root@pc01:/etc/nginx/ssl/ggc.world# acme.sh --issue -w /var/www/ggc.world/html/ -d www.ggc.world -d ggc.world -k 2048 --debug 2 [lun 10 feb 2020, 17.55.45, CET] Lets find script dir. [lun 10 feb 2020, 17.55.45, CET] _SCRIPT_='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 17.55.45, CET] _script='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 17.55.45, CET] _script_home='/root/.acme.sh' [lun 10 feb 2020, 17.55.45, CET] Using config home:/home/marco/webMatters/acme.sh/data/ [lun 10 feb 2020, 17.55.45, CET] LE_WORKING_DIR='/root/.acme.sh' https://github.com/acmesh-official/acme.sh v2.8.6 [lun 10 feb 2020, 17.55.45, CET] Running cmd: issue [lun 10 feb 2020, 17.55.45, CET] _main_domain='www.ggc.world' [lun 10 feb 2020, 17.55.45, CET] _alt_domains='ggc.world' [lun 10 feb 2020, 17.55.45, CET] Using config home:/home/marco/webMatters/acme.sh/data/ [lun 10 feb 2020, 17.55.45, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 17.55.45, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 17.55.45, CET] DOMAIN_PATH='/home/marco/webMatters/acme.sh/data//www.ggc.world' [lun 10 feb 2020, 17.55.45, CET] '/var/www/ggc.world/html/' does not contain 'dns' [lun 10 feb 2020, 17.55.45, CET] Using ACME_DIRECTORY: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 17.55.45, CET] _init api for server: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 17.55.45, CET] GET [lun 10 feb 2020, 17.55.45, CET] url='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 17.55.45, CET] timeout= [lun 10 feb 2020, 17.55.45, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.LNMvlKUtRE -g ' [lun 10 feb 2020, 17.55.45, CET] ret='0' [lun 10 feb 2020, 17.55.45, CET] response='{ "_D18pjHkVcs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" }' [lun 10 feb 2020, 17.55.46, CET] ACME_KEY_CHANGE='https://acme-v02.api.letsencrypt.org/acme/key-change' [lun 10 feb 2020, 17.55.46, CET] ACME_NEW_AUTHZ [lun 10 feb 2020, 17.55.46, CET] ACME_NEW_ORDER='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 17.55.46, CET] ACME_NEW_ACCOUNT='https://acme-v02.api.letsencrypt.org/acme/new-acct' [lun 10 feb 2020, 17.55.46, CET] ACME_REVOKE_CERT='https://acme-v02.api.letsencrypt.org/acme/revoke-cert' [lun 10 feb 2020, 17.55.46, CET] ACME_AGREEMENT='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf' [lun 10 feb 2020, 17.55.46, CET] ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 17.55.46, CET] ACME_VERSION='2' [lun 10 feb 2020, 17.55.46, CET] Le_NextRenewTime [lun 10 feb 2020, 17.55.46, CET] _on_before_issue [lun 10 feb 2020, 17.55.46, CET] _chk_main_domain='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] _chk_alt_domains='ggc.world' [lun 10 feb 2020, 17.55.46, CET] '/var/www/ggc.world/html/' does not contain 'no' [lun 10 feb 2020, 17.55.46, CET] Le_LocalAddress [lun 10 feb 2020, 17.55.46, CET] d='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] Check for domain='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.46, CET] d='ggc.world' [lun 10 feb 2020, 17.55.46, CET] Check for domain='ggc.world' [lun 10 feb 2020, 17.55.46, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.46, CET] d [lun 10 feb 2020, 17.55.46, CET] '/var/www/ggc.world/html/' does not contain 'apache' [lun 10 feb 2020, 17.55.46, CET] _saved_account_key_hash='4eiB8TnFhXD7BGqwEPvmklXvDq4MZngmfbqCgJaUqac=' [lun 10 feb 2020, 17.55.46, CET] _saved_account_key_hash is not changed, skip register account. [lun 10 feb 2020, 17.55.46, CET] Read key length:2048 [lun 10 feb 2020, 17.55.46, CET] _createcsr [lun 10 feb 2020, 17.55.46, CET] domain='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] domainlist='ggc.world' [lun 10 feb 2020, 17.55.46, CET] csrkey='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.key' [lun 10 feb 2020, 17.55.46, CET] csr='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.csr' [lun 10 feb 2020, 17.55.46, CET] csrconf='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.csr.conf' [lun 10 feb 2020, 17.55.46, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 17.55.46, CET] _idn_temp [lun 10 feb 2020, 17.55.46, CET] domainlist='ggc.world' [lun 10 feb 2020, 17.55.46, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] _idn_temp [lun 10 feb 2020, 17.55.46, CET] Multi domain='DNS:www.ggc.world,DNS:ggc.world' [lun 10 feb 2020, 17.55.46, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] _idn_temp [lun 10 feb 2020, 17.55.46, CET] _csr_cn='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] Getting domain auth token for each domain [lun 10 feb 2020, 17.55.46, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 17.55.46, CET] _idn_temp [lun 10 feb 2020, 17.55.46, CET] d='ggc.world' [lun 10 feb 2020, 17.55.46, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 17.55.46, CET] _idn_temp [lun 10 feb 2020, 17.55.46, CET] d [lun 10 feb 2020, 17.55.46, CET] _identifiers='{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}' [lun 10 feb 2020, 17.55.46, CET] url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 17.55.46, CET] payload='{"identifiers": [{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}]}' [lun 10 feb 2020, 17.55.46, CET] RSA key [lun 10 feb 2020, 17.55.46, CET] Get nonce with HEAD. ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 17.55.46, CET] HEAD [lun 10 feb 2020, 17.55.46, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 17.55.46, CET] body [lun 10 feb 2020, 17.55.46, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.46, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g -I ' [lun 10 feb 2020, 17.55.46, CET] _ret='0' [lun 10 feb 2020, 17.55.46, CET] _headers='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:46 GMT cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0101tBirJ-NQPHMRCxrzgEeorJDa-CZsuP6aBOxSeeYhnqI x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.46, CET] _CACHED_NONCE='0101tBirJ-NQPHMRCxrzgEeorJDa-CZsuP6aBOxSeeYhnqI' [lun 10 feb 2020, 17.55.46, CET] nonce='0101tBirJ-NQPHMRCxrzgEeorJDa-CZsuP6aBOxSeeYhnqI' [lun 10 feb 2020, 17.55.46, CET] POST [lun 10 feb 2020, 17.55.46, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 17.55.46, CET] body='{"protected": "eyJub25jZSI6ICIwMTAxdEJpckotTlFQSE1SQ3hyemdFZW9ySkRhLUNac3VQNmFCT3hTZWVZaG5xSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC83Nzc2MDQyNSJ9", "payload": "eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6Ind3dy5nZ2Mud29ybGQifSx7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6ImdnYy53b3JsZCJ9XX0", "signature": "H-0-uMQAn6q5V8oarPeQm6Fv-J_T1XJQMDrq3-Q0MHEet7i7yp9ef9svGmivMeB8Bx7AwFxSutGiUnpUEYvMKPYAm4i9HbQg3xFdhBD4DfiOGkmiIARMkekr0nq2BM8GHMTPopwBkD48Svip0UTuZoyZUYWyjPFySZ6KMN_9_P6C459kZSNVQqNkomTPJF9d9pumSYCkdIQ6BtFKMre5S7qvbyviFECEuhgbAU2MvzhMgnuM0K4_CEaJNw0mCGi7IKHRKfzeEszvwwe7Lm454KLAuRkXVctxbK341RqPBoy4JeQHsgEnvO0JblnYUVBIoCFuuHHIKLbWXMTdzj8tfg"}' [lun 10 feb 2020, 17.55.46, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.46, CET] Http already initialized. [lun 10 feb 2020, 17.55.46, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.47, CET] _ret='0' [lun 10 feb 2020, 17.55.47, CET] responseHeaders='HTTP/2 201 server: nginx date: Mon, 10 Feb 2020 16:55:47 GMT content-type: application/json content-length: 473 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" location: https://acme-v02.api.letsencrypt.org/acme/order/77760425/2291514450 replay-nonce: 0001-bl7BnLvmNLpSVOZ2DVSL0FEep0342NbOVGNNkItTt0 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.47, CET] code='201' [lun 10 feb 2020, 17.55.47, CET] original='{ "status": "pending", "expires": "2020-02-17T16:55:47.558348988Z", "identifiers": [ { "type": "dns", "value": "ggc.world" }, { "type": "dns", "value": "www.ggc.world" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291514450" }' [lun 10 feb 2020, 17.55.47, CET] response='{"status":"pending","expires":"2020-02-17T16:55:47.558348988Z","identifiers":[{"type":"dns","value":"ggc.world"},{"type":"dns","value":"www.ggc.world"}],"authorizations":["https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541","https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264"],"finalize":"https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291514450"}' [lun 10 feb 2020, 17.55.47, CET] Le_LinkOrder='https://acme-v02.api.letsencrypt.org/acme/order/77760425/2291514450' [lun 10 feb 2020, 17.55.47, CET] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291514450' [lun 10 feb 2020, 17.55.47, CET] _authorizations_seg='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541,https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264' [lun 10 feb 2020, 17.55.47, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 17.55.47, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 17.55.47, CET] payload [lun 10 feb 2020, 17.55.47, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.47, CET] Use _CACHED_NONCE='0001-bl7BnLvmNLpSVOZ2DVSL0FEep0342NbOVGNNkItTt0' [lun 10 feb 2020, 17.55.47, CET] nonce='0001-bl7BnLvmNLpSVOZ2DVSL0FEep0342NbOVGNNkItTt0' [lun 10 feb 2020, 17.55.47, CET] POST [lun 10 feb 2020, 17.55.47, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 