Server IP : 172.16.15.8 / Your IP : 3.129.45.144 Web Server : Apache System : Linux zeus.vwu.edu 4.18.0-553.27.1.el8_10.x86_64 #1 SMP Wed Nov 6 14:29:02 UTC 2024 x86_64 User : apache ( 48) PHP Version : 7.2.24 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON Directory (0755) : /var/log/letsencrypt/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
2023-01-23 21:06:08,377:DEBUG:certbot._internal.main:certbot version: 1.11.0 2023-01-23 21:06:08,377:DEBUG:certbot._internal.main:Location of certbot entry point: /bin/certbot 2023-01-23 21:06:08,377:DEBUG:certbot._internal.main:Arguments: [] 2023-01-23 21:06:08,377:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-01-23 21:06:08,436:DEBUG:certbot._internal.log:Root logging level set at 20 2023-01-23 21:06:08,436:INFO:certbot._internal.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log 2023-01-23 21:06:08,438:DEBUG:certbot.display.util:Notifying user: Processing /etc/letsencrypt/renewal/zeus.vwu.edu.conf 2023-01-23 21:06:08,455:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7fda31151310> and installer <certbot._internal.cli.cli_utils._Default object at 0x7fda31151310> 2023-01-23 21:06:08,806:DEBUG:certbot.ocsp:Querying OCSP for /etc/letsencrypt/archive/zeus.vwu.edu/cert15.pem 2023-01-23 21:06:08,806:DEBUG:certbot.ocsp:openssl ocsp -no_nonce -issuer /etc/letsencrypt/archive/zeus.vwu.edu/chain15.pem -cert /etc/letsencrypt/archive/zeus.vwu.edu/cert15.pem -CAfile /etc/letsencrypt/archive/zeus.vwu.edu/chain15.pem -verify_other /etc/letsencrypt/archive/zeus.vwu.edu/chain15.pem -trust_other -timeout 10 -header Host r3.o.lencr.org -url http://r3.o.lencr.org 2023-01-23 21:06:08,931:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-01-31 01:24:50 UTC. 2023-01-23 21:06:08,931:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-01-23 21:06:08,931:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache 2023-01-23 21:06:09,097:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.6 2023-01-23 21:06:09,554:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache Description: Apache Web Server plugin Interfaces: IAuthenticator, IInstaller, IPlugin Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7fda3113db90> Prep: True 2023-01-23 21:06:09,555:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache Description: Apache Web Server plugin Interfaces: IAuthenticator, IInstaller, IPlugin Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7fda3113db90> Prep: True 2023-01-23 21:06:09,555:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7fda3113db90> and installer <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7fda3113db90> 2023-01-23 21:06:09,555:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache 2023-01-23 21:06:09,565:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, terms_of_service_agreed=None, agreement=None, only_return_existing=None, contact=(), key=None, external_account_binding=None), uri=u'https://acme-v02.api.letsencrypt.org/acme/acct/40173573', new_authzr_uri=None, terms_of_service=None), 6979ed2cc96e439045b7e68c37cf4450, Meta(creation_host=u'zeus.vwu.edu', register_to_eff=None, creation_dt=datetime.datetime(2018, 8, 13, 18, 27, 29, tzinfo=<UTC>)))> 2023-01-23 21:06:09,566:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-01-23 21:06:09,586:INFO:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org 2023-01-23 21:06:09,951:DEBUG:urllib3.connectionpool:"GET /directory HTTP/1.1" 200 659 2023-01-23 21:06:09,951:DEBUG:acme.client:Received response: HTTP 200 content-length: 659 strict-transport-security: max-age=604800 server: nginx connection: keep-alive cache-control: public, max-age=0, no-cache date: Tue, 24 Jan 2023 02:06:09 GMT x-frame-options: DENY content-type: application/json { "aWKnbNG4D78": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-01-23 21:06:09,952:DEBUG:certbot.display.util:Notifying user: Renewing an existing certificate for