root@pc01:/etc/nginx/ssl/ggc.world# acme.sh --issue -w /var/www/ggc.world/html/ -d www.ggc.world -d ggc.world --debug 2 [lun 10 feb 2020, 19.00.01, CET] Lets find script dir. [lun 10 feb 2020, 19.00.01, CET] _SCRIPT_='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 19.00.01, CET] _script='/root/.acme.sh/acme.sh' [lun 10 feb 2020, 19.00.01, CET] _script_home='/root/.acme.sh' [lun 10 feb 2020, 19.00.01, CET] Using config home:/home/marco/webMatters/acme.sh/data/ [lun 10 feb 2020, 19.00.01, CET] LE_WORKING_DIR='/root/.acme.sh' https://github.com/acmesh-official/acme.sh v2.8.6 [lun 10 feb 2020, 19.00.01, CET] Running cmd: issue [lun 10 feb 2020, 19.00.01, CET] _main_domain='www.ggc.world' [lun 10 feb 2020, 19.00.01, CET] _alt_domains='ggc.world' [lun 10 feb 2020, 19.00.01, CET] Using config home:/home/marco/webMatters/acme.sh/data/ [lun 10 feb 2020, 19.00.01, CET] ACME_DIRECTORY='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 19.00.01, CET] _ACME_SERVER_HOST='acme-v02.api.letsencrypt.org' [lun 10 feb 2020, 19.00.01, CET] DOMAIN_PATH='/home/marco/webMatters/acme.sh/data//www.ggc.world' [lun 10 feb 2020, 19.00.01, CET] '/var/www/ggc.world/html/' does not contain 'dns' [lun 10 feb 2020, 19.00.01, CET] Using ACME_DIRECTORY: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 19.00.01, CET] _init api for server: https://acme-v02.api.letsencrypt.org/directory [lun 10 feb 2020, 19.00.01, CET] GET [lun 10 feb 2020, 19.00.01, CET] url='https://acme-v02.api.letsencrypt.org/directory' [lun 10 feb 2020, 19.00.01, CET] timeout= [lun 10 feb 2020, 19.00.01, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.r8BrsBdjnJ -g ' [lun 10 feb 2020, 19.00.02, CET] ret='0' [lun 10 feb 2020, 19.00.02, CET] response='{ "deqoGiBJS9M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" }' [lun 10 feb 2020, 19.00.02, CET] ACME_KEY_CHANGE='https://acme-v02.api.letsencrypt.org/acme/key-change' [lun 10 feb 2020, 19.00.02, CET] ACME_NEW_AUTHZ [lun 10 feb 2020, 19.00.02, CET] ACME_NEW_ORDER='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 19.00.02, CET] ACME_NEW_ACCOUNT='https://acme-v02.api.letsencrypt.org/acme/new-acct' [lun 10 feb 2020, 19.00.02, CET] ACME_REVOKE_CERT='https://acme-v02.api.letsencrypt.org/acme/revoke-cert' [lun 10 feb 2020, 19.00.02, CET] ACME_AGREEMENT='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf' [lun 10 feb 2020, 19.00.02, CET] ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 19.00.02, CET] ACME_VERSION='2' [lun 10 feb 2020, 19.00.02, CET] Le_NextRenewTime [lun 10 feb 2020, 19.00.02, CET] _on_before_issue [lun 10 feb 2020, 19.00.02, CET] _chk_main_domain='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] _chk_alt_domains='ggc.world' [lun 10 feb 2020, 19.00.02, CET] '/var/www/ggc.world/html/' does not contain 'no' [lun 10 feb 2020, 19.00.02, CET] Le_LocalAddress [lun 10 feb 2020, 19.00.02, CET] d='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] Check for domain='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.02, CET] d='ggc.world' [lun 10 feb 2020, 19.00.02, CET] Check for domain='ggc.world' [lun 10 feb 2020, 19.00.02, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.02, CET] d [lun 10 feb 2020, 19.00.02, CET] '/var/www/ggc.world/html/' does not contain 'apache' [lun 10 feb 2020, 19.00.02, CET] _saved_account_key_hash='4eiB8TnFhXD7BGqwEPvmklXvDq4MZngmfbqCgJaUqac=' [lun 10 feb 2020, 19.00.02, CET] _saved_account_key_hash is not changed, skip register account. [lun 10 feb 2020, 19.00.02, CET] Read key length: [lun 10 feb 2020, 19.00.02, CET] _createcsr [lun 10 feb 2020, 19.00.02, CET] domain='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] domainlist='ggc.world' [lun 10 feb 2020, 19.00.02, CET] csrkey='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.key' [lun 10 feb 2020, 19.00.02, CET] csr='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.csr' [lun 10 feb 2020, 19.00.02, CET] csrconf='/home/marco/webMatters/acme.sh/data//www.ggc.world/www.ggc.world.csr.conf' [lun 10 feb 2020, 19.00.02, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 19.00.02, CET] _idn_temp [lun 10 feb 2020, 19.00.02, CET] domainlist='ggc.world' [lun 10 feb 2020, 19.00.02, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] _idn_temp [lun 10 feb 2020, 19.00.02, CET] Multi domain='DNS:www.ggc.world,DNS:ggc.world' [lun 10 feb 2020, 19.00.02, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] _idn_temp [lun 10 feb 2020, 19.00.02, CET] _csr_cn='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] Getting domain auth token for each domain [lun 10 feb 2020, 19.00.02, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 19.00.02, CET] _idn_temp [lun 10 feb 2020, 19.00.02, CET] d='ggc.world' [lun 10 feb 2020, 19.00.02, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 19.00.02, CET] _idn_temp [lun 10 feb 2020, 19.00.02, CET] d [lun 10 feb 2020, 19.00.02, CET] _identifiers='{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}' [lun 10 feb 2020, 19.00.02, CET] url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 19.00.02, CET] payload='{"identifiers": [{"type":"dns","value":"www.ggc.world"},{"type":"dns","value":"ggc.world"}]}' [lun 10 feb 2020, 19.00.02, CET] RSA key [lun 10 feb 2020, 19.00.02, CET] Get nonce with HEAD. ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 19.00.02, CET] HEAD [lun 10 feb 2020, 19.00.02, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 19.00.02, CET] body [lun 10 feb 2020, 19.00.02, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.02, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g -I ' [lun 10 feb 2020, 19.00.03, CET] _ret='0' [lun 10 feb 2020, 19.00.03, CET] _headers='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:02 GMT cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001reDoOemxnaFQGbfpB8sN1gBn5THXelPv_GfrrwGvJ80 x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.03, CET] _CACHED_NONCE='0001reDoOemxnaFQGbfpB8sN1gBn5THXelPv_GfrrwGvJ80' [lun 10 feb 2020, 19.00.03, CET] nonce='0001reDoOemxnaFQGbfpB8sN1gBn5THXelPv_GfrrwGvJ80' [lun 10 feb 2020, 19.00.03, CET] POST [lun 10 feb 2020, 19.00.03, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-order' [lun 10 feb 2020, 19.00.03, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxcmVEb09lbXhuYUZRR2JmcEI4c04xZ0JuNVRIWGVsUHZfR2ZycndHdko4MCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC83Nzc2MDQyNSJ9", "payload": "eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6Ind3dy5nZ2Mud29ybGQifSx7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6ImdnYy53b3JsZCJ9XX0", "signature": "u_x0trxyPT6yCYA9xIkk-NOhlKGeo7oBE6C5DQpjLnGTyqn9thfIx9JNsnDZSwRUw6U28l3NV12Z5Filcjj_VTdUvOnHZIlHnToaGRy6XH19JHXnoO1v1I70eUpdbQTl6XRqUv6l2IwvWpicekCprIDm3tkWP7NGJs5qG5hlPjGZ1YCCbMBilqzkbhkgQh-CoGk_cEj3jMHjK-ywX_LA7nTD8fc9j6Ll9lZ0EeJJFk0WGZFnP91ymNFMqE-hlut6wPtRGjVawCz1ilrblhsOInd9PgYzeEEhVK8rmdOyOaZRsoQizBePAftH6BZR7DQOUHcgIdXNQz-sZbBP-OzXkw"}' [lun 10 feb 2020, 19.00.03, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.03, CET] Http already initialized. [lun 10 feb 2020, 19.00.03, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.04, CET] _ret='0' [lun 10 feb 2020, 19.00.04, CET] responseHeaders='HTTP/2 201 server: nginx date: Mon, 10 Feb 2020 18:00:04 GMT content-type: application/json content-length: 473 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" location: https://acme-v02.api.letsencrypt.org/acme/order/77760425/2291959505 replay-nonce: 0002_sPRzBd7X948jv77p4Q765E9E___xip6NBlAJZ46QTs x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.04, CET] code='201' [lun 10 feb 2020, 19.00.04, CET] original='{ "status": "pending", "expires": "2020-02-17T18:00:04.213489768Z", "identifiers": [ { "type": "dns", "value": "ggc.world" }, { "type": "dns", "value": "www.ggc.world" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291959505" }' [lun 10 feb 2020, 19.00.04, CET] response='{"status":"pending","expires":"2020-02-17T18:00:04.213489768Z","identifiers":[{"type":"dns","value":"ggc.world"},{"type":"dns","value":"www.ggc.world"}],"authorizations":["https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541","https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782"],"finalize":"https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291959505"}' [lun 10 feb 2020, 19.00.04, CET] Le_LinkOrder='https://acme-v02.api.letsencrypt.org/acme/order/77760425/2291959505' [lun 10 feb 2020, 19.00.04, CET] Le_OrderFinalize='https://acme-v02.api.letsencrypt.org/acme/finalize/77760425/2291959505' [lun 10 feb 2020, 19.00.04, CET] _authorizations_seg='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541,https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782' [lun 10 feb 2020, 19.00.04, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 19.00.04, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 19.00.04, CET] payload [lun 10 feb 2020, 19.00.04, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.04, CET] Use _CACHED_NONCE='0002_sPRzBd7X948jv77p4Q765E9E___xip6NBlAJZ46QTs' [lun 10 feb 2020, 19.00.04, CET] nonce='0002_sPRzBd7X948jv77p4Q765E9E___xip6NBlAJZ46QTs' [lun 10 feb 2020, 19.00.04, CET] POST [lun 10 feb 2020, 19.00.04, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2728308541' [lun 10 feb 2020, 19.00.04, CET] body='{"protected": "eyJub25jZSI6ICIwMDAyX3NQUnpCZDdYOTQ4anY3N3A0UTc2NUU5RV9fX3hpcDZOQmxBSlo0NlFUcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjcyODMwODU0MSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc3NjA0MjUifQ", "payload": "", "signature": "GXDN-EPyq7leXM_3YTRcHRPGTrEsDoHK8xODOkhoXnKWQD5XMTtZ3QEnVPp1315KOcfGo0PsU9eD_nMueExBbK7bKF_oNM51nH4rFy1_NgrGqvQBVicGSSxM_1Nu3fDyJ-hRtTcmZgDIDxfE2KDzfYY1x_V5D86IaLABYjlBkvhBo-VYYuNrbPMu-yGJL-C95KQ90dTBkyKWiYMTwDe8u-7uULvDTdTCOUt7dXeRIQT2a419YteTFKjqSfcIyxEJPjjxu2ST_44DLXC_0Gg2VvBhYe40eKVGBpyhoUHCW8GTCbjwHjPNCDKhFGCqApCKWo6GC4JoC7GCUMCDIMp2vA"}' [lun 