Server IP : 213.176.29.180 / Your IP : 3.133.114.90 Web Server : Apache System : Linux 213.176.29.180.hostiran.name 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64 User : webtaragh ( 1001) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /home/../sys/../var/log/letsencrypt/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
2025-01-03 13:23:30,309:DEBUG:certbot._internal.main:certbot version: 1.22.0 2025-01-03 13:23:30,310:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2025-01-03 13:23:30,310:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew'] 2025-01-03 13:23:30,310:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-03 13:23:30,369:DEBUG:certbot._internal.log:Root logging level set at 30 2025-01-03 13:23:30,372:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/213.176.29.180.hostiran.name.conf 2025-01-03 13:23:30,426:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7f4c8ca00cc0> and installer <certbot._internal.cli.cli_utils._Default object at 0x7f4c8ca00cc0> 2025-01-03 13:23:30,478:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-03 13:23:30,783:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-03 13:23:30,785:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/213.176.29.180.hostiran.name/cert3.pem is signed by the certificate's issuer. 2025-01-03 13:23:30,799:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/213.176.29.180.hostiran.name/cert3.pem is: OCSPCertStatus.GOOD 2025-01-03 13:23:30,802:DEBUG:certbot._internal.display.obj:Notifying user: Certificate not yet due for renewal 2025-01-03 13:23:30,803:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2025-01-03 13:23:30,803:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cpanel-alma.centraldnserver.com.conf 2025-01-03 13:23:30,887:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-08 10:07:04 UTC. 2025-01-03 13:23:30,887:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2025-01-03 13:23:30,887:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2025-01-03 13:23:30,890:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Place files in webroot directory Interfaces: Authenticator, Plugin Entry point: webroot = certbot._internal.plugins.webroot:Authenticator Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7f4c8c9f90b8> Prep: True 2025-01-03 13:23:30,891:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7f4c8c9f90b8> and installer None 2025-01-03 13:23:30,891:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2025-01-03 13:23:30,961:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1300221086', new_authzr_uri=None, terms_of_service=None), 659870aca54881e8b8b346907964e6bf, Meta(creation_dt=datetime.datetime(2023, 9, 9, 11, 7, 3, tzinfo=<UTC>), creation_host='cpanel-alma.centraldnserver.com', register_to_eff=None))> 2025-01-03 13:23:30,963:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-03 13:23:30,964:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-03 13:23:31,869:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2025-01-03 13:23:31,869:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hJDhhCBoQd4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-03 13:23:31,872:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cpanel-alma.centraldnserver.com 2025-01-03 13:23:32,211:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0268_key-certbot.pem 2025-01-03 13:23:32,260:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0268_csr-certbot.pem 2025-01-03 13:23:32,272:DEBUG:acme.client:Requesting fresh nonce 2025-01-03 13:23:32,272:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-03 13:23:32,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-03 13:23:32,638:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF68mK8vvD7SeEwRMhcVOvLOTalCzwlw8vxtAk1rhjvH1M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-03 13:23:32,638:DEBUG:acme.client:Storing nonce: GJdccAF68mK8vvD7SeEwRMhcVOvLOTalCzwlw8vxtAk1rhjvH1M 2025-01-03 13:23:32,639:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cpanel-alma.centraldnserver.com"\n }\n ]\n}' 2025-01-03 