zeus.vwu.edu 2023-01-23 21:06:10,072:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0063_key-certbot.pem 2023-01-23 21:06:10,116:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0063_csr-certbot.pem 2023-01-23 21:06:10,117:DEBUG:acme.client:Requesting fresh nonce 2023-01-23 21:06:10,117:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-01-23 21:06:10,169:DEBUG:urllib3.connectionpool:"HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-01-23 21:06:10,170:DEBUG:acme.client:Received response: HTTP 200 strict-transport-security: max-age=604800 server: nginx connection: keep-alive link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" cache-control: public, max-age=0, no-cache date: Tue, 24 Jan 2023 02:06:10 GMT x-frame-options: DENY replay-nonce: 371CCfj67fi7DblWWT0hEyii6h6vd4bhZrHtip_x3kd1Dfw 2023-01-23 21:06:10,170:DEBUG:acme.client:Storing nonce: 371CCfj67fi7DblWWT0hEyii6h6vd4bhZrHtip_x3kd1Dfw 2023-01-23 21:06:10,170:DEBUG:acme.client:JWS payload: { "identifiers": [ { "type": "dns", "value": "zeus.vwu.edu" } ] } 2023-01-23 21:06:10,172:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJub25jZSI6ICIzNzFDQ2ZqNjdmaTdEYmxXV1QwaEV5aWk2aDZ2ZDRiaFpySHRpcF94M2tkMURmdyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzQwMTczNTczIiwgImFsZyI6ICJSUzI1NiJ9", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwgCiAgICAgICJ2YWx1ZSI6ICJ6ZXVzLnZ3dS5lZHUiCiAgICB9CiAgXQp9", "signature": "mKex_Q3MmGvs52tb0Mm9Z9IIZLuD6vUOhWgbn9IQ1A5VqXD_ow27y490zd_WPQ70h1S1TxPE7gZC4VkNOlPPBK0g8m3fzPzGPZtaeJsoRcuyz_7Y-MKJTVGyXPDmsGxKlO1wbO13elRvfmPfLlCg5kFRy9qQP3vjxS9e_HMnr6uNl0t-Bt-oFN5dZS6_ATl-UtaLc1uKXh4bNXa-Db5J42CsnFFbcXCWwwILtTVI94y2zaQuxE960EV373ds4_tsXtVlFMI3A0y_6p1TtXwhNefyKk1L2Z03dbIg4-dNLhmzXo13dG6a9IxkpTYT_6rU44e96jDLRg1NUBNv--7c5w" } 2023-01-23 21:06:10,423:DEBUG:urllib3.connectionpool:"POST /acme/new-order HTTP/1.1" 201 336 2023-01-23 21:06:10,423:DEBUG:acme.client:Received response: HTTP 201 content-length: 336 cache-control: public, max-age=0, no-cache strict-transport-security: max-age=604800 server: nginx connection: keep-alive link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" location: https://acme-v02.api.letsencrypt.org/acme/order/40173573/160635272457 boulder-requester: 40173573 date: Tue, 24 Jan 2023 02:06:10 GMT x-frame-options: DENY content-type: application/json replay-nonce: 1AADd21bnfJyQvi8ZKWX9BM5lrO3NdK9ySypsSUCXfOrTiQ { "status": "pending", "expires": "2023-01-31T02:06:10Z", "identifiers": [ { "type": "dns", "value": "zeus.vwu.edu" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/197720410527" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/40173573/160635272457" } 2023-01-23 21:06:10,423:DEBUG:acme.client:Storing nonce: 1AADd21bnfJyQvi8ZKWX9BM5lrO3NdK9ySypsSUCXfOrTiQ 2023-01-23 21:06:10,424:DEBUG:acme.client:JWS payload: 2023-01-23 21:06:10,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/197720410527: { "protected": "eyJub25jZSI6ICIxQUFEZDIxYm5mSnlRdmk4WktXWDlCTTVsck8zTmRLOXlTeXBzU1VDWGZPclRpUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvMTk3NzIwNDEwNTI3IiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzQwMTczNTczIiwgImFsZyI6ICJSUzI1NiJ9", "payload": "", "signature": "XKyuAkr6i9Mg4pon6pW6OKNJySPda444_Y_huO8JMBu9i6h-6do9XFxtSL73vIuaF-6gnzZp8tDeL0KM2N5gnXAISoj6Tc6KTbEfrOODHu4MMMzBRV_JTEGDaBSQ9M6mx_vCAcdVwd8cQMXIPRBjdXSdqVssbSonvCi9Xu3lTyV5FmfOmKPekmj9XdT5nwwntQJBLxklqG2JwTqcu-4PrnYlG3ThkB-XO5COr6adf2hvqlpF2Pt09J4DqXvLLVKriVcUWoqB1JTE2m47fEQh22zLCaWqgy3b1hdHiQ7Iy7Qb0riYYssovTqxAi0jwH3HQR-npHky446Wh53pmgMerQ" } 2023-01-23 21:06:10,481:DEBUG:urllib3.connectionpool:"POST /acme/authz-v3/197720410527 HTTP/1.1" 200 796 2023-01-23 21:06:10,481:DEBUG:acme.client:Received response: HTTP 200 content-length: 796 cache-control: public, max-age=0, no-cache strict-transport-security: max-age=604800 server: nginx connection: keep-alive link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" boulder-requester: 