Manual-public-ip-logging-ok depriciated

CentOS Linux release 7.9.2009 (Core)

I get below / attached error for one, but not all servers. Any subbestions - Thanks

/ Harald

Validating configuration for istdpbib2.villemoes.dk …
… no problems found
Requesting a certificate for istdpbib2.villemoes.dk from Let’s Encrypt …
… request failed : Web-based validation failed :
Use of --manual-public-ip-logging-ok is deprecated.
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
Use of --manual-public-ip-logging-ok is deprecated.
Renewing an existing certificate for istdpbib2.villemoes.dk
Performing the following challenges:
http-01 challenge for istdpbib2.villemoes.dk
Using the webroot path /home/openkm/public_html for all unmatched domains.
Waiting for verification…
Challenge failed for domain istdpbib2.villemoes.dk
http-01 challenge for istdpbib2.villemoes.dk
Cleaning up challenges
Some challenges have failed.
Error in atexit._run_exitfuncs:
Traceback (most recent call last):
File “/usr/lib64/python2.7/atexit.py”, line 24, in _run_exitfuncs
func(*targs, **kargs)
File “/usr/lib/python2.7/site-packages/certbot/util.py”, line 625, in _atexit_call
func(*args, **kwargs)
File “/usr/lib/python2.7/site-packages/certbot/_internal/reporter.py”, line 97, in print_messages
next_wrapper.fill(line) for line in lines[1:]))
UnicodeEncodeError: ‘ascii’ codec can’t encode character u’\u2013’ in position 283: ordinal not in range(128)
Error in sys.exitfunc:
An unexpected error occurred:
UnicodeEncodeError: ‘ascii’ codec can’t encode character u’\u2013’ in position 283: ordinal not in range(128)
IMPORTANT NOTES:

  • The following errors were reported by the server:
    Please see the logfiles in /var/log/letsencrypt for more details.

Log-file:
[root@agurk8 ~]# cat /var/log/letsencrypt/letsencrypt.log
2020-12-28 17:11:06,210:DEBUG:certbot._internal.main:certbot version: 1.10.1
2020-12-28 17:11:06,210:DEBUG:certbot._internal.main:Arguments: [’-a’, ‘webroot’, ‘-d’, ‘istdpbib2.villemoes.dk’, ‘–webroot-path’, ‘/home/openkm/public_html’, ‘–duplicate’, ‘–force-renewal’, ‘–manual-public-ip-logging-ok’, ‘–non-interactive’, ‘–agree-tos’, ‘–config’, ‘/tmp/.webmin/544233_16799_1_letsencrypt.cgi’, ‘–rsa-key-size’, ‘2048’, ‘–cert-name’, ‘istdpbib2.villemoes.dk’]
2020-12-28 17:11:06,210:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2020-12-28 17:11:06,221:WARNING:certbot.util:Use of --manual-public-ip-logging-ok is deprecated.
2020-12-28 17:11:06,251:DEBUG:certbot._internal.log:Root logging level set at 20
2020-12-28 17:11:06,252:INFO:certbot._internal.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2020-12-28 17:11:06,252:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2020-12-28 17:11:06,254:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: IAuthenticator, IPlugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7f4c24338910>
Prep: True
2020-12-28 17:11:06,254:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7f4c24338910> and installer None
2020-12-28 17:11:06,254:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2020-12-28 17:11:06,281:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, terms_of_service_agreed=None, agreement=u’https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf’, only_return_existing=None, contact=(u’mailto:admin@agurk.dk’,), key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7f4c270c2c10>)>), external_account_binding=None), uri=u’https://acme-v01.api.letsencrypt.org/acme/reg/15692787’, new_authzr_uri=u’https://acme-v01.api.letsencrypt.org/acme/new-authz’, terms_of_service=u’https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf’), 29a7d842dbc481b5afb0b1799b21ddae, Meta(creation_host=u’agurk8.agurk.dk’, register_to_eff=None, creation_dt=datetime.datetime(2017, 5, 27, 16, 18, 6, tzinfo=)))>
2020-12-28 17:11:06,288:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2020-12-28 17:11:06,298:INFO:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
2020-12-28 17:11:06,934:DEBUG:urllib3.connectionpool:“GET /directory HTTP/1.1” 200 658
2020-12-28 17:11:06,935:DEBUG:acme.client:Received response:
HTTP 200
content-length: 658
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
cache-control: public, max-age=0, no-cache
date: Mon, 28 Dec 2020 16:11:06 GMT
x-frame-options: DENY
content-type: application/json