10 feb 2020, 19.00.04, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.04, CET] Http already initialized. [lun 10 feb 2020, 19.00.04, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.05, CET] _ret='0' [lun 10 feb 2020, 19.00.05, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:04 GMT content-type: application/json content-length: 693 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 01025M0iEyIWH5ycdDq4toHaRWveUFgorOYyjse4DAZz_vs x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.05, CET] code='200' [lun 10 feb 2020, 19.00.05, CET] original='{ "identifier": { "type": "dns", "value": "ggc.world" }, "status": "valid", "expires": "2020-03-10T18:18:24Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ", "token": "qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "validationRecord": [ { "url": "http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "hostname": "ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] } ] }' [lun 10 feb 2020, 19.00.05, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 19.00.05, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 19.00.05, CET] _d='ggc.world' [lun 10 feb 2020, 19.00.05, CET] _authz_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782' [lun 10 feb 2020, 19.00.05, CET] url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782' [lun 10 feb 2020, 19.00.05, CET] payload [lun 10 feb 2020, 19.00.05, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.05, CET] Use _CACHED_NONCE='01025M0iEyIWH5ycdDq4toHaRWveUFgorOYyjse4DAZz_vs' [lun 10 feb 2020, 19.00.05, CET] nonce='01025M0iEyIWH5ycdDq4toHaRWveUFgorOYyjse4DAZz_vs' [lun 10 feb 2020, 19.00.05, CET] POST [lun 10 feb 2020, 19.00.05, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/authz-v3/2745899782' [lun 10 feb 2020, 19.00.05, CET] body='{"protected": "eyJub25jZSI6ICIwMTAyNU0waUV5SVdINXljZERxNHRvSGFSV3ZlVUZnb3JPWXlqc2U0REFael92cyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMjc0NTg5OTc4MiIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNzc3NjA0MjUifQ", "payload": "", "signature": "Z-Ax4n2DUZPZPoBUqqk-tPNMLTzV_uCeIR6EvdxPwSvp6h9P5ObaRk8MREY1TlFpXzeJyttLQn65aTqKULU1J0yfz2cbrN97WP3T9hECpsroSMEuHvLJgalrsquPXpkP5SJCMhx95vvxT0kO10Zvbc6kg5YFEBMHWs_Xn65Qicd1yYaWwbi2RbM7F9amhrGwOTFGqUhyDWvLRkQnWeBGXhGmjvO-WKD5dMsIUpqQEuHt69otjcETE5WGOCYdWfoV0DvQMtUZuGdlV1OZb8fFz8MblBD3zfn-i4ncRh6A9vTUI5l-MNywVaSA993gwymY3sZ7Nd-xOaQBgMzciPUAyg"}' [lun 10 feb 2020, 19.00.05, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.05, CET] Http already initialized. [lun 10 feb 2020, 19.00.05, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.06, CET] _ret='0' [lun 10 feb 2020, 19.00.06, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:05 GMT content-type: application/json content-length: 791 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0002Y_58GMaLBKCryKZixQVAbYN6Dtx376QPJTYBlYbccyY x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.06, CET] code='200' [lun 10 feb 2020, 19.00.06, CET] original='{ "identifier": { "type": "dns", "value": "www.ggc.world" }, "status": "pending", "expires": "2020-02-17T18:00:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg", "token": "cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA", "token": "cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw", "token": "cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU" } ] }' [lun 10 feb 2020, 19.00.06, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T18:00:04Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}]}' [lun 10 feb 2020, 19.00.06, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T18:00:04Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}]}' [lun 10 feb 2020, 19.00.06, CET] _d='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] _authorizations_map='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T18:00:04Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}]} ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]} ' [lun 10 feb 2020, 19.00.06, CET] d='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] Getting webroot for domain='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] _w='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] _is_idn_d='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] _idn_temp [lun 10 feb 2020, 19.00.06, CET] _candindates='www.ggc.world,{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T18:00:04Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}]}' [lun 10 feb 2020, 