Lindner, Thomas 1. (Nokia - DE/Nuremberg)([email protected]) on 2019.01.22 18:56:06 +0000: > Hello, > > I run OpenBSD 6.4 and recently noted that renewals with acme-client fail: > # acme-client -vv lists.dl6tom.de = > = > = > =20 > acme-client: /etc/acme/letsencrypt-privkey.pem: loaded RSA account key = > = > = > =20 > acme-client: /etc/ssl/lists.dl6tom.de.crt: certificate renewable: -42 days = > left = > = > =20 > acme-client: /etc/ssl/private/lists.dl6tom.de.key: loaded RSA domain key = > = > = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/directory: directories = > = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: DNS: 104.111.246.175 = > = > = > =20 > acme-client: transfer buffer: [{ "0wdNjYxn8kA": "https://community.letsencr= > ypt.org/t/adding-random-entries-to-the-directory/33417", "key-change": "htt= > ps://acme-v01.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentitie= > s": [ "letse > ncrypt.org" ], "terms-of-service": "https://letsencrypt.org/documents/LE-SA= > -v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org" }, "new-a= > uthz": "https://acme-v01.api.letsencrypt.org/acme/new-authz", "new-cert": "= > https://acme > -v01.api.letsencrypt.org/acme/new-cert", "new-reg": "https://acme-v01.api.l= > etsencrypt.org/acme/new-reg", "revoke-cert": "https://acme-v01.api.letsencr= > ypt.org/acme/revoke-cert" }] (658 bytes) = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/acme/new-authz: req-auth:= > lists.dl6tom.de = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: transfer buffer: [{ "identifier": { "type": "dns", "value": "l= > ists.dl6tom.de" }, "status": "pending", "expires": "2019-01-29T18:19:20Z", = > "challenges": [ { "type": "tls-alpn-01", "status": "pending", "uri": "https= > ://acme-v01. > api.letsencrypt.org/acme/challenge/IibpqF0ckn28LYY5bfA-_qbAlYsWq-DJcQlAw0SW= > CE0/11749882442", "token": "v8oZc_-YhBHNLCaALLEBZ03hEl--KM63pMdqixg_9Io" },= > { "type": "http-01", "status": "pending", "uri": "https://acme-v01.api.let= > sencrypt.org > /acme/challenge/IibpqF0ckn28LYY5bfA-_qbAlYsWq-DJcQlAw0SWCE0/11749882443", "= > token": "yW3-6mo2IK-ZASKPB6lV6rPq1qbvfP1NdUE9AV0xRTs" }, { "type": "tls-sni= > -01", "status": "pending", "uri": "https://acme-v01.api.letsencrypt.org/acm= > e/challenge/ > IibpqF0ckn28LYY5bfA-_qbAlYsWq-DJcQlAw0SWCE0/11749882444", "token": "yfhU9kY= > Zg5wHaRlxLmg6m_DWgzzEdwUnztXAKBmhE6w" }, { "type": "dns-01", "status": "pen= > ding", "uri": "https://acme-v01.api.letsencrypt.org/acme/challenge/IibpqF0c= > kn28LYY5bfA- > _qbAlYsWq-DJcQlAw0SWCE0/11749882445", "token": "iDBP2CeNpp0r5NCWTbpKUoiBOSZ= > z8cJN8HphHRVXULk" } ], "combinations": [ [ 2 ], [ 0 ], [ 1 ], [ 3 ] ] }] (1= > 271 bytes) = > =20 > acme-client: /var/www/acme/yW3-6mo2IK-ZASKPB6lV6rPq1qbvfP1NdUE9AV0xRTs: cre= > ated = > = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/IibpqF0ckn= > 28LYY5bfA-_qbAlYsWq-DJcQlAw0SWCE0/11749882443: challenge = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: transfer buffer: [{ "type": "http-01", "status": "pending", "u= > ri": "https://acme-v01.api.letsencrypt.org/acme/challenge/IibpqF0ckn28LYY5b= > fA-_qbAlYsWq-DJcQlAw0SWCE0/11749882443", "token": "yW3-6mo2IK-ZASKPB6lV6rPq= > 1qbvfP1NdUE9 > AV0xRTs", "keyAuthorization": "yW3-6mo2IK-ZASKPB6lV6rPq1qbvfP1NdUE9AV0xRTs.= > YJLLEKdoM4e4WocQ9C9xvXqa6dAO4zUn6hdCgEgIfBs" }] (337 bytes) = > = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/acme/challenge/IibpqF0ckn= > 28LYY5bfA-_qbAlYsWq-DJcQlAw0SWCE0/11749882443: status = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/acme/new-cert: certificat= > e = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: acme-v01.api.letsencrypt.org: cached = > = > = > =20 > acme-client: https://acme-v01.api.letsencrypt.org/acme/new-cert: bad HTTP: = > 403 = > = > =20 > acme-client: transfer buffer: [{ "type": "urn:acme:error:unauthorized", "de= > tail": "Error creating new cert :: authorizations for these names not found= > or expired: lists.dl6tom.de", "status": 403 }] (171 bytes) = > =20 > acme-client: bad exit: netproc(61794): 1 > > The access.log shows a 404. I searched and found a post on this list, indic= > ating that acme-client handles "status: pending" incorrectly, so I fetched =
Do you have a link? > the source, removed the unlink of the token and recompiled acme-client. Now= > , access.log shows a 200, but renewal still fails: Please show dmesg, webserver configuration, and log entries. This should probably go to bugs@, please send your replies there. /B