{
“RE7C9X0uU-4”: “Adding random entries to the directory - API Announcements - Let's Encrypt Community Support”,
“keyChange”: “https://acme-v02.api.letsencrypt.org/acme/key-change”,
“meta”: {
“caaIdentities”: [
letsencrypt.org
],
“termsOfService”: “https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf”,
“website”: “https://letsencrypt.org
},
“newAccount”: “https://acme-v02.api.letsencrypt.org/acme/new-acct”,
“newNonce”: “https://acme-v02.api.letsencrypt.org/acme/new-nonce”,
“newOrder”: “https://acme-v02.api.letsencrypt.org/acme/new-order”,
“revokeCert”: “https://acme-v02.api.letsencrypt.org/acme/revoke-cert
}
2020-12-28 17:11:06,950:WARNING:certbot.util:Use of --manual-public-ip-logging-ok is deprecated.
2020-12-28 17:11:06,951:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer <certbot._internal.cli.cli_utils._Default object at 0x7f4c23f30650>
2020-12-28 17:11:06,952:DEBUG:certbot._internal.renewal:Auto-renewal forced with --force-renewal…
2020-12-28 17:11:06,953:DEBUG:certbot.display.util:Notifying user: Renewing an existing certificate for istdpbib2.villemoes.dk
2020-12-28 17:11:07,165:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0670_key-certbot.pem
2020-12-28 17:11:07,173:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0670_csr-certbot.pem
2020-12-28 17:11:07,174:DEBUG:acme.client:Requesting fresh nonce
2020-12-28 17:11:07,174:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2020-12-28 17:11:07,347:DEBUG:urllib3.connectionpool:“HEAD /acme/new-nonce HTTP/1.1” 200 0
2020-12-28 17:11:07,347:DEBUG:acme.client:Received response:
HTTP 200
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
cache-control: public, max-age=0, no-cache
date: Mon, 28 Dec 2020 16:11:07 GMT
x-frame-options: DENY
replay-nonce: 0004w3HfUaf3vMCESm97dRg8iFm8wELv1b62DsgS_m4l6t4

2020-12-28 17:11:07,348:DEBUG:acme.client:Storing nonce: 0004w3HfUaf3vMCESm97dRg8iFm8wELv1b62DsgS_m4l6t4
2020-12-28 17:11:07,348:DEBUG:acme.client:JWS payload:
{
“identifiers”: [
{
“type”: “dns”,
“value”: “istdpbib2.villemoes.dk”
}
]
}
2020-12-28 17:11:07,350:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
“protected”: “eyJub25jZSI6ICIwMDA0dzNIZlVhZjN2TUNFU205N2RSZzhpRm04d0VMdjFiNjJEc2dTX200bDZ0NCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIiwgImtpZCI6ICJodHRwczovL2FjbWUtdjAxLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9yZWcvMTU2OTI3ODciLCAiYWxnIjogIlJTMjU2In0”,
“payload”: “ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwgCiAgICAgICJ2YWx1ZSI6ICJpc3RkcGJpYjIudmlsbGVtb2VzLmRrIgogICAgfQogIF0KfQ”,
“signature”: “AdUAwxLXgcqlDZXc7UaKoPAmpa40oI6bWPKpjVF-rGp9UVX9uaTlNRaKlgwaMSonqHzWVRfNiWyTbp0mavN0MIjjFvZ_Mw1CoZY1nNoFRnVu0diaNYUHj2Ik2HKOKyGme2tzko2PGqiwP42BK863MBjiZtNllkjo7DC7krzoXPdi8aDLfCwqJjJDRmOtgHg5trFaJzHlQViHX23cZ_m-h870POo448ugdpy6v3QO9KoWV8Prk-Xl2x2fuhJdH1609ZiJe59wb2ohg603gJbdT-BFAIcEdZDW6SlG7w2cImdftOisihfGFwkawDnDBAeTVEct7nw61tilpTvsb4vq5w”
}
2020-12-28 17:11:09,236:DEBUG:urllib3.connectionpool:“POST /acme/new-order HTTP/1.1” 201 352
2020-12-28 17:11:09,237:DEBUG:acme.client:Received response:
HTTP 201
content-length: 352
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
location: https://acme-v02.api.letsencrypt.org/acme/order/15692787/6992614186
boulder-requester: 15692787
date: Mon, 28 Dec 2020 16:11:09 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0004_pGLd2uGIGXhBoO6gJ9xKcyL_Xu9E8R590fqxxIWdWk

