2024-11-18 16:15:42,853:DEBUG:certbot._internal.main:certbot version: 3.0.1 2024-11-18 16:15:42,853:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-18 16:15:42,853:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '-d', 'scraping.slassurances.fr', '-d', 'comparateur.slc-assurances.fr', '--non-interactive', '--force-renewal'] 2024-11-18 16:15:42,854:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-18 16:15:42,872:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-18 16:15:42,872:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-18 16:15:42,872:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A separate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-18 16:15:42,874:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-18 16:15:42,874:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-18 16:15:42,937:DEBUG:certbot._internal.main:Picked account: ), creation_host='d75572c010e1', register_to_eff=None))> 2024-11-18 16:15:42,938:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-18 16:15:42,940:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-18 16:15:47,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-18 16:15:47,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:47 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VQ2vZM5qYw8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-18 16:15:47,343:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for scraping.slassurances.fr and comparateur.slc-assurances.fr 2024-11-18 16:15:47,370:DEBUG:acme.client:Requesting fresh nonce 2024-11-18 16:15:47,370:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-18 16:15:47,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-18 16:15:47,507:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr705C-nKPZR8RaLXsnVZgRz6Ss2phvhHEMXasW2AX75k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-18 16:15:47,508:DEBUG:acme.client:Storing nonce: JNlwFRqr705C-nKPZR8RaLXsnVZgRz6Ss2phvhHEMXasW2AX75k 2024-11-18 16:15:47,508:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n },\n {\n "type": "dns",\n "value": "comparateur.slc-assurances.fr"\n }\n ]\n}' 2024-11-18 16:15:47,515:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcjcwNUMtbktQWlI4UmFMWHNuVlpnUno2U3MycGh2aEhFTVhhc1cyQVg3NWsiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "XlqmdfiYRg7MWKLDymWVsXtNDl4VfjXZe6twpGNf7w5RhQHOLuVlC_lj47rE2Hvh6HX2-k5OWXQDaNGN6pxsEBzOwg3cBspGWKggyAZIaaV7k79ztiZl9UtjUgyeeScr6GcoTeRwhyDjDXzn7IZ9sVUuLqCdYQ2vtTMSw-VwcYDn-Witn8TvnojUMCR4ExxeWc4fwgdmnhuZGuUTkvWDzusc72Lo1-iLQj8ge4s7oXdX9KeFwUjQO6D_U8DOjQxlZ1zy1tWUTnK3DWhQ0_DwjSn2D3lhrbz0D-C5lru2lJ-Lfwj75Xu6Eq-AYu8XvfXyrJmje8MFBu2rR_Q-3S2Cww", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0sCiAgICB7CiAgICAgICJ0eXBlIjogImRucyIsCiAgICAgICJ2YWx1ZSI6ICJjb21wYXJhdGV1ci5zbGMtYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-18 16:15:47,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 502 2024-11-18 16:15:47,935:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 18 Nov 2024 16:15:47 GMT Content-Type: application/json Content-Length: 502 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1673405107/324382928207 Replay-Nonce: JNlwFRqrthe4zDIrxKP9EeFU23MeVx2osj2NTI-MRYhJKf96HaQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-25T16:15:47Z", "identifiers": [ { "type": "dns", "value": "comparateur.slc-assurances.fr" }, { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/431994680887" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1673405107/324382928207" } 2024-11-18 16:15:47,935:DEBUG:acme.client:Storing nonce: JNlwFRqrthe4zDIrxKP9EeFU23MeVx2osj2NTI-MRYhJKf96HaQ 2024-11-18 16:15:47,936:DEBUG:acme.client:JWS payload: b'' 2024-11-18 16:15:47,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcnRoZTR6RElyeEtQOUVlRlUyM01lVngyb3NqMk5USS1NUlloSktmOTZIYVEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDM0NyJ9", "signature": "GiO1h2_l-YFuVkjQQEmTjIxsQed1l37XCqOQ_Sw5lQjSSTr4kK6147IkY5p96iud1it0wqmWQHr4byDulwte60m3wE1S1vSHtG5gSf2fPigcnBafmyZ4tSwDc7kfVn_qCdj6F8CITt3csbsF1WWS0nawAMJ07VyivSUHiB64G3mdfpK6ahuoGK7Vs9IaSGH2ZK8z8RCsk1YuricmGc_AB2sbQAuIKty6uLk7C6pqZPE-xdR0ItwYvY2lQfjcZe0JfliAT9Y7E6QEo9GT3J1fH66X0f9-skZ07fI1ZCVgbXzBAyA7sMmTS-h3AGZX-nyVyFs4an1BQbxV7cj4OelG7g", "payload": "" } 2024-11-18 16:15:48,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970347 HTTP/1.1" 200 787 2024-11-18 16:15:48,097:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:48 