19.00.06, CET] response='{"identifier":{"type":"dns","value":"www.ggc.world"},"status":"pending","expires":"2020-02-17T18:00:04Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"dns-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-wN3UA","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/-alpmw","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}]}' [lun 10 feb 2020, 19.00.06, CET] entry='"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"' [lun 10 feb 2020, 19.00.06, CET] token='cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU' [lun 10 feb 2020, 19.00.06, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.06, CET] keyauthorization='cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 19.00.06, CET] dvlist='www.ggc.world#cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg#http-01#/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] d='ggc.world' [lun 10 feb 2020, 19.00.06, CET] Getting webroot for domain='ggc.world' [lun 10 feb 2020, 19.00.06, CET] _w='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] _is_idn_d='ggc.world' [lun 10 feb 2020, 19.00.06, CET] _idn_temp [lun 10 feb 2020, 19.00.06, CET] _candindates='ggc.world,{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 19.00.06, CET] response='{"identifier":{"type":"dns","value":"ggc.world"},"status":"valid","expires":"2020-03-10T18:18:24Z","challenges":[{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}]}' [lun 10 feb 2020, 19.00.06, CET] entry='"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"' [lun 10 feb 2020, 19.00.06, CET] token='qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E' [lun 10 feb 2020, 19.00.06, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 19.00.06, CET] keyauthorization='qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 19.00.06, CET] ggc.world is already verified. [lun 10 feb 2020, 19.00.06, CET] keyauthorization='verified_ok' [lun 10 feb 2020, 19.00.06, CET] dvlist='ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] d [lun 10 feb 2020, 19.00.06, CET] vlist='www.ggc.world#cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg#http-01#/var/www/ggc.world/html/,ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/,' [lun 10 feb 2020, 19.00.06, CET] d='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] d='ggc.world' [lun 10 feb 2020, 19.00.06, CET] ggc.world is already verified, skip http-01. [lun 10 feb 2020, 19.00.06, CET] ok, let's start to verify [lun 10 feb 2020, 19.00.06, CET] Verifying: www.ggc.world [lun 10 feb 2020, 19.00.06, CET] d='www.ggc.world' [lun 10 feb 2020, 19.00.06, CET] keyauthorization='cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 19.00.06, CET] uri='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.06, CET] _currentRoot='/var/www/ggc.world/html/' [lun 10 feb 2020, 19.00.06, CET] wellknown_path='/var/www/ggc.world/html//.well-known/acme-challenge' [lun 10 feb 2020, 19.00.06, CET] writing token:cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU to /var/www/ggc.world/html//.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU [lun 10 feb 2020, 19.00.06, CET] Changing owner/group of .well-known to root:root [lun 10 feb 2020, 19.00.06, CET] Trigger domain validation. [lun 10 feb 2020, 19.00.06, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.06, CET] _t_key_authz='cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 19.00.06, CET] _t_vtype='http-01' [lun 10 feb 2020, 19.00.06, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.06, CET] payload='{}' [lun 10 feb 2020, 19.00.06, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.06, CET] Use _CACHED_NONCE='0002Y_58GMaLBKCryKZixQVAbYN6Dtx376QPJTYBlYbccyY' [lun 10 feb 2020, 19.00.06, CET] nonce='0002Y_58GMaLBKCryKZixQVAbYN6Dtx376QPJTYBlYbccyY' [lun 10 feb 2020, 19.00.06, CET] POST [lun 10 feb 2020, 19.00.06, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.06, CET] body='{"protected": "eyJub25jZSI6ICIwMDAyWV81OEdNYUxCS0NyeUtaaXhRVkFiWU42RHR4Mzc2UVBKVFlCbFliY2N5WSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTg5OTc4Mi9UQmtVZGciLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "WGvgxPkRhtHqB0VgvX2Aw85uNoBM0BIH-dB4SuoN2rjqn7t2CngHEW_wYL8tQ__H1iOmuJ041Q9MkaL-n5_R96vyjdXq9udqzLSm6y4A2lPlpzFROQe3bOFV3IyFXyLu5CMJtRBvEJrpmH7IxEep7NRBnkUUNdEN_GgaaUWZJTfuxlmPWOigGqhFJGyZ8hotoAz9Dy4zpXcB1tECx_NFFOmSjDxRqJPPMQ4BFI4WdW1fCxkfCOhIyjfUnGaH1g37Z7dg-hPLNpjzvatxldo6Gue-VI88XjkqhFn3JELMAIAoUV5dWMUEpqSTalY5z6XazHuHdll-9mr2BF833MS_FQ"}' [lun 10 feb 2020, 19.00.06, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.06, CET] Http already initialized. [lun 10 feb 2020, 19.00.06, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.08, CET] _ret='0' [lun 10 feb 2020, 19.00.08, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:07 GMT content-type: application/json content-length: 185 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg replay-nonce: 0001Qj5EjEzP2XSvo9QjOTKglbPgympwk1s0FEqg8ItHHjk x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.08, CET] code='200' [lun 