{
“status”: “pending”,
“expires”: “2021-01-04T16:11:09.072950976Z”,
“identifiers”: [
{
“type”: “dns”,
“value”: “istdpbib2.villemoes.dk”
}
],
“authorizations”: [
https://acme-v02.api.letsencrypt.org/acme/authz-v3/9645202402
],
“finalize”: “https://acme-v02.api.letsencrypt.org/acme/finalize/15692787/6992614186
}
2020-12-28 17:11:09,237:DEBUG:acme.client:Storing nonce: 0004_pGLd2uGIGXhBoO6gJ9xKcyL_Xu9E8R590fqxxIWdWk
2020-12-28 17:11:09,238:DEBUG:acme.client:JWS payload:

2020-12-28 17:11:09,240:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/9645202402:
{
“protected”: “eyJub25jZSI6ICIwMDA0X3BHTGQydUdJR1hoQm9PNmdKOXhLY3lMX1h1OUU4UjU5MGZxeHhJV2RXayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvOTY0NTIwMjQwMiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMS5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvcmVnLzE1NjkyNzg3IiwgImFsZyI6ICJSUzI1NiJ9”,
“payload”: “”,
“signature”: “qcSRiI7qsSAQ4mmHwuSEKfP80DjTKDEMiaXeqK16ktKzXPP-4SDdxJOsLnOm3z7bI3O4bwo76bp-MXQudT7U03YG5k8aO_sVx8I37z3tYwNtMxcY87O13G_oE-V1Xu1ofBzWyYXU707Fd1XMJtwfNSdRGDjnuZSPUTWPDZ-B2sNUTQv1QCryVEDsCOjlhkkQCmAPYD3ywxw-wg8L4pQ3AwOOZuhAQkd5nzbrIcqgqYsKwpJq2clDlCJtpc-0m1l-HUD3jaEKxIN7oUrU8psJUhlvuTFA5U37O-VP7fu5rPljKoNfXJuv-1QtWXy8mDRKRvUaxMNvJHQXdoKalaFFGQ”
}
2020-12-28 17:11:09,440:DEBUG:urllib3.connectionpool:“POST /acme/authz-v3/9645202402 HTTP/1.1” 200 800
2020-12-28 17:11:09,441:DEBUG:acme.client:Received response:
HTTP 200
content-length: 800
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
boulder-requester: 15692787
date: Mon, 28 Dec 2020 16:11:09 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0004Dc8ipwLAHzMSoRCxZnPVphvHUOffJTEc295XNMDwP0I