GMT Content-Type: application/json Content-Length: 787 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgX4UtH4HVtgh_pOcg1Q4QmEvkEg7jwAy2lKELxTcv42Xs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "valid", "expires": "2024-12-18T15:15:17Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "valid", "validated": "2024-11-18T15:15:15Z", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-18 16:15:48,097:DEBUG:acme.client:Storing nonce: usf-jMgX4UtH4HVtgh_pOcg1Q4QmEvkEg7jwAy2lKELxTcv42Xs 2024-11-18 16:15:48,098:DEBUG:acme.client:JWS payload: b'' 2024-11-18 16:15:48,102:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431994680887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWDRVdEg0SFZ0Z2hfcE9jZzFRNFFtRXZrRWc3andBeTJsS0VMeFRjdjQyWHMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk5NDY4MDg4NyJ9", "signature": "U7pap6j6j7d_POr0eAO3Jsyr9x3_8a9VWf-FHL3hVPlWni_hUnncEI42PNKSFH0ETzvbkAvJsvcN9gqjo9I6ndUlhEBCdPw0ZFlfGI7_ZLVHTNWuPbj9CbH3NLQuHBdTIM1srORh-RylrgZkQG4gU4n87lNZFs-y4zK4n2eJti4eOPr8vSoCM7E-Tx7bibvrWTq0D9kAGnmLpnZGIUXc8fsbHCfmo333S6t0byHC00GaPAKtmdjtNkCjQnZPFKWWAnyssPg87WR1-WFfnv9nB1GFP2sO_Tk9yarK2lg-KAjJReM260pZ53J8SfEmBLwfJn1UsxHctVyMdch_4KFRGw", "payload": "" } 2024-11-18 16:15:48,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431994680887 HTTP/1.1" 200 813 2024-11-18 16:15:48,259:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:48 GMT Content-Type: application/json Content-Length: 813 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrgfsrsLLJDQqSaaH5UIvpvUqEAsUNgF5UmOS7e8F1gg4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "comparateur.slc-assurances.fr" }, "status": "pending", "expires": "2024-11-25T16:15:47Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/cLJtHw", "status": "pending", "token": "PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/XFWC7A", "status": "pending", "token": "PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/BpVQbQ", "status": "pending", "token": "PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8" } ] } 2024-11-18 16:15:48,260:DEBUG:acme.client:Storing nonce: JNlwFRqrgfsrsLLJDQqSaaH5UIvpvUqEAsUNgF5UmOS7e8F1gg4 2024-11-18 16:15:48,260:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-18 16:15:48,261:INFO:certbot._internal.auth_handler:http-01 challenge for comparateur.slc-assurances.fr 2024-11-18 16:15:48,261:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-18 16:15:48,261:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-18 16:15:48,263:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8 2024-11-18 16:15:48,264:DEBUG:acme.client:JWS payload: b'{}' 2024-11-18 16:15:48,267:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/cLJtHw: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcmdmc3JzTExKRFFxU2FhSDVVSXZwdlVxRUFzVU5nRjVVbU9TN2U4RjFnZzQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQzMTk5NDY4MDg4Ny9jTEp0SHcifQ", "signature": "HVXirHm74AvXUqvehdhFWVhrywSKAoObhjUeMC_UTcJ_bn0TvJ2WMPIkZLqKUq4i1zo_4YJcUcoCh56B55rdxGTSV8Ui0rF9C-6xcMaHGX-4AqOg5z44r9WLW8Qms044NdQQLBclNm_rCYnaXkh1HC21fZiuI3qv_qG2_cvpamk3KB5QMkEHG62BLPhC8nrM5zuR3uapgF8RHarMD456BbOlkj5JrClFREwqftzINnx8mhYo_vYWo82mi412nkhNnoecBSpRxtG3hNlTmDfby_PnWSBZ8r1o3rFhlKlJgaHFUCnQqqGuYRO6F0vdfKZVUB7ABUKfHIxFz-37Vq3Gwg", "payload": "e30" } 2024-11-18 16:15:48,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/431994680887/cLJtHw HTTP/1.1" 200 187 2024-11-18 16:15:48,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:48 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/cLJtHw Replay-Nonce: usf-jMgXEw3OGKcBZkWjQrgSBnBJ5FnGK0A_twxLanHdHk5WNc0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/cLJtHw", "status": "pending", "token": "PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8" } 2024-11-18 16:15:48,414:DEBUG:acme.client:Storing nonce: usf-jMgXEw3OGKcBZkWjQrgSBnBJ5FnGK0A_twxLanHdHk5WNc0 2024-11-18 16:15:48,415:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-18 16:15:49,416:DEBUG:acme.client:JWS payload: b'' 2024-11-18 16:15:49,420:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWEV3M09HS2NCWmtXalFyZ1NCbkJKNUZuR0swQV90d3hMYW5IZEhrNVdOYzAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDM0NyJ9", "signature": "MWBS1_sWkbqlr6hDBg388IOzWdHRTM9HOQqdv0fHwzWBSnJWXlDYh4Mjc4qCvi5quo2CrDF1ymaU8swwNlZNthUbCQHidE3JGjje_YOeUxRes6vYvyFDwOv69rsyEJ8Sht9SP9ZveyrRdj1ztd_BiAexJfygnYb6r4b9SC2UZVvlChkyFbTjcIIAcntYlZOfCIsrib3tFaCg3GKD4xg9oFUE8xQ-mtLV1k9u-cbiISJrFsbGT3OneBnBK5fDvx5nD1EykELvGe47gEoQXc14MugwOMOlBD4WuU-KNVpBVN3piqEpC_AfOsmHuBb-EaTUko3jHlkTXTCvoSFBi9tybQ", "payload": "" } 