10 feb 2020, 19.00.08, CET] original='{ "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg", "token": "cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU" }' [lun 10 feb 2020, 19.00.08, CET] response='{"type":"http-01","status":"pending","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU"}' [lun 10 feb 2020, 19.00.08, CET] trigger validation code: 200 [lun 10 feb 2020, 19.00.08, CET] sleep 2 secs to verify [lun 10 feb 2020, 19.00.10, CET] checking [lun 10 feb 2020, 19.00.10, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.10, CET] payload [lun 10 feb 2020, 19.00.10, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.10, CET] Use _CACHED_NONCE='0001Qj5EjEzP2XSvo9QjOTKglbPgympwk1s0FEqg8ItHHjk' [lun 10 feb 2020, 19.00.10, CET] nonce='0001Qj5EjEzP2XSvo9QjOTKglbPgympwk1s0FEqg8ItHHjk' [lun 10 feb 2020, 19.00.10, CET] POST [lun 10 feb 2020, 19.00.10, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.10, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxUWo1RWpFelAyWFN2bzlRak9US2dsYlBneW1wd2sxczBGRXFnOEl0SEhqayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTg5OTc4Mi9UQmtVZGciLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "", "signature": "uxIM7X45YR-0-H8mky9sLETuUymoBjhteaCZJQ8Di_T-VgMiYLC0pcjs3Z-Vqles4jdLin4m7a-F4lU0-U81vEq3DRlo677KG9pHYBBJFEQd3RQJW9uJQCLQ93B04OSzlJZofwfdzjum8SEhM9ubQt0vEyaNc5K-rxt9V7t0g7_uSm61dt68Iejwisq57Yb7GHzyO0Gd783dl3Rn3DI4lmdfrqW_8LN22Nut_2MQ7tLKKv83FSsPtW-Sd9AVHgPQQ__ZKRINQaKxnzBLT0f3CK3O3ZO3DJ7HbByHz1k0WpfMC-uDJnFwYI6MK7AL_SLp1s26AyTuEVl6anj9VO53dw"}' [lun 10 feb 2020, 19.00.10, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.10, CET] Http already initialized. [lun 10 feb 2020, 19.00.10, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.12, CET] _ret='0' [lun 10 feb 2020, 19.00.12, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:12 GMT content-type: application/json content-length: 711 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg replay-nonce: 0001HP68ytrZSRmo0dettcxrW5FmDD7KJ8iorKlkbQpknjc x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.12, CET] code='200' [lun 10 feb 2020, 19.00.12, CET] original='{ "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused", "status": 400 }, "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg", "token": "cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU", "validationRecord": [ { "url": "http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU", "hostname": "www.ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] }' [lun 10 feb 2020, 19.00.12, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 19.00.12, CET] original='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 19.00.12, CET] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused","status": 400},"url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg","token":"cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","validationRecord":[{"url":"http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU","hostname":"www.ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 19.00.12, CET] error='"error":{"type":"urn:ietf:params:acme:error:connection","detail":"Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused","status": 400' [lun 10 feb 2020, 19.00.12, CET] errordetail='Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused' [lun 10 feb 2020, 19.00.12, CET] www.ggc.world:Verify error:Fetching http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU: Connection refused [lun 10 feb 2020, 19.00.12, CET] Debug: get token url. [lun 10 feb 2020, 19.00.12, CET] GET [lun 10 feb 2020, 19.00.12, CET] url='http://www.ggc.world/.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU' [lun 10 feb 2020, 19.00.12, CET] timeout=1 [lun 10 feb 2020, 19.00.12, CET] Http already initialized. [lun 10 feb 2020, 19.00.12, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g --connect-timeout 1' [lun 10 feb 2020, 19.00.12, CET] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 7 [lun 10 feb 2020, 19.00.12, CET] Here is the curl dump log: [lun 10 feb 2020, 19.00.12, CET] == Info: Trying 2.36.58.214... == Info: TCP_NODELAY set == Info: connect to 2.36.58.214 port 80 failed: Connection refused == Info: Failed to connect to www.ggc.world port 80: Connection refused == Info: Closing connection 0 [lun 10 feb 2020, 19.00.12, CET] ret='7' [lun 10 feb 2020, 19.00.12, CET] Debugging, skip removing: /var/www/ggc.world/html//.well-known/acme-challenge/cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU [lun 10 feb 2020, 19.00.12, CET] pid [lun 10 feb 2020, 19.00.12, CET] No need to restore nginx, skip. [lun 10 feb 2020, 19.00.12, CET] _clearupdns [lun 10 feb 2020, 19.00.12, CET] dns_entries [lun 10 feb 2020, 19.00.12, CET] skip dns. [lun 10 feb 2020, 19.00.12, CET] _on_issue_err [lun 10 feb 2020, 19.00.12, CET] Please add '--debug' or '--log' to