{
“identifier”: {
“type”: “dns”,
“value”: “istdpbib2.villemoes.dk”
},
“status”: “pending”,
“expires”: “2021-01-04T16:11:09Z”,
“challenges”: [
{
“type”: “http-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
},
{
“type”: “dns-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/GRLjjw”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
},
{
“type”: “tls-alpn-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/0pTFrw”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
}
]
}
2020-12-28 17:11:09,442:DEBUG:acme.client:Storing nonce: 0004Dc8ipwLAHzMSoRCxZnPVphvHUOffJTEc295XNMDwP0I
2020-12-28 17:11:09,443:INFO:certbot._internal.auth_handler:Performing the following challenges:
2020-12-28 17:11:09,443:INFO:certbot._internal.auth_handler:http-01 challenge for istdpbib2.villemoes.dk
2020-12-28 17:11:09,443:INFO:certbot._internal.plugins.webroot:Using the webroot path /home/openkm/public_html for all unmatched domains.
2020-12-28 17:11:09,444:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /home/openkm/public_html/.well-known/acme-challenge
2020-12-28 17:11:09,448:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /home/openkm/public_html/.well-known/acme-challenge/-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U
2020-12-28 17:11:09,449:INFO:certbot._internal.auth_handler:Waiting for verification…
2020-12-28 17:11:09,449:DEBUG:acme.client:JWS payload:
{}
2020-12-28 17:11:09,451:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A:
{
“protected”: “eyJub25jZSI6ICIwMDA0RGM4aXB3TEFIek1Tb1JDeFpuUFZwaHZIVU9mZkpURWMyOTVYTk1Ed1AwSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwtdjMvOTY0NTIwMjQwMi9iekpDOUEiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDEuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL3JlZy8xNTY5Mjc4NyIsICJhbGciOiAiUlMyNTYifQ”,
“payload”: “e30”,
“signature”: “ee3801WPbSb5f_Pgk4N4StlNTK6UeFItyh0IJd8HzrSbeIF–xwZabk7XZ9GmnFFrKMPFQVbEFMSwKohfi9haGLDDg0t5gCxornXL8RzkrAMB0vmqrAiJ1lfMbZffHTRaUkZwGgXl5JDFaZHnioono1f5VFVsS-rqU9oYamBXH_bV65Cdyb_LOWMocmjMZOYwhqAsiULTa7HP4MMWTkTw-Yp321o532fJ2UnroV6kDfTj0eFunvyp0cIKNYs_ZWn5iWO5TQdOh0nloOFO9zA9PdB8ckDl40_2s0uQfy_sm3KKnKDCRIL-kRkReZXFu9ybgWUtMDrJVPrlje_PmhZCA”
}
2020-12-28 17:11:12,070:DEBUG:urllib3.connectionpool:“POST /acme/chall-v3/9645202402/bzJC9A HTTP/1.1” 200 185
2020-12-28 17:11:12,071:DEBUG:acme.client:Received response:
HTTP 200
content-length: 185
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”, https://acme-v02.api.letsencrypt.org/acme/authz-v3/9645202402;rel=“up”
location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A
boulder-requester: 15692787
date: Mon, 28 Dec 2020 16:11:12 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0003JD7tkM6QugelbuzvdGRhVZZZg7_rl9YfcxS28nvm824

{
“type”: “http-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
}
2020-12-28 17:11:12,072:DEBUG:acme.client:Storing nonce: 0003JD7tkM6QugelbuzvdGRhVZZZg7_rl9YfcxS28nvm824
2020-12-28 17:11:13,073:DEBUG:acme.client:JWS payload:

2020-12-28 17:11:13,075:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/9645202402:
{
“protected”: “eyJub25jZSI6ICIwMDAzSkQ3dGtNNlF1Z2VsYnV6dmRHUmhWWlpaZzdfcmw5WWZjeFMyOG52bTgyNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvOTY0NTIwMjQwMiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMS5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvcmVnLzE1NjkyNzg3IiwgImFsZyI6ICJSUzI1NiJ9”,
“payload”: “”,
“signature”: “rICzVSvXmdgixL_JMJcEgSECzVkpQE4F_LnZbHGVfxp63MG9c4FAeSizOdRyyuO4KekqNknp7YvrBq3cYVkul7GsKBC6YhbN_8QkH0-ilBgvnWJwEjEnwbj7mGwhkJkqzxWp77hvioHx1J7Heng54P12jPGOIi22MRX0qLUB7fx3cJxPdNDsURvLyHcSltNS1CG_1N5tkUf6xEjj1ec2EzbTPNxdNf6q3oXe4EwMBU9EfW5XxgzyEkXau5K15cWJd_E85pleCLImIqMqlKakY85AVf2IMRcdJjBZyqIvwgJVCQRrcNDWG-w9Xl4OuFYKfQ4-Os9hRaY4oKi_CGNosQ”
}
2020-12-28 17:11:13,284:DEBUG:urllib3.connectionpool:“POST /acme/authz-v3/9645202402 HTTP/1.1” 200 800
2020-12-28 17:11:13,285:DEBUG:acme.client:Received response:
HTTP 200
content-length: 800
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
boulder-requester: 15692787
date: Mon, 28 Dec 2020 16:11:13 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0003tYHLwEwrlen5ngF67B8wU7MV8tfkXU5xH3QPNYtKanA

