:52,430:DEBUG:certbot._internal.renewal:no renewal failures 2022-11-17 03:11:49,323:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-17 03:11:49,323:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-17 03:11:49,323:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-propagation-seconds', '60', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-17 03:11:49,323:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-17 03:11:49,336:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-17 03:11:49,338:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-17 03:11:49,338:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-17 03:11:49,338:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-17 03:11:49,338:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-17 03:11:49,431:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-17 03:11:49,433:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-17 03:11:49,435:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-17 03:11:49,811:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-17 03:11:49,812:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:49 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZkBW4jBwweA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2022-11-17 03:11:49,813:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-17 03:11:50,382:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0009_key-certbot.pem 2022-11-17 03:11:50,389:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0009_csr-certbot.pem 2022-11-17 03:11:50,392:DEBUG:acme.client:Requesting fresh nonce 2022-11-17 03:11:50,392:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-17 03:11:50,467:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-17 03:11:50,468:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AAD9IA2NVVjpctWP50X_YmGJnHLkVfGo7tvQ9t5oso8xGI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-17 03:11:50,468:DEBUG:acme.client:Storing nonce: 1AAD9IA2NVVjpctWP50X_YmGJnHLkVfGo7tvQ9t5oso8xGI 2022-11-17 03:11:50,468:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-17 03:11:50,471:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQUQ5SUEyTlZWanBjdFdQNTBYX1ltR0puSExrVmZHbzd0dlE5dDVvc284eEdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MRADRWUDiIG_issxhLFfqZLCSNv0GKWR3xx4o264Ma_KyefGJYXvUV57Yjd82aEBswwOk-gTrkMnRaIT3ATbmvJL-K7CgengXwDxjqL5Xfb5OxLLuBSqVkCPVROO7L9QIGlml0APvDp3kDaFOWX6DHtuJqkqRLZOz159D9kZGFP1jutIPFCU5LZH0hVfsJLdJyyai81U0n0hC-Sbm9xIUkx9QOz1YIOn8oqjbt1XLplHeVA9pv4j7igRzWBzVOxWQt5vgv3lj2QFyEPz7ZcTO4N4MIFP5qR9THWMH7iu6QovU_rYAxAHfT8N4cx_QqdmHzyGAR7lkDWEpcwGcFIK-w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-17 03:11:50,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-17 03:11:50,638:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 17 Nov 2022 03:11:50 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: 1AAD8TCTvZx-hbxFk0ETXQYm77Aq9LN5GQxmortVl4tqsMc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-17 03:11:50,639:DEBUG:acme.client:Storing nonce: 1AAD8TCTvZx-hbxFk0ETXQYm77Aq9LN5GQxmortVl4tqsMc 2022-11-17 03:11:50,639:DEBUG:acme.client:JWS payload: b'' 2022-11-17 03:11:50,641:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFBQUQ4VENUdlp4LWhieEZrMEVUWFFZbTc3QXE5TE41R1F4bW9ydFZsNHRxc01jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "CfJZxFIZGN0YY_4wrJ73VV7dV9Ss41kPxevvDFI5tKrbrh-D4a_MCNJ50Qtn6hx6Pau4xqHnu-DqQjTFu7f1TnoNVLxocAjt26mUccDAZeZryF4ZF08eiU8meu3cKSrCZC1O-2itJTAETNxDlUMtalYXtFBN5AO90sLuXrCwvtERjkQejpBwDnNpexOqSAh9AAJ75E4Q8Wv2lYLv8iPb3qurTfq8VjtlyGjATmd4vRQqj8crlQ4OlssgyblJTPrM6bgssqNiS28RsJKFG3yQ57Egldb-3AmYkDJfFDZq6Ksy3i17LlQ856yPNsWApDE3jfzYDp6h-v8LNnR03fJc2w", "payload": "" } 2022-11-17 03:11:50,760:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-17 