check more details. [lun 10 feb 2020, 19.00.12, CET] See: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh [lun 10 feb 2020, 19.00.12, CET] _chk_vlist='www.ggc.world#cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg#http-01#/var/www/ggc.world/html/,ggc.world#verified_ok#https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ#http-01#/var/www/ggc.world/html/,' [lun 10 feb 2020, 19.00.12, CET] start to deactivate authz [lun 10 feb 2020, 19.00.12, CET] Trigger domain validation. [lun 10 feb 2020, 19.00.12, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.12, CET] _t_key_authz='cIEzXKpE3ou3btnE03TLcGK4evElREwClfEq28MHInU.3saRMlkAj4d_m20XxunO7Z9O1TWIIqp2MbT-pbsKl3c' [lun 10 feb 2020, 19.00.12, CET] _t_vtype [lun 10 feb 2020, 19.00.12, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.12, CET] payload='{}' [lun 10 feb 2020, 19.00.12, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.12, CET] Use _CACHED_NONCE='0001HP68ytrZSRmo0dettcxrW5FmDD7KJ8iorKlkbQpknjc' [lun 10 feb 2020, 19.00.12, CET] nonce='0001HP68ytrZSRmo0dettcxrW5FmDD7KJ8iorKlkbQpknjc' [lun 10 feb 2020, 19.00.12, CET] POST [lun 10 feb 2020, 19.00.12, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2745899782/TBkUdg' [lun 10 feb 2020, 19.00.12, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxSFA2OHl0clpTUm1vMGRldHRjeHJXNUZtREQ3S0o4aW9yS2xrYlFwa25qYyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjc0NTg5OTc4Mi9UQmtVZGciLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "SIVQiwzUnaZzGVkyPirwGTLEy6zZskAHGXs9tEuN4x4QWNbV79wsZBRk7-sYUFJ5W09oU00FNFbtP30xhcolFVPK6UZckj7hA-ZCeEjQtdaqMQZMwAnMlG4ML1TIa2EnTpcSotjNv1gMEQO20G4RjqLmTK9es9gnEruvMvIMjfyVmeyzgXvsBR7NYmiftkUhdOf8V5dTvweucVul9eXIuaFm02Tbu8qRvsbBQGtphZlRhFgubpj-25Q9SPt3JGeR9eM89ezJiA7NHrj2HyBLaD0sQojxRLQI6OEDjL5ovhTPktXYpjpIF4FFfG6PTaipfvJuFnjsk7WN5-Nq1JklzQ"}' [lun 10 feb 2020, 19.00.12, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.12, CET] Http already initialized. [lun 10 feb 2020, 19.00.12, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.14, CET] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 35 [lun 10 feb 2020, 19.00.14, CET] Here is the curl dump log: [lun 10 feb 2020, 19.00.14, CET] == Info: Trying 172.65.32.248... == Info: TCP_NODELAY set == Info: Connected to acme-v02.api.letsencrypt.org (172.65.32.248) port 443 (#0) == Info: ALPN, offering h2 == Info: ALPN, offering http/1.1 == Info: successfully set certificate verify locations: == Info: CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs => Send SSL data, 5 bytes (0x5) 0000: ..... == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): => Send SSL data, 512 bytes (0x200) 0000: ...........|...f!5G...#.m.....q0v3.:.% .".....o.S...'uK...'s..{. 0040: .../....>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u...!.....acme-v02.api.letsencrypt.org................ 00c0: ........3t.........h2.http/1.1...........0...................... 0100: ...........................+............-.....3.&.$... .{..`.... 0140: B...e..q.;E..v.......n.......................................... 0180: ................................................................ 01c0: ................................................................ == Info: OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to acme-v02.api.letsencrypt.org:443 == Info: stopped the pause stream! == Info: Closing connection 0 [lun 10 feb 2020, 19.00.14, CET] _ret='35' [lun 10 feb 2020, 19.00.14, CET] responseHeaders [lun 10 feb 2020, 19.00.14, CET] code [lun 10 feb 2020, 19.00.14, CET] original [lun 10 feb 2020, 19.00.14, CET] response [lun 10 feb 2020, 19.00.14, CET] Trigger domain validation. [lun 10 feb 2020, 19.00.14, CET] _t_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 19.00.14, CET] _t_key_authz='verified_ok' [lun 10 feb 2020, 19.00.14, CET] _t_vtype [lun 10 feb 2020, 19.00.14, CET] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 19.00.14, CET] payload='{}' [lun 10 feb 2020, 19.00.14, CET] Use cached jwk for file: /home/marco/webMatters/acme.sh/data//ca/acme-v02.api.letsencrypt.org/account.key [lun 10 feb 2020, 19.00.14, CET] Get nonce with HEAD. ACME_NEW_NONCE='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 19.00.14, CET] HEAD [lun 10 feb 2020, 19.00.14, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/new-nonce' [lun 10 feb 2020, 19.00.14, CET] body [lun 10 feb 2020, 19.00.14, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.14, CET] Http already initialized. [lun 10 feb 2020, 19.00.14, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g -I ' [lun 10 feb 2020, 19.00.15, CET] _ret='0' [lun 10 feb 2020, 19.00.15, CET] _headers='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:15 GMT cache-control: public, max-age=0, no-cache link: ;rel="index" replay-nonce: 0001_gv2ScJP8999WUv-6pLHmcBAotSyu3kcq1a-ib7JkAM x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.15, CET] _CACHED_NONCE='0001_gv2ScJP8999WUv-6pLHmcBAotSyu3kcq1a-ib7JkAM' [lun 10 feb 2020, 19.00.15, CET] nonce='0001_gv2ScJP8999WUv-6pLHmcBAotSyu3kcq1a-ib7JkAM' [lun 10 feb 2020, 19.00.15, CET] POST [lun 10 feb 2020, 19.00.15, CET] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ' [lun 10 feb 2020, 19.00.15, CET] body='{"protected": "eyJub25jZSI6ICIwMDAxX2d2MlNjSlA4OTk5V1V2LTZwTEhtY0JBb3RTeXUza2NxMWEtaWI3SmtBTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvMjcyODMwODU0MS9VbXRBa1EiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0Lzc3NzYwNDI1In0", "payload": "e30", "signature": "D5E8HuJc8KqPr9w21YHMoMQyiiPlZvZddkuFDHWdsvx4MxsuCZ0Ti3JXjiUoh7G4MMKZlinSg4_bomJPGk_La06UToobje6RwuJ_UWYgSirnDWKf-yOZor851g1Zmyx_jZWRSDIjLGf_unkxe_FTSPigFcHhukiE9dlxmserDHhMUhIYo95jSW0EQwaL4OEzNAlLmYzy0YAewx1uoL9HPWQs1x4tQ8KhRltozwClOLZCAPActL6iKp51guClxtAJxHynBduWpS-gsZ-YIbOnqBmDQJutuvXx4sltUkVejUii_mgNz83gvJyVA3eTreEBD7VgAWWGxx-0nsnyd2U1mA"}' [lun 10 feb 2020, 19.00.15, CET] _postContentType='application/jose+json' [lun 10 feb 2020, 19.00.15, CET] Http already initialized. [lun 10 feb 2020, 19.00.15, CET] _CURL='curl -L --silent --dump-header /home/marco/webMatters/acme.sh/data//http.header --trace-ascii /tmp/tmp.drCgYJsjTg -g ' [lun 10 feb 2020, 19.00.17, CET] _ret='0' [lun 10 feb 2020, 19.00.17, CET] responseHeaders='HTTP/2 200 server: nginx date: Mon, 10 Feb 2020 18:00:16 GMT content-type: application/json content-length: 474 boulder-requester: 77760425 cache-control: public, max-age=0, no-cache link: ;rel="index" link: ;rel="up" location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ replay-nonce: 0001veHwDuj3Op63_uKqWUndVjRPV_XUswTrjDfUbrliu3M x-frame-options: DENY strict-transport-security: max-age=604800 ' [lun 10 feb 2020, 19.00.17, CET] code='200' [lun 10 feb 2020, 19.00.17, CET] original='{ "type": "http-01", "status": "valid", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ", "token": "qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "validationRecord": [ { "url": "http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E", "hostname": "ggc.world", "port": "80", "addressesResolved": [ "2.36.58.214" ], "addressUsed": "2.36.58.214" } ] }' [lun 10 feb 2020, 19.00.17, CET] response='{"type":"http-01","status":"valid","url":"https://acme-v02.api.letsencrypt.org/acme/chall-v3/2728308541/UmtAkQ","token":"qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","validationRecord":[{"url":"http://ggc.world/.well-known/acme-challenge/qtYTtmaMHh4RPaqWLAjC98eSVHSfc8ZmdvOdWcYDr1E","hostname":"ggc.world","port":"80","addressesResolved":["2.36.58.214"],"addressUsed":"2.36.58.214"}]}' [lun 10 feb 2020, 19.00.17, CET] Diagnosis versions: openssl:openssl OpenSSL 1.1.1 11 Sep 2018 apache: apache doesn't exists. nginx: nginx version: nginx/1.14.0 (Ubuntu) built with OpenSSL 1.1.1 11 Sep 2018 TLS SNI support enabled configure arguments: --with-cc-opt='-g -O2 -fdebug-prefix-map=/build/nginx-GkiujU/nginx-1.14.0=. -fstack-protector-strong -Wformat -Werror=format-security -fPIC -Wdate-time -D_FORTIFY_SOURCE=2' --with-ld-opt='-Wl,-Bsymbolic-functions -Wl,-z,relro -Wl,-z,now -fPIC' --prefix=/usr/share/nginx --conf-path=/etc/nginx/nginx.conf --http-log-path=/var/log/nginx/access.log --error-log-path=/var/log/nginx/error.log --lock-path=/var/lock/nginx.lock --pid-path=/run/nginx.pid --modules-path=/usr/lib/nginx/modules --http-client-body-temp-path=/var/lib/nginx/body --http-fastcgi-temp-path=/var/lib/nginx/fastcgi --http-proxy-temp-path=/var/lib/nginx/proxy --http-scgi-temp-path=/var/lib/nginx/scgi --http-uwsgi-temp-path=/var/lib/nginx/uwsgi --with-debug --with-pcre-jit --with-http_ssl_module --with-http_stub_status_module --with-http_realip_module --with-http_auth_request_module --with-http_v2_module --with-http_dav_module --with-http_slice_module --with-threads --with-http_addition_module --with-http_geoip_module=dynamic --with-http_gunzip_module --with-http_gzip_static_module --with-http_image_filter_module=dynamic --with-http_sub_module --with-http_xslt_module=dynamic --with-stream=dynamic --with-stream_ssl_module --with-mail=dynamic --with-mail_ssl_module socat: socat by Gerhard Rieger and contributors - see www.dest-unreach.org Usage: socat [options] options: -V print version and feature information to stdout, and exit -h|-? print a help text describing command line options and addresses -hh like -h, plus a list of all common address option names -hhh like -hh, plus a list of all available address option names -d increase verbosity (use up to 4 times; 2 are recommended) -D analyze file descriptors before loop -ly[facility] log to syslog, using facility (default is daemon) -lf log to file -ls log to stderr (default if no other log) -lm[facility] mixed log mode (stderr during initialization, then syslog) -lp