Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Report bugs to FreeDNS dns api #2305

Open
dkerr64 opened this issue Jun 2, 2019 · 34 comments
Open

Report bugs to FreeDNS dns api #2305

dkerr64 opened this issue Jun 2, 2019 · 34 comments
Assignees
Labels
3rd party api report bugs to dns api, deploy hooks and notification hooks

Comments

@dkerr64
Copy link
Contributor

dkerr64 commented Jun 2, 2019

Please report any issues with the FreeDNS api script by appending a comment to this issue.
Thank you,
David Kerr

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jun 2, 2019

Pull request #2285 ... Fix for multi-part top level domains not working. Fixes issue #1086 and issue #1835

@Neilpang Neilpang added the 3rd party api report bugs to dns api, deploy hooks and notification hooks label Jun 3, 2019
@maks2018
Copy link

api not working :(
free accaunt

[Thu Jun 27 17:13:04 UTC 2019] Add TXT record using FreeDNS
[Thu Jun 27 17:13:08 UTC 2019] Domain xxxxxx.top not found at FreeDNS, try with next level of TLD
[Thu Jun 27 17:13:11 UTC 2019] Domain top not found at FreeDNS, try with next level of TLD

this is my personal domain in the TOP zone

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jun 27, 2019

@maks2018 what version of acme.sh are you using? There is a bug in 2.8.1 and all prior versions of acme.sh which is fixed in PR #2285. This has been merged into the dev branch, but not yet into the master. When the next version of acme.sh is tagged it should include this fix.

Thanks

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jun 27, 2019

@maks2018 also... you are using a domain that you personally own right? It is not possible to use one of the FreeDNS shared domain names as they cannot be automatically validated (requires human to fill out a captcha).

@maks2018
Copy link

maks2018 commented Jun 27, 2019

what version of acme.sh are you using?

I am using version 2.8.2

you are using a domain that you personally own right?

Yes, you're right, domain name like xxxxxx.top. Changing DNS does not require input the captcha

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jun 27, 2019

@maks2018 I'll need a full debug log. Preferably not posted here but by email.

@maks2018
Copy link

dkerr64, i sent the log to you

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jun 28, 2019

dkerr64, i sent the log to you

Thanks, I got it. Will reply directly by email.

@dkerr64
Copy link
Contributor Author

dkerr64 commented Jul 11, 2019

An update for anyone monitoring this issue, @maks2018 provided a debug log and I was able to fix the problem he reported. @maks2018 has tested the fix and I will shortly upload the fix to github and open a PR to get it into the mainline. A big THANK YOU to @maks2018 for reporting the problem
David

dkerr64 added a commit to dkerr64/acme.sh that referenced this issue Jul 11, 2019
Fix bug reported by @maks2018 in issue acmesh-official#2305 by updating the regex in egrep of the subdomain html page.
@dkerr64
Copy link
Contributor Author

dkerr64 commented Jul 11, 2019

For anyone that would like to test the fix for bug reported by @maks2018 please try this version of the dns_freedns.sh file... https://github.com/dkerr64/acme.sh/blob/FreeDNS/dnsapi/dns_freedns.sh

Thanks
David

dkerr64 referenced this issue in dkerr64/acme.sh Jul 11, 2019
_egrep_o() function accepts extended regex and on systems that do not have egrep uses sed to emulate egrep.
This is failing on the specific regex I was using before my last commit... ae66c6f
The problem is that I fixed it by passing in non-extended regex which then fails on systems that do have egrep.  So I am no longer using _egrep_o.
@felixgonsug
Copy link

Im having problems generating a certificate. The record is not being generated in free_dns.

