2024-11-18 15:15:09,953:DEBUG:certbot._internal.main:certbot version: 3.0.1 2024-11-18 15:15:09,953:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-11-18 15:15:09,953:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '-d', 'scraping.slassurances.fr', '-d', 'comparateur.slc-assurances.fr', '--non-interactive', '--force-renewal'] 2024-11-18 15:15:09,953:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-11-18 15:15:09,974:DEBUG:certbot._internal.log:Root logging level set at 30 2024-11-18 15:15:09,974:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-11-18 15:15:09,975:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A separate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-11-18 15:15:09,976:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-11-18 15:15:09,976:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-11-18 15:15:10,046:DEBUG:certbot._internal.main:Picked account: ), creation_host='d75572c010e1', register_to_eff=None))> 2024-11-18 15:15:10,046:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-11-18 15:15:10,049:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-11-18 15:15:14,484:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-11-18 15:15:14,485:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "iNJflJa5ACs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-11-18 15:15:14,561:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for scraping.slassurances.fr and comparateur.slc-assurances.fr 2024-11-18 15:15:14,626:DEBUG:acme.client:Requesting fresh nonce 2024-11-18 15:15:14,626:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-11-18 15:15:14,760:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-11-18 15:15:14,761:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXRzP-fKplqAXvtwUzz35L989hxOcS_laWhLyFoLe4iVg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-11-18 15:15:14,761:DEBUG:acme.client:Storing nonce: usf-jMgXRzP-fKplqAXvtwUzz35L989hxOcS_laWhLyFoLe4iVg 2024-11-18 15:15:14,762:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "scraping.slassurances.fr"\n },\n {\n "type": "dns",\n "value": "comparateur.slc-assurances.fr"\n }\n ]\n}' 2024-11-18 15:15:14,766:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWFJ6UC1mS3BscUFYdnR3VXp6MzVMOTg5aHhPY1NfbGFXaEx5Rm9MZTRpVmciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "d6dsGPDr3f7OrFpZTE6_Vtsbzte8tDFCy1oeIV0-K5FmWYlB_y32K3Y04llgWmIFq2nWonzvnEV4KjHnHOxwbnbNzezpXDMKfEc6bDFojqL8BWMn-1NXUHhVJGFoUtLqqhm2ZOVXFwvZ2LbrlWNgAC-_TR60kW7WKsfliQD8uxwGpCM0SGmfdaRJIqj2ob2IK8ESxex94byS7j2yRESvKm5ldmSgo1P29vw5JSymAv7xLxo0cp81GmdtYhXjnkfCKF4ncTza7gdxIiVZAcK0KrEOCnnlKQ8N9ve5sr01f8Gv5ZQg5hU_M7o2M6ZQf4N1AD6t9X7LQ0nKx8n97mNRYA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNjcmFwaW5nLnNsYXNzdXJhbmNlcy5mciIKICAgIH0sCiAgICB7CiAgICAgICJ0eXBlIjogImRucyIsCiAgICAgICJ2YWx1ZSI6ICJjb21wYXJhdGV1ci5zbGMtYXNzdXJhbmNlcy5mciIKICAgIH0KICBdCn0" } 2024-11-18 15:15:15,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 502 2024-11-18 15:15:15,038:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 18 Nov 2024 15:15:14 GMT Content-Type: application/json Content-Length: 502 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1673405107/324368669847 Replay-Nonce: JNlwFRqrz02Mj9PfA1J5AXVzTDiSNuVpfJAVITJ5JrG9bQBlmM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-11-25T15:15:14Z", "identifiers": [ { "type": "dns", "value": "comparateur.slc-assurances.fr" }, { "type": "dns", "value": "scraping.slassurances.fr" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970337", "https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1673405107/324368669847" } 2024-11-18 15:15:15,039:DEBUG:acme.client:Storing nonce: JNlwFRqrz02Mj9PfA1J5AXVzTDiSNuVpfJAVITJ5JrG9bQBlmM0 2024-11-18 15:15:15,039:DEBUG:acme.client:JWS payload: b'' 2024-11-18 15:15:15,043:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970337: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcnowMk1qOVBmQTFKNUFYVnpURGlTTnVWcGZKQVZJVEo1SnJHOWJRQmxtTTAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDMzNyJ9", "signature": "EFYFrEeATV762Lrh3MaxgU3Qmdwt5V3LLNjZ5oDrFx0pXpi5WTwWO2--ySY5NSkcYlMj56t7eaA4x7z9H0Z_lYj719kUWFJjJlxz3G-t691JAsNqXg1NcMd_dN7Xya0JrnJIY0l4gPRRfAwAoW5IYkS6qT7iMaGgL7KFglHobwHry8xFjyweySey-Vze6qgQquklhspDm91aIANceirf-RMCFM_O_gy3ctm7nRkU-Dx-2R3Jd-cOpuX_BqOI_NUBd-CrsgnlajK4gwUBGrAkvpA3JwvRP0aMSrCLg-n-hmRd1zzI_ecIgHU7mcTax0mpCbxmIMebYrD8ZkpanrIpZg", "payload": "" } 2024-11-18 15:15:15,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970337 HTTP/1.1" 200 813 2024-11-18 15:15:15,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:15 GMT Content-Type: application/json Content-Length: 813 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXvk8DZ7cZ1Iuys8SwZdQNnfl3tFjFuryrMNSf5Acj-cU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "comparateur.slc-assurances.fr" }, "status": "pending", "expires": "2024-11-25T15:15:14Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/179SHA", "status": "pending", "token": "JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/gZINwQ", "status": "pending", "token": "JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/WcSvFw", "status": "pending", "token": "JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk" } ] } 2024-11-18 15:15:15,204:DEBUG:acme.client:Storing nonce: usf-jMgXvk8DZ7cZ1Iuys8SwZdQNnfl3tFjFuryrMNSf5Acj-cU 2024-11-18 15:15:15,205:DEBUG:acme.client:JWS payload: b'' 2024-11-18 15:15:15,209:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWHZrOERaN2NaMUl1eXM4U3daZFFObmZsM3RGakZ1cnlyTU5TZjVBY2otY1UiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDM0NyJ9", "signature": "tpvMgHE1AvXvcAQdeXAE66uk8QaBf2UITC1unBX-Nq6HBMtb4VMNUTztTbCwCZEsDl1riBoT8a7mFnxtQeuxjrZdQNejpA_kD__l-N_Er2MnxfcbbqZSpcdPCAGF5xoZH4cZ5qyWd3XVGkTkS1Yc9VtfHB5Nh6wy1PXJTzIM5DK0o-g1EzL11loq_br4Us0pPEjC79nhJTzhAiraM-HB0aYNeD_4TP91OOFVrCf8z92XlerE1uTqdDDF4qPiOY8cSdJEZzbLx8HKg2-LrA6vow0DEiYwsN-hFvsIrEs1HIL_GkJcC1lX0YW1iiZMyb6CYovtTRGOQYiJXf0PMgZ87A", "payload": "" } 2024-11-18 15:15:15,366:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970347 HTTP/1.1" 200 808 2024-11-18 15:15:15,367:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:15 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: usf-jMgXZ8AfFI2pkpuch1wNeuqppGC2T_gcsZpfpuBirufDC-s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-25T15:15:14Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/zPvnhw", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/yfQq3w", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" } ] } 2024-11-18 15:15:15,367:DEBUG:acme.client:Storing nonce: usf-jMgXZ8AfFI2pkpuch1wNeuqppGC2T_gcsZpfpuBirufDC-s 2024-11-18 15:15:15,369:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-11-18 15:15:15,369:INFO:certbot._internal.auth_handler:http-01 challenge for comparateur.slc-assurances.fr 2024-11-18 15:15:15,369:INFO:certbot._internal.auth_handler:http-01 challenge for scraping.slassurances.fr 2024-11-18 15:15:15,370:INFO:certbot._internal.plugins.webroot:Using the webroot path /usr/share/nginx/html/letsencrypt for all unmatched domains. 