2021-10-03 20:43:53,428:DEBUG:certbot.main:certbot version: 0.31.0 2021-10-03 20:43:53,429:DEBUG:certbot.main:Arguments: ['--standalone', '--dry-run'] 2021-10-03 20:43:53,430:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2021-10-03 20:43:53,458:DEBUG:certbot.log:Root logging level set at 20 2021-10-03 20:43:53,459:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2021-10-03 20:43:53,485:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer 2021-10-03 20:43:53,485:DEBUG:certbot.cli:Var dry_run=True (set by user). 2021-10-03 20:43:53,485:DEBUG:certbot.cli:Var server={'dry_run', 'staging'} (set by user). 2021-10-03 20:43:53,486:DEBUG:certbot.cli:Var dry_run=True (set by user). 2021-10-03 20:43:53,486:DEBUG:certbot.cli:Var server={'dry_run', 'staging'} (set by user). 2021-10-03 20:43:53,486:DEBUG:certbot.cli:Var account={'server'} (set by user). 2021-10-03 20:43:53,486:DEBUG:certbot.cli:Var authenticator=standalone (set by user). 2021-10-03 20:43:53,508:DEBUG:certbot.storage:Should renew, less than 30 days before certificate expiry 2021-10-04 01:34:32 UTC. 2021-10-03 20:43:53,508:INFO:certbot.renewal:Cert is due for renewal, auto-renewing... 2021-10-03 20:43:53,508:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None 2021-10-03 20:43:53,904:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot.plugins.standalone:Authenticator Initialized: Prep: True 2021-10-03 20:43:53,905:DEBUG:certbot.plugins.selection:Selected authenticator and installer None 2021-10-03 20:43:53,906:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2021-10-03 20:43:53,913:DEBUG:certbot.main:Picked account: ), creation_host='homecenter'))> 2021-10-03 20:43:53,915:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2021-10-03 20:43:53,921:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2021-10-03 20:43:54,090:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 724 2021-10-03 20:43:54,092:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:43:54 GMT Content-Type: application/json Content-Length: 724 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert", "xSEVGMChHHY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2021-10-03 20:43:54,093:INFO:certbot.main:Renewing an existing certificate 2021-10-03 20:43:54,375:DEBUG:acme.client:Requesting fresh nonce 2021-10-03 20:43:54,376:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2021-10-03 20:43:54,420:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2021-10-03 20:43:54,422:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:43:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0001WfPMRwJ0TAhmob9QNx6tiyDTWxuUhJJj9ggpfbXQSeY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2021-10-03 20:43:54,423:DEBUG:acme.client:Storing nonce: 0001WfPMRwJ0TAhmob9QNx6tiyDTWxuUhJJj9ggpfbXQSeY 2021-10-03 20:43:54,423:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "kelnos.spurint.org"\n }\n ]\n}' 2021-10-03 20:43:54,433:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAxV2ZQTVJ3SjBUQWhtb2I5UU54NnRpeURUV3h1VWhKSmo5Z2dwZmJYUVNlWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OJSuWw5X2tC3zVmjWTtAnV3ZqEilM84oJ7-br7oPc4CD_J0NEipQJO8TfKYN1yEdDhSW0kYENeWMERTzHT4zX_yIsZ9MsWv3bGt70WaBkC3sfRXi5cGN4t9O_qBLVPYa1k9fTEkTmJePcTD8_Jx05IByX6rBF0YY5_qSs-MFuBdjZLLiNr7fmg_znbneN-nvklTLIceK-hzAZe6r_S7Zr0ax-oGDjNewcjT9T8X_rqR-SXYWbNxlWV2rwQHdBlMtVtTLPyL5O7GYGGtk4G92BMvdbvaVukiOsQf00RLWGAieBntktBUqNDiMfw7bG1inAaTIZO4BaUHmMdL-omUHcQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImtlbG5vcy5zcHVyaW50Lm9yZyIKICAgIH0KICBdCn0" } 