03:11:50,761:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:50 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAZuevz5bHh9tJMtUOhkLJvG6hPyZGEBytRluqUdHo2nE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-17 03:11:50,761:DEBUG:acme.client:Storing nonce: 1DFAZuevz5bHh9tJMtUOhkLJvG6hPyZGEBytRluqUdHo2nE 2022-11-17 03:11:50,762:DEBUG:acme.client:JWS payload: b'' 2022-11-17 03:11:50,765:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIjFERkFadWV2ejViSGg5dEpNdFVPaGtMSnZHNmhQeVpHRUJ5dFJsdXFVZEhvMm5FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "jo-zd_uKRjSPMtfeEsxD3HHqwq4Gi3CfD7JuyCV_voRu2-xIGMhbDiJe7ueTw27gC75KcGWLv-LDBtkGpM4OSoQPKe-XCurraNyRPkER-tiquWa9UX-WNGA6Gv7BeN9wnA4BbRz8h93bvaL8-OlFHSB6dc1D44RyxcDYK0wPm0JhcnuP8lapYs1E4JvjIoxOrXYApzVUxFlXnGH_n-O2D37ZZhQYvXpyBtuLKGWJKKVMOmR95XJBU5zLNf6RNM91hmvG96RZfKJXaheDORAjGtOCasjlccNI1lAQ7UrOllHNrScEz6R_Viri5q3lAqXEqjEiFm8-rctyZkhLA6ZATA", "payload": "" } 2022-11-17 03:11:50,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-17 03:11:50,868:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:50 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878FvBFE1Dj0arK-97cfsmYuwTJkqQ_Dc5qcK9tQuS1p6I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-17 03:11:50,868:DEBUG:acme.client:Storing nonce: C878FvBFE1Dj0arK-97cfsmYuwTJkqQ_Dc5qcK9tQuS1p6I 2022-11-17 03:11:50,869:DEBUG:acme.client:JWS payload: b'' 2022-11-17 03:11:50,871:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhGdkJGRTFEajBhckstOTdjZnNtWXV3VEprcVFfRGM1cWNLOXRRdVMxcDZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "AMMxc73C0hjCnAJaxTvg-WLkJWksn_N58t7z26vVLYXaYyDLUmPIyjHHX8gwzEJd5XVTTplvO8Dr26va0yspaNgKOsjln1gQKeeePWN7cWDlfMZ3kE-O31B55LG9JEgIDlX7afGpDzgcgrQ_8XzHM9kePe4vNPtGSiEX_Tu03If6qqarJj3yXx1f4HZogsb1yXp0csU92MorbrziE1quRh7er1coX7meavZX5ca6aLPxJjKkf5a1_NlU_boWe-DjpUDJdw068G1qgc37ypxJfk9qRiQOm4xTljzNcpbD-kgyq1UeergyI-25SEzoXTYDiSDKy4wkuPEqDRLARp7UJw", "payload": "" } 2022-11-17 03:11:50,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-17 03:11:50,964:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:50 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878Rgne-YBOnW2vpE1izp8oVMmRNffexByh6B9xY6EnZfM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-17 03:11:50,964:DEBUG:acme.client:Storing nonce: C878Rgne-YBOnW2vpE1izp8oVMmRNffexByh6B9xY6EnZfM 2022-11-17 03:11:50,965:DEBUG:acme.client:JWS payload: b'' 2022-11-17 03:11:50,967:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkM4NzhSZ25lLVlCT25XMnZwRTFpenA4b1ZNbVJOZmZleEJ5aDZCOXhZNkVuWmZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "HHzK_fDG04jQPDVsshkGqInZtLewzZjIyu4LyQqwpvcGY_oAx--tTj1ePXqEcMdq7ROFbLBwG1fZIsXHpMK6kHFVprqUMqluXqPGRyHey-VMd4qdnCSsyM5D0yoIZonAhWKWqn1oJboTvbt8XxLbGelIVRsNaToqCrzV-qHADdUI9fwhHWD2iHOazgBZyFoI7q7O5Fi4ZC44QK9OgQJi-SnWu5M_yGMtxcBz4M6ta1zFI2_JSP2v9qjQpjgighjt38nY5kB3h13U76Q52e1vONaBtej5kRs11rRwS7LKPYq_lyvKXgu9JfF73gypmjZEEj8zi4Xo7-61Gc1MYiOmQg", "payload": "" } 2022-11-17 03:11:51,066:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-17 03:11:51,067:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 17 Nov 2022 03:11:51 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1AADA6os8wZ5Y9igUQHvfYfIcw9kp67UZlDq8A3rym5ljTc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-17 03:11:51,067:DEBUG:acme.client:Storing nonce: 1AADA6os8wZ5Y9igUQHvfYfIcw9kp67UZlDq8A3rym5ljTc 2022-11-17 03:11:51,068:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-17 03:11:51,068:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 03:11:51,068:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 03:11:51,068:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-17 03:11:51,068:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-17 