Server IP : 213.176.29.180 / Your IP : 18.118.151.93 Web Server : Apache System : Linux 213.176.29.180.hostiran.name 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64 User : webtaragh ( 1001) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /home/../sys/../var/log/letsencrypt/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
2024-12-16 16:23:14,691:DEBUG:certbot._internal.main:certbot version: 1.22.0 2024-12-16 16:23:14,692:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2024-12-16 16:23:14,692:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew'] 2024-12-16 16:23:14,693:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-12-16 16:23:15,042:DEBUG:certbot._internal.log:Root logging level set at 30 2024-12-16 16:23:15,077:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/213.176.29.180.hostiran.name.conf 2024-12-16 16:23:15,130:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7fd255589cc0> and installer <certbot._internal.cli.cli_utils._Default object at 0x7fd255589cc0> 2024-12-16 16:23:15,378:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2024-12-16 16:23:16,010:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2024-12-16 16:23:16,013:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/213.176.29.180.hostiran.name/cert2.pem is signed by the certificate's issuer. 2024-12-16 16:23:16,024:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/213.176.29.180.hostiran.name/cert2.pem is: OCSPCertStatus.GOOD 2024-12-16 16:23:16,030:DEBUG:certbot._internal.display.obj:Notifying user: Certificate not yet due for renewal 2024-12-16 16:23:16,032:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-12-16 16:23:16,032:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cpanel-alma.centraldnserver.com.conf 2024-12-16 16:23:16,118:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-08 10:07:04 UTC. 2024-12-16 16:23:16,119:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2024-12-16 16:23:16,119:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-12-16 16:23:16,126:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Place files in webroot directory Interfaces: Authenticator, Plugin Entry point: webroot = certbot._internal.plugins.webroot:Authenticator Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7fd2555820b8> Prep: True 2024-12-16 16:23:16,128:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7fd2555820b8> and installer None 2024-12-16 16:23:16,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-12-16 16:23:16,215:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1300221086', new_authzr_uri=None, terms_of_service=None), 659870aca54881e8b8b346907964e6bf, Meta(creation_dt=datetime.datetime(2023, 9, 9, 11, 7, 3, tzinfo=<UTC>), creation_host='cpanel-alma.centraldnserver.com', register_to_eff=None))> 2024-12-16 16:23:16,217:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-12-16 16:23:16,219:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-12-16 16:23:17,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-12-16 16:23:17,038:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8hF16fEvzZc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-12-16 16:23:17,057:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cpanel-alma.centraldnserver.com 2024-12-16 16:23:17,451:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0233_key-certbot.pem 2024-12-16 16:23:17,488:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0233_csr-certbot.pem 2024-12-16 16:23:17,489:DEBUG:acme.client:Requesting fresh nonce 2024-12-16 16:23:17,489:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-12-16 16:23:17,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-12-16 16:23:17,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6YP6R00AVVED_BWtNuOiOD5MeJrgXHw0z3ywfmbzDcyk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-12-16 16:23:17,785:DEBUG:acme.client:Storing nonce: GJdccAF6YP6R00AVVED_BWtNuOiOD5MeJrgXHw0z3ywfmbzDcyk 2024-12-16 16:23:17,786:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cpanel-alma.centraldnserver.com"\n }\n ]\n}' 2024-12-16 