40173573 date: Tue, 24 Jan 2023 02:06:10 GMT x-frame-options: DENY content-type: application/json replay-nonce: C878bgWlHfBfPmbnDp9jGm9T53Sck2YGGXa75r0PQyJrIPA { "identifier": { "type": "dns", "value": "zeus.vwu.edu" }, "status": "pending", "expires": "2023-01-31T02:06:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/197720410527/HcNRRA", "token": "c5yPzZ5kfr87Rqyd7W3UzZA2ZumP4Xy7i58C65SCW04" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/197720410527/WNLfMg", "token": "c5yPzZ5kfr87Rqyd7W3UzZA2ZumP4Xy7i58C65SCW04" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/197720410527/Rr2u6Q", "token": "c5yPzZ5kfr87Rqyd7W3UzZA2ZumP4Xy7i58C65SCW04" } ] } 2023-01-23 21:06:10,481:DEBUG:acme.client:Storing nonce: C878bgWlHfBfPmbnDp9jGm9T53Sck2YGGXa75r0PQyJrIPA 2023-01-23 21:06:10,482:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-01-23 21:06:10,482:INFO:certbot._internal.auth_handler:http-01 challenge for zeus.vwu.edu 2023-01-23 21:06:10,560:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/configurator.py", line 2498, in perform http_response = http_doer.perform() File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 76, in perform self._mod_config() File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 111, in _mod_config for vh in self._relevant_vhosts(): File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 166, in _relevant_vhosts " {0}.".format(http01_port)) PluginError: Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80. 2023-01-23 21:06:10,560:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-01-23 21:06:10,560:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-01-23 21:06:11,022:ERROR:certbot._internal.renewal:Failed to renew certificate zeus.vwu.edu with error: Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80. 2023-01-23 21:06:11,063:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 471, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1235, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 124, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 331, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python2.7/site-packages/certbot/_internal/client.py", line 374, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python2.7/site-packages/certbot/_internal/client.py", line 421, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/configurator.py", line 2498, in perform http_response = http_doer.perform() File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 76, in perform self._mod_config() File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 111, in _mod_config for vh in self._relevant_vhosts(): File "/usr/lib/python2.7/site-packages/certbot_apache/_internal/http_01.py", line 166, in _relevant_vhosts " {0}.".format(http01_port)) PluginError: Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80. 2023-01-23 21:06:11,064:DEBUG:certbot.display.util:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-01-23 21:06:11,064:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed: 2023-01-23 21:06:11,064:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/zeus.vwu.edu/fullchain.pem (failure) 2023-01-23 21:06:11,064:DEBUG:certbot.display.util:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2023-01-23 21:06:11,066:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/bin/certbot", line 9, in <module> load_entry_point('certbot==1.11.0', 'console_scripts', 'certbot')() File "/usr/lib/python2.7/site-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1421, in main return config.func(config, plugins) File "/usr/lib/python2.7/site-packages/certbot/_internal/main.py", line 1318, in renew renewal.handle_renewal_request(config) File "/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py", line 497, in handle_renewal_request len(renew_failures), len(parse_failures))) Error: 1 renew failure(s), 0 parse failure(s) 2023-01-23 21:06:11,076:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)