2024-11-18 15:15:15,370:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-18 15:15:15,371:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge 2024-11-18 15:15:15,373:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk 2024-11-18 15:15:15,375:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0 2024-11-18 15:15:15,376:DEBUG:acme.client:JWS payload: b'{}' 2024-11-18 15:15:15,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/179SHA: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWFo4QWZGSTJwa3B1Y2gxd05ldXFwcEdDMlRfZ2NzWnBmcHVCaXJ1ZkRDLXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQzMTk3Mzk3MDMzNy8xNzlTSEEifQ", "signature": "pgneOYAIr-LFbQjOtONch3k9vOSbpijer_lL2ztebiNGphO8zQxcGhIXS5dvxI8DrieVmwyxUA8uwfTMQA69VuRJuWB745pWOoLE85JNR54VUI0SupnUEEm5l2qha5BdU83XYF2GQxBdIyXIeQ9GGMIjGx6TmgSNftDIW3W3lGhuLRhPMaskPeNR7Q1PSpSqp-zJnPv7HLGovQW2yngD__HHB1KRTa7GRYK1KcaVUPQmCXo7gA0pvmo6sUE0w-_l7aocor8Y1NsNBVXCs7nDtLjP1X-NnfX7d0LT8HjMBIyHOmVpgop4BzMLfG1Ie35K-QJ9nqOrTjMmYEfDEAPapA", "payload": "e30" } 2024-11-18 15:15:15,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/431973970337/179SHA HTTP/1.1" 200 187 2024-11-18 15:15:15,521:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:15 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/179SHA Replay-Nonce: JNlwFRqrasdeXwd51qt4PI94FiWE-ZaN9CHow_a0rOQaMKse21c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/179SHA", "status": "pending", "token": "JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk" } 2024-11-18 15:15:15,522:DEBUG:acme.client:Storing nonce: JNlwFRqrasdeXwd51qt4PI94FiWE-ZaN9CHow_a0rOQaMKse21c 2024-11-18 15:15:15,523:DEBUG:acme.client:JWS payload: b'{}' 2024-11-18 15:15:15,527:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcmFzZGVYd2Q1MXF0NFBJOTRGaVdFLVphTjlDSG93X2Ewck9RYU1Lc2UyMWMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzQzMTk3Mzk3MDM0Ny93SkxYbXcifQ", "signature": "GMlhxf0RzbWR1udikKv0SO52IePsxhIFH2UT-STK6VmV9u9cy65cDboqjSAscR4EnGbZxcDZEOJahfB2FZBWqcPa_dcCU5-SuRUgNaOfNsSmPnBM8TkCIWKNHhFbya02HTNpqKRfj2eC4M71O0T3ofbsrjFMpUeCguFBgC-GCsj1Pgfi3j_stFfSiTu55z3pprhdVcbqMzr3TinIpE56v7Hgl6yezQv9-6Pz5fVoBFuHB9G8tXF7XK8uG1rbL6YvYgJKCvMD2TIGcwkYALZounOa_GGahXNkpv7MwEQR7tQQmNJcLoMG5rPSqCOKf1XWrMp6PKgoZ6-1hSuhYR8cJw", "payload": "e30" } 2024-11-18 15:15:15,675:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/431973970347/wJLXmw HTTP/1.1" 200 187 2024-11-18 15:15:15,676:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:15 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw Replay-Nonce: usf-jMgXawWcy5iQ44GNW94QRibootT00Uf3WVQnrPmiAgp0FdA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" } 2024-11-18 15:15:15,677:DEBUG:acme.client:Storing nonce: usf-jMgXawWcy5iQ44GNW94QRibootT00Uf3WVQnrPmiAgp0FdA 2024-11-18 15:15:15,677:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-11-18 15:15:16,678:DEBUG:acme.client:JWS payload: b'' 2024-11-18 