16:23:17,791:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNllQNlIwMEFWVkVEX0JXdE51T2lPRDVNZUpyZ1hIdzB6M3l3Zm1iekRjeWsiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "BxuLtde3imjUzsSKnsYnrAoJl-V6Iio9RA2re58vdKsxGv93JDMtFdgkmfJzLPAeYmot_KCh8UPM_z-I7MkPBX6BsvcGLCwffWyzCeZODX6noHA-T8zB9mQcEMcppLmgffjr_iRaxglLMh2cEz94iNwZ5GG7ybNxFl20KMqhz98VV3q5IrYwRR1HFLnznYxYHRZWwJrFLntjms76dl_0UscmFugIig45EWz_zWDb2ZJ-ZZSrKev-8Xp2e9qW4Ioc8ZZXykZ148d58_5qx_rQBQ1B0uuifqSYjInmYwubv8oK5XPeazQR_VeRUk3Ri9AKZzR_veN06TxsOq7g_3isUw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNwYW5lbC1hbG1hLmNlbnRyYWxkbnNlcnZlci5jb20iCiAgICB9CiAgXQp9" } 2024-12-16 16:23:18,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 365 2024-12-16 16:23:18,155:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 16 Dec 2024 12:53:19 GMT Content-Type: application/json Content-Length: 365 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1300221086/333917828845 Replay-Nonce: GJdccAF6vLRHHAOJCgY2hve8-tir6NmjTo8MXsQL2PPvMdhpUis X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-12-23T12:53:18Z", "identifiers": [ { "type": "dns", "value": "cpanel-alma.centraldnserver.com" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1300221086/333917828845" } 2024-12-16 16:23:18,155:DEBUG:acme.client:Storing nonce: GJdccAF6vLRHHAOJCgY2hve8-tir6NmjTo8MXsQL2PPvMdhpUis 2024-12-16 16:23:18,156:DEBUG:acme.client:JWS payload: b'' 2024-12-16 16:23:18,159:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNnZMUkhIQU9KQ2dZMmh2ZTgtdGlyNk5talRvOE1Yc1FMMlBQdk1kaHBVaXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1In0", "signature": "Gk_ML8Simj2X0_NNISn58Mc-rW0lyAScAF9dn4azH_A-8cbCbXi7F8x1PfvHaXXn-upeHcWh5AU-Tc5xq599GGky3CrPFVolAoXg-odu_wm1boeik9HLtkdgAyKDw-xhVKbrDtaHrpt3FO3kRIYvrxkz91g4VBSbvW-05-pEycuGXKoO6Oyl__5sBEVMNftn0tkt_D5LHgdYq9JEDvz2oBSdRsjqMME7P5j56ILAessiHYfM_I7BBKS1qqoOFYuIWOU0gnQwm4T27GMWCGJAJpIY3aGE1AW9QJonmV3k1jMmOeV_CzfpA_lBgEnJ4s21h9Co8F2dfAv9H5717uj70A", "payload": "" } 2024-12-16 16:23:18,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/445754013795 HTTP/1.1" 200 839 2024-12-16 16:23:18,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:19 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: WVWTDxmJjXGBWI04Y2bP66NP6i2tllXufDCV56Nz_EJ-mrZsnkY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2024-12-23T12:53:18Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/lNDB9w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/1C239w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" } ] } 2024-12-16 16:23:18,446:DEBUG:acme.client:Storing nonce: WVWTDxmJjXGBWI04Y2bP66NP6i2tllXufDCV56Nz_EJ-mrZsnkY 2024-12-16 16:23:18,447:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-12-16 16:23:18,447:INFO:certbot._internal.auth_handler:http-01 challenge for cpanel-alma.centraldnserver.com 2024-12-16 16:23:18,447:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains. 2024-12-16 16:23:18,448:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge 2024-12-16 16:23:18,451:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw 2024-12-16 16:23:18,452:DEBUG:acme.client:JWS payload: b'{}' 2024-12-16 16:23:18,454:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJXVldURHhtSmpYR0JXSTA0WTJiUDY2TlA2aTJ0bGxYdWZEQ1Y1Nk56X0VKLW1yWnNua1kiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1L2lldHJ1QSJ9", "signature": "OSo3xmqxAQj-e8eWGnthViDFRhRVxUwVlQ04CcLTMG_TViP8LJpr782iURPcAGn04dRviR7BYEX7NhHpyQea2TXiiRQ76CZlaGG8lIS32I-OGusi69HAWPNYYYUMogs7s6ROcui8wBpkii8Pqg3a0tA-LAdH2kHi_2dS-_84UAz_cgjK47ifsKn_uli91hNKDl2hcL1_pfs7b959W1y6JIRCFWKyMLcrDx1c3Qdvi7R4mMLUOsE1f_lqD517MSHgYnDN42TilvqcN6HcD3aQnoZoiFtQ9IwaRIRxUUW7GUlGZg4_MB5gEhwDz7IoattiEAfajmYPksyHmEqh6IZn2w", "payload": "e30" } 2024-12-16 16:23:18,693:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/1300221086/445754013795/ietruA HTTP/1.1" 200 195 2024-12-16 16:23:18,694:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:19 GMT Content-Type: application/json Content-Length: 195 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795>;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA Replay-Nonce: GJdccAF6puNz5b-yqQCvc7OMnFpciV3D8iTpZVi1axsj_u_JGvE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" } 2024-12-16 16:23:18,694:DEBUG:acme.client:Storing nonce: GJdccAF6puNz5b-yqQCvc7OMnFpciV3D8iTpZVi1axsj_u_JGvE 2024-12-16 16:23:18,694:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-12-16 