2023-02-11 07:44:27,234:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 07:44:27,236:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 07:44:27,236:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 07:44:27,280:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 07:44:27,281:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 07:44:27,283:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 07:44:27,309:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 07:44:27,310:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 07:44:27,311:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 07:44:43,977:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 07:44:43,983:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 07:44:44,788:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 07:44:44,789:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:44:44 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TPZFL5JYoqU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 07:44:51,695:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 07:44:51,695:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 07:44:51,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 07:44:51,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:44:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAgmqxKMcZGpO1teim0JcNO-Kzp0ircY92BBqdpP0U630 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 07:44:51,962:DEBUG:acme.client:Storing nonce: 1DFAgmqxKMcZGpO1teim0JcNO-Kzp0ircY92BBqdpP0U630 2023-02-11 07:44:51,962:DEBUG:acme.client:JWS payload: b'{\n "contact": [\n "mailto:caoyixiong6@gmail.com"\n ],\n "termsOfServiceAgreed": true,\n "resource": "new-reg"\n}' 2023-02-11 07:44:51,968:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct: { "protected": "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", "signature": "PDoipW3YY2I4ArOCWkJJbnktqSVrdHERehjbA50VsqdqEeO1d3V-l0e58VfwPNFpBPNhvsmZ7CQn4PsNQp1xRadXpXEPAiDbEaMxjbRVAeEZkESt6r3b3aETx8CXIT4TrUYrsqfoxkx2k58rN9-PvGrK-JBFw3iIutQovqXXAituA35iHzexphSFip4qkQ-uGCGsH2z5XB53qbh_5d2j09JgU0QwqIFRJzSpDX7JyMne4f5TRY1lAXYO0ZiNmBoGJn0FalDPW-vgB3OpAjgyDgymIQT2i-qZjjCK3NYd8UHc1wGdkY4vTVCePqjHScInwNhNj48AT1h_EY5ZsiZBWA", "payload": "ewogICJjb250YWN0IjogWwogICAgIm1haWx0bzpjYW95aXhpb25nNkBnbWFpbC5jb20iCiAgXSwKICAidGVybXNPZlNlcnZpY2VBZ3JlZWQiOiB0cnVlLAogICJyZXNvdXJjZSI6ICJuZXctcmVnIgp9" } 2023-02-11 07:44:52,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 564 2023-02-11 07:44:52,256:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 11 Feb 2023 07:44:52 GMT Content-Type: application/json Content-Length: 564 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="terms-of-service" Location: https://acme-v02.api.letsencrypt.org/acme/acct/959656006 Replay-Nonce: 15C9hJRnEnz5mjh5DqCIDaSM0IRnBCb7o-5Vkb4KbfDw444 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "key": { "kty": "RSA", "n": "rXqLN_8UINVBRO83vAbKfm-Hq526W8qWmr9Vv16pc5_GZnPirXpu9xdbgopq0eVrTMyzjpVnNCWflORY6IXALMxb7_jBrZGHpZ7nvP-kVs7trTFGnbWTy0ylAK7t269XvWmoNftw-ih6W-Gn4Vy7d-agXUVEShGY9u6lx5MXwjWWbKIEug4sE0eZpws_v7_Q9oMtxqxlJ2T4vOl3HAvZgrtXa5MbNIrrxB-ULo54W24TzNhIGodM38lzRM1OuvLE5qiry3QyV3LB3tufcEC6v64xIQY_EYjI_Cqg6L83WCePjYibUmMfdIafwsQG89aWZF_EP5n5ejbo2DkqGI09Bw", "e": "AQAB" }, "contact": [ "mailto:caoyixiong6@gmail.com" ], "initialIp": "158.247.199.7", "createdAt": "2023-02-11T07:44:52.165532495Z", "status": "valid" } 2023-02-11 07:44:52,257:DEBUG:acme.client:Storing nonce: 15C9hJRnEnz5mjh5DqCIDaSM0IRnBCb7o-5Vkb4KbfDw444 2023-02-11 07:44:52,259:DEBUG:certbot.reporter:Reporting to user: Your account credentials have been saved in your Certbot configuration directory at /etc/letsencrypt. You should make a secure backup of this folder now. This configuration directory will also contain certificates and private keys obtained by Certbot so making regular backups of this folder is ideal. 2023-02-11 07:44:54,152:DEBUG:certbot.eff:Sending POST request to https://supporters.eff.org/subscribe/certbot: {'data_type': 'json', 'email': 'caoyixiong6@gmail.com', 'form_id': 'eff_supporters_library_subscribe_form'} 2023-02-11 07:44:54,154:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): supporters.eff.org 2023-02-11 07:44:55,499:DEBUG:urllib3.connectionpool:https://supporters.eff.org:443 "POST /subscribe/certbot HTTP/1.1" 200 90 2023-02-11 07:44:55,501:DEBUG:certbot.eff:Received response: b'{"status":true,"message":"Please check your email for a confirmation link."}' 2023-02-11 07:44:55,501:DEBUG:certbot.main:Picked account: )>), contact=('mailto:caoyixiong6@gmail.com',), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/959656006', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf'), 03a5ce4ead89fe3a5074650f86313ddf, Meta(creation_dt=datetime.datetime(2023, 2, 11, 7, 44, 52, tzinfo=), creation_host='vultr.guest'))> 2023-02-11 07:44:55,503:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 07:45:04,013:INFO:certbot.main:Obtaining a new certificate 2023-02-11 07:45:04,086:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0000_key-certbot.pem 2023-02-11 07:45:04,090:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0000_csr-certbot.pem 2023-02-11 07:45:04,092:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "caoy=\\b\\b\\bc"\n }\n ]\n}' 2023-02-11 07:45:04,095:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1QzloSlJuRW56NW1qaDVEcUNJRGFTTTBJUm5CQ2I3by01VmtiNEtiZkR3NDQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WAk54bcGPMpTMElsetEX9I1xMQK0QvQ2pctvi0t977lGLcUPJgk7l1cNy31mWifmaiUFupTAtZ-xtqM9nP0kBzwMognOoCERuKBAzglnMHvvSkSWMqqQU-ryU4-mi00fn6FFtcKWNN_BxC1VCNfIr7MLFKf0NIFxqyOOpdvacxb5H4NDJV2kWRh3fcyHiOEKcS9pylHmrS2fdxR8MX_gsqyyAn1ircNGS7cjnoHbjAMjzpsYGXh7nTFDN-RuC_Dw7s4zeaQ_CCu8bgcVjj_2DuGWvFPC4QCWOeQXDdxk-tEN15qfQ7GqF4tCPVefz5TQsgU54WXFcHlu8zHMq_Bykg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhb3k9XGJcYlxiYyIKICAgIH0KICBdCn0" } 2023-02-11 07:45:04,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 400 201 2023-02-11 07:45:04,364:DEBUG:acme.client:Received response: HTTP 400 Server: nginx Date: Sat, 11 Feb 2023 07:45:04 GMT Content-Type: application/problem+json Content-Length: 201 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878eQvUEpiIGnPQRyvVNKEWju8A7sdeCC0lf3cEvo0O1k4 { "type": "urn:ietf:params:acme:error:rejectedIdentifier", "detail": "Error creating new order :: Cannot issue for \"caoy=\\b\\b\\bc\": Domain name contains an invalid character", "status": 400 } 2023-02-11 07:45:04,365:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 385, in _get_order_and_authorizations orderr = self.acme.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 889, in new_order return self.client.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 672, in new_order response = self._post(self.directory['newOrder'], order) File "/usr/lib/python3/dist-packages/acme/client.py", line 96, in _post return self.net.post(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1204, in post return self._post_once(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1218, in _post_once response = self._check_response(response, content_type=content_type) File "/usr/lib/python3/dist-packages/acme/client.py", line 1073, in _check_response raise messages.Error.from_json(jobj) acme.messages.Error: urn:ietf:params:acme:error:rejectedIdentifier :: Error creating new order :: Cannot issue for "caoy=\b\b\bc": Domain name contains an invalid character 2023-02-11 07:45:04,367:ERROR:certbot.log:An unexpected error occurred: 2023-02-11 07:45:04,367:ERROR:certbot.log:Error creating new order :: Cannot issue for "caoy=\b\b\bc": Domain name contains an invalid character 2023-02-11 07:45:07,943:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 07:45:07,945:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 07:45:07,946:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 07:45:07,984:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 07:45:07,985:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 07:45:07,987:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 