$ acme.sh --version
https://github.com/Neilpang/acme.sh
v2.8.2
Debug output

    $ acme.sh --issue --dns free_dns -d subdomain.domain.com --debug 3 --staging                                                                                                               
    [Sat Sep  7 18:20:37 -03 2019] readlink exists=0
    [Sat Sep  7 18:20:37 -03 2019] dirname exists=0
    [Sat Sep  7 18:20:37 -03 2019] Lets find script dir.
    [Sat Sep  7 18:20:37 -03 2019] _SCRIPT_='/usr/local/sbin/acme.sh'
    [Sat Sep  7 18:20:37 -03 2019] _script='/usr/local/sbin/acme.sh'
    [Sat Sep  7 18:20:37 -03 2019] _script_home='/usr/local/sbin'
    [Sat Sep  7 18:20:37 -03 2019] Using default home:/var/db/acme/.acme.sh
    [Sat Sep  7 18:20:37 -03 2019] Using config home:/var/db/acme/.acme.sh
    [Sat Sep  7 18:20:37 -03 2019] LE_WORKING_DIR='/var/db/acme/.acme.sh'
    https://github.com/Neilpang/acme.sh
    v2.8.2
    [Sat Sep  7 18:20:37 -03 2019] Running cmd: issue
    [Sat Sep  7 18:20:37 -03 2019] _main_domain='subdomain.domain.com'
    [Sat Sep  7 18:20:37 -03 2019] _alt_domains='no'
    [Sat Sep  7 18:20:37 -03 2019] Using config home:/var/db/acme/.acme.sh
    [Sat Sep  7 18:20:37 -03 2019] Using stage ACME_DIRECTORY: https://acme-staging-v02.api.letsencrypt.org/directory
    [Sat Sep  7 18:20:37 -03 2019] ACME_DIRECTORY='https://acme-staging-v02.api.letsencrypt.org/directory'
    [Sat Sep  7 18:20:37 -03 2019] _ACME_SERVER_HOST='acme-staging-v02.api.letsencrypt.org'
    [Sat Sep  7 18:20:37 -03 2019] CA_CONF='/var/db/acme/.acme.sh/ca/acme-staging-v02.api.letsencrypt.org/ca.conf'
    [Sat Sep  7 18:20:37 -03 2019] DOMAIN_PATH='/var/db/acme/.acme.sh/subdomain.domain.com'
    [Sat Sep  7 18:20:37 -03 2019] 'free_dns' does not contain 'dns'
    [Sat Sep  7 18:20:37 -03 2019] Using ACME_DIRECTORY: https://acme-staging-v02.api.letsencrypt.org/directory
    [Sat Sep  7 18:20:37 -03 2019] _init api for server: https://acme-staging-v02.api.letsencrypt.org/directory
    [Sat Sep  7 18:20:37 -03 2019] GET
    [Sat Sep  7 18:20:37 -03 2019] url='https://acme-staging-v02.api.letsencrypt.org/directory'
    [Sat Sep  7 18:20:37 -03 2019] timeout=
    [Sat Sep  7 18:20:37 -03 2019] curl exists=0
    [Sat Sep  7 18:20:37 -03 2019] mktemp exists=0
    [Sat Sep  7 18:20:37 -03 2019] wget exists=0
    [Sat Sep  7 18:20:37 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.jwLoRAmj  -g '
    [Sat Sep  7 18:20:37 -03 2019] ret='0'
    [Sat Sep  7 18:20:37 -03 2019] response='{
      "Tyj6t4gAUn8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
      "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
      "meta": {
        "caaIdentities": [
          "letsencrypt.org"
        ],
        "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
        "website": "https://letsencrypt.org/docs/staging-environment/"
      },
      "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
      "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
      "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
      "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
    }'
    [Sat Sep  7 18:20:38 -03 2019] ACME_KEY_CHANGE='https://acme-staging-v02.api.letsencrypt.org/acme/key-change'
    [Sat Sep  7 18:20:38 -03 2019] ACME_NEW_AUTHZ
    [Sat Sep  7 18:20:38 -03 2019] ACME_NEW_ORDER='https://acme-staging-v02.api.letsencrypt.org/acme/new-order'
    [Sat Sep  7 18:20:38 -03 2019] ACME_NEW_ACCOUNT='https://acme-staging-v02.api.letsencrypt.org/acme/new-acct'
    [Sat Sep  7 18:20:38 -03 2019] ACME_REVOKE_CERT='https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert'
    [Sat Sep  7 18:20:38 -03 2019] ACME_AGREEMENT='https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf'
    [Sat Sep  7 18:20:38 -03 2019] ACME_NEW_NONCE='https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce'
    [Sat Sep  7 18:20:38 -03 2019] ACME_VERSION='2'
    [Sat Sep  7 18:20:38 -03 2019] Le_NextRenewTime
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 1:Le_Domain='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 2:Le_Alt='no'
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 3:Le_Webroot='free_dns'
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 4:Le_PreHook=''
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 5:Le_PostHook=''
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 6:Le_RenewHook=''
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 9:Le_API='https://acme-staging-v02.api.letsencrypt.org/directory'
    [Sat Sep  7 18:20:38 -03 2019] _on_before_issue
    [Sat Sep  7 18:20:38 -03 2019] _chk_main_domain='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _chk_alt_domains
    [Sat Sep  7 18:20:38 -03 2019] 'free_dns' does not contain 'no'
    [Sat Sep  7 18:20:38 -03 2019] Le_LocalAddress
    [Sat Sep  7 18:20:38 -03 2019] d='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] Check for domain='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _currentRoot='free_dns'
    [Sat Sep  7 18:20:38 -03 2019] d
    [Sat Sep  7 18:20:38 -03 2019] 'free_dns' does not contain 'apache'
    [Sat Sep  7 18:20:38 -03 2019] _saved_account_key_hash='5mohiyaPHikDqJhISZ9E/o7W9u40OpXGxEv7kQIb6rY='
    [Sat Sep  7 18:20:38 -03 2019] base64 single line.
    [Sat Sep  7 18:20:38 -03 2019] _saved_account_key_hash is not changed, skip register account.
    [Sat Sep  7 18:20:38 -03 2019] Read key length:
    [Sat Sep  7 18:20:38 -03 2019] _createcsr
    [Sat Sep  7 18:20:38 -03 2019] domain='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] domainlist
    [Sat Sep  7 18:20:38 -03 2019] csrkey='/var/db/acme/.acme.sh/subdomain.domain.com/subdomain.domain.com.key'
    [Sat Sep  7 18:20:38 -03 2019] csr='/var/db/acme/.acme.sh/subdomain.domain.com/subdomain.domain.com.csr'
    [Sat Sep  7 18:20:38 -03 2019] csrconf='/var/db/acme/.acme.sh/subdomain.domain.com/subdomain.domain.com.csr.conf'
    [Sat Sep  7 18:20:38 -03 2019] Single domain='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _is_idn_d='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _idn_temp
    [Sat Sep  7 18:20:38 -03 2019] _is_idn_d='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _idn_temp
    [Sat Sep  7 18:20:38 -03 2019] _csr_cn='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] OK
    [Sat Sep  7 18:20:38 -03 2019] 7:Le_Keylength=''
    [Sat Sep  7 18:20:38 -03 2019] Getting domain auth token for each domain
    [Sat Sep  7 18:20:38 -03 2019] _is_idn_d='subdomain.domain.com'
    [Sat Sep  7 18:20:38 -03 2019] _idn_temp
    [Sat Sep  7 18:20:38 -03 2019] d
    [Sat Sep  7 18:20:38 -03 2019] _identifiers='{"type":"dns","value":"subdomain.domain.com"}'
    [Sat Sep  7 18:20:38 -03 2019] url='https://acme-staging-v02.api.letsencrypt.org/acme/new-order'
    [Sat Sep  7 18:20:38 -03 2019] payload='{"identifiers": [{"type":"dns","value":"subdomain.domain.com"}]}'
    [Sat Sep  7 18:20:38 -03 2019] RSA key
    [Sat Sep  7 18:20:38 -03 2019] pub_exp='010001'
    [Sat Sep  7 18:20:38 -03 2019] [Sat Sep  7 18:20:38 -03 2019] xxd exists=127
    base64 single line.
    [Sat Sep  7 18:20:38 -03 2019] _URGLY_PRINTF='1'
    [Sat Sep  7 18:20:38 -03 2019] e='AQAB'
    [Sat Sep  7 18:20:38 -03 2019] modulus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
    [Sat Sep  7 18:20:38 -03 2019] [Sat Sep  7 18:20:38 -03 2019] base64 single line.
    xxd exists=127
    [Sat Sep  7 18:20:38 -03 2019] _URGLY_PRINTF='1'
    [Sat Sep  7 18:20:38 -03 2019] n='zs1vWgTLL3fSsK8GKml4vLFFlTKeTvOBnqvJBW9XTJ_jziEc-AFlT9-UseHkKdlGTOE4L7ZTBnI4XX8e7V0Cb-l_TtpM1cPfdS0WWXLwz0vZCfrfEUJstOcjBXx83hPlYVwkjWNoImFYmMiuuNMQRcyOStiIRl5usB8S-qs8yAsVfS_hCPHt1mSORQIGAzGG5jtZxvQdUrpANjnucTn3X5MONGXewoWybaeBaBC-8ub6mnTH6Xmn9FI3d1JE1XBmFxgoZ1FRM4FxZFoK1I1efkAfKONDQpA-N2JAHZ9-IFORPJFfCsr-HMsnaWBcDYw8mwWD279xZuZLuW2Zw9Oo0w'
    [Sat Sep  7 18:20:38 -03 2019] jwk='{"e": "AQAB", "kty": "RSA", "n": "zs1vWgTLL3fSsK8GKml4vLFFlTKeTvOBnqvJBW9XTJ_jziEc-AFlT9-UseHkKdlGTOE4L7ZTBnI4XX8e7V0Cb-l_TtpM1cPfdS0WWXLwz0vZCfrfEUJstOcjBXx83hPlYVwkjWNoImFYmMiuuNMQRcyOStiIRl5usB8S-qs8yAsVfS_hCPHt1mSORQIGAzGG5jtZxvQdUrpANjnucTn3X5MONGXewoWybaeBaBC-8ub6mnTH6Xmn9FI3d1JE1XBmFxgoZ1FRM4FxZFoK1I1efkAfKONDQpA-N2JAHZ9-IFORPJFfCsr-HMsnaWBcDYw8mwWD279xZuZLuW2Zw9Oo0w"}'
    [Sat Sep  7 18:20:38 -03 2019] JWK_HEADER='{"alg": "RS256", "jwk": {"e": "AQAB", "kty": "RSA", "n": "zs1vWgTLL3fSsK8GKml4vLFFlTKeTvOBnqvJBW9XTJ_jziEc-AFlT9-UseHkKdlGTOE4L7ZTBnI4XX8e7V0Cb-l_TtpM1cPfdS0WWXLwz0vZCfrfEUJstOcjBXx83hPlYVwkjWNoImFYmMiuuNMQRcyOStiIRl5usB8S-qs8yAsVfS_hCPHt1mSORQIGAzGG5jtZxvQdUrpANjnucTn3X5MONGXewoWybaeBaBC-8ub6mnTH6Xmn9FI3d1JE1XBmFxgoZ1FRM4FxZFoK1I1efkAfKONDQpA-N2JAHZ9-IFORPJFfCsr-HMsnaWBcDYw8mwWD279xZuZLuW2Zw9Oo0w"}}'
    [Sat Sep  7 18:20:38 -03 2019] base64 single line.
    [Sat Sep  7 18:20:38 -03 2019] payload64='eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6InNoYXJlbGF0ZXgucGxhbmV0YXgudXkifV19'
    [Sat Sep  7 18:20:38 -03 2019] _request_retry_times='1'
    [Sat Sep  7 18:20:38 -03 2019] Get nonce with HEAD. ACME_NEW_NONCE='https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce'
    [Sat Sep  7 18:20:38 -03 2019] HEAD
    [Sat Sep  7 18:20:38 -03 2019] _post_url='https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce'
    [Sat Sep  7 18:20:38 -03 2019] body