03:11:51,075:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 03:11:51,514:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 03:11:51,516:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:51,516:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-17 03:11:51,516:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-17 03:11:51,520:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 03:11:51,876:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 03:11:51,878:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:51,885:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 03:11:52,217:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 03:11:52,220:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:52,228:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 03:11:52,598:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-17 03:11:52,600:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:52,607:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-17 03:11:52,971:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-17 03:11:52,973:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:52,974:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-17 03:11:52,975:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:13,599:DEBUG:certbot._internal.main:certbot version: 1.21.0 2022-11-18 01:32:13,599:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2022-11-18 01:32:13,599:DEBUG:certbot._internal.main:Arguments: ['--dns-cloudflare', '--dns-cloudflare-propagation-seconds', '60', '--dns-cloudflare-credentials', '/root/.secrets/cloudflare.ini', '-d', 'terziu.net,*.terziu.net,terziu.xyz,*.terziu.xyz', '--preferred-challenges', 'dns-01'] 2022-11-18 01:32:13,600:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#dns-cloudflare,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2022-11-18 01:32:13,625:DEBUG:certbot._internal.log:Root logging level set at 30 2022-11-18 01:32:13,628:DEBUG:certbot._internal.plugins.selection:Requested authenticator dns-cloudflare and installer None 2022-11-18 01:32:13,629:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * dns-cloudflare Description: Obtain certificates using a DNS TXT record (if you are using Cloudflare for DNS). Interfaces: Authenticator, Plugin Entry point: dns-cloudflare = certbot_dns_cloudflare._internal.dns_cloudflare:Authenticator Initialized: Prep: True 2022-11-18 01:32:13,629:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2022-11-18 01:32:13,629:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator dns-cloudflare, Installer None 2022-11-18 01:32:13,718:DEBUG:certbot._internal.main:Picked account: ), creation_host='certbot.ter.zoo', register_to_eff=None))> 2022-11-18 01:32:13,719:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2022-11-18 01:32:13,722:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2022-11-18 01:32:14,318:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 659 2022-11-18 01:32:14,320:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:14 GMT Content-Type: application/json Content-Length: 659 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "szd2rkcWb94": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2022-11-18 01:32:14,322:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for terziu.net and 3 more domains 2022-11-18 01:32:14,547:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0010_key-certbot.pem 2022-11-18 01:32:14,556:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0010_csr-certbot.pem 2022-11-18 01:32:14,559:DEBUG:acme.client:Requesting fresh nonce 2022-11-18 01:32:14,559:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2022-11-18 01:32:14,668:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2022-11-18 