07:45:08,020:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 07:45:08,021:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 07:45:08,022:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 07:45:08,028:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 07:45:08,030:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 07:45:08,033:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 07:45:08,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 07:45:08,818:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:08 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "nEWNsXy2xTI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 07:45:08,818:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 07:45:12,395:INFO:certbot.main:Obtaining a new certificate 2023-02-11 07:45:12,439:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0001_key-certbot.pem 2023-02-11 07:45:12,442:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0001_csr-certbot.pem 2023-02-11 07:45:12,444:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 07:45:12,444:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 07:45:12,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 07:45:12,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371CfN4n6hMxVGBi9gU-x46Lhf98uIhR4D-8SiGsgJGKk3Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 07:45:12,706:DEBUG:acme.client:Storing nonce: 371CfN4n6hMxVGBi9gU-x46Lhf98uIhR4D-8SiGsgJGKk3Y 2023-02-11 07:45:12,707:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ca"\n }\n ]\n}' 2023-02-11 07:45:12,710:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUNmTjRuNmhNeFZHQmk5Z1UteDQ2TGhmOTh1SWhSNEQtOFNpR3NnSkdLazNZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RGoW87_OiEtfz3uhT3CVYzglk1hYL2AzEJNFYI118YDwNsdROs2RSWGmbi0a79QK9K0jYHFxP-THIrkp-IHh5AjV7ZWRq0rdemvklMtpvpSV-9-xKHYPVXkz2CB9VufhJ0Ax-yhvnrDxCAVSm2sY-UDZ0DpyNFpu3yP5hS5uu-BToSZ7K_Nu00_cGgfs9zyxeogVo9jxj4omLGXg3bWrUS98ccOpm6LpsChdJQ0YDCXMMqM8VlH0uYGAm3vuwkPbIUsbiGoky020m7VGkvHuKAO6ZAUloUht5vSbHNLDdGgdsbr4rEda3gDlX8dIcvkkMURgzMg4W_8c2SbAGu-mbA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhIgogICAgfQogIF0KfQ" } 2023-02-11 07:45:12,973:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 400 181 2023-02-11 07:45:12,974:DEBUG:acme.client:Received response: HTTP 400 Server: nginx Date: Sat, 11 Feb 2023 07:45:12 GMT Content-Type: application/problem+json Content-Length: 181 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAJGCdd6prTI6lmthXEXS8FdzSoiWOF6RQ2lVJSteFiMA { "type": "urn:ietf:params:acme:error:rejectedIdentifier", "detail": "Error creating new order :: Cannot issue for \"ca\": Domain name needs at least one dot", "status": 400 } 2023-02-11 07:45:12,974:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 385, in _get_order_and_authorizations orderr = self.acme.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 889, in new_order return self.client.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 672, in new_order response = self._post(self.directory['newOrder'], order) File "/usr/lib/python3/dist-packages/acme/client.py", line 96, in _post return self.net.post(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1204, in post return self._post_once(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1218, in _post_once response = self._check_response(response, content_type=content_type) File "/usr/lib/python3/dist-packages/acme/client.py", line 1073, in _check_response raise messages.Error.from_json(jobj) acme.messages.Error: urn:ietf:params:acme:error:rejectedIdentifier :: Error creating new order :: Cannot issue for "ca": Domain name needs at least one dot 2023-02-11 07:45:12,976:ERROR:certbot.log:An unexpected error occurred: 2023-02-11 07:45:12,976:ERROR:certbot.log:Error creating new order :: Cannot issue for "ca": Domain name needs at least one dot 2023-02-11 07:45:14,830:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 07:45:14,831:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 07:45:14,832:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 07:45:14,879:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 07:45:14,880:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 07:45:14,882:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 07:45:14,970:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 07:45:14,972:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 07:45:14,972:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 07:45:14,978:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 07:45:14,980:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 07:45:14,983:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 07:45:15,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 07:45:15,766:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:15 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mKxuuaJq_F0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 07:45:15,767:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 07:45:20,158:INFO:certbot.main:Obtaining a new certificate 2023-02-11 07:45:20,289:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0002_key-certbot.pem 2023-02-11 07:45:20,293:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0002_csr-certbot.pem 2023-02-11 07:45:20,295:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 07:45:20,295:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 07:45:20,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 07:45:20,557:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371C-na6Nh0BYR02wcUtH2ELGDF_GKx7F4mm9nUjE84agRY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 07:45:20,558:DEBUG:acme.client:Storing nonce: 371C-na6Nh0BYR02wcUtH2ELGDF_GKx7F4mm9nUjE84agRY 2023-02-11 07:45:20,558:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cyx"\n }\n ]\n}' 2023-02-11 07:45:20,562:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUMtbmE2TmgwQllSMDJ3Y1V0SDJFTEdERl9HS3g3RjRtbTluVWpFODRhZ1JZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pff9XpeS5tw1hUMKeRyo5Ajgd-TXUyLfzSveibOUUnQXZqdLP6C53-6P82gc3Cz3ZbfZN8goELbJEpDrLINuh3AmV1Ju6Pu7y9Mvg7Dwzt9FMWDuSYss8XEJuTtu-vr_Nu16XTVRM225qbNhZ7_CRd47PMdLHL_zX-jEsMzwVvn6chETgNKH60RHk0kGO5E7Fbw7l_BFORFzjKc1ruxCF6pS_kkdRIhmiRdB2__iO9_3wxEBxUTvzcbVAtAb9O6I3QFhQllt4Ofv4AG-RifGGdujJOYzn18PDIO-7rlnTDpfasINmlfo1XqoQfjv08r0ON7uSpPz7smtrem3bMrZKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImN5eCIKICAgIH0KICBdCn0" } 2023-02-11 07:45:20,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 400 182 2023-02-11 07:45:20,824:DEBUG:acme.client:Received response: HTTP 400 Server: nginx Date: Sat, 11 Feb 2023 07:45:20 GMT Content-Type: application/problem+json Content-Length: 182 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9t0m0BncaJ6Uhooz8FrzoEGRQ8JtnBWuzozYDI6ju1EI { "type": "urn:ietf:params:acme:error:rejectedIdentifier", "detail": "Error creating new order :: Cannot issue for \"cyx\": Domain name needs at least one dot", "status": 400 } 2023-02-11 07:45:20,825:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 385, in _get_order_and_authorizations orderr = self.acme.