{
“identifier”: {
“type”: “dns”,
“value”: “istdpbib2.villemoes.dk”
},
“status”: “pending”,
“expires”: “2021-01-04T16:11:09Z”,
“challenges”: [
{
“type”: “http-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
},
{
“type”: “dns-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/GRLjjw”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
},
{
“type”: “tls-alpn-01”,
“status”: “pending”,
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/0pTFrw”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”
}
]
}
2020-12-28 17:11:13,285:DEBUG:acme.client:Storing nonce: 0003tYHLwEwrlen5ngF67B8wU7MV8tfkXU5xH3QPNYtKanA
2020-12-28 17:11:16,289:DEBUG:acme.client:JWS payload:

2020-12-28 17:11:16,291:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/9645202402:
{
“protected”: “eyJub25jZSI6ICIwMDAzdFlITHdFd3JsZW41bmdGNjdCOHdVN01WOHRma1hVNXhIM1FQTll0S2FuQSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHotdjMvOTY0NTIwMjQwMiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXYwMS5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvcmVnLzE1NjkyNzg3IiwgImFsZyI6ICJSUzI1NiJ9”,
“payload”: “”,
“signature”: “USPuzcm7BC6UMRKYZaQZc56lEbcUVoSCXPAL59vk_0KxemDOkbA3nmEfApqMOa0Gw-nzblyKTzg3EewMB8-htDcToFw0Kcls109iQ41sJ_Ziti0vDBxopdx9pzF-XUpsgNC5tDSRDi6Jv_UepV2UtA5iFIgnQNgCFcqcu3flWajrIcdvOrTd-2GOdVAWVE9lAgKJkJg85bF4iBMwVH6lmKpY-NXrx0qMyLWIayytSPy0EMW2y2I9JnboZ1n0u38FvuMbzKu-Wu25PXv7D5VzxrK4tqMxJKDUi3A8UkCvA1t-uT2SwcneGn3y9YoJnXoWjnnp-uEYKW1wqRdJg6Eopw”
}
2020-12-28 17:11:16,575:DEBUG:urllib3.connectionpool:“POST /acme/authz-v3/9645202402 HTTP/1.1” 200 1216
2020-12-28 17:11:16,576:DEBUG:acme.client:Received response:
HTTP 200
content-length: 1216
cache-control: public, max-age=0, no-cache
strict-transport-security: max-age=604800
server: nginx
connection: keep-alive
link: https://acme-v02.api.letsencrypt.org/directory;rel=“index”
boulder-requester: 15692787
date: Mon, 28 Dec 2020 16:11:16 GMT
x-frame-options: DENY
content-type: application/json
replay-nonce: 0003Ui22x5LgzLnXVTEU-6iDC9d9xv9_tUBCDkGhYuglowY

{
“identifier”: {
“type”: “dns”,
“value”: “istdpbib2.villemoes.dk”
},
“status”: “invalid”,
“expires”: “2021-01-04T16:11:09Z”,
“challenges”: [
{
“type”: “http-01”,
“status”: “invalid”,
“error”: {
“type”: “urn:ietf:params:acme:error:unauthorized”,
“detail”: “Invalid response from http://istdpbib2.villemoes.dk/.well-known/acme-challenge/-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U [193.162.159.87]: “\u003c!doctype html\u003e\u003chtml lang=\“en\”\u003e\u003chead\u003e\u003ctitle\u003eHTTP Status 404 â Not Found\u003c/title\u003e\u003cstyle type=\“text/css\”\u003eh1 {font-family:Tahoma,A””,
“status”: 403
},
“url”: “https://acme-v02.api.letsencrypt.org/acme/chall-v3/9645202402/bzJC9A”,
“token”: “-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”,
“validationRecord”: [
{
“url”: “http://istdpbib2.villemoes.dk/.well-known/acme-challenge/-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U”,
“hostname”: “istdpbib2.villemoes.dk”,
“port”: “80”,
“addressesResolved”: [
“193.162.159.87”
],
“addressUsed”: “193.162.159.87”
}
]
}
]
}
2020-12-28 17:11:16,576:DEBUG:acme.client:Storing nonce: 0003Ui22x5LgzLnXVTEU-6iDC9d9xv9_tUBCDkGhYuglowY
2020-12-28 17:11:16,577:WARNING:certbot._internal.auth_handler:Challenge failed for domain istdpbib2.villemoes.dk
2020-12-28 17:11:16,577:INFO:certbot._internal.auth_handler:http-01 challenge for istdpbib2.villemoes.dk
2020-12-28 17:11:16,578:DEBUG:certbot._internal.reporter:Reporting to user: The following errors were reported by the server:

Domain: istdpbib2.villemoes.dk
Type: unauthorized
Detail: Invalid response from http://istdpbib2.villemoes.dk/.well-known/acme-challenge/-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U [193.162.159.87]: “<!doctype html><html lang=“en”>HTTP Status 404 â Not Found<style type=“text/css”>h1 {font-family:Tahoma,A”

To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2020-12-28 17:11:16,578:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File “/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py”, line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File “/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py”, line 180, in _poll_authorizations
raise errors.AuthorizationError(‘Some challenges have failed.’)
AuthorizationError: Some challenges have failed.

2020-12-28 17:11:16,578:DEBUG:certbot._internal.error_handler:Calling registered functions
2020-12-28 17:11:16,578:INFO:certbot._internal.auth_handler:Cleaning up challenges
2020-12-28 17:11:16,578:DEBUG:certbot._internal.plugins.webroot:Removing /home/openkm/public_html/.well-known/acme-challenge/-_l5XtrtRP6FU4uQTkCv0-oGOND_egrl3L04De8gY9U
2020-12-28 17:11:16,579:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2020-12-28 17:11:16,579:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File “/bin/letsencrypt”, line 9, in
load_entry_point(‘certbot==1.10.1’, ‘console_scripts’, ‘certbot’)()
File “/usr/lib/python2.7/site-packages/certbot/main.py”, line 15, in main
return internal_main.main(cli_args)
File “/usr/lib/python2.7/site-packages/certbot/_internal/main.py”, line 1412, in main
return config.func(config, plugins)
File “/usr/lib/python2.7/site-packages/certbot/_internal/main.py”, line 1293, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File “/usr/lib/python2.7/site-packages/certbot/_internal/main.py”, line 123, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File “/usr/lib/python2.7/site-packages/certbot/_internal/renewal.py”, line 330, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File “/usr/lib/python2.7/site-packages/certbot/_internal/client.py”, line 374, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File “/usr/lib/python2.7/site-packages/certbot/_internal/client.py”, line 421, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File “/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py”, line 91, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File “/usr/lib/python2.7/site-packages/certbot/_internal/auth_handler.py”, line 180, in _poll_authorizations
raise errors.AuthorizationError(‘Some challenges have failed.’)
AuthorizationError: Some challenges have failed.
2020-12-28 17:11:16,580:ERROR:certbot._internal.log:Some challenges have failed.
2020-12-28 17:11:16,582:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File “/usr/lib64/python2.7/atexit.py”, line 24, in _run_exitfuncs
func(*targs, **kargs)
File “/usr/lib/python2.7/site-packages/certbot/util.py”, line 625, in _atexit_call
func(*args, **kwargs)
File “/usr/lib/python2.7/site-packages/certbot/_internal/reporter.py”, line 97, in print_messages
next_wrapper.fill(line) for line in lines[1:]))
UnicodeEncodeError: ‘ascii’ codec can’t encode character u’\u2013’ in position 283: ordinal not in range(128)
2020-12-28 17:11:16,583:ERROR:certbot._internal.log:An unexpected error occurred:
2020-12-28 17:11:16,583:ERROR:certbot._internal.log:UnicodeEncodeError: ‘ascii’ codec can’t encode character u’\u2013’ in position 283: ordinal not in range(128)
[root@agurk8 ~]#

Solved: A permanent redirect was the source of the problem :slight_smile:

This topic was automatically closed 4 days after the last reply. New replies are no longer allowed.