13:23:32,641:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNjhtSzh2dkQ3U2VFd1JNaGNWT3ZMT1RhbEN6d2x3OHZ4dEFrMXJoanZIMU0iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "r418vEmgxDwi2Ce60hhYGlSwmpi9i2edZT3GSeWgSh7LglKJdQtJoWn_ruvyXzWhCceyVgWS84XJaMQzIfL4DTIodFmT2WEv96vglbCrtacpQSyI3V0RfYW6Hz4aGEY30QB9JZ8yiqof94OC-NgfYSM4mi0M6Tq1qaREciPylXZNYpjOHIbtJRQaV3M80l7mqYOrIZuRSzE9KKBq51hWKOAA-kniQhCp458w7TG7ThSCG41NBVnLIg--_tri_L4VDOOsVarmOj6U2Kj-jsdkwop5tFBwKkIuCDnDoYurn4V8N5iiB-t9OLVIGUzkI_MF1-Bm4zYWZPexk7m1UgOAPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNwYW5lbC1hbG1hLmNlbnRyYWxkbnNlcnZlci5jb20iCiAgICB9CiAgXQp9" } 2025-01-03 13:23:32,996:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 365 2025-01-03 13:23:32,997:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 03 Jan 2025 09:53:32 GMT Content-Type: application/json Content-Length: 365 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1300221086/340282339065 Replay-Nonce: WVWTDxmJLv8USlU36o6Dam-Vj-WOhL08vFrb6l9qVF6I1nsloXs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-10T09:53:32Z", "identifiers": [ { "type": "dns", "value": "cpanel-alma.centraldnserver.com" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1300221086/340282339065" } 2025-01-03 13:23:32,998:DEBUG:acme.client:Storing nonce: WVWTDxmJLv8USlU36o6Dam-Vj-WOhL08vFrb6l9qVF6I1nsloXs 2025-01-03 13:23:32,998:DEBUG:acme.client:JWS payload: b'' 2025-01-03 13:23:33,000:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJXVldURHhtSkx2OFVTbFUzNm82RGFtLVZqLVdPaEwwOHZGcmI2bDlxVkY2STFuc2xvWHMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1In0", "signature": "U9ls9Op_mQ6Rp5-TzERz088ezeZpzaQuuT6YoRN4EZzQk0qxJcM-fiKFGJj-iJBuyy2DzrNTYqMgWxx72VXQ0yhKraj7Vbq2gv7UH2Hc9LVMSJ_WHyTMbdVXWd0fn1MGyK-zMuSjuT4Z_2RT3tISJZwBIcq2uSXkXXmzE5qCp_pGNaNf4Df9OQRp7T7aFFrWFzZN0TPGjnrE58orkHHuCQGP4Uv_8SBeFIvimaYps6amh02kG7vP7EnNcAe5uCrO3mHX1kUV1rNp-L0qfwvtfwe4ieY8qhYZqxg00Uif6Ar0f11rASC0Q1yjYQVfJhK98fsSn1zU7Uq5DDVnzsXmvA", "payload": "" } 2025-01-03 13:23:33,210:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/454859815875 HTTP/1.1" 200 839 2025-01-03 13:23:33,211:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:33 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF63ReYsEZHENr2WQiVTvmsHrMMxKK057TSzvwFrL3O0TY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2025-01-10T09:53:32Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U0A6Dg", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/w3hLcQ", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" } ] } 2025-01-03 13:23:33,211:DEBUG:acme.client:Storing nonce: GJdccAF63ReYsEZHENr2WQiVTvmsHrMMxKK057TSzvwFrL3O0TY 2025-01-03 13:23:33,212:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-03 13:23:33,212:INFO:certbot._internal.auth_handler:http-01 challenge for cpanel-alma.centraldnserver.com 2025-01-03 13:23:33,213:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains. 2025-01-03 13:23:33,213:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge 2025-01-03 13:23:33,226:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw 2025-01-03 13:23:33,227:DEBUG:acme.client:JWS payload: b'{}' 2025-01-03 13:23:33,229:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNjNSZVlzRVpIRU5yMldRaVZUdm1zSHJNTXhLSzA1N1RTenZ3RnJMM08wVFkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1L1U4UFJtQSJ9", "signature": "fJLSM0Y_CEw0YRVU4VDYFMiLgX3Ut6QbdjPSTqm6vKlU16-2YXawKzviJASRJWTbdydMF-6FXpDp3BHuiDWlbNlJckb5yVdB_x0D5uPvRMzusO-5rix1FwSKeZDpIwBxWk8IqHVM0IpgPNyRb5uudSkngKmn97z_v4bdXSk77l9s0pd04bxlyVeJVlqdyjESFm_wo4A0zoTZZU4YBOU8FM-8dVQPVRb2loHuUjBd3cJm3g7zyH4E-3fUfjOlapsprwRjydcjPnz-gkFi33oDtoJNan3y8cDJhA55GdA11G1zAdIM41Xa9PGpS1n6LROZIW6DPrr9dkDdQ1dfQ8Bp2Q", "payload": "e30" } 2025-01-03 13:23:33,455:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/1300221086/454859815875/U8PRmA HTTP/1.1" 200 195 2025-01-03 13:23:33,456:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:33 GMT Content-Type: application/json Content-Length: 195 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875>;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA Replay-Nonce: GJdccAF657MWYOWYMFic4tcUzEr21AF7huJfGA0npzgtJdv3XOw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" } 2025-01-03 13:23:33,456:DEBUG:acme.client:Storing nonce: GJdccAF657MWYOWYMFic4tcUzEr21AF7huJfGA0npzgtJdv3XOw 2025-01-03 13:23:33,456:INFO:certbot._internal.auth_handler:Waiting for verification... 2025-01-03 13:23:34,457:DEBUG:acme.client:JWS payload: b'' 2025-01-03 13:23:34,460:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNjU3TVdZT1dZTUZpYzR0Y1V6RXIyMUFGN2h1SmZHQTBucHpndEpkdjNYT3ciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1In0", "signature": "E36uk_aSiJkJ4EBphGnktxOrenAsTPQ_80WznjWymigZrbfv9-metHfzgzMNMVcXsPEoZC5HdY69pYlQs_--SCAb8XwXmzHP8LhIW4OF5U2b9dRhoaXOSDEjl9-vGlSogkB0jGmQAasNlHTmZATyvnrpJjFqTi1oGPp-mu4mD30U09RPqZNyenTF0xPZ9aD0ye9PQ8hd3jf5vkCOncSFEPxZwk4VUA9s50zxqpWRuckGxXCvcA8asuV0YDGaqkNj-aNL913HPDegi-hjKgOt4TqY5lsJbWeD4p5lMmolqIjfkDcr7QTiubBxmrx_iCQVG4_kXB5cs5_zzsvq_-GwGg", "payload": "" } 2025-01-03 13:23:34,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/454859815875 HTTP/1.1" 200 839 2025-01-03 13:23:34,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:34 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: WVWTDxmJAob96IbFNkDanvROHWh0_DeP60tKT-naJjXJXxeRDvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2025-01-10T09:53:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/w3hLcQ", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U0A6Dg", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" } ] } 2025-01-03 13:23:34,670:DEBUG:acme.client:Storing nonce: WVWTDxmJAob96IbFNkDanvROHWh0_DeP60tKT-naJjXJXxeRDvQ 2025-01-03 13:23:37,674:DEBUG:acme.client:JWS payload: b'' 2025-01-03 13:23:37,676:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJXVldURHhtSkFvYjk2SWJGTmtEYW52Uk9IV2gwX0RlUDYwdEtULW5hSmpYSlh4ZVJEdlEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1In0", "signature": "L9brxpAlkzNf0SvLNdNsTIYI7YBlCL_2qX7zqxON8PUIl58Kiv76aF_3jw7B18jvWjBzCNgClT0cb4XfcGR_swP0wTAuxn00eyFtTjxNrRS5MBR2y17mCR4wTMSjtBcbYI_pLUlQZZ_Mqjfv7vXCa8J06XQ2k16rKrlWJKPkWPuKoxF9nrerMU35OI5uhGx3Oa-qfmL2m-7AJZrvz0Eww2F_-4Qym2dPM-5d1jV_tmd-SVG-8XcmmmcaCPQGGVhMDDXeV8-xaLwhXDlhJJGSrBuEg2dOHSSfkVw60PTTeCkjf0DRva0RWOf4l6e31d_IAG8R14BbT2PmpEU8eJKEuw", "payload": "" } 2025-01-03 13:23:37,890:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/454859815875 HTTP/1.1" 200 839 2025-01-03 13:23:37,891:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:37 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6hhtJ1eUnlHiiTf85VhThuYzfPhnS9ygT1e-BC8Sd7pA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2025-01-10T09:53:32Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U0A6Dg", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/w3hLcQ", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" } ] } 2025-01-03 13:23:37,891:DEBUG:acme.client:Storing nonce: GJdccAF6hhtJ1eUnlHiiTf85VhThuYzfPhnS9ygT1e-BC8Sd7pA 2025-01-03 13:23:40,895:DEBUG:acme.client:JWS payload: b'' 2025-01-03 13:23:40,897:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNmhodEoxZVVubEhpaVRmODVWaFRodVl6ZlBoblM5eWdUMWUtQkM4U2Q3cEEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1In0", "signature": "q3EyE97Z5c5pT8yQSHmDxaYvO6iZ54ZfwIRtWg2zyES_rREPoxPit02nCstM1pCXctyqwrpdmUt7sZvzVx4EPE8Gk2mcG6riTWZRnD6dyfE8zre_MWZlGNzInm8EP-B7Ef9n6SucFGBgZQl1Tfl9kuotMYOSkD-bxa8U2hp-9194gDq9uaX3k4wQrZkkr6lf8r5H26-i5RT8ELemP_XQdKquRrWM1pyGn0SulpiGS2n8ZvA2zgsxRBKae2LTtZ39G5dQ8pZ91c-KIzw8PNXnD7ShLFlAUL67s7qvstJGJB0Yze3uZHUpaR3QIllfVVK8nwJnMsTo0zS1yFQV4HMyug", "payload": "" } 2025-01-03 13:23:41,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/454859815875 HTTP/1.1" 200 839 2025-01-03 13:23:41,110:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:41 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: WVWTDxmJvoSv3SzIRiY9-Xyq1VoMOG0bTT83v75t9QeT2QInCPI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2025-01-10T09:53:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/w3hLcQ", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U0A6Dg", "status": "pending", "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw" } ] } 2025-01-03 13:23:41,110:DEBUG:acme.client:Storing nonce: WVWTDxmJvoSv3SzIRiY9-Xyq1VoMOG0bTT83v75t9QeT2QInCPI 2025-01-03 13:23:44,113:DEBUG:acme.client:JWS payload: b'' 2025-01-03 13:23:44,115:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/454859815875: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJXVldURHhtSnZvU3YzU3pJUmlZOS1YeXExVm9NT0cwYlRUODN2NzV0OVFlVDJRSW5DUEkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDU0ODU5ODE1ODc1In0", "signature": "BB8YNhMVQB6ZDsY_Ya04PBQGrSUX-IyqPPhP2wFhjt2Ar5nL-qWWiQFMd0nH3hxdoDm7Rx8H28ziG0ke4dJkn9mi-ru82yiUZ2wCOYb4kSWuv6QnimOUVvvy9kAvR1hi5zDezeY5O7Ez_rOYUaN-ARv9f6QiAV4HYs7JCZZ9eR3JQP2fvxcS6psAItvFx_frdElJBS72zclRIDDgN1v5EPMkejdkDllXcT-5WstwRRft9DJYcT1-UTl5Jv7OdnC751Fet1s-t_qM9SEMRE7iuXoduil_PzVxtXnU3_oPO7V4rPQjdIcyJuNHF0YDKpcmBGdbEflsD1ql3QuGM6TpxQ", "payload": "" } 2025-01-03 13:23:44,327:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/454859815875 HTTP/1.1" 200 1124 2025-01-03 13:23:44,327:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 03 Jan 2025 09:53:44 GMT Content-Type: application/json Content-Length: 1124 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6tE347oGCbe44HYJyEPE1omw5oxoAsS_6cAVe6Xy_WM4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "invalid", "expires": "2025-01-10T09:53:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/454859815875/U8PRmA", "status": "invalid", "validated": "2025-01-03T09:53:33Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "95.81.93.42: Fetching http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw: Timeout during connect (likely firewall problem)", "status": 400 }, "token": "WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw", "validationRecord": [ { "url": "http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw", "hostname": "cpanel-alma.centraldnserver.com", "port": "80", "addressesResolved": [ "95.81.93.42" ], "addressUsed": "95.81.93.42" } ] } ] } 2025-01-03 13:23:44,328:DEBUG:acme.client:Storing nonce: GJdccAF6tE347oGCbe44HYJyEPE1omw5oxoAsS_6cAVe6Xy_WM4 2025-01-03 13:23:44,328:INFO:certbot._internal.auth_handler:Challenge failed for domain cpanel-alma.centraldnserver.com 2025-01-03 13:23:44,328:INFO:certbot._internal.auth_handler:http-01 challenge for cpanel-alma.centraldnserver.com 2025-01-03 13:23:44,328:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: cpanel-alma.centraldnserver.com Type: connection Detail: 95.81.93.42: Fetching http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw: Timeout during connect (likely firewall problem) Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2025-01-03 13:23:44,330:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2025-01-03 13:23:44,330:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-03 13:23:44,331:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-03 13:23:44,331:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/WXAGUYK5Pw-991qQj_VcT-stw9b9z2hG_5rc3VycsQw 2025-01-03 13:23:44,331:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2025-01-03 13:23:44,332:ERROR:certbot._internal.renewal:Failed to renew certificate cpanel-alma.centraldnserver.com with error: Some challenges have failed. 2025-01-03 13:23:44,337:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2025-01-03 13:23:44,339:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2025-01-03 13:23:44,339:DEBUG:certbot._internal.display.obj:Notifying user: The following certificates are not due for renewal yet: 2025-01-03 13:23:44,339:DEBUG:certbot._internal.display.obj:Notifying user: /etc/letsencrypt/live/213.176.29.180.hostiran.name/fullchain.pem expires on 2025-03-21 (skipped) 2025-01-03 13:23:44,339:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed: 2025-01-03 13:23:44,339:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cpanel-alma.centraldnserver.com/fullchain.pem (failure) 2025-01-03 13:23:44,340:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2025-01-03 13:23:44,340:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in <module> load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')() File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main return internal_main.main(cli_args) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main return config.func(config, plugins) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2025-01-03 13:23:44,341:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)