    [Sat Sep  7 18:20:38 -03 2019] _postContentType='application/jose+json'
    [Sat Sep  7 18:20:38 -03 2019] curl exists=0
    [Sat Sep  7 18:20:38 -03 2019] mktemp exists=0
    [Sat Sep  7 18:20:38 -03 2019] wget exists=0
    [Sat Sep  7 18:20:38 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g '
    [Sat Sep  7 18:20:38 -03 2019] _ret='0'
    [Sat Sep  7 18:20:38 -03 2019] _headers='HTTP/1.1 200 OK
    Server: nginx
    Link: ;rel="index"
    Replay-Nonce: 0002yQOFsS9ejEQOzz5pDeRuBbBioWlLDZN4KrmvJd-Wc_Y
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    Content-Length: 0
    Expires: Sat, 07 Sep 2019 21:20:38 GMT
    Cache-Control: max-age=0, no-cache, no-store
    Pragma: no-cache
    Date: Sat, 07 Sep 2019 21:20:38 GMT
    Connection: keep-alive
    '
    [Sat Sep  7 18:20:38 -03 2019] _CACHED_NONCE='0002yQOFsS9ejEQOzz5pDeRuBbBioWlLDZN4KrmvJd-Wc_Y'
    [Sat Sep  7 18:20:38 -03 2019] nonce='0002yQOFsS9ejEQOzz5pDeRuBbBioWlLDZN4KrmvJd-Wc_Y'
    [Sat Sep  7 18:20:38 -03 2019] protected='{"nonce": "0002yQOFsS9ejEQOzz5pDeRuBbBioWlLDZN4KrmvJd-Wc_Y", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "alg": "RS256", "kid": "https://acme-staging-v02.api.letsencrypt.org/acme/acct/10884918"}'
    [Sat Sep  7 18:20:38 -03 2019] base64 single line.
    [Sat Sep  7 18:20:38 -03 2019] protected64='eyJub25jZSI6ICIwMDAyeVFPRnNTOWVqRVFPeno1cERlUnVCYkJpb1dsTERaTjRLcm12SmQtV2NfWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA4ODQ5MTgifQ'
    [Sat Sep  7 18:20:38 -03 2019] base64 single line.
    [Sat Sep  7 18:20:38 -03 2019] _sig_t='L9EUVL6m5ZJykOcAnoJRCCu5ZUrVqToQxHRZ6puDhJ4TQ0+R8jRqlocaC+2NIAOckfEQtCN7mh1pN8vl5fFkM1+VrFOwck8Il9MWBjccRqWtkFE9+/eqKj6Ok28UTQE+Jp+2Cxn4cUAn+fvzDtuG7LJ/Vn2j56luy3EQ0xHMBbfC7DPgjGvBGaWhrJWqC/B+6hBkE5erCf8woEDTLrLdOtVgfAzWvYIDShV+bODExn2RS9grV9vjgAoIsBjLFO30PUQJZIkmbgAQVZY/N0OyV2Te59kY6ZvUTKYb6QkQj1hNyhn7QujpEM9WR7ubk3lJ2srFmWvuibNNnU42dYvxzQ=='
    [Sat Sep  7 18:20:38 -03 2019] sig='L9EUVL6m5ZJykOcAnoJRCCu5ZUrVqToQxHRZ6puDhJ4TQ0-R8jRqlocaC-2NIAOckfEQtCN7mh1pN8vl5fFkM1-VrFOwck8Il9MWBjccRqWtkFE9-_eqKj6Ok28UTQE-Jp-2Cxn4cUAn-fvzDtuG7LJ_Vn2j56luy3EQ0xHMBbfC7DPgjGvBGaWhrJWqC_B-6hBkE5erCf8woEDTLrLdOtVgfAzWvYIDShV-bODExn2RS9grV9vjgAoIsBjLFO30PUQJZIkmbgAQVZY_N0OyV2Te59kY6ZvUTKYb6QkQj1hNyhn7QujpEM9WR7ubk3lJ2srFmWvuibNNnU42dYvxzQ'
    [Sat Sep  7 18:20:38 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAyeVFPRnNTOWVqRVFPeno1cERlUnVCYkJpb1dsTERaTjRLcm12SmQtV2NfWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA4ODQ5MTgifQ", "payload": "eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6InNoYXJlbGF0ZXgucGxhbmV0YXgudXkifV19", "signature": "L9EUVL6m5ZJykOcAnoJRCCu5ZUrVqToQxHRZ6puDhJ4TQ0-R8jRqlocaC-2NIAOckfEQtCN7mh1pN8vl5fFkM1-VrFOwck8Il9MWBjccRqWtkFE9-_eqKj6Ok28UTQE-Jp-2Cxn4cUAn-fvzDtuG7LJ_Vn2j56luy3EQ0xHMBbfC7DPgjGvBGaWhrJWqC_B-6hBkE5erCf8woEDTLrLdOtVgfAzWvYIDShV-bODExn2RS9grV9vjgAoIsBjLFO30PUQJZIkmbgAQVZY_N0OyV2Te59kY6ZvUTKYb6QkQj1hNyhn7QujpEM9WR7ubk3lJ2srFmWvuibNNnU42dYvxzQ"}'
    [Sat Sep  7 18:20:38 -03 2019] POST
    [Sat Sep  7 18:20:38 -03 2019] _post_url='https://acme-staging-v02.api.letsencrypt.org/acme/new-order'
    [Sat Sep  7 18:20:38 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAyeVFPRnNTOWVqRVFPeno1cERlUnVCYkJpb1dsTERaTjRLcm12SmQtV2NfWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIiLCAiYWxnIjogIlJTMjU2IiwgImtpZCI6ICJodHRwczovL2FjbWUtc3RhZ2luZy12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTA4ODQ5MTgifQ", "payload": "eyJpZGVudGlmaWVycyI6IFt7InR5cGUiOiJkbnMiLCJ2YWx1ZSI6InNoYXJlbGF0ZXgucGxhbmV0YXgudXkifV19", "signature": "L9EUVL6m5ZJykOcAnoJRCCu5ZUrVqToQxHRZ6puDhJ4TQ0-R8jRqlocaC-2NIAOckfEQtCN7mh1pN8vl5fFkM1-VrFOwck8Il9MWBjccRqWtkFE9-_eqKj6Ok28UTQE-Jp-2Cxn4cUAn-fvzDtuG7LJ_Vn2j56luy3EQ0xHMBbfC7DPgjGvBGaWhrJWqC_B-6hBkE5erCf8woEDTLrLdOtVgfAzWvYIDShV-bODExn2RS9grV9vjgAoIsBjLFO30PUQJZIkmbgAQVZY_N0OyV2Te59kY6ZvUTKYb6QkQj1hNyhn7QujpEM9WR7ubk3lJ2srFmWvuibNNnU42dYvxzQ"}'
    [Sat Sep  7 18:20:38 -03 2019] _postContentType='application/jose+json'
    [Sat Sep  7 18:20:38 -03 2019] Http already initialized.
    [Sat Sep  7 18:20:38 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g '
    [Sat Sep  7 18:20:39 -03 2019] _ret='0'
    [Sat Sep  7 18:20:39 -03 2019] responseHeaders='HTTP/1.1 201 Created
    Server: nginx
    Content-Type: application/json
    Content-Length: 363
    Boulder-Requester: 10884918
    Link: ;rel="index"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/10884918/48983418
    Replay-Nonce: 0001qeZPH1TpS5JtGHkrKEQMcpNy0bjvzsB_vIbXwdUk1sg
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    Expires: Sat, 07 Sep 2019 21:20:39 GMT
    Cache-Control: max-age=0, no-cache, no-store
    Pragma: no-cache
    Date: Sat, 07 Sep 2019 21:20:39 GMT
    Connection: keep-alive
    '
    [Sat Sep  7 18:20:39 -03 2019] code='201'
    [Sat Sep  7 18:20:39 -03 2019] original='{
      "status": "pending",
      "expires": "2019-09-14T21:20:39.185383994Z",
      "identifiers": [
        {
          "type": "dns",
          "value": "subdomain.domain.com"
        }
      ],
      "authorizations": [
        "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611"
      ],
      "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/10884918/48983418"
    }'
    [Sat Sep  7 18:20:39 -03 2019] response='{"status":"pending","expires":"2019-09-14T21:20:39.185383994Z","identifiers":[{"type":"dns","value":"subdomain.domain.com"}],"authorizations":["https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611"],"finalize":"https://acme-staging-v02.api.letsencrypt.org/acme/finalize/10884918/48983418"}'
    [Sat Sep  7 18:20:39 -03 2019] Le_LinkOrder='https://acme-staging-v02.api.letsencrypt.org/acme/order/10884918/48983418'
    [Sat Sep  7 18:20:39 -03 2019] Le_OrderFinalize='https://acme-staging-v02.api.letsencrypt.org/acme/finalize/10884918/48983418'
    [Sat Sep  7 18:20:39 -03 2019] OK
    [Sat Sep  7 18:20:39 -03 2019] 8:Le_OrderFinalize='https://acme-staging-v02.api.letsencrypt.org/acme/finalize/10884918/48983418'
    [Sat Sep  7 18:20:39 -03 2019] _authorizations_seg='https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611'
    [Sat Sep  7 18:20:39 -03 2019] _authz_url='https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611'
    [Sat Sep  7 18:20:39 -03 2019] url='https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611'
    [Sat Sep  7 18:20:39 -03 2019] payload
    [Sat Sep  7 18:20:39 -03 2019] Use cached jwk for file: /var/db/acme/.acme.sh/ca/acme-staging-v02.api.letsencrypt.org/account.key
    [Sat Sep  7 18:20:39 -03 2019] base64 single line.
    [Sat Sep  7 18:20:39 -03 2019] payload64
    [Sat Sep  7 18:20:39 -03 2019] _request_retry_times='1'
    [Sat Sep  7 18:20:39 -03 2019] Use _CACHED_NONCE='0001qeZPH1TpS5JtGHkrKEQMcpNy0bjvzsB_vIbXwdUk1sg'
    [Sat Sep  7 18:20:39 -03 2019] nonce='0001qeZPH1TpS5JtGHkrKEQMcpNy0bjvzsB_vIbXwdUk1sg'
    [Sat Sep  7 18:20:39 -03 2019] protected='{"nonce": "0001qeZPH1TpS5JtGHkrKEQMcpNy0bjvzsB_vIbXwdUk1sg", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611", "alg": "RS256", "kid": "https://acme-staging-v02.api.letsencrypt.org/acme/acct/10884918"}'
    [Sat Sep  7 18:20:39 -03 2019] base64 single line.
    [Sat Sep  7 18:20:39 -03 2019] protected64='eyJub25jZSI6ICIwMDAxcWVaUEgxVHBTNUp0R0hrcktFUU1jcE55MGJqdnpzQl92SWJYd2RVazFzZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My83NDM5NjExIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzEwODg0OTE4In0'
    [Sat Sep  7 18:20:39 -03 2019] base64 single line.
    [Sat Sep  7 18:20:39 -03 2019] _sig_t='jXlI/uPfQhNpT+AKxF5K5q4hqqwkmNgfOsaA2zq2pOwzIFJbxOd0Egxrjqn9blJUHjoS7lHg9qhb2Wxtykfr4mO1RQiRlobVhbEqFy0ERQeOkGfUKVGqcVbjbyr9gX6IAGEKMLoJ+SSlUKdFmRKr7oFJ0KJ46wI4nNsW72ZDTZxSCqKfEx/IaWnc+lx5o4+lKGnacgcYfb/+wB6AOQpXHIuy0crz+ztMTdAvMrNmq7h7KRzfXE8INkTDs5jtMD8P+AZRcZQ0JuIMDwytYu09gBZRwfSdoyDca9Hf3R0sZ4w0L9Qh0aadz5R2zLAK88wYbq/1IV0ev3g1uopjDY2k3A=='
    [Sat Sep  7 18:20:39 -03 2019] sig='jXlI_uPfQhNpT-AKxF5K5q4hqqwkmNgfOsaA2zq2pOwzIFJbxOd0Egxrjqn9blJUHjoS7lHg9qhb2Wxtykfr4mO1RQiRlobVhbEqFy0ERQeOkGfUKVGqcVbjbyr9gX6IAGEKMLoJ-SSlUKdFmRKr7oFJ0KJ46wI4nNsW72ZDTZxSCqKfEx_IaWnc-lx5o4-lKGnacgcYfb_-wB6AOQpXHIuy0crz-ztMTdAvMrNmq7h7KRzfXE8INkTDs5jtMD8P-AZRcZQ0JuIMDwytYu09gBZRwfSdoyDca9Hf3R0sZ4w0L9Qh0aadz5R2zLAK88wYbq_1IV0ev3g1uopjDY2k3A'
    [Sat Sep  7 18:20:39 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxcWVaUEgxVHBTNUp0R0hrcktFUU1jcE55MGJqdnpzQl92SWJYd2RVazFzZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My83NDM5NjExIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzEwODg0OTE4In0", "payload": "", "signature": "jXlI_uPfQhNpT-AKxF5K5q4hqqwkmNgfOsaA2zq2pOwzIFJbxOd0Egxrjqn9blJUHjoS7lHg9qhb2Wxtykfr4mO1RQiRlobVhbEqFy0ERQeOkGfUKVGqcVbjbyr9gX6IAGEKMLoJ-SSlUKdFmRKr7oFJ0KJ46wI4nNsW72ZDTZxSCqKfEx_IaWnc-lx5o4-lKGnacgcYfb_-wB6AOQpXHIuy0crz-ztMTdAvMrNmq7h7KRzfXE8INkTDs5jtMD8P-AZRcZQ0JuIMDwytYu09gBZRwfSdoyDca9Hf3R0sZ4w0L9Qh0aadz5R2zLAK88wYbq_1IV0ev3g1uopjDY2k3A"}'
    [Sat Sep  7 18:20:39 -03 2019] POST
    [Sat Sep  7 18:20:39 -03 2019] _post_url='https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/7439611'