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 889, in new_order return self.client.new_order(csr_pem) File "/usr/lib/python3/dist-packages/acme/client.py", line 672, in new_order response = self._post(self.directory['newOrder'], order) File "/usr/lib/python3/dist-packages/acme/client.py", line 96, in _post return self.net.post(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1204, in post return self._post_once(*args, **kwargs) File "/usr/lib/python3/dist-packages/acme/client.py", line 1218, in _post_once response = self._check_response(response, content_type=content_type) File "/usr/lib/python3/dist-packages/acme/client.py", line 1073, in _check_response raise messages.Error.from_json(jobj) acme.messages.Error: urn:ietf:params:acme:error:rejectedIdentifier :: Error creating new order :: Cannot issue for "cyx": Domain name needs at least one dot 2023-02-11 07:45:20,828:ERROR:certbot.log:An unexpected error occurred: 2023-02-11 07:45:20,828:ERROR:certbot.log:Error creating new order :: Cannot issue for "cyx": Domain name needs at least one dot 2023-02-11 07:45:23,593:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 07:45:23,595:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 07:45:23,596:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 07:45:23,637:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 07:45:23,638:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 07:45:23,640:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 07:45:23,834:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 07:45:23,836:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 07:45:23,836:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 07:45:23,843:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 07:45:23,845:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 07:45:23,848:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 07:45:24,652:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 07:45:24,653:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:24 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "k04LOkeSQks": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 07:45:24,654:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 07:45:30,924:INFO:certbot.main:Obtaining a new certificate 2023-02-11 07:45:30,959:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0003_key-certbot.pem 2023-02-11 07:45:30,962:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0003_csr-certbot.pem 2023-02-11 07:45:30,964:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 07:45:30,964:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 07:45:31,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 07:45:31,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977_RGleUlRZCPKFTTE_2d_94S7iYg4HfXF_zIbVHH7kNM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 07:45:31,232:DEBUG:acme.client:Storing nonce: F977_RGleUlRZCPKFTTE_2d_94S7iYg4HfXF_zIbVHH7kNM 2023-02-11 07:45:31,233:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "caoyx.cyxhj.buzz"\n }\n ]\n}' 2023-02-11 07:45:31,237:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkY5NzdfUkdsZVVsUlpDUEtGVFRFXzJkXzk0UzdpWWc0SGZYRl96SWJWSEg3a05NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Uag2ixZ8P6Ss_bBvSO9lJXCMUVytPraF4It3CAymF9Qky3hzM-AosDpyBJxO9T5IIfs12kYJkvJUJizhInUnQCa1yFGuql5nlbxNDS8IfFtdiOzUN9eheq80zvY619ssAZrTlVs5uGpPKBK6WfbPpaX7tn5r9iv1LDhSQdUbQTotAqCtnz8s0bVR2kHO7T2lestayinNAhCajmIs8k5iDRnq10ek1j_d8Elo1ayp6HmAtLuf0Z9wXM1dVzRXAVN6dQ93AZO4pcp7doWBGVzNP0SrkLMcaMXzkjwIPeupv601UjoDjQGwTIgef_vflqNDeBxmGP6IBGDA-3oRPnKnpg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhb3l4LmN5eGhqLmJ1enoiCiAgICB9CiAgXQp9" } 2023-02-11 07:45:31,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-02-11 07:45:31,528:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 11 Feb 2023 07:45:31 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/959656006/164141361246 Replay-Nonce: 853FF_7vs7UWHhH7a_RCO6UrX5J0HXJvz8dMeKWxu-gZHE4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-02-18T07:45:31Z", "identifiers": [ { "type": "dns", "value": "caoyx.cyxhj.buzz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/959656006/164141361246" } 2023-02-11 07:45:31,528:DEBUG:acme.client:Storing nonce: 853FF_7vs7UWHhH7a_RCO6UrX5J0HXJvz8dMeKWxu-gZHE4 2023-02-11 07:45:31,529:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:45:31,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjg1M0ZGXzd2czdVV0hoSDdhX1JDTzZVclg1SjBIWEp2ejhkTWVLV3h1LWdaSEU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzA3MTM2NDYifQ", "signature": "MYQPbj6Y1CU8FiOXcxlocjHDIVhzByOMWM6IBahfFjJNlTiICkFSh0zLnyprvXyzPS3izh6JXevGggsxcfsKQpU_oiygKd2P14vZh2hM4uY0Yb37ozQNj6Gfhb7xdpSFqS_IzxdMsLsUTR0tRidrv5KiKFINsf_4CILCAZKWGEi3Q3om0aweCPVYZplH09RtlkgYsnP_x6-cH6foh5jdb_F34euLZ5y65hnudh3DaXFDQncZ2yI-bmYmgkl_-c5maMJWYb69tX5lFkSENKLCmwhgxF6S27mM8eBI1xkkRwaeP3TmNRV4Zs4e7WM-giyZMzc8UoAlIfLonolk314hCA", "payload": "" } 2023-02-11 07:45:31,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202570713646 HTTP/1.1" 200 800 2023-02-11 07:45:31,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:31 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C4009cbdFtJJ_CSvHaS7dLHkRidZEIPF3zqFClBQ7Atzee8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:45:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/tF3ldg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/Yc_2Zg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" } ] } 2023-02-11 07:45:31,801:DEBUG:acme.client:Storing nonce: C4009cbdFtJJ_CSvHaS7dLHkRidZEIPF3zqFClBQ7Atzee8 2023-02-11 07:45:31,802:INFO:certbot.auth_handler:Performing the following challenges: 2023-02-11 07:45:31,803:INFO:certbot.auth_handler:http-01 challenge for caoyx.cyxhj.buzz 2023-02-11 07:45:31,804:DEBUG:acme.standalone:Successfully bound to :80 using IPv6 2023-02-11 07:45:31,804:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations. 2023-02-11 07:45:31,812:INFO:certbot.auth_handler:Waiting for verification... 2023-02-11 07:45:31,813:DEBUG:acme.client:JWS payload: b'{\n "resource": "challenge",\n "type": "http-01"\n}' 2023-02-11 07:45:31,815:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM0MDA5Y2JkRnRKSl9DU3ZIYVM3ZExIa1JpZFpFSVBGM3pxRkNsQlE3QXR6ZWU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My8yMDI1NzA3MTM2NDYvcUtPZmFnIn0", "signature": "ablNn-Rj2eOu1awfb8zHdlNSN7oWxHWFKXwNw1M_pjMjF_FODrEITRa-DR7GXVA1H_BUJZ8YmVBc2voXsxZN66cV5N5JrxkWuLEzeexePx2caWK-laowBx4NQwBmfnln9iKsKn8GLnXVDNXSgUSWa4i-oDDfMgl45EPJc-O_tyuORLwTqSuZ6mhLDk6imOk_ATVLGee0TR-5OjxJeCBEvOTDhgQTeI7dZ2WpdAeqZislNvn84ew6w4IL025EPtqjrvfrolMNrJ5Q2gxYDhW29CKC3HTzZWqmh2s5EinULJbPt8RV1Q-0BkUtFpwlIRNgOEqny-Lwb9uCU0vK1s7pJQ", "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0" } 2023-02-11 07:45:32,086:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/202570713646/qKOfag HTTP/1.1" 200 187 2023-02-11 07:45:32,088:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:32 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag Replay-Nonce: A5FEG2-4_82vS38-qYOoIQAfa6DUfdFgltsaIElXrxM3qI0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" } 2023-02-11 07:45:32,088:DEBUG:acme.client:Storing nonce: A5FEG2-4_82vS38-qYOoIQAfa6DUfdFgltsaIElXrxM3qI0 2023-02-11 07:45:35,092:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:45:35,095:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkE1RkVHMi00XzgydlMzOC1xWU9vSVFBZmE2RFVmZEZnbHRzYUlFbFhyeE0zcUkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzA3MTM2NDYifQ", "signature": "h83yUEEyDfimANNadjcmdr-MjxVqEdkNxkg2hlecz3uwlBFnx4lwzpjUvMKp-qLesSjEsbN9FtpQP-P2zXGk-z-rlEPyVscXZRMJ5pRqjfEt2WWY4ZkGpY_fVdT-_tj7nvMYzaDpzXIQrnujsdjspcjSxVG0NYkNxleIxhAB0x3-BgaU-Vv0S-pjKVzIGZUF8D_CLQ01zhEq7L2pTc64V6k1JNr8vxHyupPT5bm_Sn0B-PamJZ5N7jhqV9FMcfh7tHsqtU0xqMKWXGhkn9ESWsF9bEhW8JPir3IQDOr19I5jIAgy944Jl3w9sFWt98hCg14Nktjl32EV6gF1--HBQg", "payload": "" } 2023-02-11 07:45:35,364:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202570713646 HTTP/1.1" 200 800 2023-02-11 07:45:35,365:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:35 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 853FaKoDiNY0-ipVo777VdIV2XE8romvzpuoR8cTgFYqcvk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:45:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/tF3ldg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/Yc_2Zg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" } ] } 2023-02-11 07:45:35,365:DEBUG:acme.client:Storing nonce: 853FaKoDiNY0-ipVo777VdIV2XE8romvzpuoR8cTgFYqcvk 2023-02-11 07:45:38,369:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:45:38,371:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjg1M0ZhS29EaU5ZMC1pcFZvNzc3VmRJVjJYRThyb212enB1b1I4Y1RnRllxY3ZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzA3MTM2NDYifQ", "signature": "Q_x5DVlSRoAqjUcpQhmqDjOXjfbY5v_bDgziUWz1OhSMmCtIwXXIzQ3Aq3pvhsgJ1SSyCL3kiU9t-I_cilp3YsMgzTbi__zhokKOFRETMMN48DVh9VmBx_zZTMWuYWeQp5vko5bX4AFmdbrL4flhM_jlqzqlJFciw4_NF80DFXVv4_WFJUqbeDbS1U9a5-e3LNJwOyUAVbMTsMhyNiWXN6wCJFYF_hcRcKbuFDAtQ55Fkj1q3d0h_c9zHA3OeyBeSUpfGQpxz6XnOk3Vk2q_KxMEpLEyDBxAlQ9_OT3pclt-A75jNIk_LM7fs0cG8brR2tvCBjo3nqZo--ZMizbvQg", "payload": "" } 