17.55.47, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxLWJsN0JuTHZtTkxwU1ZPWjJEVlNMMEZFZXAwMzQyTmJPVkdOTmtJdFR0MCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjcyODMwODU0MSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc3NjA0MjUifQ", "payload": "", "signature": "nqfL2XE2ZFHQ4LsBGBBu03Hc2AVPYKattHHg8MhVYHzEVLLKaRKBMaw4eNe9bX8wuSRgEGs396scNLNxiP02lZwknUrIXD5smoIZKxNaV9YhM4atx3qVBDS63wWH8r53JZNYvYUJbg8OKTej0HuRglalkc891OiWVRQFy6jzN63mJehtMwIavm1T0dhuK62zYpbID8ABYtUVKBhtF6e-_bnAqI5IY3hlbQ6B_C4pU8_ktPYwIFZiF35fxUrwEyB7lb4gJRWdM6M45HYXelV-zYpb_6EZOR3owcL1TSeVbC-EQzuAGxNOuX0cQuiF2mtWgfhvuAfbw7ZtSuhxw9Naaw"}' [lun 10 feb 2020, 17.55.47, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.47, CET] Http already initialized. [lun 10 feb 2020, 17.55.47, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.48, CET] _ret='0' [lun 10 feb 2020, 17.55.48, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:48 GMT content-type: application/json content-length: 693 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001gOKne1PfGeTlAmzjYyYqkzMq0adD-eKdH8B5ec1eVd8 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.48, CET] code='200' [lun 10 feb 2020, 17.55.48, CET] original='{ "identifier": { "type": "dns", "value": "ggc.world" }, "status": "valid", "expires": "2020-03-10T18:18:24Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ", "token": "qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "validationRecord": [ { "url": "http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "hostname": "ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] } ] }' [lun 10 feb 2020, 17.55.48, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 17.55.48, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 17.55.48, CET] _d='ggc.world' [lun 10 feb 2020, 17.55.48, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264' [lun 10 feb 2020, 17.55.48, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264' [lun 10 feb 2020, 17.55.48, CET] payload [lun 10 feb 2020, 17.55.48, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.48, CET] Use _CACHED_NONCE='0001gOKne1PfGeTlAmzjYyYqkzMq0adD-eKdH8B5ec1eVd8' [lun 10 feb 2020, 17.55.48, CET] nonce='0001gOKne1PfGeTlAmzjYyYqkzMq0adD-eKdH8B5ec1eVd8' [lun 10 feb 2020, 17.55.48, CET] POST [lun 10 feb 2020, 17.55.48, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745063264' [lun 10 feb 2020, 17.55.48, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxZ09LbmUxUGZHZVRsQW16all5WXFrek1xMGFkRC1lS2RIOEI1ZWMxZVZkOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjc0NTA2MzI2NCIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc3NjA0MjUifQ", "payload": "", "signature": "jb9EdSj9MNRes5NyU5DHBbFff4qyfaTcQkx1CMz-NX340UiBdTVpnSKDIlQiDLR1uh4g2fxLhFFFg8o4al4bJVA_T2aLEbbmGEmeuvUVY97fF_ynFKMhad578mmIsVP2vljiQgwJl0R-6MZhtP9pICJ2nLJYZhuxRGY6YJ6ephNpOfSbMFIJO-2_zOlF0TtO4Gk08IAdG2vLSyg06dwpnqkuUh8uo-Maylxbinc2mVIZmSOX4ibI3vwH9gEKRqwZQdip82cj18_Js-YZzF2_L3ogHPKQGadeBbb06A4AM4B_MzWbKZixzalLNfqOp_0Hdd4tlzSdu6UCmzfXucr6WA"}' [lun 10 feb 2020, 17.55.48, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.48, CET] Http already initialized. [lun 10 feb 2020, 17.55.48, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.49, CET] _ret='0' [lun 10 feb 2020, 17.55.49, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:49 GMT content-type: application/json content-length: 791 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0002mso1i7fhSjIPP5n9opvnM-wKH82GA053ek6J7C5G0FY x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.49, CET] code='200' [lun 10 feb 2020, 17.55.49, CET] original='{ "identifier": { "type": "dns", "value": "www.ggc.world" }, "status": "pending", "expires": "2020-02-17T16:55:47Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ", "token": "6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g", "token": "6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA", "token": "6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4" } ] }' [lun 10 feb 2020, 17.55.49, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T16:55:47Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}]}' [lun 10 feb 2020, 17.55.49, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T16:55:47Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}]}' [lun 10 feb 2020, 17.55.49, CET] _d='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] _authorizations_map='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T16:55:47Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}]} ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]} ' [lun 10 feb 2020, 17.55.49, CET] d='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] Getting webroot for domain='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] _w='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] _idn_temp [lun 10 feb 2020, 