    [Sat Sep  7 18:20:39 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxcWVaUEgxVHBTNUp0R0hrcktFUU1jcE55MGJqdnpzQl92SWJYd2RVazFzZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My83NDM5NjExIiwgImFsZyI6ICJSUzI1NiIsICJraWQiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hY2N0LzEwODg0OTE4In0", "payload": "", "signature": "jXlI_uPfQhNpT-AKxF5K5q4hqqwkmNgfOsaA2zq2pOwzIFJbxOd0Egxrjqn9blJUHjoS7lHg9qhb2Wxtykfr4mO1RQiRlobVhbEqFy0ERQeOkGfUKVGqcVbjbyr9gX6IAGEKMLoJ-SSlUKdFmRKr7oFJ0KJ46wI4nNsW72ZDTZxSCqKfEx_IaWnc-lx5o4-lKGnacgcYfb_-wB6AOQpXHIuy0crz-ztMTdAvMrNmq7h7KRzfXE8INkTDs5jtMD8P-AZRcZQ0JuIMDwytYu09gBZRwfSdoyDca9Hf3R0sZ4w0L9Qh0aadz5R2zLAK88wYbq_1IV0ev3g1uopjDY2k3A"}'
    [Sat Sep  7 18:20:39 -03 2019] _postContentType='application/jose+json'
    [Sat Sep  7 18:20:39 -03 2019] Http already initialized.
    [Sat Sep  7 18:20:39 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g '
    [Sat Sep  7 18:20:40 -03 2019] _ret='0'
    [Sat Sep  7 18:20:40 -03 2019] responseHeaders='HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/json
    Content-Length: 815
    Boulder-Requester: 10884918
    Link: ;rel="index"
    Replay-Nonce: 0001fIGgWJ3k0L35bPGuAdyJNXuSlrt9q7_hRH1Ax29DekU
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    Expires: Sat, 07 Sep 2019 21:20:40 GMT
    Cache-Control: max-age=0, no-cache, no-store
    Pragma: no-cache
    Date: Sat, 07 Sep 2019 21:20:40 GMT
    Connection: keep-alive
    '
    [Sat Sep  7 18:20:40 -03 2019] code='200'
    [Sat Sep  7 18:20:40 -03 2019] original='{
      "identifier": {
        "type": "dns",
        "value": "subdomain.domain.com"
      },
      "status": "pending",
      "expires": "2019-09-14T21:20:39Z",
      "challenges": [
        {
          "type": "http-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ",
          "token": "tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"
        },
        {
          "type": "dns-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/M5u-ew",
          "token": "tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"
        },
        {
          "type": "tls-alpn-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/79Su8w",
          "token": "tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"
        }
      ]
    }'
    [Sat Sep  7 18:20:40 -03 2019] response='{"identifier":{"type":"dns","value":"subdomain.domain.com"},"status":"pending","expires":"2019-09-14T21:20:39Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"dns-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/M5u-ew","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/79Su8w","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"}]}'
    [Sat Sep  7 18:20:40 -03 2019] response='{"identifier":{"type":"dns","value":"subdomain.domain.com"},"status":"pending","expires":"2019-09-14T21:20:39Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"dns-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/M5u-ew","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/79Su8w","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"}]}'
    [Sat Sep  7 18:20:40 -03 2019] _d='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] _authorizations_map='subdomain.domain.com,{"identifier":{"type":"dns","value":"subdomain.domain.com"},"status":"pending","expires":"2019-09-14T21:20:39Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"dns-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/M5u-ew","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/79Su8w","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"}]}
    '
    [Sat Sep  7 18:20:40 -03 2019] d='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] Getting webroot for domain='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] _w='free_dns'
    [Sat Sep  7 18:20:40 -03 2019] _currentRoot='free_dns'
    [Sat Sep  7 18:20:40 -03 2019] _is_idn_d='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] _idn_temp
    [Sat Sep  7 18:20:40 -03 2019] response='{"identifier":{"type":"dns","value":"subdomain.domain.com"},"status":"pending","expires":"2019-09-14T21:20:39Z","challenges":[{"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"dns-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/M5u-ew","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"},{"type":"tls-alpn-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/79Su8w","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"}]}'
    [Sat Sep  7 18:20:40 -03 2019] base64 single line.
    [Sat Sep  7 18:20:40 -03 2019] entry='"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"'
    [Sat Sep  7 18:20:40 -03 2019] token='tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M'
    [Sat Sep  7 18:20:40 -03 2019] uri='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:40 -03 2019] keyauthorization='tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M.Pf0fBui4ubwkLVOj4PALof7fb8LiYRyTcFwTU4np9j4'
    [Sat Sep  7 18:20:40 -03 2019] dvlist='subdomain.domain.com#tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M.Pf0fBui4ubwkLVOj4PALof7fb8LiYRyTcFwTU4np9j4#https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ#http-01#free_dns'
    [Sat Sep  7 18:20:40 -03 2019] d
    [Sat Sep  7 18:20:40 -03 2019] vlist='subdomain.domain.com#tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M.Pf0fBui4ubwkLVOj4PALof7fb8LiYRyTcFwTU4np9j4#https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ#http-01#free_dns,'
    [Sat Sep  7 18:20:40 -03 2019] d='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] ok, let's start to verify
    [Sat Sep  7 18:20:40 -03 2019] Verifying: subdomain.domain.com
    [Sat Sep  7 18:20:40 -03 2019] d='subdomain.domain.com'
    [Sat Sep  7 18:20:40 -03 2019] keyauthorization='tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M.Pf0fBui4ubwkLVOj4PALof7fb8LiYRyTcFwTU4np9j4'
    [Sat Sep  7 18:20:40 -03 2019] uri='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:40 -03 2019] _currentRoot='free_dns'
    [Sat Sep  7 18:20:40 -03 2019] wellknown_path='free_dns/.well-known/acme-challenge'
    [Sat Sep  7 18:20:40 -03 2019] writing token:tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M to free_dns/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M
    [Sat Sep  7 18:20:40 -03 2019] Changing owner/group of .well-known to acme:certs
    [Sat Sep  7 18:20:40 -03 2019] mktemp exists=0
    [Sat Sep  7 18:20:40 -03 2019] Trigger domain validation.
    [Sat Sep  7 18:20:40 -03 2019] _t_url='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:40 -03 2019] _t_key_authz='tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M.Pf0fBui4ubwkLVOj4PALof7fb8LiYRyTcFwTU4np9j4'
    [Sat Sep  7 18:20:40 -03 2019] _t_vtype='http-01'
    [Sat Sep  7 18:20:40 -03 2019] url='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:40 -03 2019] payload='{}'
    [Sat Sep  7 18:20:40 -03 2019] Use cached jwk for file: /var/db/acme/.acme.sh/ca/acme-staging-v02.api.letsencrypt.org/account.key
    [Sat Sep  7 18:20:40 -03 2019] base64 single line.
    [Sat Sep  7 18:20:40 -03 2019] payload64='e30'
    [Sat Sep  7 18:20:40 -03 2019] _request_retry_times='1'
    [Sat Sep  7 18:20:40 -03 2019] Use _CACHED_NONCE='0001fIGgWJ3k0L35bPGuAdyJNXuSlrt9q7_hRH1Ax29DekU'
    [Sat Sep  7 18:20:40 -03 2019] nonce='0001fIGgWJ3k0L35bPGuAdyJNXuSlrt9q7_hRH1Ax29DekU'
    [Sat Sep  7 18:20:40 -03 2019] protected='{"nonce": "0001fIGgWJ3k0L35bPGuAdyJNXuSlrt9q7_hRH1Ax29DekU", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ", "alg": "RS256", "kid": "https://acme-staging-v02.api.letsencrypt.org/acme/acct/10884918"}'
    [Sat Sep  7 18:20:40 -03 2019] base64 single line.
    [Sat Sep  7 18:20:40 -03 2019] protected64='eyJub25jZSI6ICIwMDAxZklHZ1dKM2swTDM1YlBHdUFkeUpOWHVTbHJ0OXE3X2hSSDFBeDI5RGVrVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9'
    [Sat Sep  7 18:20:40 -03 2019] base64 single line.
    [Sat Sep  7 18:20:40 -03 2019] _sig_t='HO6vDwqu/8QJYo3sfYypATRRejMyMNJylEgmbOevz71vHDLlu3GIMgA8++D2XNkXm1+jxBhqk0MRKq+lAvJOHxfOw+MPtGY7+IB4eGx/hF9YaxZlkfoDbuW1i7w62G7jUdwVmP6Io1v8j2kWCye69QT6kdQdrGF4OxhrBx1lXxNHYYFCMtSHjd+m0Rbm8Y9t3PknIfWiaWMoq+7f/N+ydc7qPjDLs4KOW5WM9XYsMhPTskWAdNQ98qMfopLYBtuLgvshBNAWU7Dge17M5MtuH46Bs7tddyerZyLr9m3YOeS/RjeeRhRSQcvfD5v71Shn+n5pdCFamZeaX3tUODPOdQ=='
    [Sat Sep  7 18:20:40 -03 2019] sig='HO6vDwqu_8QJYo3sfYypATRRejMyMNJylEgmbOevz71vHDLlu3GIMgA8--D2XNkXm1-jxBhqk0MRKq-lAvJOHxfOw-MPtGY7-IB4eGx_hF9YaxZlkfoDbuW1i7w62G7jUdwVmP6Io1v8j2kWCye69QT6kdQdrGF4OxhrBx1lXxNHYYFCMtSHjd-m0Rbm8Y9t3PknIfWiaWMoq-7f_N-ydc7qPjDLs4KOW5WM9XYsMhPTskWAdNQ98qMfopLYBtuLgvshBNAWU7Dge17M5MtuH46Bs7tddyerZyLr9m3YOeS_RjeeRhRSQcvfD5v71Shn-n5pdCFamZeaX3tUODPOdQ'
    [Sat Sep  7 18:20:40 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxZklHZ1dKM2swTDM1YlBHdUFkeUpOWHVTbHJ0OXE3X2hSSDFBeDI5RGVrVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9", "payload": "e30", "signature": "HO6vDwqu_8QJYo3sfYypATRRejMyMNJylEgmbOevz71vHDLlu3GIMgA8--D2XNkXm1-jxBhqk0MRKq-lAvJOHxfOw-MPtGY7-IB4eGx_hF9YaxZlkfoDbuW1i7w62G7jUdwVmP6Io1v8j2kWCye69QT6kdQdrGF4OxhrBx1lXxNHYYFCMtSHjd-m0Rbm8Y9t3PknIfWiaWMoq-7f_N-ydc7qPjDLs4KOW5WM9XYsMhPTskWAdNQ98qMfopLYBtuLgvshBNAWU7Dge17M5MtuH46Bs7tddyerZyLr9m3YOeS_RjeeRhRSQcvfD5v71Shn-n5pdCFamZeaX3tUODPOdQ"}'
    [Sat Sep  7 18:20:40 -03 2019] POST
