2023-04-13 17:30:18,327:DEBUG:certbot._internal.main:certbot version: 1.21.0 2023-04-13 17:30:18,327:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2023-04-13 17:30:18,327:DEBUG:certbot._internal.main:Arguments: ['--dry-run'] 2023-04-13 17:30:18,327:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-04-13 17:30:18,347:DEBUG:certbot._internal.log:Root logging level set at 30 2023-04-13 17:30:18,349:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.eigenval.xyz.conf 2023-04-13 17:30:18,393:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-04-13 17:30:18,393:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2023-04-13 17:30:18,393:DEBUG:certbot._internal.cli:Var server={'dry_run', 'staging'} (set by user). 2023-04-13 17:30:18,393:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2023-04-13 17:30:18,393:DEBUG:certbot._internal.cli:Var server={'dry_run', 'staging'} (set by user). 2023-04-13 17:30:18,393:DEBUG:certbot._internal.cli:Var account={'server'} (set by user). 2023-04-13 17:30:18,425:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-04-13 17:30:18,567:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-04-13 17:30:18,570:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/cloud.eigenval.xyz/cert2.pem is signed by the certificate's issuer. 2023-04-13 17:30:18,576:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/cloud.eigenval.xyz/cert2.pem is: OCSPCertStatus.GOOD 2023-04-13 17:30:18,583:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-04-26 13:35:09 UTC. 2023-04-13 17:30:18,584:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2023-04-13 17:30:18,584:DEBUG:certbot._internal.plugins.selection:Requested authenticator nginx and installer nginx 2023-04-13 17:30:18,799:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2023-04-13 17:30:18,800:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2023-04-13 17:30:18,800:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer 2023-04-13 17:30:18,801:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx 2023-04-13 17:30:18,810:DEBUG:certbot._internal.main:Picked account: ), creation_host='71df0c02e251', register_to_eff=None))> 2023-04-13 17:30:18,811:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2023-04-13 17:30:18,812:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2023-04-13 17:30:19,314:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830 2023-04-13 17:30:19,315:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 17:30:19 GMT Content-Type: application/json Content-Length: 830 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-9EujzVVNbU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-04-13 17:30:19,318:DEBUG:certbot._internal.display.obj:Notifying user: Simulating renewal of an existing certificate for cloud.eigenval.xyz 2023-04-13 17:30:19,368:DEBUG:acme.client:Requesting fresh nonce 2023-04-13 17:30:19,369:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2023-04-13 17:30:19,536:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-04-13 17:30:19,537:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 17:30:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: BEB9t73-RDyHpJIVxn5x19ZiSK_bWnjisGG8pO5GcHK0TKY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-04-13 17:30:19,537:DEBUG:acme.client:Storing nonce: BEB9t73-RDyHpJIVxn5x19ZiSK_bWnjisGG8pO5GcHK0TKY 2023-04-13 17:30:19,538:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cloud.eigenval.xyz"\n }\n ]\n}' 2023-04-13 17:30:19,541:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCRUI5dDczLVJEeUhwSklWeG41eDE5WmlTS19iV25qaXNHRzhwTzVHY0hLMFRLWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sGTScUq0t8Pmej6bygC_t52LHQBJyFDlArjI5p4Qv3H5YNwWMpB8IK6-AvnfTGwhSBKfbUOr7-dfNjPpiCFASDDq-NivjMQxEG6F12MnV98wXoCxjqX0yC5LFJ-V3xFDPsfmYw4dY-lc0u54I4HkRFntPoLycLupH6h6mJw3kZBkcVk-oATqgvxILP_fF39eQ7dWG6vpTwmTCGb-es8t6VKranVt9XsP6-dUg2Z3_J-WeA-15aXBpgEM6Y_YSSHAMEN633WT16sdc6GoB2rf-nsIORiVKc_4xPjWqyEVKHiBYlJAOLrqwAr9vzYzFzJe4bxy9hYjDLaNQ860YaYWng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLmVpZ2VudmFsLnh5eiIKICAgIH0KICBdCn0" } 2023-04-13 17:30:19,753:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 354 2023-04-13 17:30:19,754:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 13 Apr 2023 17:30:19 GMT Content-Type: application/json Content-Length: 354 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/97852964/8250483304 Replay-Nonce: 8F05TmmXEoJ29w0f7OVK524ZWPOHXWwfb4v_C-qjwhre-_k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-04-20T17:30:19Z", "identifiers": [ { "type": "dns", "value": "cloud.eigenval.xyz" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107012014" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/97852964/8250483304" } 2023-04-13 17:30:19,755:DEBUG:acme.client:Storing nonce: 8F05TmmXEoJ29w0f7OVK524ZWPOHXWwfb4v_C-qjwhre-_k 2023-04-13 17:30:19,755:DEBUG:acme.client:JWS payload: b'' 2023-04-13 17:30:19,758:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107012014: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICI4RjA1VG1tWEVvSjI5dzBmN09WSzUyNFpXUE9IWFd3ZmI0dl9DLXFqd2hyZS1fayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MTA3MDEyMDE0In0", "signature": "TFNmneEfA54JTpgMwYRr0ihYigAotWzWfEWmRoTPSg2DkCe5SU_GjUxcYpd_Vg8kuR3KOMstfKRzsnx0f8PHQkuG3jEi6PHG9ULf7COp-MsBn2rvS9-4fqGEZNib-CogIdi6CdQyvE-8vfEl0CN79i8jSceUat0aeUwtUKXO_WxDLN6I5V7b_3uUQDiZGpEwbHbQx9gGyDU3MZFdRs0Pe_fnSUfurcRQl08u0gvWPSwaIpFEY4sWRPWjM7baJE7Lu8h3iLGr44MSFH78YRwOAHU18dCK5P2R6syhGcSOf0CxhSa68lu6B-GOj4RsSPUcwGpW23-yM8UlMf0JfwH6ow", "payload": "" } 2023-04-13 17:30:19,930:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6107012014 HTTP/1.1" 200 820 2023-04-13 17:30:19,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 17:30:19 GMT Content-Type: application/json Content-Length: 820 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B37C6h0hL3NEV-AoTdXKjBk98mqOqR0srK-PHHEC73sjSvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.eigenval.xyz" }, "status": "pending", "expires": "2023-04-20T17:30:19Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/F480AA", "token": "K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/uspFYQ", "token": "K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/VUwZCA", "token": "K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4" } ] } 2023-04-13 17:30:19,931:DEBUG:acme.client:Storing nonce: B37C6h0hL3NEV-AoTdXKjBk98mqOqR0srK-PHHEC73sjSvI 2023-04-13 17:30:19,932:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-04-13 17:30:19,932:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.eigenval.xyz 2023-04-13 17:30:19,968:DEBUG:certbot_nginx._internal.http_01:Using default addresses 80 and [::]:80 ipv6only=on for authentication. 2023-04-13 17:30:19,986:DEBUG:certbot_nginx._internal.http_01:Generated server block: [[['server'], [['listen', '80'], ['listen', '[::]:80'], ['server_name', 'cloud.eigenval.xyz'], ['root', '/var/lib/letsencrypt/http_01_nonexistent'], [['location', '=', '/.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4'], [['default_type', 'text/plain'], ['return', '200', 'K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4.NNKegGrTjaJE9PQNiu3_qLEHAHKeoCV4AjixVDbTvsU']]]]]] 2023-04-13 17:30:19,987:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf 2023-04-13 17:30:19,988:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/default.conf 2023-04-13 17:30:19,988:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/cloud.eigenval.ml.conf 2023-04-13 17:30:19,988:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types 2023-04-13 17:30:19,988:DEBUG:certbot.reverter:Creating backup of /etc/nginx/snippets/ssl-params.conf 2023-04-13 17:30:19,989:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/nginx.conf: user nginx; worker_processes auto; error_log /var/log/nginx/error.log notice; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /etc/letsencrypt/le_http_01_cert_challenge.conf; server_names_hash_bucket_size 128; include /etc/nginx/mime.types; default_type application/octet-stream; log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; #tcp_nopush on; keepalive_timeout 65; #gzip on; include /etc/nginx/conf.d/*.conf; } 2023-04-13 17:30:19,991:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/conf.d/cloud.eigenval.ml.conf: server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot server_name cloud.eigenval.xyz; listen [::]:443 ssl http2 ipv6only=on; listen 443 ssl http2; ssl_certificate /etc/letsencrypt/live/cloud.eigenval.xyz/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/cloud.eigenval.xyz/privkey.pem; include snippets/ssl-params.conf; client_max_body_size 100M; location / { proxy_pass http://10.0.0.3:80; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-NginX-Proxy true; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_ssl_session_reuse off; proxy_set_header Host $http_host; proxy_pass_header Server; proxy_cache_bypass $http_upgrade; proxy_hide_header X-Frame-Options; proxy_redirect off; } # Make a regex exception for `/.well-known` so that clients can still # access it despite the existence of the regex rule # `location ~ /(\.|autotest|...)` which would otherwise handle requests # for `/.well-known`. location ^~ /.well-known { # The rules in this block are an adaptation of the rules # in `.htaccess` that concern `/.well-known`. location = /.well-known/carddav { return 301 /remote.php/dav/; } location = /.well-known/caldav { return 301 /remote.php/dav/; } location /.well-known/acme-challenge { allow all; }#{ try_files $uri $uri/ =404; } location /.well-known/pki-validation { try_files $uri $uri/ =404; } # Let Nextcloud's API for `/.well-known` URIs handle all other # requests by passing them to the front-end controller. return 301 /index.php$request_uri; } location = /.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4{default_type text/plain;return 200 K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4.NNKegGrTjaJE9PQNiu3_qLEHAHKeoCV4AjixVDbTvsU;} # managed by Certbot } 2023-04-13 17:30:20,007:DEBUG:certbot_nginx._internal.configurator:nginx reload failed: nginx: [error] invalid PID number "" in "/var/run/nginx.pid" 23/04/13 17:30:19 [error] 17#17: invalid PID number "" in "/var/run/nginx.pid" 2023-04-13 17:30:21,019:DEBUG:acme.client:JWS payload: b'{}' 2023-04-13 17:30:21,023:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/F480AA: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCMzdDNmgwaEwzTkVWLUFvVGRYS2pCazk4bXFPcVIwc3JLLVBISEVDNzNzalN2SSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My82MTA3MDEyMDE0L0Y0ODBBQSJ9", "signature": "j21CbcLrJOKQlgqwGH8ahawrhbb8JqB6pgmg4nJ-7CWe6B07YpiDAcyZ937Mnr-jQUi8YxiOVSd-4TgsAcuCO_tT9N61-bDMn_TOv4kbzxKFbIyEDQSVe-A-ARJ0PUKGIirW8r9njXDtDI87S0qcUcT2TMqE0n-8Hn_U0QI1YS-87RceBtgIQ1hJPeLk-GVGMHDIN41gB_tecnJGfuBvURab9ImpUQMFxZkzaBdzv3PMNZ54OCLrfQLB73sbgFXLPeH5DVOyapLtzXWEJmcwe7WlDrCYUvgrQRBgZNu5xRwsQCP0YhrVjYxnQBgupoxTryYRVPZUNVRx3bInxUuW8A", "payload": "e30" } 2023-04-13 17:30:21,197:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/6107012014/F480AA HTTP/1.1" 200 193 2023-04-13 17:30:21,199:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 17:30:21 GMT Content-Type: application/json Content-Length: 193 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/F480AA Replay-Nonce: B37CxRPi5fcqp1RsqGYl_w2EXPSdto-tjF6RPIS6Qayt1UY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/F480AA", "token": "K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4" } 2023-04-13 17:30:21,199:DEBUG:acme.client:Storing nonce: B37CxRPi5fcqp1RsqGYl_w2EXPSdto-tjF6RPIS6Qayt1UY 2023-04-13 17:30:21,200:INFO:certbot._internal.auth_handler:Waiting for verification... 2023-04-13 17:30:22,201:DEBUG:acme.client:JWS payload: b'' 2023-04-13 17:30:22,204:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107012014: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCMzdDeFJQaTVmY3FwMVJzcUdZbF93MkVYUFNkdG8tdGpGNlJQSVM2UWF5dDFVWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MTA3MDEyMDE0In0", "signature": "bnjdF7luOIvOk3K5V-_CKtfvWueUX6E_FJLirQrPjylNLgZ6eB6iN4EMXMK-pZIwMSNlJkgKzJkvIGuD3MypJ3DfEVwpE7Rti5R-lj1OrFSiTJ4gqio6Qv6Cu5MpN9VTCiNHPykPLoQV38uAZX1BSxfx7b0Ug5CpH24ZzFwm7eAWu6GwqEZZOumnFu4_y8dMjFM-7FVsHy8ORSi7IxJ6-IPYxKsrldPAph0JYSoVoTLRhpCB7BvilTMTg679g_GlFLY_CuOdQK0lzLkTN95P29Em1_Orz_DRgVPu6XM_JhyYdRo36N4pQJPMRZKWhSnnb1jRQbKYpvGFs6AWmvOJpQ", "payload": "" } 2023-04-13 17:30:22,375:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6107012014 HTTP/1.1" 200 1370 2023-04-13 17:30:22,377:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 17:30:22 GMT Content-Type: application/json Content-Length: 1370 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: A272sn5BXhFDIxSWiH2jQXXOZmc3IfHRc-Q7xAFGWJZGPtY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.eigenval.xyz" }, "status": "invalid", "expires": "2023-04-20T17:30:19Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:unauthorized", "detail": "94.130.148.89: Invalid response from https://cloud.eigenval.xyz/.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4: 404", "status": 403 }, "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107012014/F480AA", "token": "K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4", "validationRecord": [ { "url": "http://cloud.eigenval.xyz/.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4", "hostname": "cloud.eigenval.xyz", "port": "80", "addressesResolved": [ "94.130.148.89" ], "addressUsed": "94.130.148.89" }, { "url": "https://cloud.eigenval.xyz/.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4", "hostname": "cloud.eigenval.xyz", "port": "443", "addressesResolved": [ "94.130.148.89" ], "addressUsed": "94.130.148.89" } ], "validated": "2023-04-13T17:30:21Z" } ] } 2023-04-13 17:30:22,377:DEBUG:acme.client:Storing nonce: A272sn5BXhFDIxSWiH2jQXXOZmc3IfHRc-Q7xAFGWJZGPtY 2023-04-13 17:30:22,378:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.eigenval.xyz 2023-04-13 17:30:22,378:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.eigenval.xyz 2023-04-13 17:30:22,379:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: nginx). The Certificate Authority reported these problems: Domain: cloud.eigenval.xyz Type: unauthorized Detail: 94.130.148.89: Invalid response from https://cloud.eigenval.xyz/.well-known/acme-challenge/K4RK_xsOE-gK4b4DqpOoeySMDYhpv9uEOt4PnKnOqo4: 404 Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx server and that it is accessible from the internet. 2023-04-13 17:30:22,380:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-04-13 17:30:22,380:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-04-13 17:30:22,380:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-04-13 17:30:23,574:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.eigenval.xyz with error: Some challenges have failed. 2023-04-13 17:30:23,576:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 475, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1386, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 122, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 335, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3.9/site-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3.9/site-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-04-13 17:30:23,576:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-04-13 17:30:23,576:ERROR:certbot._internal.renewal:All simulated renewals failed. The following certificates could not be renewed: 2023-04-13 17:30:23,577:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cloud.eigenval.xyz/fullchain.pem (failure) 2023-04-13 17:30:23,577:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-04-13 17:30:23,577:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3.9/site-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1460, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 500, in handle_renewal_request raise errors.Error("{0} renew failure(s), {1} parse failure(s)".format( certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2023-04-13 17:30:23,578:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)