17.55.49, CET] _candindates='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T16:55:47Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}]}' [lun 10 feb 2020, 17.55.49, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T16:55:47Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/_hfu8g","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/dNXefA","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}]}' [lun 10 feb 2020, 17.55.49, CET] entry='"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"' [lun 10 feb 2020, 17.55.49, CET] token='6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4' [lun 10 feb 2020, 17.55.49, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.49, CET] keyauthorization='6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 17.55.49, CET] dvlist='www.ggc.world#6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ#http-01#/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] d='ggc.world' [lun 10 feb 2020, 17.55.49, CET] Getting webroot for domain='ggc.world' [lun 10 feb 2020, 17.55.49, CET] _w='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 17.55.49, CET] _idn_temp [lun 10 feb 2020, 17.55.49, CET] _candindates='ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 17.55.49, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 17.55.49, CET] entry='"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"' [lun 10 feb 2020, 17.55.49, CET] token='qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E' [lun 10 feb 2020, 17.55.49, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 17.55.49, CET] keyauthorization='qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 17.55.49, CET] ggc.world is already verified. [lun 10 feb 2020, 17.55.49, CET] keyauthorization='verified_ok' [lun 10 feb 2020, 17.55.49, CET] dvlist='ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] d [lun 10 feb 2020, 17.55.49, CET] vlist='www.ggc.world#6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ#http-01#/var/www/ggc.world/html/,ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/,' [lun 10 feb 2020, 17.55.49, CET] d='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] d='ggc.world' [lun 10 feb 2020, 17.55.49, CET] ggc.world is already verified, skip http-01. [lun 10 feb 2020, 17.55.49, CET] ok, let's start to verify [lun 10 feb 2020, 17.55.49, CET] Verifying: www.ggc.world [lun 10 feb 2020, 17.55.49, CET] d='www.ggc.world' [lun 10 feb 2020, 17.55.49, CET] keyauthorization='6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 17.55.49, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.49, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 17.55.49, CET] wellknown_path='/var/www/ggc.world/html//.well-known/acme-challenge' [lun 10 feb 2020, 17.55.49, CET] writing token:6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 to /var/www/ggc.world/html//.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [lun 10 feb 2020, 17.55.49, CET] Changing owner/group of .well-known to root:root [lun 10 feb 2020, 17.55.49, CET] Trigger domain validation. [lun 10 feb 2020, 17.55.49, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.49, CET] _t_key_authz='6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 17.55.49, CET] _t_vtype='http-01' [lun 10 feb 2020, 17.55.49, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.49, CET] payload='{}' [lun 10 feb 2020, 17.55.49, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.49, CET] Use _CACHED_NONCE='0002mso1i7fhSjIPP5n9opvnM-wKH82GA053ek6J7C5G0FY' [lun 10 feb 2020, 17.55.49, CET] nonce='0002mso1i7fhSjIPP5n9opvnM-wKH82GA053ek6J7C5G0FY' [lun 10 feb 2020, 17.55.49, CET] POST [lun 10 feb 2020, 17.55.49, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.49, CET] body='{"protected": "eyJub25jZSI6ICIwMDAybXNvMWk3ZmhTaklQUDVuOW9wdm5NLXdLSDgyR0EwNTNlazZKN0M1RzBGWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTA2MzI2NC9nN1h1aFEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "CVAFeVXVjvidCPOT-ugJUAED2lc7S-htWQ_BZcLIoxF51aALGEEg31nVrk1tGc1V1XbjHH9m0K5sfwtb5mtIpbM13ZWq0KGxvcpM6CMFUNaior5_W4YCr60WIv7pNzP2VHCdtJxvBV7Xk4Wm5I0M_iJKqhLCfIn_Mk28ZyhpFsIGKsf52GSA56Da7R8r15rOjmftFYvjBdjroutTAfJKTHA1dj4X3kMdxH-BjLUjhy39FJM4fEONIgrnw_c9QA4m8wiCC0BUpqsa0VQM8Bj1Xzm3l8Fa7MTxqEH9N4_KJpHc1mn4hyvoryFrmq9-0nwuPfGssiYWs8D-IDnT06otlA"}' [lun 10 feb 2020, 17.55.49, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.49, CET] Http already initialized. [lun 10 feb 2020, 17.55.49, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.50, CET] _ret='0' [lun 10 feb 2020, 17.55.50, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:50 GMT content-type: application/json content-length: 185 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ replay-nonce: 