    [Sat Sep  7 18:20:40 -03 2019] _post_url='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:40 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxZklHZ1dKM2swTDM1YlBHdUFkeUpOWHVTbHJ0OXE3X2hSSDFBeDI5RGVrVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9", "payload": "e30", "signature": "HO6vDwqu_8QJYo3sfYypATRRejMyMNJylEgmbOevz71vHDLlu3GIMgA8--D2XNkXm1-jxBhqk0MRKq-lAvJOHxfOw-MPtGY7-IB4eGx_hF9YaxZlkfoDbuW1i7w62G7jUdwVmP6Io1v8j2kWCye69QT6kdQdrGF4OxhrBx1lXxNHYYFCMtSHjd-m0Rbm8Y9t3PknIfWiaWMoq-7f_N-ydc7qPjDLs4KOW5WM9XYsMhPTskWAdNQ98qMfopLYBtuLgvshBNAWU7Dge17M5MtuH46Bs7tddyerZyLr9m3YOeS_RjeeRhRSQcvfD5v71Shn-n5pdCFamZeaX3tUODPOdQ"}'
    [Sat Sep  7 18:20:40 -03 2019] _postContentType='application/jose+json'
    [Sat Sep  7 18:20:40 -03 2019] Http already initialized.
    [Sat Sep  7 18:20:40 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g '
    [Sat Sep  7 18:20:40 -03 2019] _ret='0'
    [Sat Sep  7 18:20:40 -03 2019] responseHeaders='HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/json
    Content-Length: 190
    Boulder-Requester: 10884918
    Link: ;rel="index"
    Link: ;rel="up"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ
    Replay-Nonce: 0001FrbVzCF3Rh44LaLQHNpdalcBUyoDBQCJZcSeIOh9el8
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    Expires: Sat, 07 Sep 2019 21:20:40 GMT
    Cache-Control: max-age=0, no-cache, no-store
    Pragma: no-cache
    Date: Sat, 07 Sep 2019 21:20:40 GMT
    Connection: keep-alive
    '
    [Sat Sep  7 18:20:40 -03 2019] code='200'
    [Sat Sep  7 18:20:40 -03 2019] original='{
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ",
      "token": "tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"
    }'
    [Sat Sep  7 18:20:40 -03 2019] response='{"type":"http-01","status":"pending","url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M"}'
    [Sat Sep  7 18:20:40 -03 2019] trigger validation code: 200
    [Sat Sep  7 18:20:40 -03 2019] sleep 2 secs to verify
    [Sat Sep  7 18:20:42 -03 2019] checking
    [Sat Sep  7 18:20:42 -03 2019] url='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:42 -03 2019] payload
    [Sat Sep  7 18:20:42 -03 2019] Use cached jwk for file: /var/db/acme/.acme.sh/ca/acme-staging-v02.api.letsencrypt.org/account.key
    [Sat Sep  7 18:20:42 -03 2019] base64 single line.
    [Sat Sep  7 18:20:42 -03 2019] payload64
    [Sat Sep  7 18:20:42 -03 2019] _request_retry_times='1'
    [Sat Sep  7 18:20:42 -03 2019] Use _CACHED_NONCE='0001FrbVzCF3Rh44LaLQHNpdalcBUyoDBQCJZcSeIOh9el8'
    [Sat Sep  7 18:20:42 -03 2019] nonce='0001FrbVzCF3Rh44LaLQHNpdalcBUyoDBQCJZcSeIOh9el8'
    [Sat Sep  7 18:20:42 -03 2019] protected='{"nonce": "0001FrbVzCF3Rh44LaLQHNpdalcBUyoDBQCJZcSeIOh9el8", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ", "alg": "RS256", "kid": "https://acme-staging-v02.api.letsencrypt.org/acme/acct/10884918"}'
    [Sat Sep  7 18:20:42 -03 2019] base64 single line.
    [Sat Sep  7 18:20:42 -03 2019] protected64='eyJub25jZSI6ICIwMDAxRnJiVnpDRjNSaDQ0TGFMUUhOcGRhbGNCVXlvREJRQ0paY1NlSU9oOWVsOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9'
    [Sat Sep  7 18:20:42 -03 2019] base64 single line.
    [Sat Sep  7 18:20:42 -03 2019] _sig_t='JiFGAt1twU/FKf0oWPnVuWV0Eg5hWwxQVpFvLO2oKUVnYz6hkKvuo3HaKHL/rayKAvhaaOXx8TzoPL2Zsq3jZ/TNtHxu3Dx+DBJ/olC/gr2Hb8qjcBx/bcwtyRomAC8gGQojxbFB9dyzc9LF/ktX/i5xhRxIhXpKKGoVR0lG3cUxoBcVyZ2oWuFUyQ7KBrWTsfsPpaUcNzLK8HjnrzOq6rUOtmvkDxpiwYrp7Sz0oao6I9s7SHAQTnOVfOBbQISMjLgJ+D/tCPI9Wk7vB5uFxfl74I9amnP8GJ56wDc/7nweMZ0ZUKr28H7qnXgOqad0oBtuGYPNuGhlWedG2H34Cw=='
    [Sat Sep  7 18:20:42 -03 2019] sig='JiFGAt1twU_FKf0oWPnVuWV0Eg5hWwxQVpFvLO2oKUVnYz6hkKvuo3HaKHL_rayKAvhaaOXx8TzoPL2Zsq3jZ_TNtHxu3Dx-DBJ_olC_gr2Hb8qjcBx_bcwtyRomAC8gGQojxbFB9dyzc9LF_ktX_i5xhRxIhXpKKGoVR0lG3cUxoBcVyZ2oWuFUyQ7KBrWTsfsPpaUcNzLK8HjnrzOq6rUOtmvkDxpiwYrp7Sz0oao6I9s7SHAQTnOVfOBbQISMjLgJ-D_tCPI9Wk7vB5uFxfl74I9amnP8GJ56wDc_7nweMZ0ZUKr28H7qnXgOqad0oBtuGYPNuGhlWedG2H34Cw'
    [Sat Sep  7 18:20:42 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxRnJiVnpDRjNSaDQ0TGFMUUhOcGRhbGNCVXlvREJRQ0paY1NlSU9oOWVsOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9", "payload": "", "signature": "JiFGAt1twU_FKf0oWPnVuWV0Eg5hWwxQVpFvLO2oKUVnYz6hkKvuo3HaKHL_rayKAvhaaOXx8TzoPL2Zsq3jZ_TNtHxu3Dx-DBJ_olC_gr2Hb8qjcBx_bcwtyRomAC8gGQojxbFB9dyzc9LF_ktX_i5xhRxIhXpKKGoVR0lG3cUxoBcVyZ2oWuFUyQ7KBrWTsfsPpaUcNzLK8HjnrzOq6rUOtmvkDxpiwYrp7Sz0oao6I9s7SHAQTnOVfOBbQISMjLgJ-D_tCPI9Wk7vB5uFxfl74I9amnP8GJ56wDc_7nweMZ0ZUKr28H7qnXgOqad0oBtuGYPNuGhlWedG2H34Cw"}'
    [Sat Sep  7 18:20:42 -03 2019] POST
    [Sat Sep  7 18:20:42 -03 2019] _post_url='https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ'
    [Sat Sep  7 18:20:42 -03 2019] body='{"protected": "eyJub25jZSI6ICIwMDAxRnJiVnpDRjNSaDQ0TGFMUUhOcGRhbGNCVXlvREJRQ0paY1NlSU9oOWVsOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My83NDM5NjExLzVQdFlVUSIsICJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8xMDg4NDkxOCJ9", "payload": "", "signature": "JiFGAt1twU_FKf0oWPnVuWV0Eg5hWwxQVpFvLO2oKUVnYz6hkKvuo3HaKHL_rayKAvhaaOXx8TzoPL2Zsq3jZ_TNtHxu3Dx-DBJ_olC_gr2Hb8qjcBx_bcwtyRomAC8gGQojxbFB9dyzc9LF_ktX_i5xhRxIhXpKKGoVR0lG3cUxoBcVyZ2oWuFUyQ7KBrWTsfsPpaUcNzLK8HjnrzOq6rUOtmvkDxpiwYrp7Sz0oao6I9s7SHAQTnOVfOBbQISMjLgJ-D_tCPI9Wk7vB5uFxfl74I9amnP8GJ56wDc_7nweMZ0ZUKr28H7qnXgOqad0oBtuGYPNuGhlWedG2H34Cw"}'
    [Sat Sep  7 18:20:42 -03 2019] _postContentType='application/jose+json'
    [Sat Sep  7 18:20:42 -03 2019] Http already initialized.
    [Sat Sep  7 18:20:42 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g '
    [Sat Sep  7 18:20:43 -03 2019] _ret='0'
    [Sat Sep  7 18:20:43 -03 2019] responseHeaders='HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/json
    Content-Length: 1036
    Boulder-Requester: 10884918
    Link: ;rel="index"
    Link: ;rel="up"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ
    Replay-Nonce: 00027Kx-6QGY_i-GfTGvmwKohSIK0JrxcRTaP5B8h7ms2Tw
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    Expires: Sat, 07 Sep 2019 21:20:43 GMT
    Cache-Control: max-age=0, no-cache, no-store
    Pragma: no-cache
    Date: Sat, 07 Sep 2019 21:20:43 GMT
    Connection: keep-alive
    '
    [Sat Sep  7 18:20:43 -03 2019] code='200'
    [Sat Sep  7 18:20:43 -03 2019] original='{
      "type": "http-01",
      "status": "invalid",
      "error": {
        "type": "urn:ietf:params:acme:error:unauthorized",
        "detail": "Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccenter\u003enginx\u003c/cente\"",
        "status": 403
      },
      "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ",
      "token": "tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M",
      "validationRecord": [
        {
          "url": "http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M",
          "hostname": "subdomain.domain.com",
          "port": "80",
          "addressesResolved": [
            "255.255.255.255"
          ],
          "addressUsed": "255.255.255.255"
        }
      ]
    }'
    [Sat Sep  7 18:20:43 -03 2019] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccenter\u003enginx\u003c/cente\"","status": 403},"url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","validationRecord":[{"url":"http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","hostname":"subdomain.domain.com","port":"80","addressesResolved":["255.255.255.255"],"addressUsed":"255.255.255.255"}]}'
    [Sat Sep  7 18:20:43 -03 2019] original='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccenter\u003enginx\u003c/cente\"","status": 403},"url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","validationRecord":[{"url":"http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","hostname":"subdomain.domain.com","port":"80","addressesResolved":["255.255.255.255"],"addressUsed":"255.255.255.255"}]}'
    [Sat Sep  7 18:20:43 -03 2019] response='{"type":"http-01","status":"invalid","error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: \"\u003chtml\u003e\\r\\n\u003chead\u003e\u003ctitle\u003e502 Bad Gateway\u003c/title\u003e\u003c/head\u003e\\r\\n\u003cbody\u003e\\r\\n\u003ccenter\u003e\u003ch1\u003e502 Bad Gateway\u003c/h1\u003e\u003c/center\u003e\\r\\n\u003chr\u003e\u003ccenter\u003enginx\u003c/cente\"","status": 403},"url":"https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/7439611/5PtYUQ","token":"tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","validationRecord":[{"url":"http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M","hostname":"subdomain.domain.com","port":"80","addressesResolved":["255.255.255.255"],"addressUsed":"255.255.255.255"}]}'
    [Sat Sep  7 18:20:43 -03 2019] error='"error":{"type":"urn:ietf:params:acme:error:unauthorized","detail":"Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: '
    [Sat Sep  7 18:20:43 -03 2019] errordetail='Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: '
    [Sat Sep  7 18:20:43 -03 2019] subdomain.domain.com:Verify error:Invalid response from http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [255.255.255.255]: 
    [Sat Sep  7 18:20:43 -03 2019] Debug: get token url.
    [Sat Sep  7 18:20:43 -03 2019] GET
    [Sat Sep  7 18:20:43 -03 2019] url='http://subdomain.domain.com/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M'
    [Sat Sep  7 18:20:43 -03 2019] timeout=1
    [Sat Sep  7 18:20:43 -03 2019] Http already initialized.
    [Sat Sep  7 18:20:43 -03 2019] _CURL='curl -L --silent --dump-header /var/db/acme/.acme.sh/http.header  --trace-ascii /tmp/tmp.ZWj97QzH  -g  --connect-timeout 1'
    