15:15:16,682:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970337: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJ1c2Ytak1nWGF3V2N5NWlRNDRHTlc5NFFSaWJvb3RUMDBVZjNXVlFuclBtaUFncDBGZEEiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDMzNyJ9", "signature": "M27xJUthX6JN7EiQfMrtqmljKEgygbpEbpxrRQCVqgkUybZgZbmniGZIVxHo2pQa2DeDUG5MgeyJTtzf775EmA-tAcuNpRMfjUa5MeJnhkGH10IUIbYukG5ji0jqPryzKnvPwheEWGt2GvFX3qgL7MT2lYg1Xy87JHJXDRtw0uKLKO2eaQoMzqY-QniPHMqMp29ER6Z8ogdRZ-1Ynvx6XuIJ0wCgJnDNVsJt6VfKud8j5VSyq2z355m4KqRQeothaZGxpIRSjBCmOdAR5nBQWNL8H0Y6cmMVa-TiaxCmY602DxY1uIv2rjTEn0SJe6t13iV3mgvnN71Yy8XbaqmwEQ", "payload": "" } 2024-11-18 15:15:16,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970337 HTTP/1.1" 200 1150 2024-11-18 15:15:16,825:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:16 GMT Content-Type: application/json Content-Length: 1150 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrusnDzdJsrhs0QSXoiyhbUvnvKdvqWk3SPqw48xDmmYs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "comparateur.slc-assurances.fr" }, "status": "invalid", "expires": "2024-11-25T15:15:14Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970337/179SHA", "status": "invalid", "validated": "2024-11-18T15:15:15Z", "error": { "type": "urn:ietf:params:acme:error:connection", "detail": "51.255.71.144: Fetching https://comparateur.slc-assurances.fr:8443/.well-known/acme-challenge/JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk: Invalid port in redirect target. Only ports 80 and 443 are supported, not 8443", "status": 400 }, "token": "JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk", "validationRecord": [ { "url": "http://comparateur.slc-assurances.fr/.well-known/acme-challenge/JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk", "hostname": "comparateur.slc-assurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-18 15:15:16,825:DEBUG:acme.client:Storing nonce: JNlwFRqrusnDzdJsrhs0QSXoiyhbUvnvKdvqWk3SPqw48xDmmYs 2024-11-18 15:15:16,826:DEBUG:acme.client:JWS payload: b'' 2024-11-18 15:15:16,830:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxcnVzbkR6ZEpzcmhzMFFTWG9peWhiVXZudktkdnFXazNTUHF3NDh4RG1tWXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDM0NyJ9", "signature": "RfQjAJcteJqifYh8LIqq6GeKGE5UsOXj7-s_E1m1u5Lq8SsDOy2wzVeDsKROFd1z2duxJdjL2NwPZC3skAdyDTTnl9izYK9PWAR9dNzMkHXS0WCaFvcrQV0STaVuBR9xZmxvnYL_kGBDUlVCT-thByfhWA6r9nkVhS4wNRxnT8fm_dwy3-vGEXwvDhMvzAmS0G9RMLSDxGEsB1X0eBs40L_gJemhUN_mbvmntOHRQVrQw0Matl6YhKQl6ysNgJLvICKaf4KFQUNkOXk3seGqqomOJ_x9zGqW9-K8i_ao8QbKiqP9bIhd1VnC6Nx39TEyau4GIG8naRKzrjtby4Nfjg", "payload": "" } 2024-11-18 15:15:16,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970347 HTTP/1.1" 200 808 2024-11-18 15:15:16,969:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:16 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrIh8kmTJGwJeMoqjoDJNwpXGiqcaaaVt7NnbCCNzr6CI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "pending", "expires": "2024-11-25T15:15:14Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/yfQq3w", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/zPvnhw", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "pending", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0" } ] } 2024-11-18 15:15:16,969:DEBUG:acme.client:Storing nonce: JNlwFRqrIh8kmTJGwJeMoqjoDJNwpXGiqcaaaVt7NnbCCNzr6CI 2024-11-18 15:15:16,970:INFO:certbot._internal.auth_handler:Challenge failed for domain comparateur.slc-assurances.fr 2024-11-18 15:15:19,971:DEBUG:acme.client:JWS payload: b'' 2024-11-18 15:15:19,975:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/431973970347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTY3MzQwNTEwNyIsICJub25jZSI6ICJKTmx3RlJxckloOGttVEpHd0plTW9xam9ESk53cFhHaXFjYWFhVnQ3Tm5iQ0NOenI2Q0kiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzQzMTk3Mzk3MDM0NyJ9", "signature": "du7BicbZl_wsrdCEgBora2oGFyfm12a2tVph0mP7iDSb29q5H9k3KpwuWz-1h3iqu-PY6m3OjrZbwPHWTND73VNS5flDRaMpEPAnylxoe663q1-_4p3dL-9pIHOZ1gbdEFfTWIeDn9TBN0uHjJNHWOmt4Pl7cEA7-gXYoYFhlldrGm23m1NW8ZsK7jcPDJrQyJipYxDURFuCvXhBjpUk0MxZ-NvbRN8WNoAFBvBry3NqLymHB4DUQlQA36B9aOBIv61B5Rg-oHty_jYPKonO_vnnzqNqfNBwS-yuCAEAd92bOgXFLqOigVHpp6yjPyDIHmZiQCCymc5aODA18yugOA", "payload": "" } 2024-11-18 15:15:20,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/431973970347 HTTP/1.1" 200 787 2024-11-18 15:15:20,115:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 18 Nov 2024 15:15:20 GMT Content-Type: application/json Content-Length: 787 Connection: keep-alive Boulder-Requester: 1673405107 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: JNlwFRqrkUrTJEekLv9dCSqQTBej7yTuGx4B9KPSqFL5LDmsu_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "scraping.slassurances.fr" }, "status": "valid", "expires": "2024-12-18T15:15:17Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/431973970347/wJLXmw", "status": "valid", "validated": "2024-11-18T15:15:15Z", "token": "2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "validationRecord": [ { "url": "http://scraping.slassurances.fr/.well-known/acme-challenge/2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0", "hostname": "scraping.slassurances.fr", "port": "80", "addressesResolved": [ "51.255.71.144" ], "addressUsed": "51.255.71.144" } ] } ] } 2024-11-18 15:15:20,116:DEBUG:acme.client:Storing nonce: JNlwFRqrkUrTJEekLv9dCSqQTBej7yTuGx4B9KPSqFL5LDmsu_c 2024-11-18 15:15:20,116:INFO:certbot._internal.auth_handler:http-01 challenge for comparateur.slc-assurances.fr 2024-11-18 15:15:20,116:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: comparateur.slc-assurances.fr Type: connection Detail: 51.255.71.144: Fetching https://comparateur.slc-assurances.fr:8443/.well-known/acme-challenge/JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk: Invalid port in redirect target. Only ports 80 and 443 are supported, not 8443 Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2024-11-18 15:15:20,118:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-18 15:15:20,119:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-11-18 15:15:20,119:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-11-18 15:15:20,119:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/JOnxncWTpK1bJ2akbTPAeb5mS2no9frP_tTcyabgBsk 2024-11-18 15:15:20,120:DEBUG:certbot._internal.plugins.webroot:Removing /usr/share/nginx/html/letsencrypt/.well-known/acme-challenge/2yw0oLRZIvehF1GR_BDT8k4Lxn-GSQFK-XY45rWZcV0 2024-11-18 15:15:20,120:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2024-11-18 15:15:20,121:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1876, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1578, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 130, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/opt/certbot/src/certbot/certbot/_internal/renewal.py", line 399, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort) File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2024-11-18 15:15:20,128:ERROR:certbot._internal.log:Some challenges have failed.