0002V5cBHfQ62iKqYc1TkEphxjxXfwLvf82iw8Sl4178tEg x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.50, CET] code='200' [lun 10 feb 2020, 17.55.50, CET] original='{ "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ", "token": "6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4" }' [lun 10 feb 2020, 17.55.50, CET] response='{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4"}' [lun 10 feb 2020, 17.55.50, CET] trigger validation code: 200 [lun 10 feb 2020, 17.55.50, CET] sleep 2 secs to verify [lun 10 feb 2020, 17.55.52, CET] checking [lun 10 feb 2020, 17.55.52, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.52, CET] payload [lun 10 feb 2020, 17.55.52, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.52, CET] Use _CACHED_NONCE='0002V5cBHfQ62iKqYc1TkEphxjxXfwLvf82iw8Sl4178tEg' [lun 10 feb 2020, 17.55.52, CET] nonce='0002V5cBHfQ62iKqYc1TkEphxjxXfwLvf82iw8Sl4178tEg' [lun 10 feb 2020, 17.55.52, CET] POST [lun 10 feb 2020, 17.55.52, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.52, CET] body='{"protected": "eyJub25jZSI6ICIwMDAyVjVjQkhmUTYyaUtxWWMxVGtFcGh4anhYZndMdmY4Mml3OFNsNDE3OHRFZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTA2MzI2NC9nN1h1aFEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "", "signature": "ngiDo1NW2GvPFKylAtQQAoeD27UTYHsm9sHd2vnN8m1b_f32msP_FKuUA770E6VWI96Nv0YD9Xk2DsvrNWFCgC_kToeSOs44rSolPFVKSmM6kg9M4IBfzGHiNXwBl0Ey-vzgHRG0A_rst9mSLPcLawzlWvQKeyzGYwV1LrGZZnIaexhuYmryoLag8LEzJcEltEuJSuuKoPgOd11629tIwxYzwgw2CDSxGneDleoY5iyAUHiOPamxb6i8RcXkG37jLfmYV8-wHIOSo-ksAm996WQLIzbkuXi9EibYqgMhj4nPNx2Jx-I8UVrnXtGukrOdz_lYD-QouignFxWFnrTZqw"}' [lun 10 feb 2020, 17.55.52, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.52, CET] Http already initialized. [lun 10 feb 2020, 17.55.52, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.53, CET] _ret='0' [lun 10 feb 2020, 17.55.53, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:53 GMT content-type: application/json content-length: 1265 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ replay-nonce: 000135-GliO-a0ykxA5MRa1TixP4d-r0X1T2rZjbzYnSPR4 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.53, CET] code='200' [lun 10 feb 2020, 17.55.53, CET] original='{ "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:unauthorized", "detail": "Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody bgcolor=\\\"white\\\"\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccen\"", "status": 403 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ", "token": "6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4", "validationRecord": [ { "url": "http://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4", "hostname": "www.ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" }, { "url": "https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4", "hostname": "www.ggc.world", "port": "443", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] }' [lun 10 feb 2020, 17.55.53, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody bgcolor=\\\"white\\\"\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccen\"","status": 403},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"},{"url":"https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"443","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 17.55.53, CET] original='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody bgcolor=\\\"white\\\"\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccen\"","status": 403},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"},{"url":"https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"443","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 17.55.53, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody bgcolor=\\\"white\\\"\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccen\"","status": 403},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ","token":"6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"},{"url":"https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4","hostname":"www.ggc.world","port":"443","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 17.55.53, CET] error='"error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: ' [lun 10 feb 2020, 17.55.53, CET] errordetail='Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: ' [lun 10 feb 2020, 17.55.53, CET] www.ggc.world:Verify error:Invalid response from https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [2.36.58.214]: [lun 10 feb 2020, 17.55.53, CET] Debug: get token url. [lun 10 feb 2020, 17.55.53, CET] GET [lun 10 feb 2020, 17.55.53, CET] url='http://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4' [lun 10 feb 2020, 17.55.53, CET] timeout=1 [lun 10 feb 2020, 17.55.53, CET] Http already initialized. [lun 10 feb 2020, 17.55.53, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g --connect-timeout 1' [lun 10 feb 2020, 17.55.53, CET] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 51 [lun 10 feb 2020, 17.55.53, CET] Here is the curl dump log: [lun 10 feb 2020, 17.55.53, CET] == Info: Trying 2.36.58.214... == Info: TCP_NODELAY set == Info: Connected to www.ggc.world (2.36.58.214) port 80 (#0) => Send header, 194 bytes (0xc2) 0000: GET /.