    <title>502 Bad Gateway</title>
    
    

502 Bad Gateway


nginx [Sat Sep 7 18:20:43 -03 2019] ret='0' [Sat Sep 7 18:20:43 -03 2019] Debugging, skip removing: free_dns/.well-known/acme-challenge/tuDDXbHzDIy2GzXHeB47hz1zwe99sxYJZo0MVr2Y3-M [Sat Sep 7 18:20:43 -03 2019] pid [Sat Sep 7 18:20:43 -03 2019] No need to restore nginx, skip. [Sat Sep 7 18:20:43 -03 2019] _clearupdns [Sat Sep 7 18:20:43 -03 2019] dns_entries [Sat Sep 7 18:20:43 -03 2019] skip dns. [Sat Sep 7 18:20:43 -03 2019] _on_issue_err ...

@dkerr64
Copy link
Contributor Author

dkerr64 commented Sep 8, 2019

@felixgonsug you are not calling acme.sh with the correct parameters. For FreeDNS the correct flag to use is --dns dns_freedns so you are not even getting as far as calling the plugin that talks to FreeDNS.

Also, is subdomain.domain.com the real domain or did you edit the debug output to mask the real domain? I ask because the dns_freedns plugin will not work with a "public" domain shared by FreeDNS... it will only work with a domain that you own.

Thanks.
DAK

@felixgonsug
Copy link

@dkerr64 Thank you very much, shame on me, year and a half using acme but was a long time ago i used the issue command. The domain was to mask the real domain.