2021-10-03 20:43:54,501:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2021-10-03 20:43:54,502:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 04 Oct 2021 03:43:54 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/28727108/684307688 Replay-Nonce: 0001x5MN0P4any13lRbrD6PPFOIgcHdDx9Wp8MZsN9KD9Es X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2021-10-11T03:43:25Z", "identifiers": [ { "type": "dns", "value": "kelnos.spurint.org" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/28727108/684307688" } 2021-10-03 20:43:54,503:DEBUG:acme.client:Storing nonce: 0001x5MN0P4any13lRbrD6PPFOIgcHdDx9Wp8MZsN9KD9Es 2021-10-03 20:43:54,504:DEBUG:acme.client:JWS payload: b'' 2021-10-03 20:43:54,512:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAxeDVNTjBQNGFueTEzbFJickQ2UFBGT0lnY0hkRHg5V3A4TVpzTjlLRDlFcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MjgzMzY0OTgifQ", "signature": "RUvkujb660FBHGy35mR5wT059Mukjo8SRKHRR2THkIht11XRUfRrn9ubMXc6dqHytt2ikI6rqywf4nHnB6jV6m4Sq774WRTyGWMceH1zZm41FdSbUkLPsxXwpI52nL-LVO8HGr8-L_XDpXTmM0cMVIoCNsCr9cTuI6yMKBSb9ixZ43cwoUmk2ZjMnIzj4BGlwgkbJkIC3sqnXP55ls78wWJ6ImbdfhOsajwfPKJxHUw-moham5uurtwimnoMWID5O3t7qT7IO2WgpffnIbvf8ogCVKkdWTbVlZmuj2SfIcaihSNx1gFSzftuVqkpkrhQuztMmZ_aRvEiRuoCwIIIVg", "payload": "" } 2021-10-03 20:43:54,561:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/628336498 HTTP/1.1" 200 817 2021-10-03 20:43:54,563:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:43:54 GMT Content-Type: application/json Content-Length: 817 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002G7xWLi058KxNLln861SjOgN5K-JCCwKHqBem0WXgHMA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "kelnos.spurint.org" }, "status": "pending", "expires": "2021-10-11T03:43:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/pOyAYQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/CM7SGQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" } ] } 2021-10-03 20:43:54,563:DEBUG:acme.client:Storing nonce: 0002G7xWLi058KxNLln861SjOgN5K-JCCwKHqBem0WXgHMA 2021-10-03 20:43:54,565:INFO:certbot.auth_handler:Performing the following challenges: 2021-10-03 20:43:54,565:INFO:certbot.auth_handler:http-01 challenge for kelnos.spurint.org 2021-10-03 20:43:54,567:DEBUG:acme.standalone:Successfully bound to :80 using IPv6 2021-10-03 20:43:54,567:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations. 2021-10-03 20:43:54,576:INFO:certbot.auth_handler:Waiting for verification... 2021-10-03 20:43:54,577:DEBUG:acme.client:JWS payload: b'{\n "resource": "challenge",\n "type": "http-01"\n}' 2021-10-03 20:43:54,585:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAyRzd4V0xpMDU4S3hOTGxuODYxU2pPZ041Sy1KQ0N3S0hxQmVtMFdYZ0hNQSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My82MjgzMzY0OTgvYmM1Rm13In0", "signature": "nji4h5gGFgKpUOGFKa4dYL0XS4YasKdDEFMVBPd-h3QzHkxr8bh6-H8maA_vU1Vxi3UE6CpvP4LPpNMQUbpMuUooA7ij5Le5aAwrxMf6RNFYTk2bD6rwnyeruhRTD4a-3jyXNXGsa1qOdFMpX-0I-riCTz2lGsFewdHDkLk92hTgTNWdxbA4aV7H2pa0tiTUXzLVL_28Xp8ZAuZRAreyt9DM4Vmwlgh-vx-y3hxsK3kLENBip4eEaQ7gG0EO1KaxBREJ3CGw0I84ivqeI66Rm_1_UJxo8UmQp3OM3aUKVKqpV1nISwotxL4QluGCgmKhuzFJbSt42JikGeODY79E-Q", "payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0" } 2021-10-03 20:43:54,637:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/628336498/bc5Fmw HTTP/1.1" 200 192 2021-10-03 20:43:54,639:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:43:54 GMT Content-Type: application/json Content-Length: 192 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw Replay-Nonce: 00018Q-NXrvIgYNOiougeNEN6uUvm05bFMUUf0YXn69mMGM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" } 2021-10-03 20:43:54,639:DEBUG:acme.client:Storing nonce: 00018Q-NXrvIgYNOiougeNEN6uUvm05bFMUUf0YXn69mMGM 2021-10-03 20:43:54,939:DEBUG:acme.standalone:::ffff:18.222.145.89 - - Incoming request 2021-10-03 20:43:54,940:DEBUG:acme.standalone:::ffff:18.222.145.89 - - Serving HTTP01 with token 'xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA' 2021-10-03 20:43:54,941:DEBUG:acme.standalone:::ffff:18.222.145.89 - - "GET /.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA HTTP/1.1" 200 - 2021-10-03 20:43:54,958:DEBUG:acme.standalone:::ffff:18.196.102.134 - - Incoming request 2021-10-03 20:43:54,959:DEBUG:acme.standalone:::ffff:18.196.102.134 - - Serving HTTP01 with token 'xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA' 2021-10-03 20:43:54,959:DEBUG:acme.standalone:::ffff:18.196.102.134 - - "GET /.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA HTTP/1.1" 200 - 2021-10-03 20:43:54,969:DEBUG:acme.standalone:::ffff:18.236.228.243 - - Incoming request 2021-10-03 20:43:54,970:DEBUG:acme.standalone:::ffff:18.236.228.243 - - Serving HTTP01 with token 'xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA' 2021-10-03 20:43:54,970:DEBUG:acme.standalone:::ffff:18.236.228.243 - - "GET /.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA HTTP/1.1" 200 - 2021-10-03 20:43:57,641:DEBUG:acme.client:JWS payload: b'' 2021-10-03 20:43:57,660:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAxOFEtTlhydklnWU5PaW91Z2VORU42dVV2bTA1YkZNVVVmMFlYbjY5bU1HTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MjgzMzY0OTgifQ", "signature": "a6xqYpQ13oL_aWeh1S39megRZVSJtR2miWjnKqQtaRJpeL9sQZLt33TeAfQhRKun8mVCq21lfNpGRoFGiiXCbrsKYqAifmWg797PZ1QCnFAD2aLXxQ4yTwmbtXl84r-Zqvw3ciudf8FID41DzXJhHwwEj1fApSQI4uDSk0YxSiWYtyaBdNcEIlRGTOyXMCKyCdshrKsAJcl5Eq2E2QhjM-o18JjUMEVWXX0XDDT8EuTUvDNSHiEiT7LQE9Ckj6UH4YvTsEfgYJCsJgVk4vkEllQEqCmPU7ydIYRg1VOPsKhxeKKCDAcuS983l6dbZnGE8GZedlBJHKKrWE796BTsDg", "payload": "" } 2021-10-03 20:43:57,715:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/628336498 HTTP/1.1" 200 817 2021-10-03 20:43:57,717:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:43:57 GMT Content-Type: application/json Content-Length: 817 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 00026KI61J0YjIdBw3sgkjb81U_080E88HEF82JQQ55sy4U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "kelnos.spurint.org" }, "status": "pending", "expires": "2021-10-11T03:43:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/pOyAYQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/CM7SGQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" } ] } 2021-10-03 20:43:57,718:DEBUG:acme.client:Storing nonce: 00026KI61J0YjIdBw3sgkjb81U_080E88HEF82JQQ55sy4U 2021-10-03 20:44:00,723:DEBUG:acme.client:JWS payload: b'' 2021-10-03 20:44:00,743:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAyNktJNjFKMFlqSWRCdzNzZ2tqYjgxVV8wODBFODhIRUY4MkpRUTU1c3k0VSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MjgzMzY0OTgifQ", "signature": "yJRQjizZootvS462Hbyf9d6oEL7_sh3i0Z2yTL2V-tkDTEjhfrUuqdIxNNO8pHlTHA4wH3Ad4XRYhwk0N81xhgc2h1mEwBABNqgVGp7iQMGdZuHNgJucuNaq4LHY318eD4_euTkhciiRERkGD8evoxJPUEND6pKhSoALvUmgA0OIlMY49nAm2v0622uYNy3bEJJAN6dFv3oZh_QJZAN4ngiGxq6sn7SBhdYPsNkI96xx116kEA0buw2TfrE6oR1VpstTw_L_8lL63KWXxzIxFlWPxzWvq52pKSnrtV25-Xt1P5U36eB_XieZ6Y1lRO2-WRFjqbGhNJOZREJyFEmTaw", "payload": "" } 2021-10-03 