2024-11-18 16:15:49,565:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970347 HTTP/1.1" 200 787 2024-11-18 16:15:49,566:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:49 GMT Content-Type: application/json Content-Length: 787 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqr2gD2lCFK1Kiahau-7Nh_CHN5iY6_BxeuX1UpXRGCwAM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "valid", "expires": "2024-12-18T15:15:17Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "valid", "validated": "2024-11-18T15:15:15Z", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-18 16:15:49,567:DEBUG:acme.client:Storing nonce: JNlwFRqr2gD2lCFK1Kiahau-7Nh_CHN5iY6_BxeuX1UpXRGCwAM 2024-11-18 16:15:49,567:DEBUG:acme.client:JWS payload: b'' 2024-11-18 16:15:49,571:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431994680887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcjJnRDJsQ0ZLMUtpYWhhdS03TmhfQ0hONWlZNl9CeGV1WDFVcFhSR0N3QU0iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk5NDY4MDg4NyJ9", "signature": "uS9HJvupY-mDPX2_2_RgCuyGzIBdDy7WGNBHGmPByCLC6x9lV6zIx5Lu2QT27vE0UHtrXPiw4hwQ3uloUNPnmi2WDECwj1ak3fAd0edz0DZmQQ0JONmZOOW7IQ_wV44adTs0PHYRdsGd7ta3nWXMkPSWYbsgQ0mKZnDUW0-j4CWbithEAEPdvGpRq8lEr2NF5V_XOEDzhh1LCKzFHos45I0VnhUTxvzIuFkEE8s917ecUbMQS_fP_SHbbjOUHcxUQObmAiNLP7KhZmD7ruLvC8gTIL5_zDa0-rpyx03iTFrsSc7bekHGnzuzIdltYnl1bPbtm36VEn5n6jA2Neeq3g", "payload": "" } 2024-11-18 16:15:49,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431994680887 HTTP/1.1" 200 1150 2024-11-18 16:15:49,714:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 16:15:49 GMT Content-Type: application/json Content-Length: 1150 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrG6nSECvtQhNwYnh8EKIUySW-En-IbnHINBSrSCXpOVU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "comparateur.slc-assurances.fr" }, "status": "invalid", "expires": "2024-11-25T16:15:47Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431994680887/cLJtHw", "status": "invalid", "validated": "2024-11-18T16:15:48Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "51.255.71.144: Fetching https://comparateur.slc-assurances.fr:8443/.well-known/acme-challenge/PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8: Invalid port in redirect target. Only ports 80 and 443 are supported, not 8443", "status": 400 }, "token": "PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8", "validationRecord": [ { "url": "http://comparateur.slc-assurances.fr/.well-known/acme-challenge/PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8", "hostname": "comparateur.slc-assurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-18 16:15:49,714:DEBUG:acme.client:Storing nonce: JNlwFRqrG6nSECvtQhNwYnh8EKIUySW-En-IbnHINBSrSCXpOVU 2024-11-18 16:15:49,715:INFO:certbot._internal.auth_handler:Challenge failed for domain comparateur.slc-assurances.fr 2024-11-18 16:15:49,716:INFO:certbot._internal.auth_handler:http-01 challenge for comparateur.slc-assurances.fr 2024-11-18 16:15:49,716:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: comparateur.slc-assurances.fr Type: connection Detail: 51.255.71.144: Fetching https://comparateur.slc-assurances.fr:8443/.well-known/acme-challenge/PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8: Invalid port in redirect target. Only ports 80 and 443 are supported, not 8443 Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-18 16:15:49,719:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-18 16:15:49,719:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-18 16:15:49,719:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-18 16:15:49,720:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/PO_fndQ10elW4itSyaE9voKEHclaCWKpF92pOR6skN8 2024-11-18 16:15:49,720:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-18 16:15:49,721:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1876, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1578, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 130, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/opt/certbot/src/certbot/certbot/_internal/renewal.py", line 399, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-18 16:15:49,727:ERROR:certbot._internal.log:Some challenges have failed.