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJ 0040: Q6_yvVIJvX4 HTTP/1.1 0056: Host: www.ggc.world 006b: User-Agent: acme.sh/2.8.6 (https://github.com/acmesh-official/ac 00ab: me.sh) 00b3: Accept: */* 00c0: <= Recv header, 32 bytes (0x20) 0000: HTTP/1.1 301 Moved Permanently <= Recv header, 31 bytes (0x1f) 0000: Server: nginx/1.14.0 (Ubuntu) <= Recv header, 37 bytes (0x25) 0000: Date: Mon, 10 Feb 2020 16:55:53 GMT <= Recv header, 25 bytes (0x19) 0000: Content-Type: text/html <= Recv header, 21 bytes (0x15) 0000: Content-Length: 194 <= Recv header, 24 bytes (0x18) 0000: Connection: keep-alive <= Recv header, 104 bytes (0x68) 0000: Location: https://www.ggc.world/.well-known/acme-challenge/6soO0 0040: 9Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 <= Recv header, 45 bytes (0x2d) 0000: Strict-Transport-Security: max-age=31536000 <= Recv header, 2 bytes (0x2) 0000: == Info: Ignoring the response-body <= Recv data, 194 bytes (0xc2) 0000: 0008: 301 Moved Permanently 003b: 0053:

301 Moved Permanently

0084:
nginx/1.14.0 (Ubuntu)
00b0: 00b9: == Info: Connection #0 to host www.ggc.world left intact == Info: Issue another request to this URL: 'https://www.ggc.world/.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4' == Info: Trying 2.36.58.214... == Info: TCP_NODELAY set == Info: Connected to www.ggc.world (2.36.58.214) port 443 (#1) == Info: ALPN, offering h2 == Info: ALPN, offering http/1.1 == Info: successfully set certificate verify locations: == Info: CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): => Send SSL data, 512 bytes (0x200) 0000: .......u..>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u.........www.ggc.world........................3t..... 00c0: ....h2.http/1.1...........0..................................... 0100: ............+............-.....3.&.$... .....|...|..v....j5.2Fgu 0140: g.....j........................................................ 0180: ................................................................ 01c0: ................................................................ <= Recv SSL data, 5 bytes (0x5) 0000: ....z == Info: TLSv1.3 (IN), TLS handshake, Server hello (2): <= Recv SSL data, 122 bytes (0x7a) 0000: ...v........[..YZ.n..5pa.......b%...;D J.!....z...x...q:s......% 0040: ...!..>......+.....3.$... ..=....n2..4{.A...2M.}(...!....a <= Recv SSL data, 5 bytes (0x5) 0000: ..... <= Recv SSL data, 5 bytes (0x5) 0000: .... == Info: TLSv1.3 (IN), TLS Unknown, Certificate Status (22): <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Unknown (8): <= Recv SSL data, 15 bytes (0xf) 0000: .............h2 <= Recv SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (IN), TLS Unknown, Certificate Status (22): <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Certificate (11): <= Recv SSL data, 2549 bytes (0x9f5) 0000: ..........M0..I0..1........Q.Y.?H..."..L.B..0...*.H........0J1.0 0040: ...U....US1.0...U....Let's Encrypt1#0!..U....Let's Encrypt Autho 0080: rity X30...200209171827Z..200509171827Z0.1.0...U....ggc.world0.. 00c0: "0...*.H.............0..........i...z..6H..K..Nqc..ir,,KtdqC'..i 0100: ..4.O. ...u....o.$3...q....Xo..@.G.1_.n....1z..D&M....).....>.( 0140: ~#....w.$=`.$.L..L..Z...J&...]w....O.;m.!.>.....U|.~U...)....S.. 0180: ...o...m.D..+W!....N......B... ..9.F.|.l....G.....$...QI.N.....& 01c0: ...V.....dI...PG....p......m-.........]0..Y0...U...........0...U 0200: .%..0...+.........+.......0...U.......0.0...U......./.5)uO...F.. 0240: .H..:..0...U.#..0....Jjc.}....9..Ee.....0o..+........c0a0...+... 0280: ..0.."http://ocsp.int-x3.letsencrypt.org0/..+.....0..#http://cer 02c0: t.int-x3.letsencrypt.org/0...U....0...ggc.world0L..U. .E0C0...g. 0300: ....07..+..........0(0&..+.........http://cps.letsencrypt.org0.. 0340: ...+.....y............v....Y....@.-/....K..G....4......s...p+,.. 0380: .....G0E.!..)...~.1.2.^..2....y.Os.....h..!. p?.%..P.R)D}so..# 03c0: .....g<9.D..-.u...\..}h.....#....W|W..j..a:.i......p+,.......F0D 0400: . y%.`........Zy.m...........y..0.. vV...../...U.)...Zs~...awv.. 0440: ...#0...*.H................-.C.Me.@S'......................OA.V. 0480: .G..c..u.FE.;...t{]x........K.2.