set the program name used for logging -lu use microseconds for logging timestamps -lh add hostname to log messages -v verbose data traffic, text -x verbose data traffic, hexadecimal -b set data buffer size (8192) -s sloppy (continue on error) -t wait seconds before closing second channel -T total inactivity timeout in seconds -u unidirectional mode (left to right) -U unidirectional mode (right to left) -g do not check option groups -L try to obtain lock, or fail -W try to obtain lock, or wait -4 prefer IPv4 if version is not explicitly specified -6 prefer IPv6 if version is not explicitly specified bi-address: pipe[,] groups=FD,FIFO !! single-address: [,] address-head: abstract-client: groups=FD,SOCKET,RETRY,UNIX abstract-connect: groups=FD,SOCKET,RETRY,UNIX abstract-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,UNIX abstract-recv: groups=FD,SOCKET,RETRY,UNIX abstract-recvfrom: groups=FD,SOCKET,CHILD,RETRY,UNIX abstract-sendto: groups=FD,SOCKET,RETRY,UNIX create: groups=FD,REG,NAMED exec: groups=FD,FIFO,SOCKET,EXEC,FORK,TERMIOS,PTY,PARENT,UNIX fd: groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP gopen: groups=FD,FIFO,CHR,BLK,REG,SOCKET,NAMED,OPEN,TERMIOS,UNIX interface: groups=FD,SOCKET ip-datagram:: groups=FD,SOCKET,RANGE,IP4,IP6 ip-recv: groups=FD,SOCKET,RANGE,IP4,IP6 ip-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4,IP6 ip-sendto:: groups=FD,SOCKET,IP4,IP6 ip4-datagram:: groups=FD,SOCKET,RANGE,IP4 ip4-recv: groups=FD,SOCKET,RANGE,IP4 ip4-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4 ip4-sendto:: groups=FD,SOCKET,IP4 ip6-datagram:: groups=FD,SOCKET,RANGE,IP6 ip6-recv: groups=FD,SOCKET,RANGE,IP6 ip6-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP6 ip6-sendto:: groups=FD,SOCKET,IP6 open: groups=FD,FIFO,CHR,BLK,REG,NAMED,OPEN,TERMIOS openssl:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,OPENSSL openssl-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,TCP,OPENSSL pipe: groups=FD,FIFO,NAMED,OPEN proxy::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,HTTP pty groups=FD,NAMED,TERMIOS,PTY sctp-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,SCTP sctp-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,SCTP sctp4-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,SCTP sctp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,SCTP sctp6-connect:: groups=FD,SOCKET,CHILD,RETRY,IP6,SCTP sctp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP6,SCTP socket-connect::: groups=FD,SOCKET,CHILD,RETRY socket-datagram:::: groups=FD,SOCKET,RANGE socket-listen::: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE socket-recv:::: groups=FD,SOCKET,RANGE socket-recvfrom:::: groups=FD,SOCKET,CHILD,RANGE socket-sendto:::: groups=FD,SOCKET socks4::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,SOCKS4 socks4a::: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP,SOCKS4 stderr groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdin groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdio groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP stdout groups=FD,FIFO,CHR,BLK,REG,SOCKET,TERMIOS,UNIX,IP4,IP6,UDP,TCP,SCTP system: groups=FD,FIFO,SOCKET,EXEC,FORK,TERMIOS,PTY,PARENT,UNIX tcp-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,IP6,TCP tcp-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,IP6,TCP tcp4-connect:: groups=FD,SOCKET,CHILD,RETRY,IP4,TCP tcp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP4,TCP tcp6-connect:: groups=FD,SOCKET,CHILD,RETRY,IP6,TCP tcp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RETRY,RANGE,IP6,TCP tun[:/] groups=FD,CHR,NAMED,OPEN,INTERFACE udp-connect:: groups=FD,SOCKET,IP4,IP6,UDP udp-datagram:: groups=FD,SOCKET,RANGE,IP4,IP6,UDP udp-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP4,IP6,UDP udp-recv: groups=FD,SOCKET,RANGE,IP4,IP6,UDP udp-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP4,IP6,UDP udp-sendto:: groups=FD,SOCKET,IP4,IP6,UDP udp4-connect:: groups=FD,SOCKET,IP4,UDP udp4-datagram:: groups=FD,SOCKET,RANGE,IP4,UDP udp4-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP4,UDP udp4-recv: groups=FD,SOCKET,RANGE,IP4,UDP udp4-recvfrom:: groups=FD,SOCKET,CHILD,RANGE,IP4,UDP udp4-sendto:: groups=FD,SOCKET,IP4,UDP udp6-connect:: groups=FD,SOCKET,IP6,UDP udp6-datagram:: groups=FD,SOCKET,RANGE,IP6,UDP udp6-listen: groups=FD,SOCKET,LISTEN,CHILD,RANGE,IP6,UDP udp6-recv: groups=FD,SOCKET,RANGE,IP6,UDP udp6-recvfrom: groups=FD,SOCKET,CHILD,RANGE,IP6,UDP udp6-sendto:: groups=FD,SOCKET,IP6,UDP unix-client: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-connect: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-listen: groups=FD,SOCKET,NAMED,LISTEN,CHILD,RETRY,UNIX unix-recv: groups=FD,SOCKET,NAMED,RETRY,UNIX unix-recvfrom: groups=FD,SOCKET,NAMED,CHILD,RETRY,UNIX unix-sendto: groups=FD,SOCKET,NAMED,RETRY,UNIX