2023-04-13 18:37:19,761:DEBUG:certbot._internal.main:certbot version: 1.21.0 2023-04-13 18:37:19,761:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2023-04-13 18:37:19,761:DEBUG:certbot._internal.main:Arguments: ['--dry-run'] 2023-04-13 18:37:19,762:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-04-13 18:37:19,781:DEBUG:certbot._internal.log:Root logging level set at 30 2023-04-13 18:37:19,782:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.eigenval.xyz.conf 2023-04-13 18:37:19,813:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-04-13 18:37:19,813:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2023-04-13 18:37:19,813:DEBUG:certbot._internal.cli:Var server={'dry_run', 'staging'} (set by user). 2023-04-13 18:37:19,813:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2023-04-13 18:37:19,813:DEBUG:certbot._internal.cli:Var server={'dry_run', 'staging'} (set by user). 2023-04-13 18:37:19,813:DEBUG:certbot._internal.cli:Var account={'server'} (set by user). 2023-04-13 18:37:19,842:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-04-13 18:37:19,859:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-04-13 18:37:19,862:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/cloud.eigenval.xyz/cert2.pem is signed by the certificate's issuer. 2023-04-13 18:37:19,866:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/cloud.eigenval.xyz/cert2.pem is: OCSPCertStatus.GOOD 2023-04-13 18:37:19,873:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-04-26 13:35:09 UTC. 2023-04-13 18:37:19,873:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2023-04-13 18:37:19,873:DEBUG:certbot._internal.plugins.selection:Requested authenticator nginx and installer nginx 2023-04-13 18:37:20,090:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2023-04-13 18:37:20,091:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2023-04-13 18:37:20,091:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer 2023-04-13 18:37:20,091:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx 2023-04-13 18:37:20,100:DEBUG:certbot._internal.main:Picked account: ), creation_host='71df0c02e251', register_to_eff=None))> 2023-04-13 18:37:20,102:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2023-04-13 18:37:20,103:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2023-04-13 18:37:20,591:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830 2023-04-13 18:37:20,592:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 18:37:20 GMT Content-Type: application/json Content-Length: 830 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "S4z16cjbYfk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-04-13 18:37:20,594:DEBUG:certbot._internal.display.obj:Notifying user: Simulating renewal of an existing certificate for cloud.eigenval.xyz 2023-04-13 18:37:20,653:DEBUG:acme.client:Requesting fresh nonce 2023-04-13 18:37:20,654:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2023-04-13 18:37:20,814:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-04-13 18:37:20,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 18:37:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: BEB9tkHNhPe6CiRPeykD9DC_n8pY4QRCr7x8RJWEKBwmG2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-04-13 18:37:20,815:DEBUG:acme.client:Storing nonce: BEB9tkHNhPe6CiRPeykD9DC_n8pY4QRCr7x8RJWEKBwmG2g 2023-04-13 18:37:20,816:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cloud.eigenval.xyz"\n }\n ]\n}' 2023-04-13 18:37:20,821:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCRUI5dGtITmhQZTZDaVJQZXlrRDlEQ19uOHBZNFFSQ3I3eDhSSldFS0J3bUcyZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kEwITu5WyNGyPFf86D9ByHPbQ0IAMNQtqx9udcDhYEPilTK6z5OceAMO161g0wWE5tB2sS2CFoRzoadjxNSQqlY8NPKbnjgKCg8ZNuBZHx0RfWhiY7_j2NMtDYDPJmeO6FbNLJJYynoIMvt_Wpe96DsmXWQ3nK38U-HfwYZP9yhnpKSSipQjfTib815INSU93BIKY_MUIN_tsWdNKFK1k8GQ75DEFVhsgWGfUa9qC7MyN_mlM8u0UTEla_mKBRl5Q-Pm0hIcNvujd84CHBG8Nfv4gWjq2GDWn-jinJJCP7FzGXs_LBhCYLKnZSnrD0iM9WN-YiMFae_yDGZfI6jFYw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLmVpZ2VudmFsLnh5eiIKICAgIH0KICBdCn0" } 2023-04-13 18:37:21,023:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 