2023-02-11 07:45:38,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202570713646 HTTP/1.1" 200 800 2023-02-11 07:45:38,641:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:38 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: F977x-brKhmI3DVM93ybTGFKkiZ1hPAv4ffq0wpvDP26jgU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:45:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/tF3ldg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/Yc_2Zg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" } ] } 2023-02-11 07:45:38,641:DEBUG:acme.client:Storing nonce: F977x-brKhmI3DVM93ybTGFKkiZ1hPAv4ffq0wpvDP26jgU 2023-02-11 07:45:41,645:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:45:41,647:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkY5Nzd4LWJyS2htSTNEVk05M3liVEdGS2tpWjFoUEF2NGZmcTB3cHZEUDI2amdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzA3MTM2NDYifQ", "signature": "CBkXSMhcCv4S-Jp_L4x7A1g2ojbphRhO9EWU7w6X8OwjNZrhsxRZcnh-myIM6epQccxR1eOyUBFXD7kb_IRFB9dSobwAxU9XHEJ0XvlgI0XLMBrplCRGarkmBiHhr8eLSpMbLKx-42Dea9l07RQA1gs1m1YdcGaIv1CuOE_qaRKXl8sR8R3-KY-kCUVSKLVqYb4sYnY_o3loLTqlYwoEjHU6XOPrHGIOAp3Y8SJtx48iAOAxnyMaTVSq0CHFOzTawmhc8noQF4-sdLVNY0q6V2IkSsPks4Nk-f3CPKKcKGHQQa1xfLUz_-pfWG9Mh8kf9NYSFVHjBqW-35JDKEbK8w", "payload": "" } 2023-02-11 07:45:41,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202570713646 HTTP/1.1" 200 800 2023-02-11 07:45:41,917:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:41 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FEtZLUY1qe4-LTaQLR4oDy0kLPgh2BjvvWBGy17zkuh0k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:45:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/tF3ldg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/Yc_2Zg", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q" } ] } 2023-02-11 07:45:41,917:DEBUG:acme.client:Storing nonce: A5FEtZLUY1qe4-LTaQLR4oDy0kLPgh2BjvvWBGy17zkuh0k 2023-02-11 07:45:44,920:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:45:44,922:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202570713646: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkE1RkV0WkxVWTFxZTQtTFRhUUxSNG9EeTBrTFBnaDJCanZ2V0JHeTE3emt1aDBrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzA3MTM2NDYifQ", "signature": "nPQoOu2xMBTEAEZdM7xGPT-7wrv9xLWIHdJXgwNe3nqbEyvtCaB8XqP7SC_WiR7h3C71EoYUXcOdUrUn1S3f8PjgigstI8uTxHUlROjx0v3AofUf3xfD4e3SBr58eXvg0z8RvhiAyZU0ef1ZnDjdqQ_p9FWAvShqVIcK6uPU3XDat-AK5XhYCVvrbI20euGFBeoCMgnK_yQ9iUxHdWBmsAP-MeCEfYcgJzFi8EzJJRafiYaH5GCQ2mfog26wopgGyQxAm4kJtsJSnkO9LojOtTwjgstM6hQ9jbw7B0tjw_bKjyjrYjHgoHjjWBz4zfpokcKtG1vqoToRCzfHZIuFoA", "payload": "" } 2023-02-11 07:45:45,192:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202570713646 HTTP/1.1" 200 1062 2023-02-11 07:45:45,193:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:45:45 GMT Content-Type: application/json Content-Length: 1062 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FE7Y5hwV13KnJ022KxH2CNijWSxCOEWdr7J1DZPT1GPMM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "invalid", "expires": "2023-02-18T07:45:31Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q: Timeout during connect (likely firewall problem)", "status": 400 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202570713646/qKOfag", "token": "56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q", "validationRecord": [ { "url": "http://caoyx.cyxhj.buzz/.well-known/acme-challenge/56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q", "hostname": "caoyx.cyxhj.buzz", "port": "80", "addressesResolved": [ "158.247.199.7" ], "addressUsed": "158.247.199.7" } ], "validated": "2023-02-11T07:45:32Z" } ] } 2023-02-11 07:45:45,193:DEBUG:acme.client:Storing nonce: A5FE7Y5hwV13KnJ022KxH2CNijWSxCOEWdr7J1DZPT1GPMM 2023-02-11 07:45:45,194:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server: Domain: caoyx.cyxhj.buzz Type: connection Detail: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q: Timeout during connect (likely firewall problem) To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided. 2023-02-11 07:45:45,195:DEBUG:certbot.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q: Timeout during connect (likely firewall problem) 2023-02-11 07:45:45,195:DEBUG:certbot.error_handler:Calling registered functions 2023-02-11 07:45:45,195:INFO:certbot.auth_handler:Cleaning up challenges 2023-02-11 07:45:45,196:DEBUG:certbot.plugins.standalone:Stopping server at :::80... 2023-02-11 07:45:45,324:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/56TY5cicnge2X8hXPNhSQ8Patqd907Q0sRYU49G525Q: Timeout during connect (likely firewall problem) 2023-02-11 07:58:32,970:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 07:58:32,971:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 07:58:32,972:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 07:58:33,007:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 07:58:33,008:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 07:58:33,009:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 07:58:33,104:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 07:58:33,105:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 07:58:33,105:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 07:58:33,111:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 07:58:33,113:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 07:58:33,116:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 07:58:33,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 07:58:33,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:33 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-Y3JYrylvmQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 07:58:33,904:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 07:58:40,932:INFO:certbot.main:Obtaining a new certificate 2023-02-11 07:58:40,974:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0004_key-certbot.pem 2023-02-11 07:58:40,977:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0004_csr-certbot.pem 2023-02-11 07:58:40,979:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 07:58:40,979:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 07:58:41,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 07:58:41,241:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371CBRiPnukkaNDZumVcD9vKR-j3YL6hoeaSCfa30Ny-sdo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 07:58:41,241:DEBUG:acme.client:Storing nonce: 371CBRiPnukkaNDZumVcD9vKR-j3YL6hoeaSCfa30Ny-sdo 2023-02-11 07:58:41,242:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "caoyx.cyxhj.buzz"\n }\n ]\n}' 2023-02-11 07:58:41,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUNCUmlQbnVra2FORFp1bVZjRDl2S1ItajNZTDZob2VhU0NmYTMwTnktc2RvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MMtR6ubGeeHM9V3Uks6g1RIU_fJ3B2ze_k9X7cJIwr0kyhVt51Kui_0Z9adPvZ0GfqsHtDZwfs64pYkONBRHb2OwYhiW-U5Lg_9qSlcurxIKs1SpqBicGiTWwdG2cjYX3dQLptR6-XzY4nsuu1ACfnuOjm_objiMTIuYeLHvYfnVZJjNlCErD5R8Dfbg_ztBxmc6gKzAw1DckYJ6yuM3ATdMra9KhB9Y6yuH6kdRYRzBKpQPrdr_G498zfrDZa6VhQeEdGMVDT9j4eDMNfVjwiUQrya2mzYu_Xxv0QQo2nNXLSa-q9jVK0fWgM-n6pBMpLxCFX-wPkgFULGgEq7t1w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhb3l4LmN5eGhqLmJ1enoiCiAgICB9CiAgXQp9" } 2023-02-11 07:58:41,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-02-11 07:58:41,655:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 11 Feb 2023 07:58:41 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/959656006/164142948136 Replay-Nonce: 15C94agGJHee6mCt8_bD_JeDeHq4jUxKlIdn7FyuyqghsPk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-02-18T07:58:41Z", "identifiers": [ { "type": "dns", "value": "caoyx.cyxhj.buzz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/959656006/164142948136" } 2023-02-11 07:58:41,655:DEBUG:acme.client:Storing nonce: 15C94agGJHee6mCt8_bD_JeDeHq4jUxKlIdn7FyuyqghsPk 