16:23:19,696:DEBUG:acme.client:JWS payload: b'' 2024-12-16 16:23:19,699:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNnB1Tno1Yi15cVFDdmM3T01uRnBjaVYzRDhpVHBaVmkxYXhzal91X0pHdkUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1In0", "signature": "BOU5tXpqyiw1DlDdBWYJlY0nudIZUcT8pSnKM4vom595-j3A3hxlIxRCPWd0uZbJBZZIj6LxqAT4li-rfLjgGAkQhOiQ1JciOwAq11qDRwfrYVCSBznJaKbpA47ukT7AEZZd1lsG4gUZudI7SCCvjj2AbWCtvdIYfgXqfN-IRrcrFXBH06NYx-gfGSBbrqaxQ8Yaqqz7-fijYbP6yOQP6UD2k7urT6kx8yBM72q7oUk-WoJMXNE1Ab0scxjaCNS_5g9dhOnCghfIWZZEOD5RCMZBwLinH1TQaJx5LnY4EKY4ddIqccthroC3TfXktlMPsLAcAJ_VDGZ06CGn4OW8cw", "payload": "" } 2024-12-16 16:23:20,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/445754013795 HTTP/1.1" 200 839 2024-12-16 16:23:20,064:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:20 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6k1EQEl5lNPO_T0YtKV3SUoZorzL2ZDj6JsI8GOvWoiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2024-12-23T12:53:18Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/lNDB9w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/1C239w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" } ] } 2024-12-16 16:23:20,064:DEBUG:acme.client:Storing nonce: GJdccAF6k1EQEl5lNPO_T0YtKV3SUoZorzL2ZDj6JsI8GOvWoiA 2024-12-16 16:23:23,073:DEBUG:acme.client:JWS payload: b'' 2024-12-16 16:23:23,075:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNmsxRVFFbDVsTlBPX1QwWXRLVjNTVW9ab3J6TDJaRGo2SnNJOEdPdldvaUEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1In0", "signature": "g5NSm5VtdmpiQR5k_eAaWE-A6lf4llROZ9oXs2_GWKXjIv2FryVlj_iMKR-1yvD-Jp5emUE814lQThlmsl9iTWozjvz3NXkb2N8073RtwH_vUsvJVvMOUb9eTjUSE16n2TTBNGBgxzMfu9Z_cpfL9SLZqLKmbaWSmJOzTSmJQwNZvTtwKm4t8Zap9eNhijcTl-F6CfV6w7WMhG_c2HvfffjdMpLdpo6ZV7Um0DCfiFKEdQwnXUvHNiI1xGAd7zet5fmLqBQOT0n0tGrybzTo0J3Cu0mANqs4jhm-fnE8E5WY73yc_JID0Jm66-w-eDPA1vm2CwBcjraZvr396sbLjw", "payload": "" } 2024-12-16 16:23:23,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/445754013795 HTTP/1.1" 200 839 2024-12-16 16:23:23,403:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:24 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6-rmwYEX5xsNIQmkrCODmLJQSN5fPVnO8qFAASNIX7jw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2024-12-23T12:53:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/1C239w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/lNDB9w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" } ] } 2024-12-16 16:23:23,403:DEBUG:acme.client:Storing nonce: GJdccAF6-rmwYEX5xsNIQmkrCODmLJQSN5fPVnO8qFAASNIX7jw 2024-12-16 16:23:26,559:DEBUG:acme.client:JWS payload: b'' 2024-12-16 16:23:26,562:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNi1ybXdZRVg1eHNOSVFta3JDT0RtTEpRU041ZlBWbk84cUZBQVNOSVg3anciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1In0", "signature": "MgJH0srS60s3tY_lgnscJdeV5vPptPayxZCUHkMricdPCjfPh0zHRsdjYJnYMw77vG85Q2U143A-eFJE8MYfEmzcRA9KiInbKAo4W3yRC0e50u_nixz2mo-Sl-Nc06BPZRwrCALM4U7OoHQdrlnFA3dKlr_Y-KD7zpnNRCLZgaR_3sKw52AGX07zW885xmpMg6RDFQ1Sdmjj-pXExP4JaFfPwTW2yQMmyHxCCty_4vujco0mA_gxBwXNzLAgb7U7B2BtiOOQhhKdMM0xvoJe5cVgft9dbkZTHlq84FA6vYf7V1uur39Z2kNkI2b87YfJgU1alBv1epzRNw2istT9EA", "payload": "" } 2024-12-16 16:23:26,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/445754013795 HTTP/1.1" 200 839 2024-12-16 16:23:26,874:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:27 GMT Content-Type: application/json Content-Length: 839 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF6URZrGnD1MToQrQoDt7rQwWqAfqqDSEm6AqJCUbBr-Pc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "pending", "expires": "2024-12-23T12:53:18Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/lNDB9w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/1C239w", "status": "pending", "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw" } ] } 2024-12-16 16:23:26,874:DEBUG:acme.client:Storing nonce: GJdccAF6URZrGnD1MToQrQoDt7rQwWqAfqqDSEm6AqJCUbBr-Pc 2024-12-16 16:23:29,887:DEBUG:acme.client:JWS payload: b'' 2024-12-16 16:23:29,890:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/1300221086/445754013795: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTMwMDIyMTA4NiIsICJub25jZSI6ICJHSmRjY0FGNlVSWnJHbkQxTVRvUXJRb0R0N3JRd1dxQWZxcURTRW02QXFKQ1ViQnItUGMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LzEzMDAyMjEwODYvNDQ1NzU0MDEzNzk1In0", "signature": "i3QAYJXIRjZXXniP21USUJf5S256JUC0MulC-oCyHQ8wnzJSnwixlh-9GZspZfdNpOuT-2RAnt82D8RIigDlCZkeWjH_uEc2Gqe1s9Xw48dOiUNAIzwf4EC-8cFh4Oqwq4Dc8lsTqRaT9iS6QOzImqbNOXw1eNA4UeL0sfrw_GYLE0fJIjmkydO1qfgo5p3k7n8bIxCakAvPWNF4nCcLl8_ky1tvU4yZiD4tk8B8HbLxcHlwKUR9akMAPCcd_OxE55guIgo9HzYUZFi53S6SF94rskWOsaT_flfBrJrneEF6b3KdiBwAfBzzCJt5gmSgS4cEHOEUwlUM-wOCrDw7og", "payload": "" } 2024-12-16 16:23:30,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/1300221086/445754013795 HTTP/1.1" 200 1124 2024-12-16 16:23:30,121:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 16 Dec 2024 12:53:30 GMT Content-Type: application/json Content-Length: 1124 Connection: keep-alive Boulder-Requester: 1300221086 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: GJdccAF64O3xFq1Wx-M7JBwbhjnY_oieil45z_sD8Vt0E4HLq_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cpanel-alma.centraldnserver.com" }, "status": "invalid", "expires": "2024-12-23T12:53:18Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/1300221086/445754013795/ietruA", "status": "invalid", "validated": "2024-12-16T12:53:19Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "95.81.93.42: Fetching http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw: Timeout during connect (likely firewall problem)", "status": 400 }, "token": "nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw", "validationRecord": [ { "url": "http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw", "hostname": "cpanel-alma.centraldnserver.com", "port": "80", "addressesResolved": [ "95.81.93.42" ], "addressUsed": "95.81.93.42" } ] } ] } 2024-12-16 16:23:30,121:DEBUG:acme.client:Storing nonce: GJdccAF64O3xFq1Wx-M7JBwbhjnY_oieil45z_sD8Vt0E4HLq_I 2024-12-16 16:23:30,122:INFO:certbot._internal.auth_handler:Challenge failed for domain cpanel-alma.centraldnserver.com 2024-12-16 16:23:30,122:INFO:certbot._internal.auth_handler:http-01 challenge for cpanel-alma.centraldnserver.com 2024-12-16 16:23:30,122:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: cpanel-alma.centraldnserver.com Type: connection Detail: 95.81.93.42: Fetching http://cpanel-alma.centraldnserver.com/.well-known/acme-challenge/nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw: Timeout during connect (likely firewall problem) Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-12-16 16:23:30,124:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-12-16 16:23:30,125:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-12-16 16:23:30,125:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-12-16 16:23:30,125:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/nwp9M9L54DFBuZqcv6Cw_K2r16UGt7lohYU5IO87VGw 2024-12-16 16:23:30,126:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-12-16 16:23:30,127:ERROR:certbot._internal.renewal:Failed to renew certificate cpanel-alma.centraldnserver.com with error: Some challenges have failed. 2024-12-16 16:23:30,133:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-12-16 16:23:30,136:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2024-12-16 16:23:30,137:DEBUG:certbot._internal.display.obj:Notifying user: The following certificates are not due for renewal yet: 2024-12-16 16:23:30,137:DEBUG:certbot._internal.display.obj:Notifying user: /etc/letsencrypt/live/213.176.29.180.hostiran.name/fullchain.pem expires on 2025-01-19 (skipped) 2024-12-16 16:23:30,137:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed: 2024-12-16 16:23:30,137:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cpanel-alma.centraldnserver.com/fullchain.pem (failure) 2024-12-16 16:23:30,137:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2024-12-16 16:23:30,138:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in <module> load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')() File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main return internal_main.main(cli_args) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main return config.func(config, plugins) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2024-12-16 16:23:30,140:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)