01:32:14,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEfxGvSSNmyQHD33XHL5dVti4Xce6R4airhXaRIq4vVlI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2022-11-18 01:32:14,670:DEBUG:acme.client:Storing nonce: A5FEfxGvSSNmyQHD33XHL5dVti4Xce6R4airhXaRIq4vVlI 2022-11-18 01:32:14,670:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "terziu.net"\n },\n {\n "type": "dns",\n "value": "*.terziu.net"\n },\n {\n "type": "dns",\n "value": "terziu.xyz"\n },\n {\n "type": "dns",\n "value": "*.terziu.xyz"\n }\n ]\n}' 2022-11-18 01:32:14,675:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkE1RkVmeEd2U1NObXlRSEQzM1hITDVkVnRpNFhjZTZSNGFpcmhYYVJJcTR2VmxJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "J1vmi8WpmCiZfCwNZ5c1dLS3EjW2O5_VrEaSYI_pndUDgm0cEGXQ7OKNWqfQCQI98QCrneM9SQrtb2mbpCZM4fO_0wMXsS0vVCJEppuG5zW61TN02N5XogLg95i5b7dvgOf1197vxYkatrODHtoD4GCIRMly8mcm7vJVDygheTVt43l6vETi2GTsz-f8BxANWWNNUCegfaNtk9DtTAbxXL9hRf4Wz9x3pPSzk0fTmxqRbj1Fv8eHbdh0duOk5TABBmYyvG1UMQQCy_dvFv-boat4FAYpU7rfhsg2Ovj9jNxlnwiNHOe0NH-3-fDcKYsPMiIlImT03Aiyz_Kjl9DqLA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS5uZXQiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUubmV0IgogICAgfSwKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlcnppdS54eXoiCiAgICB9LAogICAgewogICAgICAidHlwZSI6ICJkbnMiLAogICAgICAidmFsdWUiOiAiKi50ZXJ6aXUueHl6IgogICAgfQogIF0KfQ" } 2022-11-18 01:32:14,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 738 2022-11-18 01:32:14,809:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 18 Nov 2022 01:32:14 GMT Content-Type: application/json Content-Length: 738 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/827696447/144757898737 Replay-Nonce: A5FE4Jw5uATpxKG1-7YBTv9ybwksKXpLbZdY5sj27fW2Sy4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2022-11-24T01:36:10Z", "identifiers": [ { "type": "dns", "value": "*.terziu.net" }, { "type": "dns", "value": "*.terziu.xyz" }, { "type": "dns", "value": "terziu.net" }, { "type": "dns", "value": "terziu.xyz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/827696447/144757898737" } 2022-11-18 01:32:14,809:DEBUG:acme.client:Storing nonce: A5FE4Jw5uATpxKG1-7YBTv9ybwksKXpLbZdY5sj27fW2Sy4 2022-11-18 01:32:14,810:DEBUG:acme.client:JWS payload: b'' 2022-11-18 01:32:14,814:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900957: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkE1RkU0Snc1dUFUcHhLRzEtN1lCVHY5eWJ3a3NLWHBMYlpkWTVzajI3ZlcyU3k0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NTcifQ", "signature": "C96w_1N86xLhSGavZQY39bWIVV0q480khPm3aMW8dNdXSP2ksgFUBdVtR64icNgDde8ePw6PzOMfSplbKM_SqsXepBQioSvmt0XmKV_K49v3yN1RZ61rhjNRz8ipjmKbeViarAWT2VM_Dk11v-lq4PyezCGBbmxuDaL7EW-VrdwrKhHjgSwnMgNoxhF1YDYEY1cIEe1XKoexvK_VOEXnwziINUPj2C6A0IeFmGApLTgxjIQ2hTPlpB4rX7khPldVaueDqMjFtrtO06QO6auQXN7fV-M9yOn8gNTTPE6SJS0nPcfjKyRqDjFJNDGhdunlAikRbkQGVcBRWyzOsZKpDA", "payload": "" } 2022-11-18 01:32:14,906:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900957 HTTP/1.1" 200 384 2022-11-18 01:32:14,907:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:14 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEfBVkmzb3hPFIVmjy9K2RUotMFW-XUXlLYE5TMtejY1c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900957/gW9hlg", "token": "oGiQ5uQ056SHSRPh3hB8FunDbGgsjVMeOoah5Ecgb9A" } ], "wildcard": true } 2022-11-18 01:32:14,907:DEBUG:acme.client:Storing nonce: A5FEfBVkmzb3hPFIVmjy9K2RUotMFW-XUXlLYE5TMtejY1c 2022-11-18 01:32:14,907:DEBUG:acme.client:JWS payload: b'' 2022-11-18 01:32:14,910:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkE1RkVmQlZrbXpiM2hQRklWbWp5OUsyUlVvdE1GVy1YVVhsTFlFNVRNdGVqWTFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NjcifQ", "signature": "QBTocZwQEggpU17IBHZKEH5AD7mD1E71O3-OhViSKr2eSJZvygekKFyNkJD0KB9jKOQv4o8Qhg6D3DK3pVK40_oo1FrhtbJo_uLjsfsz891G7ZapvtMSFJhWnHgHtZhYyJWb8DyFAacOJIn2xOfq8IXbmpv5wr2uPrv0_m34U4fQRmTy5tg_RF-jPIzwl0IB-5NYFo99Gu-taNWHGMG4x_6mDwbdl14BW4lZGZudrwjT9K0OYmQFU7KiRzDCcBia3qrsS14S_ynZ3w1b0ih6kMvJ9NNaoSsSL1JmFll1JdIlIxSu3DuI-6IMfdsRtR9K5dXOn9veEsOpu0Wv2R4vUw", "payload": "" } 2022-11-18 01:32:15,028:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900967 HTTP/1.1" 200 384 2022-11-18 01:32:15,029:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:14 GMT Content-Type: application/json Content-Length: 384 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977j4SWRet0NNfFGSi8WFLxcqxDfkThDeI2eSw3n4iex8w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900967/5ldzZQ", "token": "MW612q-qCQRv-t2oUl0KZqhKpgpR8LsJuF-wfw5JSjU" } ], "wildcard": true } 2022-11-18 01:32:15,029:DEBUG:acme.client:Storing nonce: F977j4SWRet0NNfFGSi8WFLxcqxDfkThDeI2eSw3n4iex8w 2022-11-18 01:32:15,030:DEBUG:acme.client:JWS payload: b'' 2022-11-18 01:32:15,033:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900977: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5NzdqNFNXUmV0ME5OZkZHU2k4V0ZMeGNxeERma1RoRGVJMmVTdzNuNGlleDh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5NzcifQ", "signature": "MI995_jPT2JxK5Qxppxtb4NbZBFNwDir5p6SCW1ADe3EI0V6-4wq8dIcBmWku1B8gLdJqKIUTo7TjtIWgZd9s3bT_6oVUb6w7OlqLc6qwHqBFmPVXKmjye1Zi_uCejeG1O7lNqjimCbkCt4efecysmHNFJnQ7ykXx61jxzmYt4-9iV9H2Io9NtxFVkNd4w5cTxVFxzjTbHrMH_e5OdFzBmaHI0d-UT3kxHlyT7sFHhV4YAL-6-XGvmgJXyKYEXJi0b6CuBsHKBrRsmMmkzRktQfg9-vbNueQJNfe_xyQnQ8tLXK9ipH_NfBTM8oyiIzpFC27mzFicghlxEPlXO0K3Q", "payload": "" } 2022-11-18 01:32:15,122:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900977 HTTP/1.1" 200 794 2022-11-18 01:32:15,123:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:15 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977NGNCEmgmCHBCN9EcGCr9oOuujnQyXPBOIydziUVL_t4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.net" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/-Fn7Hg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/klAgpg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900977/6dhANg", "token": "b-nZ2XPgMLWPo2IQ7r9SLisVWw6VQm_QY2AWrLOcd9M" } ] } 2022-11-18 01:32:15,123:DEBUG:acme.client:Storing nonce: F977NGNCEmgmCHBCN9EcGCr9oOuujnQyXPBOIydziUVL_t4 2022-11-18 01:32:15,124:DEBUG:acme.client:JWS payload: b'' 2022-11-18 01:32:15,128:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/177067900987: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvODI3Njk2NDQ3IiwgIm5vbmNlIjogIkY5NzdOR05DRW1nbUNIQkNOOUVjR0NyOW9PdXVqblF5WFBCT0l5ZHppVVZMX3Q0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xNzcwNjc5MDA5ODcifQ", "signature": "DHO55_jPfpHVdZeMKNb6lmdIfHqVYDXiQHvUXOQjzAH9EteU0r3cRUQKtgQWD-0nX_y4Qk-uEmT51gLVI2_pFxQxB-CqzsTp3CoSrKdwr-1zYdQKhXLFKivZem9MHcZ-mEI6SCk_maKAKKtpDzSBMF4mAwagHROdFlMQydmS6cW4NPzylKlD7aDLFHwyruTvfm51aQSieht6vNZ1696WEqDGUfqi5W77t4uqTBhwHDpM-iZCJRRlFcasxlk5BVPhVLcoE4G0IPTwcdUHbDBW7fru8WfHmmnb7M7dEifiXNV68yFhbVM0uQ4x2RuF4LRGWZfpETJAO9dULSpuVheokw", "payload": "" } 2022-11-18 01:32:15,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/177067900987 HTTP/1.1" 200 794 2022-11-18 01:32:15,210:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 18 Nov 2022 01:32:15 GMT Content-Type: application/json Content-Length: 794 Connection: keep-alive Boulder-Requester: 827696447 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEvYAkpfX4LjFA9xUR5LL1SQZatQfKhHtgU7-GDhualGA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "terziu.xyz" }, "status": "pending", "expires": "2022-11-24T01:36:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/jXiRWA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/q0Uofg", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/177067900987/dEaMFA", "token": "gAU6bBRaR2jLQRXlf4m9CXrNNI40pUM8IjJNov7XeGw" } ] } 2022-11-18 01:32:15,210:DEBUG:acme.client:Storing nonce: A5FEvYAkpfX4LjFA9xUR5LL1SQZatQfKhHtgU7-GDhualGA 2022-11-18 01:32:15,210:INFO:certbot._internal.auth_handler:Performing the following challenges: 2022-11-18 01:32:15,211:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-18 01:32:15,211:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-18 01:32:15,211:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.net 2022-11-18 01:32:15,211:INFO:certbot._internal.auth_handler:dns-01 challenge for terziu.xyz 2022-11-18 01:32:15,216:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-18 01:32:15,614:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-18 01:32:15,624:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:15,624:DEBUG:certbot._internal.error_handler:Calling registered functions 2022-11-18 01:32:15,624:INFO:certbot._internal.auth_handler:Cleaning up challenges 2022-11-18 01:32:15,628:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-18 01:32:16,029:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-18 01:32:16,032:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:16,038:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-18 01:32:16,387:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-18 01:32:16,390:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:16,397:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-18 01:32:16,704:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.net&per_page=1 HTTP/1.1" 400 None 2022-11-18 01:32:16,707:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:16,716:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): api.cloudflare.com:443 2022-11-18 01:32:17,073:DEBUG:urllib3.connectionpool:https://api.cloudflare.com:443 "GET /client/v4/zones?name=terziu.xyz&per_page=1 HTTP/1.1" 400 None 2022-11-18 01:32:17,076:DEBUG:certbot_dns_cloudflare._internal.dns_cloudflare:Encountered error finding zone_id during deletion: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:17,079:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 183, in _find_zone_id zones = self.cf.zones.get(params=params) # zones | pylint: disable=no-member File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 672, in get return self._base.call_with_auth('GET', self._parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 126, in call_with_auth return self._call(method, headers, parts, File "/usr/lib/python3/dist-packages/CloudFlare/cloudflare.py", line 498, in _call raise CloudFlareAPIError(code, message, error_chain) CloudFlare.exceptions.CloudFlareAPIError: Invalid request headers During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/dns_common.py", line 67, in perform self._perform(domain, validation_domain_name, validation) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 74, in _perform self._get_cloudflare_client().add_txt_record(domain, validation_name, validation, self.ttl) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 106, in add_txt_record zone_id = self._find_zone_id(domain) File "/usr/lib/python3/dist-packages/certbot_dns_cloudflare/_internal/dns_cloudflare.py", line 200, in _find_zone_id raise errors.PluginError('Error determining zone_id: {0} {1}. Please confirm ' certbot.errors.PluginError: Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14) 2022-11-18 01:32:17,090:ERROR:certbot._internal.log:Error determining zone_id: 6003 Invalid request headers. Please confirm that you have supplied valid Cloudflare API credentials. (Did you copy your entire API token/key? To use Cloudflare tokens, you'll need the python package cloudflare>=2.3.1. This certbot is running cloudflare 2.8.14)