*..}.qC.k.k ..jU.[.G...l..3K.... 04c0: ..N........Qw.H(.G[..R":W# 0940: ....b.......?..H....eb..T..*. .........2...w..ye.+.(.:.R..R.._.. 0980: ..3.wl.@.2...\A.tl[]._3.M..8./{,b....o%./...F=.~..z...zm..%..... 09c0: ../X../,h&.K........CJ.DNosz(...n{L}.....D....4[.B.. <= Recv SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (IN), TLS Unknown, Certificate Status (22): <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): <= Recv SSL data, 264 bytes (0x108) 0000: ..........0.QcF.......9.bU6....?..F.ae.Dr....A....Q.&w.W.D...... 0040: ....I".3=..".&o...Z.f5E..........1RlX$....X....}..!|{.Y...Q4...j 0080: t...S.......D}(.....t.\..G.......k..e...;U<.>.9...\V.-.&....@x.. 00c0: .._a...2$ .(.b]2.....-OrRY..YI..R...M.p..9.4.F.]M..k...o.Rx.Z. 0100: ..WxV.z^ <= Recv SSL data, 5 bytes (0x5) 0000: ....E == Info: TLSv1.3 (IN), TLS Unknown, Certificate Status (22): <= Recv SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (IN), TLS handshake, Finished (20): <= Recv SSL data, 52 bytes (0x34) 0000: ...0m:S..DK@.n...).u....{.. &b.j?ZZ.........a<.>.G.. => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS change cipher, Client hello (1): => Send SSL data, 1 bytes (0x1) 0000: . => Send SSL data, 5 bytes (0x5) 0000: ....E == Info: TLSv1.3 (OUT), TLS Unknown, Certificate Status (22): => Send SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (OUT), TLS handshake, Finished (20): => Send SSL data, 52 bytes (0x34) 0000: ...0.VI.:..%.L..T..X-.!..&.J?........J.c...p...,..u. == Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 == Info: ALPN, server accepted to use h2 == Info: Server certificate: == Info: subject: CN=ggc.world == Info: start date: Feb 9 17:18:27 2020 GMT == Info: expire date: May 9 17:18:27 2020 GMT == Info: subjectAltName does not match www.ggc.world == Info: SSL: no alternative certificate subject name matches target host name 'www.ggc.world' == Info: stopped the pause stream! == Info: Closing connection 1 => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS Unknown, Unknown (21): => Send SSL data, 1 bytes (0x1) 0000: . == Info: TLSv1.3 (OUT), TLS alert, Client hello (1): => Send SSL data, 2 bytes (0x2) 0000: .. [lun 10 feb 2020, 17.55.53, CET] ret='51' [lun 10 feb 2020, 17.55.53, CET] Debugging, skip removing: /var/www/ggc.world/html//.well-known/acme-challenge/6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4 [lun 10 feb 2020, 17.55.53, CET] pid [lun 10 feb 2020, 17.55.53, CET] No need to restore nginx, skip. [lun 10 feb 2020, 17.55.53, CET] _clearupdns [lun 10 feb 2020, 17.55.53, CET] dns_entries [lun 10 feb 2020, 17.55.53, CET] skip dns. [lun 10 feb 2020, 17.55.53, CET] _on_issue_err [lun 10 feb 2020, 17.55.53, CET] Please add '--debug' or '--log' to check more details. [lun 10 feb 2020, 17.55.53, CET] See: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh [lun 10 feb 2020, 17.55.53, CET] _chk_vlist='www.ggc.world#6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ#http-01#/var/www/ggc.world/html/,ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/,' [lun 10 feb 2020, 17.55.53, CET] start to deactivate authz [lun 10 feb 2020, 17.55.53, CET] Trigger domain validation. [lun 10 feb 2020, 17.55.53, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.53, CET] _t_key_authz='6soO09Z1i0EOI5nZNwEXlSlCgdpPJviJQ6_yvVIJvX4.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 17.55.53, CET] _t_vtype [lun 10 feb 2020, 17.55.53, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.53, CET] payload='{}' [lun 10 feb 2020, 17.55.53, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.53, CET] Use _CACHED_NONCE='000135-GliO-a0ykxA5MRa1TixP4d-r0X1T2rZjbzYnSPR4' [lun 10 feb 2020, 17.55.53, CET] nonce='000135-GliO-a0ykxA5MRa1TixP4d-r0X1T2rZjbzYnSPR4' [lun 10 feb 2020, 17.55.53, CET] POST [lun 10 feb 2020, 17.55.53, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745063264/g7XuhQ' [lun 10 feb 2020, 17.55.53, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxMzUtR2xpTy1hMHlreEE1TVJhMVRpeFA0ZC1yMFgxVDJyWmpielluU1BSNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTA2MzI2NC9nN1h1aFEiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "WbrNafWXVH3AT4LHf5gEsetdB7G3DWeyaaN_M3Yj4KhGbeAMHngUIuGzdENek87XC9p6YwoO-tpjvryzVbGXzubu9HTAUDuIiR6OJw2q5SivsXsr3MpqiO6oo8QFV4aO297_-WpP1G6MAYWrLdfGTwFx8pR_RvMMmE63PTICmzQoHriboB3DQ7tDDNHHLnXtSce0cHk6Rz-NlUWQx_NxxRCJE7F-r8so6VsnGS75r9STrrX3kCxUo98Q-FUrVuSv9ek4m9wVp1YS35Yh6xfmxtc_0gjXbaxRzREqfTQEwZzs3YjxR5-hUmbymQobUcxQBR1uFrlylgcSPunKU46jkA"}' [lun 10 feb 2020, 17.55.53, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.53, CET] Http already initialized. [lun 10 feb 2020, 