20:44:00,797:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/628336498 HTTP/1.1" 200 817 2021-10-03 20:44:00,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:44:00 GMT Content-Type: application/json Content-Length: 817 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002SLj7AEUZfW-oA4qIR4mNPLf_T-6uG35EHOmSDGIkN5I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "kelnos.spurint.org" }, "status": "pending", "expires": "2021-10-11T03:43:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/pOyAYQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/CM7SGQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" } ] } 2021-10-03 20:44:00,801:DEBUG:acme.client:Storing nonce: 0002SLj7AEUZfW-oA4qIR4mNPLf_T-6uG35EHOmSDGIkN5I 2021-10-03 20:44:03,807:DEBUG:acme.client:JWS payload: b'' 2021-10-03 20:44:03,827:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAyU0xqN0FFVVpmVy1vQTRxSVI0bU5QTGZfVC02dUczNUVIT21TREdJa041SSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MjgzMzY0OTgifQ", "signature": "bL62XXriwsJb4UctaIkmULy9kBhynHsiUCAhL03B0aP2vr-RA9zBDyWz_TZijYJIaMzbi6VMGOn4H1YKSb20WAp0iQt0w00U6YBdbEkWyY33uUAPGb4VlNAmw_40oK6LTq1WQqWhhOtH8d9gXveaaz6ByR4upVqpIV7S8mF6GDDNfLSisQgj1m-ZwBMyHzto9PdRnyHVgdT7kqgGQPtwkfhe4IC22zuJa9tnVY6dZs0NklPwKGKQdQEfQZYsQwjTCZZhoXY1Q_pPPwxJwO_qvsTqvWNKJBv83AVEjppS6uVQhTlj8Ow2UIo1EFUigtLaWfUT38cq_rWY0MBYUqWRdQ", "payload": "" } 2021-10-03 20:44:03,882:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/628336498 HTTP/1.1" 200 817 2021-10-03 20:44:03,884:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:44:03 GMT Content-Type: application/json Content-Length: 817 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0001ntfflFYw-KhgWJEiLLPcCPh5BpxUBgjscLU7gXGsll4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "kelnos.spurint.org" }, "status": "pending", "expires": "2021-10-11T03:43:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/pOyAYQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/CM7SGQ", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA" } ] } 2021-10-03 20:44:03,886:DEBUG:acme.client:Storing nonce: 0001ntfflFYw-KhgWJEiLLPcCPh5BpxUBgjscLU7gXGsll4 2021-10-03 20:44:06,892:DEBUG:acme.client:JWS payload: b'' 2021-10-03 20:44:06,900:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/628336498: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8yODcyNzEwOCIsICJub25jZSI6ICIwMDAxbnRmZmxGWXctS2hnV0pFaUxMUGNDUGg1QnB4VUJnanNjTFU3Z1hHc2xsNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MjgzMzY0OTgifQ", "signature": "dN0Crpg6h64xOtCEJbUj1LNWUWTs1RUigl9sDKNLYW6uUt3cM_dZzJvU9Q0rfymWvGbVHoGgukrJnBaRRhuAepVt5kcNM9b8ml5Rh-8fCnO016oyeRbXXpbwdhs_3boYude6SrktGb7h2Q1ZdumFwhXr6dHLbts7i3n5oRMQvngZn92vrlGt0XbfqPc0uIuHYUJQnmNY4_1k_4hcxGEkMqYLNqaqFSGcyG0Pohj7e1M76IiCxBBjwVpvBvdYcCF7Fri7_a8PElVuOZlBg0KXqtYBbXf3u_Uv55npe77Fp1wd5bAMHfPBsDgCLDVQm-8gkLGIGLiZSVYuWp3ooucHmw", "payload": "" } 2021-10-03 20:44:06,951:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/628336498 HTTP/1.1" 200 1058 2021-10-03 20:44:06,952:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 04 Oct 2021 03:44:06 GMT Content-Type: application/json Content-Length: 1058 Connection: keep-alive Boulder-Requester: 28727108 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002X8iD8fRHp8RnC4J5a0l5A01hIdpXZMiMWa5wP-QfMCg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "kelnos.spurint.org" }, "status": "invalid", "expires": "2021-10-11T03:43:25Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "Fetching http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA: Timeout during connect (likely firewall problem)", "status": 400 }, "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/628336498/bc5Fmw", "token": "xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA", "validationRecord": [ { "url": "http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA", "hostname": "kelnos.spurint.org", "port": "80", "addressesResolved": [ "73.63.170.22" ], "addressUsed": "73.63.170.22" } ], "validated": "2021-10-04T03:43:54Z" } ] } 2021-10-03 20:44:06,953:DEBUG:acme.client:Storing nonce: 0002X8iD8fRHp8RnC4J5a0l5A01hIdpXZMiMWa5wP-QfMCg 2021-10-03 20:44:06,955:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server: Domain: kelnos.spurint.org Type: connection Detail: Fetching http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA: Timeout during connect (likely firewall problem) To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address. Additionally, please check that your computer has a publicly routable IP address and that no firewalls are preventing the server from communicating with the client. If you're using the webroot plugin, you should also verify that you are serving files from the webroot path you provided. 2021-10-03 20:44:06,957:DEBUG:certbot.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. kelnos.spurint.org (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA: Timeout during connect (likely firewall problem) 2021-10-03 20:44:06,957:DEBUG:certbot.error_handler:Calling registered functions 2021-10-03 20:44:06,958:INFO:certbot.auth_handler:Cleaning up challenges 2021-10-03 20:44:06,959:DEBUG:certbot.plugins.standalone:Stopping server at :::80... 2021-10-03 20:44:06,987:WARNING:certbot.renewal:Attempting to renew cert (kelnos.spurint.org) from /etc/letsencrypt/renewal/kelnos.spurint.org.conf produced an unexpected error: Failed authorization procedure. kelnos.spurint.org (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA: Timeout during connect (likely firewall problem). Skipping. 2021-10-03 20:44:06,990:DEBUG:certbot.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/renewal.py", line 465, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1193, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3/dist-packages/certbot/main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3/dist-packages/certbot/renewal.py", line 323, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations self._respond(aauthzrs, resp, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond self._poll_challenges(aauthzrs, chall_update, best_effort) File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges raise errors.FailedChallenges(all_failed_achalls) certbot.errors.FailedChallenges: Failed authorization procedure. kelnos.spurint.org (http-01): urn:ietf:params:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://kelnos.spurint.org/.well-known/acme-challenge/xf2z5_P6wkDwtxQXaGkdknJcduzyFuGgjfJj7LZ1uKA: Timeout during connect (likely firewall problem) 2021-10-03 20:44:06,993:ERROR:certbot.renewal:All renewal attempts failed. The following certs could not be renewed: 2021-10-03 20:44:06,995:ERROR:certbot.renewal: /etc/letsencrypt/live/kelnos.spurint.org/fullchain.pem (failure) 2021-10-03 20:44:06,996:DEBUG:certbot.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')() File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/main.py", line 1272, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3/dist-packages/certbot/renewal.py", line 490, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)