2023-02-11 07:58:41,655:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:41,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1Qzk0YWdHSkhlZTZtQ3Q4X2JEX0plRGVIcTRqVXhLbElkbjdGeXV5cWdoc1BrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "nX79swz6F5mO4yAkb7nfneJQCoGCfoz4h9MAGrJePu64VkE5BBxJxZqWkeI2nzNQezRsTTfEtaGcrtOxVHSOLOgySwrY1tyz5TIyMVzTytJ3YD3_Tqqdug-lQhjcfWPlzJ4VhMNqVKrYzE_m02SwsHSFGItDoX_w1QyJ4pgiEW6OQdT2QQijp87lKbfBDftz3_WrKqisEFlnNekcVPzGhjiGCWTih7Ys8rDxkuwcdibxhtQoHsGn_s4j2E-mrwd5JHjGf-M53kCv-JEKEkk4r7VkylHCXNxNm4HHNzyBlCbJdICCJErlT6DnMfpFdTuWD7JYgGJAyPS13AupluKVdg", "payload": "" } 2023-02-11 07:58:41,920:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 800 2023-02-11 07:58:41,921:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:41 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAeTA8ggZp9eOKS7BHbX7M3xEoO2YDKrQj-oWSgHNOlA4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/EM9OHA", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/SxfO8w", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } ] } 2023-02-11 07:58:41,921:DEBUG:acme.client:Storing nonce: 1DFAeTA8ggZp9eOKS7BHbX7M3xEoO2YDKrQj-oWSgHNOlA4 2023-02-11 07:58:41,922:INFO:certbot.auth_handler:Performing the following challenges: 2023-02-11 07:58:41,922:INFO:certbot.auth_handler:http-01 challenge for caoyx.cyxhj.buzz 2023-02-11 07:58:41,923:DEBUG:acme.standalone:Successfully bound to :80 using IPv6 2023-02-11 07:58:41,923:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations. 2023-02-11 07:58:41,928:INFO:certbot.auth_handler:Waiting for verification... 2023-02-11 07:58:41,929:DEBUG:acme.client:JWS payload: b'{\n "resource": "challenge",\n "type": "http-01"\n}' 2023-02-11 07:58:41,931:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjFERkFlVEE4Z2dacDllT0tTN0JIYlg3TTN4RW9PMllES3JRai1vV1NnSE5PbEE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My8yMDI1NzI5MDQ5OTYvV2kyMEtRIn0", "signature": "qvPbQN6j5S-SKWQ0xpzx3DLbcyYPgYMbSUBmbOlJ35F_70A96XNi01Rl3ag36cWqOjd9Xi941DDoKlSENTb6PL54h5Q-OFrc4Mgu3XiN2eUC3-plzxqtYU3q1_SzbdzI1BAHy1NYBHUTLJRsIRlnK4Z--3P36x4Kjhg918CppQPOZd4H-fYpDrBEBDNrddKZ-mmIqx2PMxcXsWHrC5sXWrHfVLDAJZ1SZboyYa7kCitYhKZAm6Do9sRFrRuuf1HNC6uWdBkCAjgOdO88_nUJsuq5oGIeS-ytNdXQzXaJn3tiNRhwAfgbOc8oglfKhB-_dtAa3cu4bNv2uJ3NxCmR5g", "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0" } 2023-02-11 07:58:42,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/202572904996/Wi20KQ HTTP/1.1" 200 187 2023-02-11 07:58:42,208:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:42 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ Replay-Nonce: 1DFAhIBHIl2RbE8cTNUIrX9pDnOSf3Jerrw0DvwgGUT8O4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } 2023-02-11 07:58:42,209:DEBUG:acme.client:Storing nonce: 1DFAhIBHIl2RbE8cTNUIrX9pDnOSf3Jerrw0DvwgGUT8O4E 2023-02-11 07:58:45,212:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:45,215:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjFERkFoSUJISWwyUmJFOGNUTlVJclg5cERuT1NmM0plcnJ3MER2d2dHVVQ4TzRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "DCEdlKldTNmTYLGZcjqyY3L-1BJOnmCe_OEUaxFUKVtSWA_1--nGhIafIbv0HeKikeU9jn7SogubuJCm76lZAMZ3nfYEexmvhqZIaFZ-jn5i5p8nZXr6bP3tSa0nbZwjvWzJ90aiHRk0LR61D5_y4OqDvZS29sH1XFPItCTma14Ebf8qtRw85beusLEbDSIofqWZhomI3DPu-we-EU0cS7Wemuk9swcEwdyiqbSJbW_wOmffmII8d5GDfmaNmbDT-VB54jsHtSw6STyH5wuIdMttuFOIjmMgRc38ivvgWDBJ5bJhQXOQq6e3_KYzkuOY0H0S3UyXY9bRJMSv5EFbYA", "payload": "" } 2023-02-11 07:58:45,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 800 2023-02-11 07:58:45,479:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:45 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878wIhmNgUbymBBKl9jzg04CxsiiuR4H8WPGdJNYudghjw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/EM9OHA", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/SxfO8w", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } ] } 2023-02-11 07:58:45,479:DEBUG:acme.client:Storing nonce: C878wIhmNgUbymBBKl9jzg04CxsiiuR4H8WPGdJNYudghjw 2023-02-11 07:58:48,483:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:48,485:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM4Nzh3SWhtTmdVYnltQkJLbDlqemcwNEN4c2lpdVI0SDhXUEdkSk5ZdWRnaGp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "ZZWGiWUaWzFhUj8D7XMtgZ71ieOqRAdfD5p51An7BN1UX1VmvgO2uEYo8L3HygtkaKCQAS0z7Fd28cv0kgizuk6LTr5vYKAY6QJlxcr4yLomDN27wroh6PVQTIXbf8d92dfPZ7D1d6xUJsgRJvs431-PxHrkGsfYgcY6duTwNQaJ0J9vYMLc4DJVtjbLZNpG885JCbjcNT6uE4u8VCVLa1vIScLTD874_exuvZQ_FrHhDoahZU-z4ZXuPYLRItAvvd8G4QPSXapo3a3Kod5aIEAlNpG7-7bfK41W4xZbhF7UgiPQlzeB-VK6fM4Xw4vNH8sRh2P5k0W3ZYgm16jS0g", "payload": "" } 2023-02-11 07:58:48,761:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 800 2023-02-11 07:58:48,762:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:48 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9t_oNsoCQ7hhT3FP3qRPC7yE425ysxrAOdHwsCJIfjdE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/EM9OHA", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/SxfO8w", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } ] } 2023-02-11 07:58:48,762:DEBUG:acme.client:Storing nonce: 15C9t_oNsoCQ7hhT3FP3qRPC7yE425ysxrAOdHwsCJIfjdE 2023-02-11 07:58:51,766:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:51,768:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1Qzl0X29Oc29DUTdoaFQzRlAzcVJQQzd5RTQyNXlzeHJBT2RId3NDSklmamRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "YyR-XVAMovw8Z_95OH7Fj7LDow3HuWjqu52mzVvhpmJllY5f4RRsbAV1LXE7YaCx-FEIGMiAhS1fDVAmUycCVQ4cla1hMsHSTAqcbqVBb6umfGL1B9TF5b3oUmcIVe6O945emsUPWdLnk36V3iKDfGVFk2kKEIdxmpJdPtK5OQeUMkhN4zIvOK1Ivg9e4mZttmMacmdQdVqOUePw5DdnkHDd52fEaIpJOLIzWqszuISF8r6LlwK5QqVV47aQAZVmwwh5_Th3Ax_Jw9fLlj8N9tvEND129n1Y8nr_7SHK8kIZPhBKIP8__hmRLg1uALu10uW_CZ9B7l3iy7dn25lA1g", "payload": "" } 2023-02-11 07:58:52,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 800 2023-02-11 07:58:52,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:51 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9OikJMwLpOflMUXwL31nDgN9JlKE3HyiICxSmPTiu62Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/EM9OHA", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/SxfO8w", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } ] } 2023-02-11 07:58:52,032:DEBUG:acme.client:Storing nonce: 15C9OikJMwLpOflMUXwL31nDgN9JlKE3HyiICxSmPTiu62Q 2023-02-11 07:58:55,033:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:55,035:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1QzlPaWtKTXdMcE9mbE1VWHdMMzFuRGdOOUpsS0UzSHlpSUN4U21QVGl1NjJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "RDafeEpz5VruYUDZ5jFvmbj7rtl8JqGHDSWvGGr_prs2c4huS9pybE8eiZV-WqSK5Fu6e8ou_OwOGyX8s5hBsekB9uRBCc02Zhcnqa66yMhFvsNnKu006pwxWPTmb23-A4c5pjY8Ngb8AuRLfksn6J0wdTzjgMmlA-TuFjs2QilXebpZ4MwBTZgkUDCvy21aaoVaSQ-nxAHvwaJSiC3ImYgsdlmFPKX6dC9Zj58M_mnMSPRs3NnBL_JzwLbOmkwvFgoxDj4CIoIrvRSsV6Kiq9hlkwbdGeaxQ_W7QJXsE_GzDaqgszUZGAC9GTmNLZ32Sw9YArKOoF0d3affQSA5Cw", "payload": "" } 2023-02-11 07:58:55,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 800 2023-02-11 07:58:55,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:55 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371C3o7gwTz-LFLkGTSEgLhZyj5PkHIBr8TnV1vZ2RGRA50 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/EM9OHA", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/SxfO8w", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc" } ] } 2023-02-11 07:58:55,300:DEBUG:acme.client:Storing nonce: 371C3o7gwTz-LFLkGTSEgLhZyj5PkHIBr8TnV1vZ2RGRA50 2023-02-11 07:58:58,304:DEBUG:acme.client:JWS payload: b'' 2023-02-11 07:58:58,306:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202572904996: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUMzbzdnd1R6LUxGTGtHVFNFZ0xoWnlqNVBrSElCcjhUblYxdloyUkdSQTUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzI5MDQ5OTYifQ", "signature": "Ua5kEn8wvxB__aNPF7nN-59NDovgu_nweqAm_ELU0BLggvkvSIvxsEnn9cylyRL4LxqUzIWsxlgq87ag-cVYbfI0JP0giZItTmhM8EcqzikF7P79MB7HdPEjJi_qMsHJOv5t-f95w9b4BQvBYxyUYs83n2QXNB08YE3eTViZcNz9bxOIynPa1a2D3FhbA4HgDabBZG_bfyh6N37JkEbGLmxVzrcZAujIIo74gB47RKqRVX_00nLwEFst_EJtoY5gZlZwfCqE4IkulUUrv_Zg6gI1FuHWLrbFFtLyW6V-i9GyrWBNA4ogMsN-Ea-iluhf4v8WeCiqeCVgkfdyqeiwvg", "payload": "" } 