17.55.53, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.54, CET] _ret='0' [lun 10 feb 2020, 17.55.54, CET] responseHeaders='HTTP/2 400 server: nginx date: Mon, 10 Feb 2020 16:55:54 GMT content-type: application/problem+json content-length: 144 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001U1qHvL9J-qG1AN2k7ZJOpzh_RpRLXblWXKcj281X1i4 ' [lun 10 feb 2020, 17.55.54, CET] code='400' [lun 10 feb 2020, 17.55.54, CET] original='{ "type": "urn:ietf:params:acme:error:malformed", "detail": "Unable to update challenge :: authorization must be pending", "status": 400 }' [lun 10 feb 2020, 17.55.54, CET] response='{ "type": "urn:ietf:params:acme:error:malformed", "detail": "Unable to update challenge :: authorization must be pending", "status": 400 }' [lun 10 feb 2020, 17.55.54, CET] Trigger domain validation. [lun 10 feb 2020, 17.55.54, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 17.55.54, CET] _t_key_authz='verified_ok' [lun 10 feb 2020, 17.55.54, CET] _t_vtype [lun 10 feb 2020, 17.55.54, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 17.55.54, CET] payload='{}' [lun 10 feb 2020, 17.55.54, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 17.55.54, CET] Use _CACHED_NONCE='0001U1qHvL9J-qG1AN2k7ZJOpzh_RpRLXblWXKcj281X1i4' [lun 10 feb 2020, 17.55.54, CET] nonce='0001U1qHvL9J-qG1AN2k7ZJOpzh_RpRLXblWXKcj281X1i4' [lun 10 feb 2020, 17.55.54, CET] POST [lun 10 feb 2020, 17.55.54, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 17.55.54, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxVTFxSHZMOUotcUcxQU4yazdaSk9wemhfUnBSTFhibFdYS2NqMjgxWDFpNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjcyODMwODU0MS9VbXRBa1EiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "vJd5ABVLXEBVzz4ielXBi8J0lVN97brbZkTd6B2Vs3xCkH0pxJYuNcw_egm7_PxVuZNehOJ2IQqmwmMR_0Un-Mp4EsTo-IpdBPl5s-rQsJSIFVF2yQW0aie_DoW3KILe5GdLsfXUBrO3RDoeNDngVdSkqb4kukr09E0n3i81Q526gKHIEytVkkfXEuTStkMsChjED-yO_WOt_c5uy9Q_ZooAT4l11svSVJjTSyx_S0gfLkl35b1twNdTmCwZmn4t4mrC6TRAMdHf9R8-5b9q9bjl0G2DJmGP99Kh_ezIOcjm-HDjN0QLillP7CL96OpJJUC5t_ViZsTM8W7p6ZE-lg"}' [lun 10 feb 2020, 17.55.54, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 17.55.54, CET] Http already initialized. [lun 10 feb 2020, 17.55.54, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.iwQraWu6jY -g ' [lun 10 feb 2020, 17.55.54, CET] _ret='0' [lun 10 feb 2020, 17.55.54, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 16:55:54 GMT content-type: application/json content-length: 474 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ replay-nonce: 0102LMhQIp798GiKg3pHsw3RxKnihhHgrUkSf_AZ0Eik8E0 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 17.55.54, CET] code='200' [lun 10 feb 2020, 17.55.54, CET] original='{ "type": "http-01", "status": "valid", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ", "token": "qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "validationRecord": [ { "url": "http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "hostname": "ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] }' [lun 10 feb 2020, 17.55.54, CET] response='{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 17.55.54, CET] socat doesn't exists. [lun 10 feb 2020, 17.55.54, CET] Diagnosis versions: openssl:openssl OpenSSL 1.1.1 11 Sep 2018 apache: apache doesn't exists. nginx: nginx version: nginx/1.14.0 (Ubuntu) built with OpenSSL 1.1.1 11 Sep 2018 TLS SNI support enabled configure arguments: --with-cc-opt='-g -O2 -fdebug-prefix-map=/build/nginx-GkiujU/nginx-1.14.0=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wdate-time -D_FORTIFY_SOURCE=2' --with-ld-opt='-Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,-z,now -fPIC' --prefix=/usr/share/nginx --conf-path=/etc/nginx/nginx.conf --http-log-path=/var/log/nginx/access.log --error-log-path=/var/log/nginx/error.log --lock-path=/var/lock/nginx.lock --pid-path=/run/nginx.pid --modules-path=/usr/lib/nginx/modules --http-client-body-temp-path=/var/lib/nginx/body --http-fastcgi-temp-path=/var/lib/nginx/fastcgi --http-proxy-temp-path=/var/lib/nginx/proxy --http-scgi-temp-path=/var/lib/nginx/scgi --http-uwsgi-temp-path=/var/lib/nginx/uwsgi --with-debug --with-pcre-jit --with-http_ssl_module --with-http_stub_status_module --with-http_realip_module --with-http_auth_request_module --with-http_v2_module --with-http_dav_module --with-http_slice_module --with-threads --with-http_addition_module --with-http_geoip_module=dynamic --with-http_gunzip_module --with-http_gzip_static_module --with-http_image_filter_module=dynamic --with-http_sub_module --with-http_xslt_module=dynamic --with-stream=dynamic --with-stream_ssl_module --with-mail=dynamic --with-mail_ssl_module socat: