2024-01-02 21:15:33,444:DEBUG:certbot._internal.main:certbot version: 1.21.0 2024-01-02 21:15:33,444:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2024-01-02 21:15:33,444:DEBUG:certbot._internal.main:Arguments: ['--standalone', '--agree-tos', '--register-unsafely-without-email', '-d', 'aberto.wand-magic.stream', '--config-dir', '/home/ubuntu/.certbot/config/', '--work-dir', '/home/ubuntu/.certbot/work/', '--logs-dir', '/home/ubuntu/.certbot/logs/'] 2024-01-02 21:15:33,444:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-02 21:15:33,455:DEBUG:certbot._internal.log:Root logging level set at 30 2024-01-02 21:15:33,458:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 21:15:33,458:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: Authenticator, Plugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-02 21:15:33,458:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-02 21:15:33,458:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-02 21:15:33,458:DEBUG:certbot._internal.client:Registering without email! 2024-01-02 21:15:34,046:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-02 21:15:34,047:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-02 21:15:34,448:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-02 21:15:34,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 21:15:34 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5MnjWjlGgPk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-02 21:15:34,449:DEBUG:acme.client:Requesting fresh nonce 2024-01-02 21:15:34,449:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-02 21:15:34,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-02 21:15:34,579:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 21:15:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zXX7izQwBUJUMTjRpeT8zmm6JQ7oZ2Y-6QXKu8eKkRSw9H_gbHc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-02 21:15:34,579:DEBUG:acme.client:Storing nonce: zXX7izQwBUJUMTjRpeT8zmm6JQ7oZ2Y-6QXKu8eKkRSw9H_gbHc 2024-01-02 21:15:34,579:DEBUG:acme.client:JWS payload: b'{\n "termsOfServiceAgreed": true,\n "contact": []\n}' 2024-01-02 21:15:34,584:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct: { "protected": "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", "signature": "X9dxjoUjwAJsp2XVnjMZXZa4ARbib0WPn5xyzO-mrS1AA5LT_Ry4gWIsef_LHfqw7jiOIRfgePhf3GhUc_c4H6M3oPJjBS5CzqDkIzdCC0geREcKbsMkbQU-C56D3l2SwzqZ14Aol_HY6-iS65L6toyemqIcdC2MDIMIr-KQdrqh0CH5TVP4AF4H8dw5ERXBMxSftWH1JweTh3vnXvqkcnoAHQT7j0c-DIFVfxS6ri8p8om2SVbq1bFBOS7xvnMz54QLsC4VvJaGe0ibNEVYwG3kc5t8tPeJYoUmYRlvpoUaUGulhOfaWg2BR0_RpMozdV8EOTYQXhpqpvNLwQid0g", "payload": "ewogICJ0ZXJtc09mU2VydmljZUFncmVlZCI6IHRydWUsCiAgImNvbnRhY3QiOiBbXQp9" } 2024-01-02 21:15:34,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 510 2024-01-02 21:15:34,735:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 21:15:34 GMT Content-Type: application/json Content-Length: 510 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="terms-of-service" Location: https://acme-v02.api.letsencrypt.org/acme/acct/1496403606 Replay-Nonce: I5zfHDkYfZT8JAZm1L2I7MK8yQeuTT5rZMrEEL2uQsbiJLnsGSw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "key": { "kty": "RSA", "n": "pJ6fGMM9bFmMg060iilXDjRMnof6uMkbIWYEALCDZMNtZySQ0G7DhmsxZltM_QKXWPGPBAZaKdABlnOKVCCvn1DerXj6bjSFcdtsDYUr-B_OIIRd6MwqauNC3Dd5ebMQ9hl_kdYsjMEBGqB7OfwfwSDE7dIlfC-KFiVKF1gMnDwAc-grAMzzSkFYQ5DNKEz24utyvfLSdO1Y1a33rNTLgMplVcFYQ18L_xyRZzaJ-auXdrOGvBOa5b3wCaBFKh2_NYnzFPagBUEGEyu7X0yd90fBqyuoQQLHT0y6D-uAA39jrlZqtmej0cwCxr5KaLJzdZuEIAYVc5oBKB6SCOTr4w", "e": "AQAB" }, "initialIp": "140.238.100.253", "createdAt": "2024-01-02T21:15:34.66863853Z", "status": "valid" } 2024-01-02 21:15:34,736:DEBUG:acme.client:Storing nonce: I5zfHDkYfZT8JAZm1L2I7MK8yQeuTT5rZMrEEL2uQsbiJLnsGSw 2024-01-02 21:15:34,740:DEBUG:certbot._internal.display.obj:Notifying user: Account registered. 2024-01-02 21:15:34,740:DEBUG:certbot._internal.main:Picked account: )>), contact=(), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1496403606', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf'), 28dcadf8d90488b0f65ce3446697fbd9, Meta(creation_dt=datetime.datetime(2024, 1, 2, 21, 15, 34, tzinfo=), creation_host='instance-20221212-1023.subnet11170331.vcn11111427.oraclevcn.com', register_to_eff=None))> 2024-01-02 21:15:34,741:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for aberto.wand-magic.stream 2024-01-02 21:15:34,972:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /home/ubuntu/.certbot/config/keys/0000_key-certbot.pem 2024-01-02 21:15:34,979:DEBUG:certbot.crypto_util:Creating CSR: /home/ubuntu/.certbot/config/csr/0000_csr-certbot.pem 2024-01-02 21:15:34,981:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aberto.wand-magic.stream"\n }\n ]\n}' 2024-01-02 21:15:34,984:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWWZaVDhKQVptMUwySTdNSzh5UWV1VFQ1clpNckVFTDJ1UXNiaUpMbnNHU3ciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "T2INudNkz3snXhPU90GwiHYROZMaRCnNlsNNhALxDpY_TbN5-MgnBWGdBDPobreZ5vxDoOvYNFgZeP5NA8EzmBwlVDIfEGXGbFe6p-9juh0YxFlbfXq3CxPP9w8_TxOqrGguP-1K8cR78qo6GmFFuGvBe-rObFohIqNT8wZwtTYCY_GvdccwdN_QabuKvQWShZJ1IKrKVVYTUAzvv5YVWK5N72Vc-vKTirbnYrliOna3fuW0_jmZ0lbVlM38p8Ma8NopQrrDbIEO2r-5g-zla6B_UsgZ0Y_JcxkxXhEHj-pIFdBpXK09JuBGcQa92Xwp2LGQMYPmjiS1BPvWZ6jsuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbSIKICAgIH0KICBdCn0" } 2024-01-02 21:15:35,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-02 21:15:35,178:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 21:15:35 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: zXX7izQw2sV89dRataCCquFWlMRhzsZ6PpNwBEAetT3KMtWp2a0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586" } 2024-01-02 21:15:35,178:DEBUG:acme.client:Storing nonce: zXX7izQw2sV89dRataCCquFWlMRhzsZ6PpNwBEAetT3KMtWp2a0 2024-01-02 21:15:35,179:DEBUG:acme.client:JWS payload: b'' 2024-01-02 21:15:35,183:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJ6WFg3aXpRdzJzVjg5ZFJhdGFDQ3F1RldsTVJoenNaNlBwTndCRUFldFQzS010V3AyYTAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "RhpDBmKXS824HJuJXC6g6pkCa64SjOysjXrAXxNab56Vek9xVY8JSL5BpDJbjs1xKOyW7hT-cI-bA1PEDS8wWUyiNQtPqv5kX4io88BdRge-yaGzaRM8j58YGDbgpx_ChqZ4lIeU8mOe8HW7OgJ26bPVSo9tFbGNVhETThqbCEkaF7d9_y07yPF0cJ7qboef3AMFEa5n67VfN6IIDodnVTyFmkTjmQuFBg88B8AdoguAXdH9VbSi8acc4CpE84KCsF1pQci13wY85aV4kP_-bzf_JdnT8iBwoBa7v6BE-hjXCbdgvt2FTRSWXDVZNQykG--g7yHK8n0XuqlRl1jizg", "payload": "" } 2024-01-02 21:15:35,316:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 808 2024-01-02 21:15:35,317:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 21:15:35 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zXX7izQwxBYrB4HcNN0WwOsUSNQIFvUH3pWX8Hiwb7W6UwwZrMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "pending", "expires": "2024-01-09T21:15:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cBoKzA", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/5q_0sg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } ] } 2024-01-02 21:15:35,317:DEBUG:acme.client:Storing nonce: zXX7izQwxBYrB4HcNN0WwOsUSNQIFvUH3pWX8Hiwb7W6UwwZrMw 2024-01-02 21:15:35,317:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-02 21:15:35,317:INFO:certbot._internal.auth_handler:http-01 challenge for aberto.wand-magic.stream 2024-01-02 21:15:35,318:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-02 21:15:35,318:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-02 21:15:35,320:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 21:15:35,320:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-02 21:15:35,320:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-02 21:15:35,321:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 21:15:35,321:ERROR:certbot._internal.log:Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:07:29,568:DEBUG:certbot._internal.main:certbot version: 1.21.0 2024-01-02 22:07:29,568:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2024-01-02 22:07:29,568:DEBUG:certbot._internal.main:Arguments: ['--standalone', '--agree-tos', '--register-unsafely-without-email', '-d', 'aberto.wand-magic.stream', '--config-dir', '/home/ubuntu/.certbot/config/', '--work-dir', '/home/ubuntu/.certbot/work/', '--logs-dir', '/home/ubuntu/.certbot/logs/'] 2024-01-02 22:07:29,568:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-02 22:07:29,575:DEBUG:certbot._internal.log:Root logging level set at 30 2024-01-02 22:07:29,576:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:07:29,576:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: Authenticator, Plugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-02 22:07:29,576:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-02 22:07:29,576:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-02 22:07:29,755:DEBUG:certbot._internal.main:Picked account: ), creation_host='instance-20221212-1023.subnet11170331.vcn11111427.oraclevcn.com', register_to_eff=None))> 2024-01-02 22:07:29,756:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-02 22:07:29,757:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-02 22:07:30,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-02 22:07:30,099:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:07:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4NyIIAJV99Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-02 22:07:30,100:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for aberto.wand-magic.stream 2024-01-02 22:07:30,610:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /home/ubuntu/.certbot/config/keys/0001_key-certbot.pem 2024-01-02 22:07:30,616:DEBUG:certbot.crypto_util:Creating CSR: /home/ubuntu/.certbot/config/csr/0001_csr-certbot.pem 2024-01-02 22:07:30,618:DEBUG:acme.client:Requesting fresh nonce 2024-01-02 22:07:30,618:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-02 22:07:30,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-02 22:07:30,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:07:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: T8gQgmcoRdZHL8qzqKZkh659n9vw0VojguSuvBgamc46RFAR83o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-02 22:07:30,731:DEBUG:acme.client:Storing nonce: T8gQgmcoRdZHL8qzqKZkh659n9vw0VojguSuvBgamc46RFAR83o 2024-01-02 22:07:30,731:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aberto.wand-magic.stream"\n }\n ]\n}' 2024-01-02 22:07:30,735:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJUOGdRZ21jb1JkWkhMOHF6cUtaa2g2NTluOXZ3MFZvamd1U3V2QmdhbWM0NlJGQVI4M28iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "LyZ3TKia2IbBya1yEGRX3QKuRi9CYCnzQK_lwN-lUbnrKFL0wts_GfGw1lpWCGYXAOWKA6ZvILEcK_t0Fuff8U4HuvfSDKlAO3IKCw0N73pP4zj4-dHmfkkxP5Uti-iuE9p1nukC7nAeVU1K-aVPMkxJqiN9BNccRnq3tQ-1KtxbtYpIoTCrHrWg1-N5riTqFw8IKEp4-zBSUixD0H82AEqifwt18x702SfljXXBkICK5q2-TQZ3bAf1Tkp4o_F0dH64ycXTg6Pyr8t2dFRl2C_JaJLzH3_Y68EJWUocgHfvW-_qNJ85Rrg27CLjkaZ1rFhVyWvtng4q9dGrk39OaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbSIKICAgIH0KICBdCn0" } 2024-01-02 22:07:30,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-02 22:07:30,887:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 22:07:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: T8gQgmcoHakgUiO9PDsCr7-v1rZh3Rf342TENVG68oI3lOTGL4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586" } 2024-01-02 22:07:30,887:DEBUG:acme.client:Storing nonce: T8gQgmcoHakgUiO9PDsCr7-v1rZh3Rf342TENVG68oI3lOTGL4E 2024-01-02 22:07:30,888:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:07:30,891:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJUOGdRZ21jb0hha2dVaU85UERzQ3I3LXYxclpoM1JmMzQyVEVOVkc2OG9JM2xPVEdMNEUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "gizaSdSTnXfgL_tbuF6R32dCVe7XXWzi_jbetFXUuTX04HJD9ulirGtrdODbejulP8C4sY_334zxIq5ste04QKDEXYMJl_6V-0r4XYBu4WLYanvWL3cNI17oyZ6-UUB-95RigCnuw_uKTBsn3oO7zyHUZ2zs0oFD8xFdrLkY3Jcy7c4vh-8elfZS-rM-b06c6Nq9LURHALF6cKBwaYKhc_02YdtnYwVGib8DT7-WH95PcofjwDuJ8sbwzHwOXjsDztwG-YS3iIC7Ht_DhTvlhqEvqmmp0Cdt4r_nFG6RwiQ-S6mWsr4ANYMN4I3hkd0WY9uG7ea1UxpesWXFACJjFA", "payload": "" } 2024-01-02 22:07:31,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 808 2024-01-02 22:07:31,044:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:07:30 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: T8gQgmcokM2yuCbQ7sl5qPevabDr-Xrlh5wbJjqfIM53bwPEXIc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "pending", "expires": "2024-01-09T21:15:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cBoKzA", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/5q_0sg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } ] } 2024-01-02 22:07:31,044:DEBUG:acme.client:Storing nonce: T8gQgmcokM2yuCbQ7sl5qPevabDr-Xrlh5wbJjqfIM53bwPEXIc 2024-01-02 22:07:31,044:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-02 22:07:31,044:INFO:certbot._internal.auth_handler:http-01 challenge for aberto.wand-magic.stream 2024-01-02 22:07:31,044:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-02 22:07:31,045:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-02 22:07:31,045:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:07:31,045:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-02 22:07:31,045:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-02 22:07:31,046:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:07:31,046:ERROR:certbot._internal.log:Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:08:03,735:DEBUG:certbot._internal.main:certbot version: 1.21.0 2024-01-02 22:08:03,736:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2024-01-02 22:08:03,736:DEBUG:certbot._internal.main:Arguments: ['--standalone', '--agree-tos', '--register-unsafely-without-email', '-d', 'aberto.wand-magic.stream', '--config-dir', '/home/ubuntu/.certbot/config/', '--work-dir', '/home/ubuntu/.certbot/work/', '--logs-dir', '/home/ubuntu/.certbot/logs/', '-v'] 2024-01-02 22:08:03,736:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-02 22:08:03,742:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-02 22:08:03,743:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:08:03,743:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: Authenticator, Plugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-02 22:08:03,743:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-02 22:08:03,743:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-02 22:08:03,935:DEBUG:certbot._internal.main:Picked account: ), creation_host='instance-20221212-1023.subnet11170331.vcn11111427.oraclevcn.com', register_to_eff=None))> 2024-01-02 22:08:03,936:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-02 22:08:03,937:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-02 22:08:04,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-02 22:08:04,294:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:08:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NmaEIqEVrcM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-02 22:08:04,294:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for aberto.wand-magic.stream 2024-01-02 22:08:04,629:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /home/ubuntu/.certbot/config/keys/0002_key-certbot.pem 2024-01-02 22:08:04,636:DEBUG:certbot.crypto_util:Creating CSR: /home/ubuntu/.certbot/config/csr/0002_csr-certbot.pem 2024-01-02 22:08:04,638:DEBUG:acme.client:Requesting fresh nonce 2024-01-02 22:08:04,638:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-02 22:08:04,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-02 22:08:04,756:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:08:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: T8gQgmcoqMf6Ha1o22phKY78CIpiqiAuoOtf1j6nMQHm8Yvnmis X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-02 22:08:04,756:DEBUG:acme.client:Storing nonce: T8gQgmcoqMf6Ha1o22phKY78CIpiqiAuoOtf1j6nMQHm8Yvnmis 2024-01-02 22:08:04,756:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aberto.wand-magic.stream"\n }\n ]\n}' 2024-01-02 22:08:04,761:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJUOGdRZ21jb3FNZjZIYTFvMjJwaEtZNzhDSXBpcWlBdW9PdGYxajZuTVFIbThZdm5taXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "HakFsZQZQGWWL7dR3icJ84HHGWuC7EqgVEe_rxAWcmllgb6mx6Y3DSexvtYeynNmH_ljJQzBg-ANT_9jIYyx4uEz4y1u85vB8wYPMQnCrqudHXfeHFPjVRnu-j3ODlT-j0yrD_KZcvOG0VQ6L4KGyzjSvQBuwdeBt6zm-5SXDygZCOlT47f2WbAuE7tO3uJ-rSxXeRYIaXUXUuPObhMc62QmvtbOZ01XbgM_nhln7a7yf7-tY52ZUXqLND-7WtlIx1vYSwkYzjywUBZ03unp0M8db8FLe5oSei81iyCkKGSu6idkMIqWaIa81SCE30v44YARkjgzyDN76X12Mvoimw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbSIKICAgIH0KICBdCn0" } 2024-01-02 22:08:04,985:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-02 22:08:04,985:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 22:08:04 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: T8gQgmcoV1fD1DB0XWJ72ULYl0yERUl9GLsqx1Aam0R6XqBUrVo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586" } 2024-01-02 22:08:04,985:DEBUG:acme.client:Storing nonce: T8gQgmcoV1fD1DB0XWJ72ULYl0yERUl9GLsqx1Aam0R6XqBUrVo 2024-01-02 22:08:04,986:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:08:04,989:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJUOGdRZ21jb1YxZkQxREIwWFdKNzJVTFlsMHlFUlVsOUdMc3F4MUFhbTBSNlhxQlVyVm8iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "E38hDUnKLjD6k44hUxyNp7Ty1r7Tm7SX4Kd_idIjE19-6d_LIwvxypEBOvXG42IaYVVqaKuIV8cxAyl0E-FGjBKpf-f0-e7ceNsYUJZsIM8KirpzRTl3MbWFY54cxCFVosSZryigPLQELIydKXn_Z_VQP23KJ57RWbuHJc80kWIZyVenCbMOZf4h00vE1bmplqXq8FBoS_33oppXzmXojw4NWqQyJWZV5dVQSB_t9dils8H4Z4dFaGiG7jKTaPKZIo-QKeL5HAss6ZRv6i2OXTNBFOVfixAufEgel7cuJB0YTZfe3FloyBv_U_B_EYrKP1tQw2ASZZWyCgZw795ivQ", "payload": "" } 2024-01-02 22:08:05,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 808 2024-01-02 22:08:05,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:08:05 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: T8gQgmcoXobK9RECMqBtf7iH20VZsvnU4l948L4Xqg-cVy3goxU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "pending", "expires": "2024-01-09T21:15:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cBoKzA", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/5q_0sg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } ] } 2024-01-02 22:08:05,115:DEBUG:acme.client:Storing nonce: T8gQgmcoXobK9RECMqBtf7iH20VZsvnU4l948L4Xqg-cVy3goxU 2024-01-02 22:08:05,115:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-02 22:08:05,115:INFO:certbot._internal.auth_handler:http-01 challenge for aberto.wand-magic.stream 2024-01-02 22:08:05,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-02 22:08:05,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-02 22:08:05,117:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:08:05,117:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-02 22:08:05,117:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-02 22:08:05,117:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:08:05,118:ERROR:certbot._internal.log:Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:14:13,784:DEBUG:certbot._internal.main:certbot version: 1.21.0 2024-01-02 22:14:13,784:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2024-01-02 22:14:13,784:DEBUG:certbot._internal.main:Arguments: ['--standalone', '--agree-tos', '--register-unsafely-without-email', '-d', 'aberto.wand-magic.stream', '--config-dir', '/home/ubuntu/.certbot/config/', '--work-dir', '/home/ubuntu/.certbot/work/', '--logs-dir', '/home/ubuntu/.certbot/logs/', '-v'] 2024-01-02 22:14:13,784:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-02 22:14:13,791:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-02 22:14:13,792:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:14:13,792:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: Authenticator, Plugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-02 22:14:13,792:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-02 22:14:13,792:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-02 22:14:13,973:DEBUG:certbot._internal.main:Picked account: ), creation_host='instance-20221212-1023.subnet11170331.vcn11111427.oraclevcn.com', register_to_eff=None))> 2024-01-02 22:14:13,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-02 22:14:13,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-02 22:14:14,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-02 22:14:14,482:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:14:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "c9Yhq39BD2g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-02 22:14:14,482:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for aberto.wand-magic.stream 2024-01-02 22:14:14,811:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /home/ubuntu/.certbot/config/keys/0003_key-certbot.pem 2024-01-02 22:14:14,817:DEBUG:certbot.crypto_util:Creating CSR: /home/ubuntu/.certbot/config/csr/0003_csr-certbot.pem 2024-01-02 22:14:14,819:DEBUG:acme.client:Requesting fresh nonce 2024-01-02 22:14:14,819:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-02 22:14:14,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-02 22:14:14,988:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:14:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: I5zfHDkYD8Qv4XCSxzWuOnySMErS0yR8OTPBWV-zvaw_nGoqVAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-02 22:14:14,988:DEBUG:acme.client:Storing nonce: I5zfHDkYD8Qv4XCSxzWuOnySMErS0yR8OTPBWV-zvaw_nGoqVAc 2024-01-02 22:14:14,988:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aberto.wand-magic.stream"\n }\n ]\n}' 2024-01-02 22:14:14,993:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWUQ4UXY0WENTeHpXdU9ueVNNRXJTMHlSOE9UUEJXVi16dmF3X25Hb3FWQWMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "Y7MiOvVXljtcGXT80t2en1Isi7RonIDO3fVd34UJaCEnMa2V4exjKgLVdiMY0Yba6Kym1nqDH7bwVlNS5Tmj7AZ9OJM2JUgRb7D7oOPyz8vjYXxhNHAYPA3qpfOMlleryLMq3TO70cexoPfS88pB4DqCpM-8vW8m6DPbQnhBary01P3RIkP80lUfStLCLr0izY0Jh1dNCW6LeXMdgf6XAks7y4YZ1Ggv-zCvWuzbqYjDSGNtmwrAB19n6Jik6pwXA4k8OmnDRJh3bpgIIl-U1FNq6swFh9wvs2jPnmZoH_Y41Sy1BZsKEw3zsXZcsnyCv5K2bML4S_WEmMXUT05Bng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbSIKICAgIH0KICBdCn0" } 2024-01-02 22:14:15,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-02 22:14:15,175:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 22:14:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: zXX7izQw3xBRgfHBl8NB4razoOzFoBkOIi7PbE9DcT2X7nD48So X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586" } 2024-01-02 22:14:15,175:DEBUG:acme.client:Storing nonce: zXX7izQw3xBRgfHBl8NB4razoOzFoBkOIi7PbE9DcT2X7nD48So 2024-01-02 22:14:15,175:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:14:15,179:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJ6WFg3aXpRdzN4QlJnZkhCbDhOQjRyYXpvT3pGb0JrT0lpN1BiRTlEY1QyWDduRDQ4U28iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "KKx_03trYxguzLPk8h2OkKg_rCdYAkfJuhboio-vLjqx_9k8kEfDirVepAt4RYEmyRsgoAXouxlK9GvGYQtPdFqTm1xHmD_MSQGBpKDPQwaIUNbeJ8pviwUH1QaQbhB0OrCa438Khs0pkDonLlY4wcPfQ4eMJ3TWTV73abaltiGuE11Wch7Yn6M-8pDZqPG3zhdkvfP_1umrEOTpW1HvHNSMoIaKBGpH-qY6nJc_w_rncAuFsdRvtvFY33FlpaCKtQcUvvGvsXnkJXyMa33qqU2joEyW_MMGdm15nwBZ5kDaOB-0Ywqe29-nrzIAd9hUcjhkCIOSMATRlTVJ7yFZLw", "payload": "" } 2024-01-02 22:14:15,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 808 2024-01-02 22:14:15,356:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:14:15 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zXX7izQwlLSlKQnjS0h1mU3ss8caLTgYHKzAYyUnJwlssY7jNUk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "pending", "expires": "2024-01-09T21:15:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cBoKzA", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/5q_0sg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } ] } 2024-01-02 22:14:15,356:DEBUG:acme.client:Storing nonce: zXX7izQwlLSlKQnjS0h1mU3ss8caLTgYHKzAYyUnJwlssY7jNUk 2024-01-02 22:14:15,357:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-02 22:14:15,357:INFO:certbot._internal.auth_handler:http-01 challenge for aberto.wand-magic.stream 2024-01-02 22:14:15,358:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-02 22:14:15,358:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-02 22:14:15,359:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:14:15,359:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-02 22:14:15,359:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-02 22:14:15,359:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 71, in run servers = acme_standalone.HTTP01DualNetworkedServers( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 211, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 120, in __init__ raise last_socket_err File "/usr/lib/python3/dist-packages/acme/standalone.py", line 95, in __init__ server = ServerClass(*new_args, **kwargs) File "/usr/lib/python3/dist-packages/acme/standalone.py", line 201, in __init__ HTTPServer.__init__( File "/usr/lib/python3/dist-packages/acme/standalone.py", line 193, in __init__ BaseHTTPServer.HTTPServer.__init__(self, *args, **kwargs) File "/usr/lib/python3.10/socketserver.py", line 452, in __init__ self.server_bind() File "/usr/lib/python3.10/http/server.py", line 137, in server_bind socketserver.TCPServer.server_bind(self) File "/usr/lib/python3.10/socketserver.py", line 466, in server_bind self.socket.bind(self.server_address) PermissionError: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 158, in _try_perform_single return self._perform_single(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 163, in _perform_single servers, response = self._perform_http_01(achall) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 170, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: [Errno 13] Permission denied During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/usr/bin/certbot", line 33, in sys.exit(load_entry_point('certbot==1.21.0', 'console_scripts', 'certbot')()) File "/usr/lib/python3/dist-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1434, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 133, in _get_and_save_cert lineage = le_client.obtain_and_enroll_certificate(domains, certname) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 459, in obtain_and_enroll_certificate cert, chain, key, _ = self.obtain_certificate(domains) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 389, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 439, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in perform return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 153, in return [self._try_perform_single(achall) for achall in achalls] File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 160, in _try_perform_single _handle_perform_error(error) File "/usr/lib/python3/dist-packages/certbot/_internal/plugins/standalone.py", line 198, in _handle_perform_error raise errors.PluginError( certbot.errors.PluginError: Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:14:15,360:ERROR:certbot._internal.log:Could not bind TCP port 80 because you don't have the appropriate permissions (for example, you aren't running this program as root). 2024-01-02 22:21:47,914:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97 2024-01-02 22:21:48,077:DEBUG:certbot._internal.main:certbot version: 2.8.0 2024-01-02 22:21:48,077:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/3567/bin/certbot 2024-01-02 22:21:48,077:DEBUG:certbot._internal.main:Arguments: ['--standalone', '--agree-tos', '--register-unsafely-without-email', '-d', 'aberto.wand-magic.stream', '--config-dir', '/home/ubuntu/.certbot/config/', '--work-dir', '/home/ubuntu/.certbot/work/', '--logs-dir', '/home/ubuntu/.certbot/logs/', '-v', '--preconfigured-renewal'] 2024-01-02 22:21:48,077:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-02 22:21:48,084:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-02 22:21:48,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:21:48,085:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Runs an HTTP server locally which serves the necessary validation files under the /.well-known/acme-challenge/ request path. Suitable if there is no HTTP server already running. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='standalone', value='certbot._internal.plugins.standalone:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-01-02 22:21:48,086:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-02 22:21:48,086:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-02 22:21:48,269:DEBUG:certbot._internal.main:Picked account: ), creation_host='instance-20221212-1023.subnet11170331.vcn11111427.oraclevcn.com', register_to_eff=None))> 2024-01-02 22:21:48,271:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-02 22:21:48,272:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-02 22:21:48,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-02 22:21:48,743:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CD0gVVMRl4k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-02 22:21:48,743:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for aberto.wand-magic.stream 2024-01-02 22:21:48,747:DEBUG:acme.client:Requesting fresh nonce 2024-01-02 22:21:48,747:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-02 22:21:48,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-02 22:21:48,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: zXX7izQw1u1aTeWNRHtTG8EYbufRWX_OVMi-j7IXczWGO8pLx-w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-02 22:21:48,903:DEBUG:acme.client:Storing nonce: zXX7izQw1u1aTeWNRHtTG8EYbufRWX_OVMi-j7IXczWGO8pLx-w 2024-01-02 22:21:48,904:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aberto.wand-magic.stream"\n }\n ]\n}' 2024-01-02 22:21:48,926:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJ6WFg3aXpRdzF1MWFUZVdOUkh0VEc4RVlidWZSV1hfT1ZNaS1qN0lYY3pXR084cEx4LXciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9", "signature": "go272XFeC7pZtn7qeEAyzlmQzuK3Em-5H2IdUgolK_HJHhLsMll1q0UqqqJOhBs8xXuY5OX_4_geMtv5AJNkAKBvZ9FaH9y0zI_8kPx4wog-l_BatnK-ke_Nare0QQeY9udkPhcM4Z9WBc3mpdmDYSN6BW9b75Z3gQHirdVBv5AEdG_JWepxpnX64HkqjlKAk3VTG_R5Sm8mH4sVKXLQ1KdNAUdOPUL6I7eTry7FiGngt7cFdNCs5j2UmE_Hoefy_JDctDT1pYMafIJNZoUHPok4R4Y0GhX0NQAM5HjFf6VAaEomdssEETn0vZsgrylMQA1wRGx4YEoDewWKwBMu3g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbSIKICAgIH0KICBdCn0" } 2024-01-02 22:21:49,102:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-02 22:21:49,103:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jan 2024 22:21:49 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: zXX7izQwEde-dtOaeHl5IfjBYIDst4JHLjXMXEx93Uwei-ULWZM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586" } 2024-01-02 22:21:49,103:DEBUG:acme.client:Storing nonce: zXX7izQwEde-dtOaeHl5IfjBYIDst4JHLjXMXEx93Uwei-ULWZM 2024-01-02 22:21:49,103:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:21:49,107:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJ6WFg3aXpRd0VkZS1kdE9hZUhsNUlmakJZSURzdDRKSExqWE1YRXg5M1V3ZWktVUxXWk0iLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "cFsLELbtS7hdmNabRXfParKFiemsJRYdxSxer6j0oJBMwTj6XFNwUdYr27dvCvxzRUNdK9c7hTTz-hcbgfk1FHlXKpmLUEEsmULH1cc2XV8dAAhBoahv-sfetxid2u0lDIy369RHfGiWqnv41dS76Ou7ET9t26Yk2TovVmXbpUxzn6InZd6PnF6USV0nuT_bpFgtVfz4RnWhlCdM7pSXIVQK2rgc8L4fkq8YxqwgaJCdmPSwkXtoDyruRnlfKQfWIFtC5W38f_niKuNLoIQun9AaDjWHRUfnL6Di7vqwMxULAQEX6u3bGl9hCTBzDJXDpQCzzO8uhoUlxMPVrDlX3w", "payload": "" } 2024-01-02 22:21:49,266:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 808 2024-01-02 22:21:49,267:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:49 GMT Content-Type: application/json Content-Length: 808 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: I5zfHDkYhhANOjW56-KlBUtvi8jaQopujj4BmHdGOXZoKQmRoII X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "pending", "expires": "2024-01-09T21:15:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cBoKzA", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/5q_0sg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } ] } 2024-01-02 22:21:49,267:DEBUG:acme.client:Storing nonce: I5zfHDkYhhANOjW56-KlBUtvi8jaQopujj4BmHdGOXZoKQmRoII 2024-01-02 22:21:49,267:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-02 22:21:49,268:INFO:certbot._internal.auth_handler:http-01 challenge for aberto.wand-magic.stream 2024-01-02 22:21:49,268:DEBUG:acme.standalone:Successfully bound to :80 using IPv6 2024-01-02 22:21:49,268:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations. 2024-01-02 22:21:49,269:DEBUG:acme.client:JWS payload: b'{}' 2024-01-02 22:21:49,273:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWWhoQU5Palc1Ni1LbEJVdHZpOGphUW9wdWpqNEJtSGRHT1hab0tRbVJvSUkiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzMwMDEwMjA0NzQ4Ni9jeFhNUWcifQ", "signature": "oMnZuVpJ5ZC-inJAxc_wvVwdI9ugHexPFp9bbuFG2KBQFU2aU27uiS5_exs1pFh5mYKvrPXaHWG_mGuk21wuJtujY5YiiQAx3hTrPVXqfV2Si4easTDS4Z3c4X262YEjJiufh6wk6vwIwCVfYBItf82zCnYTU-WkXKeRXSBwjhVN4qT2ssud6Z2i2FFF7V_owFxoZ-ftviQ_tBrZY6da12eNTV5XZ8MfPFHjHpZYE1tK3K-WS8zn8DcmUrlh2T2g4jPNmCsytDttvmdYt2ivg1zgFWMz3v-oUepeP6WKSFvL1hJnxxSKqwtMrQPJ4gs41sbP8Dch3zmxqhlSzXpWJg", "payload": "e30" } 2024-01-02 22:21:49,434:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/300102047486/cxXMQg HTTP/1.1" 200 187 2024-01-02 22:21:49,435:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:49 GMT Content-Type: application/json Content-Length: 187 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg Replay-Nonce: I5zfHDkYesRBmbAwO3wk-KhxWv4gzSTuVBBRLP6yt3CzVCvR0Qs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY" } 2024-01-02 22:21:49,435:DEBUG:acme.client:Storing nonce: I5zfHDkYesRBmbAwO3wk-KhxWv4gzSTuVBBRLP6yt3CzVCvR0Qs 2024-01-02 22:21:49,435:INFO:certbot._internal.auth_handler:Waiting for verification... 2024-01-02 22:21:49,822:DEBUG:acme.standalone:::ffff:172.71.150.197 - - Incoming request 2024-01-02 22:21:49,822:DEBUG:acme.standalone:::ffff:172.71.150.197 - - Serving HTTP01 with token 'rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY' 2024-01-02 22:21:49,822:DEBUG:acme.standalone:::ffff:172.71.150.197 - - "GET /.well-known/acme-challenge/rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY HTTP/1.1" 200 - 2024-01-02 22:21:49,871:DEBUG:acme.standalone:::ffff:162.158.245.36 - - Incoming request 2024-01-02 22:21:49,871:DEBUG:acme.standalone:::ffff:162.158.245.36 - - Serving HTTP01 with token 'rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY' 2024-01-02 22:21:49,872:DEBUG:acme.standalone:::ffff:162.158.245.36 - - "GET /.well-known/acme-challenge/rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY HTTP/1.1" 200 - 2024-01-02 22:21:50,437:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:21:50,441:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWWVzUkJtYkF3TzN3ay1LaHhXdjRnelNUdVZCQlJMUDZ5dDNDelZDdlIwUXMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzMwMDEwMjA0NzQ4NiJ9", "signature": "mZ7cVqjB-dix6b1I8JkAIp2dWNIViHWcb83IV7ycSav_5wqACNyXzdZLNvuEoq8fPh8oikjciCyqur1JqdGQQOtmUZ3xqwRwcWVOJG8oulexdrnvF3Bw0K56cvc4zT-4BXg77rVgyaW46sK8zC5pfyhfyRcd3O3xW2qmcr3cmYTLkfjW5ekbRZQxVzWSHCI1Hw5f9v1iOmnTFHWYDdKv_Is4BgaycTrpi2rLGlS3ILtAKcKeoe26gnI2C8gT8r1t_KDpN3TiNXjXCEn6IwMCO2cnlBM0LfKj38pYVwX2BEQrFlPVaFwmJx8XOK3GXc84VKh4fyrMzsejSAszMSZCaw", "payload": "" } 2024-01-02 22:21:50,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/300102047486 HTTP/1.1" 200 910 2024-01-02 22:21:50,600:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:50 GMT Content-Type: application/json Content-Length: 910 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: I5zfHDkYWPJ03y3gxyHD7_UMJP9vE1Rco5rKUKUTBOMoqlraWhg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aberto.wand-magic.stream" }, "status": "valid", "expires": "2024-02-01T22:21:50Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/300102047486/cxXMQg", "token": "rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY", "validationRecord": [ { "url": "http://aberto.wand-magic.stream/.well-known/acme-challenge/rbNd1JtjZw7nbB0E8srwit-kaw_7sCMI6NobPc2qWGY", "hostname": "aberto.wand-magic.stream", "port": "80", "addressesResolved": [ "172.67.191.42", "104.21.65.159", "2606:4700:3030::ac43:bf2a", "2606:4700:3037::6815:419f" ], "addressUsed": "2606:4700:3030::ac43:bf2a" } ], "validated": "2024-01-02T22:21:49Z" } ] } 2024-01-02 22:21:50,600:DEBUG:acme.client:Storing nonce: I5zfHDkYWPJ03y3gxyHD7_UMJP9vE1Rco5rKUKUTBOMoqlraWhg 2024-01-02 22:21:50,600:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-02 22:21:50,600:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-02 22:21:50,601:DEBUG:certbot._internal.plugins.standalone:Stopping server at :::80... 2024-01-02 22:21:50,877:DEBUG:certbot._internal.client:CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----\nMIHxMIGYAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASS5RSLMg9VzWH6\noOV3oiVNYjSGY23JLYA4UeVA7Rj9ThsIZ8kUfTz5Q9mWG6EmNgdI2UyLHjObIUw+\nG/Hz/z5SoDYwNAYJKoZIhvcNAQkOMScwJTAjBgNVHREEHDAaghhhYmVydG8ud2Fu\nZC1tYWdpYy5zdHJlYW0wCgYIKoZIzj0EAwIDSAAwRQIhAJorSUyvqlFyN/jJPElR\n/m/X/zmQpndERshAUslsZ46hAiA3cmjpROiAFg+vhjZB+9fX9vqtX78/e7QS1MNa\nu+Bydw==\n-----END CERTIFICATE REQUEST-----\n', form='pem') 2024-01-02 22:21:50,878:DEBUG:certbot._internal.client:Will poll for certificate issuance until 2024-01-02 22:23:20.878297 2024-01-02 22:21:50,878:DEBUG:acme.client:JWS payload: b'{\n "csr": "MIHxMIGYAgEAMAAwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASS5RSLMg9VzWH6oOV3oiVNYjSGY23JLYA4UeVA7Rj9ThsIZ8kUfTz5Q9mWG6EmNgdI2UyLHjObIUw-G_Hz_z5SoDYwNAYJKoZIhvcNAQkOMScwJTAjBgNVHREEHDAaghhhYmVydG8ud2FuZC1tYWdpYy5zdHJlYW0wCgYIKoZIzj0EAwIDSAAwRQIhAJorSUyvqlFyN_jJPElR_m_X_zmQpndERshAUslsZ46hAiA3cmjpROiAFg-vhjZB-9fX9vqtX78_e7QS1MNau-Bydw"\n}' 2024-01-02 22:21:50,882:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWVdQSjAzeTNneHlIRDdfVU1KUDl2RTFSY281cktVS1VUQk9Nb3FscmFXaGciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2ZpbmFsaXplLzE0OTY0MDM2MDYvMjMzNzg0NTcyNTg2In0", "signature": "HtDGHmrjP_xnumbIcE6mr4aqB8rgvkFiLqDDqSB-3p3O3MupE7zFFE85nHd_2mhfqD_wl2ElZU0dATuY_OxCc8nOX-TNjc9CcAxq9qimjGiiiGPwBjHaH5_LOPONZrZEhX7vqQuvstitXW5CttS_kJJEsiTG-VCX_nsQF3mPGnjUKZ5iT2NBgtx_fPDmutmZDe8DcPTellwff4up_nzLJtX64eMAGiL1QWp9ZqGJ2-xqZMp-I8DgVtNnblgogmbXqpEHLAAsHWAKYfZ7TDGo3GdncwmG6GuStIeBNPUDpp_-59lVf1ehLmFSq7KchJuP3BLCiXVJHO45Ky45XZzPPQ", "payload": "ewogICJjc3IiOiAiTUlIeE1JR1lBZ0VBTUFBd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTUzVSU0xNZzlWeldINm9PVjNvaVZOWWpTR1kyM0pMWUE0VWVWQTdSajlUaHNJWjhrVWZUejVROW1XRzZFbU5nZEkyVXlMSGpPYklVdy1HX0h6X3o1U29EWXdOQVlKS29aSWh2Y05BUWtPTVNjd0pUQWpCZ05WSFJFRUhEQWFnaGhoWW1WeWRHOHVkMkZ1WkMxdFlXZHBZeTV6ZEhKbFlXMHdDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWhBSm9yU1V5dnFsRnlOX2pKUEVsUl9tX1hfem1RcG5kRVJzaEFVc2xzWjQ2aEFpQTNjbWpwUk9pQUZnLXZoalpCLTlmWDl2cXRYNzhfZTdRUzFNTmF1LUJ5ZHciCn0" } 2024-01-02 22:21:51,228:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/finalize/1496403606/233784572586 HTTP/1.1" 200 452 2024-01-02 22:21:51,228:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:51 GMT Content-Type: application/json Content-Length: 452 Connection: keep-alive Boulder-Requester: 1496403606 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586 Replay-Nonce: I5zfHDkYPOXnqLvOqR6sSdE4jqSUXuLdgkgPiz_nGWYy4N_BARU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "valid", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586", "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/034fb78d52d70869acfad5ee35c27261b7f6" } 2024-01-02 22:21:51,228:DEBUG:acme.client:Storing nonce: I5zfHDkYPOXnqLvOqR6sSdE4jqSUXuLdgkgPiz_nGWYy4N_BARU 2024-01-02 22:21:52,230:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:21:52,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/order/1496403606/233784572586: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWVBPWG5xTHZPcVI2c1NkRTRqcVNVWHVMZGdrZ1Bpel9uR1dZeTROX0JBUlUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL29yZGVyLzE0OTY0MDM2MDYvMjMzNzg0NTcyNTg2In0", "signature": "QcxnTvBumgIcFfpVcH8NFSXC_VJjfF9ETxfnSJyx_iEWdY0JVtY6J1L1585O-cG78QQeIAF2uDdagDExHgOG5NVFEFZqyEdSXfCX8avz7xgO6DL0jFHR4xDCn8yeYefem6JLQWQwbmgAwh2zmFZlVBe4ZzpuGrC9jlTLz_i31rurgVxjSaM2Vr7x433BiZO1LK3nTUlLbkX0jciXAXSmPMSDHgAg6c0RbyedIMqAPafaGMdf9w-FTa76CLgq0YxfzcrHxPrxQbIMtGKRTJ7q7bAto88n87Daaj8ugNgvfgZogGwbY0dV1as28Bu4kYUDfAe7xTVY9a8UXRJpyA8gWQ", "payload": "" } 2024-01-02 22:21:52,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/order/1496403606/233784572586 HTTP/1.1" 200 452 2024-01-02 22:21:52,397:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:52 GMT Content-Type: application/json Content-Length: 452 Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: I5zfHDkYdNwH8GbScUGi8rqqIR2XMvJM1j7AIrsJEaq2hP0M0F4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "valid", "expires": "2024-01-09T21:15:35Z", "identifiers": [ { "type": "dns", "value": "aberto.wand-magic.stream" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/300102047486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1496403606/233784572586", "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/034fb78d52d70869acfad5ee35c27261b7f6" } 2024-01-02 22:21:52,397:DEBUG:acme.client:Storing nonce: I5zfHDkYdNwH8GbScUGi8rqqIR2XMvJM1j7AIrsJEaq2hP0M0F4 2024-01-02 22:21:52,398:DEBUG:acme.client:JWS payload: b'' 2024-01-02 22:21:52,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/cert/034fb78d52d70869acfad5ee35c27261b7f6: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTQ5NjQwMzYwNiIsICJub25jZSI6ICJJNXpmSERrWWROd0g4R2JTY1VHaThycXFJUjJYTXZKTTFqN0FJcnNKRWFxMmhQME0wRjQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NlcnQvMDM0ZmI3OGQ1MmQ3MDg2OWFjZmFkNWVlMzVjMjcyNjFiN2Y2In0", "signature": "baSOHVr33TylSsKqpMd3NJSPKqL03U-eKvDwWEF3OOELjy7UfqoncKt858fn3Q6exxQ2UhJ0GewZB0amN0zWNRmFZpS8CCN-oXJINifOR9fS4eTFZTLruyEP0Vcdh4R377aR9RKaENti4QNbpUQ-H42unhhtdI1552vagseM1IgmFaLJ77GYppWDBbmQqhdlnxyFO0gPck8wolOyAYRJ74g87LOnzkTsLBR8q4Nl_3UlObMOS75KWKOVZRY0hoI9DtWi_v_qMJmOALmZF6OA4w1r4RflNhBvqwxmzc7_o7ihihZkjBSh803xJsASZgTfTzx2i5QBfW65VRlZbXUe0w", "payload": "" } 2024-01-02 22:21:52,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/cert/034fb78d52d70869acfad5ee35c27261b7f6 HTTP/1.1" 200 5268 2024-01-02 22:21:52,562:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jan 2024 22:21:52 GMT Content-Type: application/pem-certificate-chain Content-Length: 5268 Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="alternate" Replay-Nonce: zXX7izQw8AlKCF5n8ab4H26m3YX4712T0gUPGvUkSp1BEjbmJ1s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 -----BEGIN CERTIFICATE----- MIIEMjCCAxqgAwIBAgISA0+3jVLXCGms+tXuNcJyYbf2MA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yNDAxMDIyMTIxNTBaFw0yNDA0MDEyMTIxNDlaMCMxITAfBgNVBAMT GGFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbTBZMBMGByqGSM49AgEGCCqGSM49AwEH A0IABJLlFIsyD1XNYfqg5XeiJU1iNIZjbcktgDhR5UDtGP1OGwhnyRR9PPlD2ZYb oSY2B0jZTIseM5shTD4b8fP/PlKjggIaMIICFjAOBgNVHQ8BAf8EBAMCB4AwHQYD VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O BBYEFKLq0jnL9p3ybdHovkbzFrqeuWmEMB8GA1UdIwQYMBaAFBQusxe3WFbLrlAJ QOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDovL3Iz Lm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5vcmcv MCMGA1UdEQQcMBqCGGFiZXJ0by53YW5kLW1hZ2ljLnN0cmVhbTATBgNVHSAEDDAK MAgGBmeBDAECATCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB2AEiw42vapkc0D+Vq AvqdMOscUgHLVt0sgdm7v6s52IRzAAABjMxE0FYAAAQDAEcwRQIhAOpGrIwIdckE 9livGwiZ1fSqZiR4MK1ZKBnXM44u3jsZAiBGTXoRxcv6cswhlNBMyHr9mb6vVyOx D28gQ42C9l+vgAB2ADtTd3U+LbmAToswWwb+QDtn2E/D9Me9AA0tcm/h+tQXAAAB jMxE0FwAAAQDAEcwRQIgLo40n3LJn7yoCRc+DpnE4axlL+PspcOqLZW2G7JYDIsC IQCaFtsECVlgq54bh2G0Kf8QGM6JGFt+b6jBEf6t47de3jANBgkqhkiG9w0BAQsF AAOCAQEAKLoudRT5saV2T+5YJa7yfXHO/yD65zJ0zq50uHsBnMvCBUtSPdicrZ7p K+ef/2WuEDkCa6O106xSMu5JFdsFN3PC+J155GJvPqc7LWK5BizVokx//c3sHtWm /6rpkDw5gSAZ0MswuM8BaHuadxqDP8VCVYDwtGibvfhJGZzgCPZ3K/22MjmO7siZ ewi6oa3IDDAw4ciAo7KUIPOfm5L0N0nusRPgQzGcswIu1K3okNXYEf3BcaAmVO9y fULJVM71WZRV1WF0FuzgSzlHWVaYfrPu9x9yI6rwUej+w1T/HocdSqVlgf4olpA5 MaGCwzr39YuAIe7ch34EazM/dBY/Bg== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG /kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX nLRbwHOoq7hHwg== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIFYDCCBEigAwIBAgIQQAF3ITfU6UK47naqPGQKtzANBgkqhkiG9w0BAQsFADA/ MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT DkRTVCBSb290IENBIFgzMB4XDTIxMDEyMDE5MTQwM1oXDTI0MDkzMDE4MTQwM1ow TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwggIiMA0GCSqGSIb3DQEB AQUAA4ICDwAwggIKAoICAQCt6CRz9BQ385ueK1coHIe+3LffOJCMbjzmV6B493XC ov71am72AE8o295ohmxEk7axY/0UEmu/H9LqMZshftEzPLpI9d1537O4/xLxIZpL wYqGcWlKZmZsj348cL+tKSIG8+TA5oCu4kuPt5l+lAOf00eXfJlII1PoOK5PCm+D LtFJV4yAdLbaL9A4jXsDcCEbdfIwPPqPrt3aY6vrFk/CjhFLfs8L6P+1dy70sntK 4EwSJQxwjQMpoOFTJOwT2e4ZvxCzSow/iaNhUd6shweU9GNx7C7ib1uYgeGJXDR5 bHbvO5BieebbpJovJsXQEOEO3tkQjhb7t/eo98flAgeYjzYIlefiN5YNNnWe+w5y sR2bvAP5SQXYgd0FtCrWQemsAXaVCg/Y39W9Eh81LygXbNKYwagJZHduRze6zqxZ Xmidf3LWicUGQSk+WT7dJvUkyRGnWqNMQB9GoZm1pzpRboY7nn1ypxIFeFntPlF4 FQsDj43QLwWyPntKHEtzBRL8xurgUBN8Q5N0s8p0544fAQjQMNRbcTa0B7rBMDBc SLeCO5imfWCKoqMpgsy6vYMEG6KDA0Gh1gXxG8K28Kh8hjtGqEgqiNx2mna/H2ql PRmP6zjzZN7IKw0KKP/32+IVQtQi0Cdd4Xn+GOdwiK1O5tmLOsbdJ1Fu/7xk9TND TwIDAQABo4IBRjCCAUIwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYw SwYIKwYBBQUHAQEEPzA9MDsGCCsGAQUFBzAChi9odHRwOi8vYXBwcy5pZGVudHJ1 c3QuY29tL3Jvb3RzL2RzdHJvb3RjYXgzLnA3YzAfBgNVHSMEGDAWgBTEp7Gkeyxx +tvhS5B1/8QVYIWJEDBUBgNVHSAETTBLMAgGBmeBDAECATA/BgsrBgEEAYLfEwEB ATAwMC4GCCsGAQUFBwIBFiJodHRwOi8vY3BzLnJvb3QteDEubGV0c2VuY3J5cHQu b3JnMDwGA1UdHwQ1MDMwMaAvoC2GK2h0dHA6Ly9jcmwuaWRlbnRydXN0LmNvbS9E U1RST09UQ0FYM0NSTC5jcmwwHQYDVR0OBBYEFHm0WeZ7tuXkAXOACIjIGlj26Ztu MA0GCSqGSIb3DQEBCwUAA4IBAQAKcwBslm7/DlLQrt2M51oGrS+o44+/yQoDFVDC 5WxCu2+b9LRPwkSICHXM6webFGJueN7sJ7o5XPWioW5WlHAQU7G75K/QosMrAdSW 9MUgNTP52GE24HGNtLi1qoJFlcDyqSMo59ahy2cI2qBDLKobkx/J3vWraV0T9VuG WCLKTVXkcGdtwlfFRjlBz4pYg1htmf5X6DYO8A4jqv2Il9DjXA6USbW1FzXSLr9O he8Y4IWS6wY7bCkjCWDcRQJMEhg76fsO3txE+FiYruq9RUWhiF1myv4Q6W+CyBFC Dfvp7OOGAN6dEOM4+qR9sdjoSYKEBpsr6GtPAQw4dy753ec5 -----END CERTIFICATE----- 2024-01-02 22:21:52,563:DEBUG:acme.client:Storing nonce: zXX7izQw8AlKCF5n8ab4H26m3YX4712T0gUPGvUkSp1BEjbmJ1s 2024-01-02 22:21:52,564:INFO:certbot._internal.client:Non-standard path(s), might not work with crontab installed by your operating system package manager 2024-01-02 22:21:52,564:DEBUG:certbot._internal.storage:Creating directory /home/ubuntu/.certbot/config/archive. 2024-01-02 22:21:52,564:DEBUG:certbot._internal.storage:Creating directory /home/ubuntu/.certbot/config/live. 2024-01-02 22:21:52,564:DEBUG:certbot._internal.storage:Writing README to /home/ubuntu/.certbot/config/live/README. 2024-01-02 22:21:52,564:DEBUG:certbot._internal.storage:Creating directory /home/ubuntu/.certbot/config/archive/aberto.wand-magic.stream. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Creating directory /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Writing certificate to /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/cert.pem. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Writing private key to /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/privkey.pem. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Writing chain to /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/chain.pem. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Writing full chain to /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/fullchain.pem. 2024-01-02 22:21:52,565:DEBUG:certbot._internal.storage:Writing README to /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/README. 2024-01-02 22:21:52,569:DEBUG:certbot.configuration:Var account=28dcadf8d90488b0f65ce3446697fbd9 (set by user). 2024-01-02 22:21:52,569:DEBUG:certbot.configuration:Var config_dir=/home/ubuntu/.certbot/config (set by user). 2024-01-02 22:21:52,569:DEBUG:certbot.configuration:Var work_dir=/home/ubuntu/.certbot/work (set by user). 2024-01-02 22:21:52,569:DEBUG:certbot.configuration:Var logs_dir=/home/ubuntu/.certbot/logs (set by user). 2024-01-02 22:21:52,569:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:21:52,569:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-02 22:21:52,570:DEBUG:certbot._internal.storage:Writing new config /home/ubuntu/.certbot/config/renewal/aberto.wand-magic.stream.conf. 2024-01-02 22:21:52,572:DEBUG:certbot._internal.display.obj:Notifying user: Successfully received certificate. Certificate is saved at: /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/fullchain.pem Key is saved at: /home/ubuntu/.certbot/config/live/aberto.wand-magic.stream/privkey.pem This certificate expires on 2024-04-01. These files will be updated when the certificate renews. Certbot has set up a scheduled task to automatically renew this certificate in the background. 2024-01-02 22:21:52,573:DEBUG:certbot._internal.display.obj:Notifying user: If you like Certbot, please consider supporting our work by: * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate * Donating to EFF: https://eff.org/donate-le