2023-02-11 07:58:58,582:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202572904996 HTTP/1.1" 200 1062 2023-02-11 07:58:58,582:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 07:58:58 GMT Content-Type: application/json Content-Length: 1062 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1DFAWF5SFTokT6bufMDS0_aB0EGHJu9vBN3drl8e9A3L2NY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "invalid", "expires": "2023-02-18T07:58:41Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc: Timeout during connect (likely firewall problem)", "status": 400 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202572904996/Wi20KQ", "token": "aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc", "validationRecord": [ { "url": "http://caoyx.cyxhj.buzz/.well-known/acme-challenge/aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc", "hostname": "caoyx.cyxhj.buzz", "port": "80", "addressesResolved": [ "158.247.199.7" ], "addressUsed": "158.247.199.7" } ], "validated": "2023-02-11T07:58:42Z" } ] } 2023-02-11 07:58:58,582:DEBUG:acme.client:Storing nonce: 1DFAWF5SFTokT6bufMDS0_aB0EGHJu9vBN3drl8e9A3L2NY 2023-02-11 07:58:58,583:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server: Domain: caoyx.cyxhj.buzz Type: connection Detail: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc: Timeout during connect (likely firewall problem) To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided. 2023-02-11 07:58:58,584:DEBUG:certbot.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc: Timeout during connect (likely firewall problem) 2023-02-11 07:58:58,584:DEBUG:certbot.error_handler:Calling registered functions 2023-02-11 07:58:58,584:INFO:certbot.auth_handler:Cleaning up challenges 2023-02-11 07:58:58,585:DEBUG:certbot.plugins.standalone:Stopping server at :::80... 2023-02-11 07:58:58,949:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/aNF57uaSZ_8ZRSpuxUxWXMMyIb3QQSPtjz-Q7AkVwnc: Timeout during connect (likely firewall problem) 2023-02-11 08:08:12,298:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 08:08:12,300:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 08:08:12,301:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 08:08:12,337:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 08:08:12,340:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 08:08:12,341:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 08:08:12,380:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 08:08:12,382:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 08:08:12,382:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 08:08:12,387:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 08:08:12,389:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 08:08:12,392:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 08:08:13,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 08:08:13,236:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:08:13 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tNqijjvk5q0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-02-11 08:08:13,237:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 08:08:22,321:INFO:certbot.main:Obtaining a new certificate 2023-02-11 08:08:22,509:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0005_key-certbot.pem 2023-02-11 08:08:22,513:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0005_csr-certbot.pem 2023-02-11 08:08:22,515:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 08:08:22,516:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 08:08:22,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 08:08:22,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:08:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C400uRjqC1CVHXyowpxTh3nqMRrzdXuzx6Zd4T1Z94up3B4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 08:08:22,785:DEBUG:acme.client:Storing nonce: C400uRjqC1CVHXyowpxTh3nqMRrzdXuzx6Zd4T1Z94up3B4 2023-02-11 08:08:22,786:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "caoyx.cyxhj.buzz"\n }\n ]\n}' 2023-02-11 08:08:22,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM0MDB1UmpxQzFDVkhYeW93cHhUaDNucU1ScnpkWHV6eDZaZDRUMVo5NHVwM0I0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EQlrE15AT3zhWcJv_ydyBLmw-g_18FCUXo2Ue0vVrd7lEP9VpoiYqkVa0vP6wmxu9FpI_LHBmCD4zq_Qo4EWJDSvtcd73w0yTql2zEhaI7R8FZB5BIbOqm154k4L-LcBs5x1gZ-E_qEuPAISD3fiZX2U9S7wZEKHT_IFF0OXhBdmxOKfQhq8V8QTD6FE_T5RrHNxKOZlg579_avl1GWWY5SZKi5Ops5ei95v7QCCaQDmmQcTL9U-f35nYb6GSokiOoFcrbov6txvRGxadZP2XnjPQs8e_x-wd4yPSU4x1CtkP_i9z2-D0BKDMn9ZzatCLoEVrHxcZp9ZwUBbJcdnuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhb3l4LmN5eGhqLmJ1enoiCiAgICB9CiAgXQp9" } 2023-02-11 08:08:23,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-02-11 08:08:23,098:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 11 Feb 2023 08:08:23 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/959656006/164144414406 Replay-Nonce: 853F02dp2uQvCj9CbazapHlBC2kbhqm4SXpbXSnGW4plyM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-02-18T08:08:23Z", "identifiers": [ { "type": "dns", "value": "caoyx.cyxhj.buzz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/959656006/164144414406" } 2023-02-11 08:08:23,098:DEBUG:acme.client:Storing nonce: 853F02dp2uQvCj9CbazapHlBC2kbhqm4SXpbXSnGW4plyM0 2023-02-11 08:08:23,099:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:08:23,101:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjg1M0YwMmRwMnVRdkNqOUNiYXphcEhsQkMya2JocW00U1hwYlhTbkdXNHBseU0wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "LLms1WO0235UuJPi9w7Yg3tEI1juYv7an-ceTN_4UZERR7NaiX5v9nLfNRrC6sSPHD8Mu0bbDJk1nIVJtrF1v8TjiIUXtFABN9-YRUfa7SOGiMWBOyMyaIx3QUmtjlbiK5ONehkryBmEe5aqeB5Ch-mwFi109t4jxk8W8PdSx16MDhenZkvt6hAH8uxKpWqpswpayzGUE8tCaBt1pFGfOEyy300GG0CzGsA588o1amy-Z7wI2T-lz-praVmiiKWO0aIW5duqoiAfyXzs5_7hjZ-V6iQnZbsKtf0ouihptJ_KhZ_akLOnPOi1R5izViElKNS8kKcIg2UG-eOcIRv4vw", "payload": "" } 2023-02-11 08:08:23,371:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:08:23,372:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:08:23 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A5FE9norv1bBgm6drLdvbaea0SPdcNf1qNmgVBJ2wvspyz8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:08:23,373:DEBUG:acme.client:Storing nonce: A5FE9norv1bBgm6drLdvbaea0SPdcNf1qNmgVBJ2wvspyz8 2023-02-11 08:08:23,373:INFO:certbot.auth_handler:Performing the following challenges: 2023-02-11 08:08:23,374:INFO:certbot.auth_handler:http-01 challenge for caoyx.cyxhj.buzz 2023-02-11 08:08:23,375:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-02-11 08:08:23,376:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-02-11 08:08:23,378:DEBUG:certbot.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 76, in run address, self.http_01_resources) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 189, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 108, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 75, in handle_authorizations resp = self._solve_challenges(aauthzrs) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 139, in _solve_challenges resp = self.auth.perform(all_achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 234, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 234, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 241, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 239, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 245, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 254, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 78, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-02-11 08:08:23,378:DEBUG:certbot.error_handler:Calling registered functions 2023-02-11 08:08:23,378:INFO:certbot.auth_handler:Cleaning up challenges 2023-02-11 08:08:23,379:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 76, in run address, self.http_01_resources) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 189, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 108, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 75, in handle_authorizations resp = self._solve_challenges(aauthzrs) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 139, in _solve_challenges resp = self.auth.perform(all_achalls) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 234, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 234, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 241, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 239, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 245, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 254, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/plugins/standalone.py", line 78, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-02-11 08:09:20,753:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 08:09:20,755:DEBUG:certbot.main:Arguments: ['--nginx'] 2023-02-11 08:09:20,756:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 08:09:20,799:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 08:09:20,801:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 08:09:20,802:DEBUG:certbot.plugins.selection:Requested authenticator nginx and installer nginx 2023-02-11 08:09:20,803:DEBUG:certbot.plugins.selection:No candidate plugin 2023-02-11 08:09:20,803:DEBUG:certbot.plugins.selection:No candidate plugin 2023-02-11 08:09:20,803:DEBUG:certbot.plugins.selection:Selected authenticator None and installer None 2023-02-11 08:09:20,803:INFO:certbot.main:Could not choose appropriate plugin: The requested nginx plugin does not appear to be installed 2023-02-11 08:09:20,805:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1229, in certonly installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "/usr/lib/python3/dist-packages/certbot/plugins/selection.py", line 237, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "/usr/lib/python3/dist-packages/certbot/plugins/selection.py", line 341, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The requested nginx plugin does not appear to be installed 2023-02-11 08:09:35,502:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 08:09:35,504:DEBUG:certbot.main:Arguments: ['--nginx'] 2023-02-11 08:09:35,505:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 08:09:35,540:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 08:09:35,541:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 08:09:35,542:DEBUG:certbot.plugins.selection:Requested authenticator nginx and installer nginx 2023-02-11 08:09:35,543:DEBUG:certbot.plugins.selection:No candidate plugin 2023-02-11 08:09:35,543:DEBUG:certbot.plugins.selection:Selected authenticator None and installer None 2023-02-11 08:09:59,491:DEBUG:certbot.main:certbot version: 0.31.0 2023-02-11 08:09:59,493:DEBUG:certbot.main:Arguments: ['--standalone'] 2023-02-11 08:09:59,494:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-02-11 08:09:59,530:DEBUG:certbot.log:Root logging level set at 20 2023-02-11 08:09:59,531:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-02-11 08:09:59,532:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2023-02-11 08:09:59,571:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2023-02-11 08:09:59,572:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2023-02-11 08:09:59,572:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-02-11 08:09:59,578:DEBUG:certbot.main:Picked account: ), creation_host='vultr.guest'))> 2023-02-11 08:09:59,580:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-02-11 08:09:59,583:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-02-11 08:10:00,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 756 2023-02-11 08:10:00,351:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:00 GMT Content-Type: application/json Content-Length: 756 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6ZtS9i8yXc4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-02-11 08:10:00,352:DEBUG:certbot.display.ops:No installer, picking names manually 2023-02-11 08:10:06,855:INFO:certbot.main:Obtaining a new certificate 2023-02-11 08:10:06,866:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0006_key-certbot.pem 2023-02-11 08:10:06,869:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0006_csr-certbot.pem 2023-02-11 08:10:06,870:DEBUG:acme.client:Requesting fresh nonce 2023-02-11 08:10:06,870:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-02-11 08:10:07,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-02-11 08:10:07,126:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 371CmGKA1b7yuGKyGa7JZO5dDVKyS_5y79JBTrmMylKamNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-02-11 08:10:07,127:DEBUG:acme.client:Storing nonce: 371CmGKA1b7yuGKyGa7JZO5dDVKyS_5y79JBTrmMylKamNU 2023-02-11 08:10:07,127:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "caoyx.cyxhj.buzz"\n }\n ]\n}' 2023-02-11 08:10:07,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUNtR0tBMWI3eXVHS3lHYTdKWk81ZERWS3lTXzV5NzlKQlRybU15bEthbU5VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "T36S5gdeQ-qxaXQNWr-ag8b9emzJIZhDkBg4-qt-8eOGlP0TBeGyzQSQCj0FlNq7ScDeC-vaqfMshjhGRU73zvPcVhu3btFVAvxGwM3zuCMuBlmnJM9ELV_RjLrbrDhi24zxJMk6IeTSRu5KP3uzLFvIS6AYknecUXfRr_nYVoNQqG9mm7qSWfY8jrprCEqX4oSGCqbYO872c-LpThXziIYNKSctxCsQskEmIwVVwisbNqLC9LOKfzIDxKqOpWS-ZHVczNaFcwGs03hxLbqTlf87bvQ9sfkprGFX0VAAK1XVnIvVfRvfE0mbJ1Vy7iO2ztKdlN64tZ3h8aN6EVY24w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNhb3l4LmN5eGhqLmJ1enoiCiAgICB9CiAgXQp9" } 2023-02-11 08:10:07,551:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-02-11 08:10:07,552:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 11 Feb 2023 08:10:07 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/959656006/164144672756 Replay-Nonce: C878WvVIrJnrDU5am1QEgydvZV6_N9T4cIJ48hkXUJqEynw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-02-18T08:08:23Z", "identifiers": [ { "type": "dns", "value": "caoyx.cyxhj.buzz" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/959656006/164144672756" } 2023-02-11 08:10:07,552:DEBUG:acme.client:Storing nonce: C878WvVIrJnrDU5am1QEgydvZV6_N9T4cIJ48hkXUJqEynw 2023-02-11 08:10:07,553:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:07,554:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM4NzhXdlZJckpuckRVNWFtMVFFZ3lkdlpWNl9OOVQ0Y0lKNDhoa1hVSnFFeW53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "cu8yC_pCj6nbTlTgHPPcw5XDHBnMTQx4J6FN2gnYOGElhLC3_INOBH3Xlseub3pcSEhsEymrj6O3MUuG-7_Kth5roGMC4kdviNIFS03CHra8__iI10EjbHQh36cVc5OUv5UU8XEMYuttRIQFULruIZTVPjEFa7YkQquJDGnHLDfpyH9Jej18_DfD2mZykvurXAtykPLQz7qyK2xGy2CPilr2-9SLYgOCmIB9p7p7XGiKcZBDQRMV1vw5A6T-Zoz8YiHww2mY5o-NW9YAbwn8yvGRMjf2_RFsmLozHRzZK_OlJT3JhSo3HI7R1Z_rLNbnkg6jYhLiLY_rzHach_kMtQ", "payload": "" } 2023-02-11 08:10:07,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:10:07,813:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:07 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C8782AQdsKdsNtVlZKWLam9i5P6kbFrMqwhFCT063gr0ggM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:10:07,813:DEBUG:acme.client:Storing nonce: C8782AQdsKdsNtVlZKWLam9i5P6kbFrMqwhFCT063gr0ggM 2023-02-11 08:10:07,814:INFO:certbot.auth_handler:Performing the following challenges: 2023-02-11 08:10:07,814:INFO:certbot.auth_handler:http-01 challenge for caoyx.cyxhj.buzz 2023-02-11 08:10:07,815:DEBUG:acme.standalone:Successfully bound to :80 using IPv6 2023-02-11 08:10:07,815:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations. 2023-02-11 08:10:07,820:INFO:certbot.auth_handler:Waiting for verification... 