354 2023-04-13 18:37:21,024:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 13 Apr 2023 18:37:20 GMT Content-Type: application/json Content-Length: 354 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/97852964/8251185904 Replay-Nonce: 8F05jd84RvseFWVfR219lwhvnPyL8M7nN-0Ci7iTHqUr6JI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-04-20T18:37:20Z", "identifiers": [ { "type": "dns", "value": "cloud.eigenval.xyz" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107523594" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/97852964/8251185904" } 2023-04-13 18:37:21,025:DEBUG:acme.client:Storing nonce: 8F05jd84RvseFWVfR219lwhvnPyL8M7nN-0Ci7iTHqUr6JI 2023-04-13 18:37:21,025:DEBUG:acme.client:JWS payload: b'' 2023-04-13 18:37:21,028:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107523594: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICI4RjA1amQ4NFJ2c2VGV1ZmUjIxOWx3aHZuUHlMOE03bk4tMENpN2lUSHFVcjZKSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MTA3NTIzNTk0In0", "signature": "RnN7ytdzKh9SiArTzNK8XSCitI2PXqfUCOMYT8ZXs8E0qJozPKuK1527Xc5ViY56eheSKoV4OS4wtvpcRxbL-_OA-CcTWd-oHLROOVIbdxiObxta8MES7sgauICG6vWKonYWkXaZtNstdsjXAegPY7MSZHZXdqbUH09mUfZT8Iar9w8tY5mjlgeeicPMIxbitesZPyZsQBIfhPUVE2CpJXdRwctF4I9s0bb4w7ATF3ItFzXXF04-ol6TKHA6hX5BW1Y0nf_loPcAvIx4-xqGED729QMWPJWLKx4wFs6l0tSZ8mnplouvJyTdZvsmF40HmzmGPDxpby3jO92TfWwi_w", "payload": "" } 2023-04-13 18:37:21,201:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6107523594 HTTP/1.1" 200 820 2023-04-13 18:37:21,202:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 18:37:21 GMT Content-Type: application/json Content-Length: 820 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B37CNMQLO9RRCgRXeINPHEZWdKXdhXaAREJVaU-CoR4Wll4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.eigenval.xyz" }, "status": "pending", "expires": "2023-04-20T18:37:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/DTIJNg", "token": "Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/8KOCTQ", "token": "Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/tL09Vw", "token": "Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc" } ] } 2023-04-13 18:37:21,202:DEBUG:acme.client:Storing nonce: B37CNMQLO9RRCgRXeINPHEZWdKXdhXaAREJVaU-CoR4Wll4 2023-04-13 18:37:21,203:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-04-13 18:37:21,204:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.eigenval.xyz 2023-04-13 18:37:21,236:DEBUG:certbot_nginx._internal.http_01:Using default addresses 80 and [::]:80 ipv6only=on for authentication. 2023-04-13 18:37:21,252:DEBUG:certbot_nginx._internal.http_01:Generated server block: [[['server'], [['listen', '80'], ['listen', '[::]:80'], ['server_name', 'cloud.eigenval.xyz'], ['root', '/var/lib/letsencrypt/http_01_nonexistent'], [['location', '=', '/.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc'], [['default_type', 'text/plain'], ['return', '200', 'Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc.NNKegGrTjaJE9PQNiu3_qLEHAHKeoCV4AjixVDbTvsU']]]]]] 2023-04-13 18:37:21,252:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/cloud.eigenval.ml.conf 2023-04-13 18:37:21,253:DEBUG:certbot.reverter:Creating backup of /etc/nginx/snippets/ssl-params.conf 2023-04-13 18:37:21,253:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf 2023-04-13 18:37:21,253:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/default.conf 2023-04-13 18:37:21,253:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types 2023-04-13 18:37:21,254:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/nginx.conf: user nginx; worker_processes auto; error_log /var/log/nginx/error.log notice; pid /var/run/nginx.pid; events { worker_connections 1024; } http { include /etc/letsencrypt/le_http_01_cert_challenge.conf; server_names_hash_bucket_size 128; include /etc/nginx/mime.types; default_type application/octet-stream; log_format main '$remote_addr - $remote_user [$time_local] "$request" ' '$status $body_bytes_sent "$http_referer" ' '"$http_user_agent" "$http_x_forwarded_for"'; access_log /var/log/nginx/access.log main; sendfile on; #tcp_nopush on; keepalive_timeout 65; #gzip on; include /etc/nginx/conf.d/*.conf; } 2023-04-13 18:37:21,256:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/conf.d/cloud.eigenval.ml.conf: server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot server_name cloud.eigenval.xyz; listen [::]:443 ssl http2 ipv6only=on; listen 443 ssl http2; ssl_certificate /etc/letsencrypt/live/cloud.eigenval.xyz/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/cloud.eigenval.xyz/privkey.pem; include snippets/ssl-params.conf; client_max_body_size 100M; location / { proxy_pass http://10.0.0.3:80; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-NginX-Proxy true; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection 'upgrade'; proxy_ssl_session_reuse off; proxy_set_header Host $http_host; proxy_pass_header Server; proxy_cache_bypass $http_upgrade; proxy_hide_header X-Frame-Options; proxy_redirect off; } # Make a regex exception for `/.well-known` so that clients can still # access it despite the existence of the regex rule # `location ~ /(\.|autotest|...)` which would otherwise handle requests # for `/.well-known`. location ^~ /.well-known { # The rules in this block are an adaptation of the rules # in `.htaccess` that concern `/.well-known`. location = /.well-known/carddav { return 301 /remote.php/dav/; } location = /.well-known/caldav { return 301 /remote.php/dav/; } location /.well-known/acme-challenge { try_files $uri $uri/ =404; } location /.well-known/pki-validation { try_files $uri $uri/ =404; } # Let Nextcloud's API for `/.well-known` URIs handle all other # requests by passing them to the front-end controller. return 301 /index.php$request_uri; } location = /.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc{default_type text/plain;return 200 Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc.NNKegGrTjaJE9PQNiu3_qLEHAHKeoCV4AjixVDbTvsU;} # managed by Certbot } 2023-04-13 18:37:22,273:DEBUG:acme.client:JWS payload: b'{}' 2023-04-13 18:37:22,277:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/DTIJNg: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCMzdDTk1RTE85UlJDZ1JYZUlOUEhFWldkS1hkaFhhQVJFSlZhVS1Db1I0V2xsNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My82MTA3NTIzNTk0L0RUSUpOZyJ9", "signature": "BVmVjX2gmJXO2azH9CUX_4u7bcYud5l-KspoKYIiNtsblCU2LMn4jrY82biiZ5s9LTbF43bLBS5tUyMJqQU4aw-g9rZUGIoxIwMFrQFmTcV3jP0XZKENc4IhuzKxxXIZZTPMG0XfHr3QtM5sh-Q9gS7y9QNMxfdOADxfn3CPq2AHeeenlGISj_DGDzcBFwLce3iyRLZhjog7wO5mKS487ZWiQkzXm1dRtsPxtKVJ6Dw0eG4xJVrQLVVRu0U3SCis0NW3_XayhTJxRAZCdkLVaDiIycVsvWz3ozugq0RClHX2VmvqcXnAIWI-DgZrCzSNyz9SPWyYD5Ax02-WxgAOGg", "payload": "e30" } 2023-04-13 18:37:22,443:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/6107523594/DTIJNg HTTP/1.1" 200 193 2023-04-13 18:37:22,444:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 18:37:22 GMT Content-Type: application/json Content-Length: 193 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/DTIJNg Replay-Nonce: BEB98XmWos-dxAa3eEKNXKpHCLWyAGKo0GMGP9Vyw19Z5xM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/DTIJNg", "token": "Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc" } 2023-04-13 18:37:22,444:DEBUG:acme.client:Storing nonce: BEB98XmWos-dxAa3eEKNXKpHCLWyAGKo0GMGP9Vyw19Z5xM 2023-04-13 18:37:22,444:INFO:certbot._internal.auth_handler:Waiting for verification... 2023-04-13 18:37:23,446:DEBUG:acme.client:JWS payload: b'' 2023-04-13 18:37:23,448:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6107523594: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85Nzg1Mjk2NCIsICJub25jZSI6ICJCRUI5OFhtV29zLWR4QWEzZUVLTlhLcEhDTFd5QUdLbzBHTUdQOVZ5dzE5WjV4TSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My82MTA3NTIzNTk0In0", "signature": "GV6heYtA296mBYpevfiuSmtzTTubAYmjz1dkp3etLuMSHP05cnr7eNgXfcDjxVYtbmiHKR4Q9gUOH737uCswWaZ5iktgBEQuPjbwFpF_eFJJQYYN34p9-T_bjLR_cac4E6as8p3LxVlAmm-uiv_epODp5lGw0WmFKdzvMCOva7K5m1bBnSHuuuwkNZmpqPxm7JHRaNEDD9G-EaGDOcS84xXZZMAM-weGmnjaVOI9s8PzRslEP5a2xLiRDXeHGFJo-QGchIzSYlw_o01rhGo9eDJM5wZsXnh_JlXhzkiGSlySOA1PktGjKcVCduGZwklJ0Ly5KmGbgTrOZz0PUSnY5g", "payload": "" } 2023-04-13 18:37:23,618:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6107523594 