@maks2018
Copy link

maks2018 commented Oct 9, 2019

Hi, old problem not fixed :(

:~/.acme.sh# ./acme.sh --issue -d mydomain.top -d '*.mydomain.top' -d '*.test.mydomain.top' --dns dns_freedns --renew
[Wed Oct 9 21:17:22 +03 2019] Renew: 'mydomain.top'
[Wed Oct 9 21:17:24 +03 2019] Multi domain='DNS:mydomain.top,DNS:*.mydomain.top,DNS:*.test.mydomain.top'
[Wed Oct 9 21:17:25 +03 2019] Getting domain auth token for each domain
[Wed Oct 9 21:17:32 +03 2019] Getting webroot for domain='mydomain.top'
[Wed Oct 9 21:17:32 +03 2019] Getting webroot for domain='*.mydomain.top'
[Wed Oct 9 21:17:32 +03 2019] Getting webroot for domain='*.test.mydomain.top'
[Wed Oct 9 21:17:33 +03 2019] Adding txt value: yF_vIPVX6OBOQ03LHk2kIGuk4ikQUzqHP9dLOX1m9ys for domain: _acme-challenge.mydomain.top
[Wed Oct 9 21:17:33 +03 2019] Add TXT record using FreeDNS
[Wed Oct 9 21:17:37 +03 2019] Domain mydomain.top not found at FreeDNS, try with next level of TLD
[Wed Oct 9 21:17:42 +03 2019] Domain top not found at FreeDNS, try with next level of TLD
[Wed Oct 9 21:17:42 +03 2019] Domain top not found at FreeDNS
[Wed Oct 9 21:17:42 +03 2019] Error add txt for domain:_acme-challenge.mydomain.top
[Wed Oct 9 21:17:42 +03 2019] Please check log file for more details: /root/.acme.sh/acme.sh.log

acme.sh - 2.8.4

:~/.acme.sh# egrep
BusyBox v1.31.0 () multi-call binary.

@dkerr64
Copy link
Contributor Author

dkerr64 commented Oct 10, 2019

@maks2018 Can you try with the version of the plugin at https://github.com/dkerr64/acme.sh/blob/FreeDNS/dnsapi/dns_freedns.sh
I am still waiting for @Neilpang to merge PR #2434 and it would help if you could confirm that the changes I made work for you.
Thanks.

@maks2018
Copy link

maks2018 commented Oct 10, 2019

@maks2018 Can you try with the version of the plugin at https://github.com/dkerr64/acme.sh/blob/FreeDNS/dnsapi/dns_freedns.sh

:(

:~/.acme.sh# ./acme.sh --issue -d test.mydomain.top --dns dns_freedns
[Thu Oct 10 08:46:20 +03 2019] Single domain='test.mydomain.top'
[Thu Oct 10 08:46:20 +03 2019] Getting domain auth token for each domain
[Thu Oct 10 08:46:25 +03 2019] Getting webroot for domain='test.mydomain.top'
[Thu Oct 10 08:46:25 +03 2019] Adding txt value: SIlfJ-rb_aIEwDf92gIPZEsQ3Gh8Tbb1WtFhm7LS2Rk for domain: _acme-challenge.test.mydomain.top
[Thu Oct 10 08:46:25 +03 2019] Add TXT record using FreeDNS
[Thu Oct 10 08:46:30 +03 2019] Domain test.mydomain.top not found at FreeDNS, try with next level of TLD
[Thu Oct 10 08:46:33 +03 2019] Domain mydomain.top not found at FreeDNS, try with next level of TLD
[Thu Oct 10 08:46:36 +03 2019] Domain top not found at FreeDNS, try with next level of TLD
[Thu Oct 10 08:46:36 +03 2019] Domain top not found at FreeDNS
[Thu Oct 10 08:46:36 +03 2019] Error add txt for domain:_acme-challenge.test.mydomain.top
[Thu Oct 10 08:46:36 +03 2019] Please check log file for more details: /root/.acme.sh/acme.sh.log

full log in your mail

@dkerr64
Copy link
Contributor Author

dkerr64 commented Oct 12, 2019

Pleased to inform that PR #2434 has been merged into the acme.sh dev branch. When 2.8.4 is released it will contain the fix to problems reported above with _egrep_o().

In the meantime I am working with @maks2018 to figure out what his problem is.

@dkerr64
Copy link
Contributor Author

dkerr64 commented Oct 23, 2019

Adding a note to this thread that issue #2536 was opened reporting a problem with use of [:space:] in tr command. Unfortunately this did not get to my attention until today (because @master-nevi opened a separate issue instead of adding to this issue).

And @Neilpang has merged a fix in pull request #2537 which has unfortunately introduced a new bug that now needs fixed. I have added comments to the above issue and pull request pointing this out. With luck this will get addressed before next version released.

I believe that this will also fix @maks2018 problem.

@master-nevi
Copy link
Contributor

master-nevi commented Oct 23, 2019

@dkerr64 Apologies, I misunderstood the issue opening process thinking that's just what you title new issues for that dns provider.

Would it be possible to correct the options on the dev branch rather than reverting the change entirely? The following pull request adds the additional white-space character options to 'tr'. I've made the change and tested it in my environment with success.

#2553

@Knoose2
Copy link

Knoose2 commented Apr 17, 2020

Whenever I enter the correct user credentials for FreeDNS in the acme package of PFsense I get: FreeDNS login failed for user xxxx
Pfsense 2.4.5
Acme.sh 2.8.6
It shows the correct username and password in the log

@dkerr64
Copy link
Contributor Author

dkerr64 commented Apr 17, 2020

Whenever I enter the correct user credentials for FreeDNS in the acme package of PFsense I get: FreeDNS login failed for user xxxx
Pfsense 2.4.5
Acme.sh 2.8.6
It shows the correct username and password in the log

The only thing I can think of is whether your userid or password contains any special characters (like a backslash) as I don't think the code does anything to escape those.

The way it is supposed to work is that you set the FREEDNS_User and FREEDNS_Password only once (or only once after changing either). Login obtains a "cookie" from freedns and then saves it in /etc/acme/account.conf and then all future logins will use that cookie unless you pass in new user/passwords. So can you look in account.conf and see if a cookie has been saved. If so then run without passing in any user/password and see if that works. If yes, have you changed your password recently? That will require generating a new cookie.

David.

@sienar1
Copy link

sienar1 commented May 21, 2020

I too am getting a login error from the script. I also thought it might be special characters in the password. I changed the password to only alphanumeric and no change. The error from the script is:
FreeDNS login failed for user "*********". Check /tmp/tmp.WbOzTTDakO file

Checking the content of the file, I see this:
cat /tmp/tmp.WbOzTTDakO
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 21 May 2020 16:34:33 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: max-age=300, public

So it appears that the while the response is a 200, meaning a successful login, the response content being saved from the script logging in does not include the login cookie and so the script is failing.

proxmox: 6.2-4
libproxmox-acme-perl: 1.0.3

@dkerr64
Copy link
Contributor Author

dkerr64 commented May 21, 2020

So it appears that the while the response is a 200, meaning a successful login, the response content being saved from the script logging in does not include the login cookie and so the script is failing.

A return code of 200 does not mean login was successful, it means web server successfully replied to the request... that reply could indicate that login was not successful. The FreeDNS script requires the login cookie set by freedns.afraid.org when you login... without that cookie you are not logged in and there is nothing more that the script can do.

You should look at the contents of the full HTML page sent back and see what it says -- do that by running with debug level 3 enabled... you will get a lot of debug output but immediately preceeding the statement "FreeDNS login failed for user" you should see the full raw HTML file... here in the source code...

_debug3 "htmlpage: $htmlpage"

@sienar1
Copy link

sienar1 commented May 21, 2020

A return code of 200 does not mean login was successful

You're absolutely right. That's actually likely a login failure. I say likely because a successful login should come back with a 302 response redirecting to https://freedns.afraid.org/menu/?ls=1 as well as setting the dns_cookie in that response. The site should probably be throwing a 403 or some other auth error instead of a 200, but whatever.

I would like to help with the debug to check out the actual html response, but the script as I'm using it is actually installed as part of another product. Proxmox in my case. So not sure how to enable a debug level or run it independently. Any suggestion on that? Could I replace that line 165 with something else or add a line there that would make it dump that html to a /tmp file?

@sienar1
Copy link

sienar1 commented May 22, 2020

Figured out my issue in proxmox. The credentials should not have parenthesis around them. Examples suggested entering credentials like this:
FREEDNS_User="username"
FREEDNS_Password="password"

But changing it to this is what worked for me:
FREEDNS_User=username
FREEDNS_Password=password

@dkerr64
Copy link
Contributor Author

dkerr64 commented May 22, 2020

But changing it to this is what worked for me:
FREEDNS_User=username
FREEDNS_Password=password

Good, I'm glad you figured it out. To reply to your earlier question, you could simply have run acme.sh from a command line on any system (that acme.sh would run on) using their test server (--test or --staging) and observe the trace/debug statements.

Thanks.