2023-02-11 08:10:07,820:DEBUG:acme.client:JWS payload: b'{\n "resource": "challenge",\n "type": "http-01"\n}' 2023-02-11 08:10:07,822:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM4NzgyQVFkc0tkc050VmxaS1dMYW05aTVQNmtiRnJNcXdoRkNUMDYzZ3IwZ2dNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My8yMDI1NzQ5ODkyMjYvMnVBeThBIn0", "signature": "TZg-2ycLTe1SyM55fAxrVLnQCY5sWS8YaQNaJ7CWibSK3i4Gxmlh0TRloQ_yydzXCwagH1XpE-XZhOmwE8uIK6Kb8m3LAFnkW4BAVhL9ktrctLU3KnVLtcUniIE_3MfQNen_ZLjVf5TN6N_EwbNtHSevq15mDPRdsEDG0EAevngYszeDvT2MgPLHJhx-Isy9o2ln5MXPL1_lUGiZ2BBr-X2zBaqY_Rb7wivO0mYTeL4KdAaaWu140TYY2HK_Hkmz15Y6XGuzzD6Mv3nUcQy4j_hj27T-fjh2CxmmbP3gZn2VyOMczJ1mIssglDR7Uet-xpRYs3wYBR9y1c8NiXboiA", "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0" } 2023-02-11 08:10:08,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/202574989226/2uAy8A HTTP/1.1" 200 187 2023-02-11 08:10:08,093:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:08 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A Replay-Nonce: 371CnFjnKpK9fd6AOlKh95vR9RFa8q1w6wu_fBcUDQlAFMQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } 2023-02-11 08:10:08,093:DEBUG:acme.client:Storing nonce: 371CnFjnKpK9fd6AOlKh95vR9RFa8q1w6wu_fBcUDQlAFMQ 2023-02-11 08:10:11,097:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:11,100:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjM3MUNuRmpuS3BLOWZkNkFPbEtoOTV2UjlSRmE4cTF3Nnd1X2ZCY1VEUWxBRk1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "K4UC36I7BaTnTDGRYbEZ3MNifo7ldR58-aFEVa1md-zGQs-NQyKq_xutQ822DQOVIdEy7HqkeCigznnAHYuV0IuboFEZZdT3eTU28br2RZanQ_5dq9KXyx49QaaRc-n0V5ZmzjNG79zL6zP6OWK6Vys-BhMKoTPxp1_D8ygS0YnPOoYYpds4uufsPGSZi888-jTwwY2JnTKVj3rROzQ8FlbY2vfYYg0RkrmAmwJ1cjgc7ipnTWnWtpQ7LYQrCZmP0hHl4iC4_XZ-bmdS3Tu7-ccQUoup1fJ65SufJh4JjcgJ2EcFjYKNymEOo889busFR3rL4RK_oKBUfniElOGNqw", "payload": "" } 2023-02-11 08:10:11,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:10:11,360:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:11 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9dxLXp2UWrkeaMQPRy2qkXCZczZEJEa3osvALpC-OKMg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:10:11,360:DEBUG:acme.client:Storing nonce: 15C9dxLXp2UWrkeaMQPRy2qkXCZczZEJEa3osvALpC-OKMg 2023-02-11 08:10:14,364:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:14,369:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1QzlkeExYcDJVV3JrZWFNUVBSeTJxa1hDWmN6WkVKRWEzb3N2QUxwQy1PS01nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "LDzijDv4fzyPWRvD28uK6HzTN51YAsgXhwaEF4PG5yMZAW1s46qbg82tIez1KyV8AbPB9ALyjuKMlKlCqIzKOeot8r1Eqi7Qsn5UqDJMVcDcBHl-XF1PWjO3w8z-73DBjzPBqLORkWJDy8Usyi_lIBkaPBgNjsYhBvmZmv3TKlZTXn6BO9dUWDFaRVU_UcqTJu1mRJk4WJE_gzG7Xixbh4ajQSbOZMKjLSaX8OqbFZGEP5RDpfXH4SbfUQHFCHc4fgyg3hXzFyzt0sIXOrIPKJYauiGvhchbBGBtiN6llm0UkfDJcrhAHPv3gz3JxGOZEKKvPE4nM-e7CGQ-lmc22g", "payload": "" } 2023-02-11 08:10:14,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:10:14,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:14 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9HH3KtgZNIr5LJULpt4X8FoZZXl2Pc_SjrYM5g1RsOTU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:10:14,630:DEBUG:acme.client:Storing nonce: 15C9HH3KtgZNIr5LJULpt4X8FoZZXl2Pc_SjrYM5g1RsOTU 2023-02-11 08:10:17,634:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:17,636:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1QzlISDNLdGdaTklyNUxKVUxwdDRYOEZvWlpYbDJQY19TanJZTTVnMVJzT1RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "TqvKdbc6XcSmu3DKPasPhwKTmQzdOku8jKY-5-yxLwlqDei5Q1h5NFg1WfehdPDLF0KLMBEaDP6BLrvgBxWDwTv8nR-tiOPU4AfMa6ZVHOchw9sVk64yWvL_ZTUoX_mugVC3ZZll0dwGNWVyJeyx3bIvLvoAyPD6d7i70U_g0iZ4wNMs1Iz8JiIlxvbDIU_B8IDwjZ5ZjxvEuAcXpD9ZPgODVZP8yXuKOyq7E0TTeDBFGmBXhjUEZV-hpax1h_CZ1kKe6-RvL12zqhgFhAUk4bTRGKK3seNXC9Na52w6dr1hdRctsQNQKMckkzzGHZZCBAZVmShJAjHv7qXhgVWNjg", "payload": "" } 2023-02-11 08:10:17,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:10:17,896:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:17 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 15C9JhwsQPAbXx15aILhlEA_EeVuXqzT7hF-REjYvxf8tbw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:10:17,897:DEBUG:acme.client:Storing nonce: 15C9JhwsQPAbXx15aILhlEA_EeVuXqzT7hF-REjYvxf8tbw 2023-02-11 08:10:20,900:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:20,902:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIjE1QzlKaHdzUVBBYlh4MTVhSUxobEVBX0VlVnVYcXpUN2hGLVJFall2eGY4dGJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "UFFHTuXNiCgI6wsG0BW_NyLcn4ffqQBjVrW6G-Z19jLbThhvt_--64ojdZlfKHi5xeln7OhKvtDDcXrg4i2Eabfz0PEdwijS91DQcIn18fCfX1bhzQL7IEcsupZk_9NFJw5BahL2jNY32WjoBF1vpTH5yWMRQNJaCGrfly_NrCfON3XSd_cbpx-fKYGbHnIH2Cv0bamgFA4lz2jBIett-xHnBRYLWWItf25CI5jZZFhqra4t_ZKr47gwRbqr1u1zU2tHt0IXcxkL1g7LpkQxSgVyW8t3n-LlMXWOFwqqQ4rrUSb-B7gPOW-l703AXe_a4mmIpZAtgtjGkjiJc1cPfA", "payload": "" } 2023-02-11 08:10:21,162:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 800 2023-02-11 08:10:21,163:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:21 GMT Content-Type: application/json Content-Length: 800 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878MTRVLHb5jhLJHm57eS2lMprLawhtDMn3jRhht6geF6w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "pending", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/M_L6zA", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/MU5rmQ", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU" } ] } 2023-02-11 08:10:21,163:DEBUG:acme.client:Storing nonce: C878MTRVLHb5jhLJHm57eS2lMprLawhtDMn3jRhht6geF6w 2023-02-11 08:10:24,167:DEBUG:acme.client:JWS payload: b'' 2023-02-11 08:10:24,169:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/202574989226: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTU5NjU2MDA2IiwgIm5vbmNlIjogIkM4NzhNVFJWTEhiNWpoTEpIbTU3ZVMybE1wckxhd2h0RE1uM2pSaGh0NmdlRjZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yMDI1NzQ5ODkyMjYifQ", "signature": "XST1m0H4fTA0I127-9Xs9u12IxPMrGp9J6M8uPgftwRoKrP9knUdZzX2oJw556lh38HwOlz3volsPsibAFtkvCn8fJd4qP6mwNquZXEmrub1kb8liqpp1e2_WVkflxvnFp1vaeZf-wzgQJLxZahzyghvKyGPXT5XYIQv7z08F5V1LhA1fopk0QB_-9k1xByQH5bZYXHR-x0y9Uby_aUPcka8H4RwDIULNCg5MsTDhbLzL4Qz1v-erHLaV0NdWPat-Qx5M1oo1vff6Pkypz5Ng-Y0BQIMgpnnDp2Nb5pYy1UFlHQosdt_NuSfOheBLNbcdLXxrLZEtgd15frweUU2Cw", "payload": "" } 2023-02-11 08:10:24,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/202574989226 HTTP/1.1" 200 1062 2023-02-11 08:10:24,440:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 11 Feb 2023 08:10:24 GMT Content-Type: application/json Content-Length: 1062 Connection: keep-alive Boulder-Requester: 959656006 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: C878-W1ChVWiddgHntGn-mMlDV8hdqKVicdHWO3z4gUHkxg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "caoyx.cyxhj.buzz" }, "status": "invalid", "expires": "2023-02-18T08:08:23Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU: Timeout during connect (likely firewall problem)", "status": 400 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/202574989226/2uAy8A", "token": "oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU", "validationRecord": [ { "url": "http://caoyx.cyxhj.buzz/.well-known/acme-challenge/oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU", "hostname": "caoyx.cyxhj.buzz", "port": "80", "addressesResolved": [ "158.247.199.7" ], "addressUsed": "158.247.199.7" } ], "validated": "2023-02-11T08:10:08Z" } ] } 2023-02-11 08:10:24,441:DEBUG:acme.client:Storing nonce: C878-W1ChVWiddgHntGn-mMlDV8hdqKVicdHWO3z4gUHkxg 2023-02-11 08:10:24,442:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server: Domain: caoyx.cyxhj.buzz Type: connection Detail: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU: Timeout during connect (likely firewall problem) To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided. 2023-02-11 08:10:24,443:DEBUG:certbot.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU: Timeout during connect (likely firewall problem) 2023-02-11 08:10:24,443:DEBUG:certbot.error_handler:Calling registered functions 2023-02-11 08:10:24,443:INFO:certbot.auth_handler:Cleaning up challenges 2023-02-11 08:10:24,444:DEBUG:certbot.plugins.standalone:Stopping server at :::80... 2023-02-11 08:10:24,842:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. caoyx.cyxhj.buzz (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: 158.247.199.7: Fetching http://caoyx.cyxhj.buzz/.well-known/acme-challenge/oqA-qUTVR3UE2EJktc0fgVl2vIV-_ZBx9V1m-Oyq0eU: Timeout during connect (likely firewall problem)