HTTP/1.1" 200 1370 2023-04-13 18:37:23,618:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 13 Apr 2023 18:37:23 GMT Content-Type: application/json Content-Length: 1370 Connection: keep-alive Boulder-Requester: 97852964 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: BEB9r3y7Dd2v5TJxko81COaVYxCmiKcS08OAe0R-e1gTB_U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.eigenval.xyz" }, "status": "invalid", "expires": "2023-04-20T18:37:20Z", "challenges": [ { "type": "http-01", "status": "invalid", "error": { "type": "urn:ietf:params:acme:error:unauthorized", "detail": "94.130.148.89: Invalid response from https://cloud.eigenval.xyz/.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc: 404", "status": 403 }, "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6107523594/DTIJNg", "token": "Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc", "validationRecord": [ { "url": "http://cloud.eigenval.xyz/.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc", "hostname": "cloud.eigenval.xyz", "port": "80", "addressesResolved": [ "94.130.148.89" ], "addressUsed": "94.130.148.89" }, { "url": "https://cloud.eigenval.xyz/.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc", "hostname": "cloud.eigenval.xyz", "port": "443", "addressesResolved": [ "94.130.148.89" ], "addressUsed": "94.130.148.89" } ], "validated": "2023-04-13T18:37:22Z" } ] } 2023-04-13 18:37:23,619:DEBUG:acme.client:Storing nonce: BEB9r3y7Dd2v5TJxko81COaVYxCmiKcS08OAe0R-e1gTB_U 2023-04-13 18:37:23,619:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.eigenval.xyz 2023-04-13 18:37:23,619:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.eigenval.xyz 2023-04-13 18:37:23,619:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: nginx). The Certificate Authority reported these problems: Domain: cloud.eigenval.xyz Type: unauthorized Detail: 94.130.148.89: Invalid response from https://cloud.eigenval.xyz/.well-known/acme-challenge/Gf0qsn43aAPgTdYqpAbxk7fA3f0Dg1Pry7j6EWo46Kc: 404 Hint: The Certificate Authority failed to verify the temporary nginx configuration changes made by Certbot. Ensure the listed domains point to this nginx server and that it is accessible from the internet. 2023-04-13 18:37:23,620:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-04-13 18:37:23,620:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-04-13 18:37:23,620:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-04-13 18:37:24,804:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.eigenval.xyz with error: Some challenges have failed. 2023-04-13 18:37:24,807:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 475, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1386, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 122, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 335, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3.9/site-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3.9/site-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 90, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.9/site-packages/certbot/_internal/auth_handler.py", line 178, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2023-04-13 18:37:24,808:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-04-13 18:37:24,808:ERROR:certbot._internal.renewal:All simulated renewals failed. The following certificates could not be renewed: 2023-04-13 18:37:24,808:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cloud.eigenval.xyz/fullchain.pem (failure) 2023-04-13 18:37:24,809:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-04-13 18:37:24,809:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3.9/site-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3.9/site-packages/certbot/_internal/main.py", line 1460, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3.9/site-packages/certbot/_internal/renewal.py", line 500, in handle_renewal_request raise errors.Error("{0} renew failure(s), {1} parse failure(s)".format( certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2023-04-13 18:37:24,810:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)