@as400l
Copy link

as400l commented Oct 5, 2020

Hi,

Old problem is back:

[Mon 05 Oct 2020 09:45:28 AM CEST] Domain my.net.pl not found. Retry loading subdomain page (0 attempts remaining)
[Mon 05 Oct 2020 09:45:28 AM CEST] Domain my.net.pl not found after retry
[Mon 05 Oct 2020 09:45:28 AM CEST] Domain my.net.pl not found at FreeDNS, try with next level of TLD
[Mon 05 Oct 2020 09:45:28 AM CEST] sub_domain: _acme-challenge.my
[Mon 05 Oct 2020 09:45:28 AM CEST] top_domain: net.pl
[Mon 05 Oct 2020 09:45:28 AM CEST] Retrieve subdomain page from FreeDNS
[Mon 05 Oct 2020 09:45:28 AM CEST] GET
[Mon 05 Oct 2020 09:45:28 AM CEST] url='https://freedns.afraid.org/subdomain/'
[Mon 05 Oct 2020 09:45:28 AM CEST] timeout=
[Mon 05 Oct 2020 09:45:28 AM CEST] _CURL='curl -L --silent --dump-header /root/.acme.sh/http.header -g '
[Mon 05 Oct 2020 09:45:28 AM CEST] ret='0'
[Mon 05 Oct 2020 09:45:29 AM CEST] Domain net.pl not found. Retry loading subdomain page (0 attempts remaining)
[Mon 05 Oct 2020 09:45:29 AM CEST] Domain net.pl not found after retry
[Mon 05 Oct 2020 09:45:29 AM CEST] Domain net.pl not found at FreeDNS, try with next level of TLD
[Mon 05 Oct 2020 09:45:29 AM CEST] sub_domain: _acme-challenge.my.net
[Mon 05 Oct 2020 09:45:29 AM CEST] top_domain: pl
[Mon 05 Oct 2020 09:45:29 AM CEST] Retrieve subdomain page from FreeDNS
[Mon 05 Oct 2020 09:45:29 AM CEST] GET
[Mon 05 Oct 2020 09:45:29 AM CEST] url='https://freedns.afraid.org/subdomain/'
[Mon 05 Oct 2020 09:45:29 AM CEST] timeout=
[Mon 05 Oct 2020 09:45:29 AM CEST] _CURL='curl -L --silent --dump-header /root/.acme.sh/http.header -g '
[Mon 05 Oct 2020 09:45:30 AM CEST] ret='0'
[Mon 05 Oct 2020 09:45:30 AM CEST] Domain pl not found. Retry loading subdomain page (1 attempts remaining)
[Mon 05 Oct 2020 09:45:30 AM CEST] Retrieve subdomain page from FreeDNS
[Mon 05 Oct 2020 09:45:30 AM CEST] GET
[Mon 05 Oct 2020 09:45:30 AM CEST] url='https://freedns.afraid.org/subdomain/'
[Mon 05 Oct 2020 09:45:30 AM CEST] timeout=
[Mon 05 Oct 2020 09:45:30 AM CEST] _CURL='curl -L --silent --dump-header /root/.acme.sh/http.header -g '
[Mon 05 Oct 2020 09:45:31 AM CEST] ret='0'
[Mon 05 Oct 2020 09:45:31 AM CEST] Domain pl not found. Retry loading subdomain page (0 attempts remaining)
[Mon 05 Oct 2020 09:45:31 AM CEST] Domain pl not found after retry
[Mon 05 Oct 2020 09:45:31 AM CEST] Domain pl not found at FreeDNS, try with next level of TLD

@dkerr64
Copy link
Contributor Author

dkerr64 commented Oct 8, 2020

@as400l I just saw a similar error myself when trying to renew a certificate with an overnight cron job. Unfortunately when I tried to manually renew from command line it just worked. I don't run my cron with debug (maybe I should) so I did not capture what went wrong.

Do you see this problem consistently or just occasionally?

Thanks.

@as400l
Copy link

as400l commented Oct 8, 2020

@dkerr64 I just run it manually with debug and the same thing happens. Maybe it's because i have -d my.net.pl -d *.my.net.pl ?
Entire output attached.
output.txt

@kmassada
Copy link

kmassada commented Apr 6, 2021

Anyone ever faced this one? error code 60?

[Mon Apr  5 17:53:33 PDT 2021] Found domain api file: /root/.acme.sh/dnsapi/dns_freedns.sh
[Mon Apr  5 17:53:33 PDT 2021] Adding txt value: TOKENNNNNNNNN for domain:  _acme-challenge.thing.mydomain.com
[Mon Apr  5 17:53:33 PDT 2021] Add TXT record using FreeDNS
[Mon Apr  5 17:53:33 PDT 2021] fulldomain: _acme-challenge.thing.mydomain.com
[Mon Apr  5 17:53:34 PDT 2021] txtvalue: TOKENNNNNNNNN
[Mon Apr  5 17:53:34 PDT 2021] Login to FreeDNS as user myusr
[Mon Apr  5 17:53:34 PDT 2021] POST
[Mon Apr  5 17:53:34 PDT 2021] _post_url='https://freedns.afraid.org/zc.php?step=2'
[Mon Apr  5 17:53:34 PDT 2021] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -g '
[Mon Apr  5 17:53:34 PDT 2021] Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: 60
[Mon Apr  5 17:53:34 PDT 2021] _ret='60'
[Mon Apr  5 17:53:34 PDT 2021] FreeDNS login failed for user myusr bad RC from _post
[Mon Apr  5 17:53:34 PDT 2021] Error add txt for domain:_acme-challenge.thing.mydomain.com
[Mon Apr  5 17:53:34 PDT 2021] _on_issue_err
[Mon Apr  5 17:53:34 PDT 2021] Please check log file for more details: /root/.acme.sh/acme.sh.log
[Mon Apr  5 17:53:34 PDT 2021] url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/12116817717/OWn84w'
[Mon Apr  5 17:53:34 PDT 2021] payload='{}'
[Mon Apr  5 17:53:35 PDT 2021] POST
[Mon Apr  5 17:53:35 PDT 2021] _post_url='https://acme-v02.api.letsencrypt.org/acme/chall-v3/12116817717/OWn84w'
[Mon Apr  5 17:53:35 PDT 2021] _CURL='curl --silent --dump-header /root/.acme.sh/http.header  -L  -g '
[Mon Apr  5 17:53:36 PDT 2021] _ret='0'
[Mon Apr  5 17:53:36 PDT 2021] code='200'
[Mon Apr  5 17:53:36 PDT 2021] socat doesn't exist.

@dkerr64
Copy link
Contributor Author

dkerr64 commented Apr 6, 2021

curl error 60 is a SSL certificate problem accessing FreeDNS web site. I'm not sure why this would fail, but that is where to start looking. It may just be temporary problem.

@mazarian
Copy link

mazarian commented Sep 21, 2022

Hey- I seem to be having an issue with the freedns acme script in Proxmox 7.2. It's able to authenticate and get a certificate, but it can't delete the TXT record upon completion. Subsequent certificate renewals fail because the old TXT is still there and needs to be manually deleted. Any help is greatly appreciated!

Loading ACME account details
Placing ACME order
Order URL: https://acme-v02.api.letsencrypt.org/acme/order/742022067/127558766687

Getting authorization details from 'https://acme-v02.api.letsencrypt.org/acme/authz-v3/155948108597'
The validation for jvbh.xxx.yyy.la is pending!
[Wed Sep 21 07:22:04 PDT 2022] Add TXT record using FreeDNS
[Wed Sep 21 07:22:12 PDT 2022] Domain jvbh.xxx.yyy.la not found at FreeDNS, try with next level of TLD
[Wed Sep 21 07:22:12 PDT 2022] Domain xxx.yyy.la found at FreeDNS, domain_id 12XXXXX
[Wed Sep 21 07:22:13 PDT 2022] Added acme challenge TXT record for _acme-challenge.jvbh.xxx.yyy.la at FreeDNS
Add TXT record: _acme-challenge.jvbh.xxx.yyy.la
Sleeping 30 seconds to wait for TXT record propagation
Triggering validation
Sleeping for 5 seconds
Status is 'valid', domain 'jvbh.xxx.yyy.la' OK!
[Wed Sep 21 07:22:49 PDT 2022] Delete TXT record using FreeDNS
[Wed Sep 21 07:22:49 PDT 2022] Cannot delete TXT record for _acme-challenge.jvbh.xxx.yyy.la, record does not exist at FreeDNS
[Wed Sep 21 07:22:49 PDT 2022] Error add txt for domain:_acme-challenge.jvbh.xxx.yyy.la
command 'setpriv --reuid nobody --regid nogroup --clear-groups --reset-env -- /bin/bash /usr/share/proxmox-acme/proxmox-acme teardown freedns jvbh.xxx.yyy.la' failed: exit code 1


All domains validated!

Creating CSR
Checking order status
Order is ready, finalizing order
valid!

Downloading certificate
Setting pveproxy certificate and key
Restarting pveproxy
TASK OK

@dkerr64
Copy link
Contributor Author

dkerr64 commented Sep 21, 2022

I have seen occasional problems with DNS verification that magically resolve themselves on subsequent retry. The error you see is very odd because it states that record does not exist when it clearly must have existed to get the 'valid' status.

If this persists then have to decide whether failure to delete a TXT record should be fatal or not. Is it safe to continue or not? It may depend on what happens next time around when trying to create a TXT record if one still exists (because attempt to delete it last time failed).

@alan-netmesh
Copy link

Hi there.
Did anyone experience getting a ban from FreeDNS?

Tried the procedure a year ago, got a ban (account closed) and Josh after unblocking me it told me it was flaged for misuse.
Now a year after, a mate tried to get a cert using the dns api.
The procedure that he did it's the following

  • Install cloning the repo and issuing ./acme.sh --install
  • export FREEDNS_User="hisusername"
  • export FREEDNS_Password="password"
  • acme.sh --issue -d *.hisdomain.com --dns dns_freedns

Saw on top that sometimes it fails due because the export should be done without quotes? He did it with the quotes, following the wiki.
I guess the block it's because the script tried more than one time to login with wrong credentials? Sounds strange since the account got blocked, so at least the user matched.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3rd party api report bugs to dns api, deploy hooks and notification hooks
Projects
None yet
Development

No branches or pull requests