Created
September 11, 2021 00:00
-
-
Save lwiechec/80857ba17448d5fcb716978fc3871913 to your computer and use it in GitHub Desktop.
acme2certifier log
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Directory._config_load() | |
load_config(/var/www/acme2certifier/./acme_srv/acme_srv.cfg:Directory) | |
CAhandler._config_load() ended | |
192.168.252.148 / | |
Directory.directory_get() | |
[pid: 18|app: 0|req: 6/13] 192.168.252.148 () {32 vars in 396 bytes} [Fri Sep 10 23:54:47 2021] GET / => generated 610 bytes in 0 msecs (HTTP/1.1 200) 1 headers in 51 bytes (1 switches on core 0) | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 99cd7247dd2d4488abd3ef7198bb19f3 | |
DBStore.nonce_add(99cd7247dd2d4488abd3ef7198bb19f3) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:99cd7247dd2d4488abd3ef7198bb19f3 | |
[pid: 22|app: 0|req: 6/14] 192.168.252.148 () {34 vars in 486 bytes} [Fri Sep 10 23:54:48 2021] HEAD /acme/newnonce => generated 0 bytes in 35 msecs (HTTP/1.1 200) 2 headers in 93 bytes (0 switches on core 0) | |
_config_load() | |
Order._config_load() | |
Order._config_load() ended. | |
Order.new() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(99cd7247dd2d4488abd3ef7198bb19f3) | |
DBStore.nonce_check(99cd7247dd2d4488abd3ef7198bb19f3) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(99cd7247dd2d4488abd3ef7198bb19f3) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/MKhF9QgwVKen | |
Message._name_get() returns: MKhF9QgwVKen | |
Signature.check(MKhF9QgwVKen) | |
check signature against account key | |
Signature._jwk_load(MKhF9QgwVKen) | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Order._add(MKhF9QgwVKen) | |
generate_random_string() | |
Order._identifiers_check([{'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}]) | |
Order._identifiers_check() done with None: | |
DBStore.order_add({'status': 2, 'expires': 1631404488, 'account': 'MKhF9QgwVKen', 'name': 'K9aUASkZeQqf', 'identifiers': '[{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}]'}) | |
DBStore.account_lookup(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.account_lookup() ended | |
DBStore.order_add() ended | |
generate_random_string() | |
DBStore.authorization_add({'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com', 'name': 'tFYSnVk9kTwR', 'order': 6, 'status': 'pending', 'expires': 1631404488}) | |
DBStore.authorization_add() ended with: 6 | |
Order._add() ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 7fa38f1a9aab4bcd9d31cceea0d28226 | |
DBStore.nonce_add(7fa38f1a9aab4bcd9d31cceea0d28226) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:7fa38f1a9aab4bcd9d31cceea0d28226 | |
Order.new() returns: {"header": {"Location": "http://acme.ais.foo.com/acme/order/K9aUASkZeQqf", "Replay-Nonce": "7fa38f1a9aab4bcd9d31cceea0d28226"}, "data": {"identifiers": [{"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}], "authorizations": ["http://acme.ais.foo.com/acme/authz/tFYSnVk9kTwR"], "status": "pending", "expires": "2021-09-11T23:54:48Z", "finalize": "http://acme.ais.foo.com/acme/order/K9aUASkZeQqf/finalize"}, "code": 201} | |
192.168.252.148 /acme/neworders {'header': {'Location': 'http://acme.ais.foo.com/acme/order/K9aUASkZeQqf', 'Replay-Nonce': '- modified -'}, 'data': {'identifiers': [{'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}], 'authorizations': ['http://acme.ais.foo.com/acme/authz/tFYSnVk9kTwR'], 'status': 'pending', 'expires': '2021-09-11T23:54:48Z', 'finalize': 'http://acme.ais.foo.com/acme/order/K9aUASkZeQqf/finalize'}, 'code': 201} | |
[pid: 21|app: 0|req: 2/15] 192.168.252.148 () {36 vars in 517 bytes} [Fri Sep 10 23:54:48 2021] POST /acme/neworders => generated 280 bytes in 166 msecs (HTTP/1.1 201) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Authorization._config_load() | |
Authorization._config_load() ended. | |
Authorization.new_post() | |
Authorization.invalidate(None) | |
Authorization.invalidate(): set timestamp to 1631318088 | |
DBStore.authorizations_expired_search(column:expires, pattern:1631318088) | |
DBStore.authorizations_expired_search-() ended | |
Authorization.invalidate() ended: 0 authorizations identified | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(7fa38f1a9aab4bcd9d31cceea0d28226) | |
DBStore.nonce_check(7fa38f1a9aab4bcd9d31cceea0d28226) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(7fa38f1a9aab4bcd9d31cceea0d28226) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/MKhF9QgwVKen | |
Message._name_get() returns: MKhF9QgwVKen | |
Signature.check(MKhF9QgwVKen) | |
check signature against account key | |
Signature._jwk_load(MKhF9QgwVKen) | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Authorization._authz_info(http://acme.ais.foo.com/acme/authz/tFYSnVk9kTwR) | |
generate_random_string() | |
DBStore.authorization_lookup(column:name, pattern:tFYSnVk9kTwR) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.authorization_update({'name': 'tFYSnVk9kTwR', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'expires': 1631404488}) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_update() ended | |
DBStore.authorization_lookup(column:name, pattern:tFYSnVk9kTwR) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.challengeset_get() for auth: tFYSnVk9kTwR | |
Challenge._challengelist_search() | |
DBStore._challenge_search(column:authorization__name, pattern:tFYSnVk9kTwR) | |
DBStore._challenge_search() ended | |
Challenge._challengelist_search() ended with: [] | |
Challenges not found. Create a new set. | |
Challenge.new_set(tFYSnVk9kTwR, 2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx) | |
Challenge._new(http-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'LFS7lRbJdNsP', 'expires': 1631404488, 'type': 'http-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization': 'tFYSnVk9kTwR', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:tFYSnVk9kTwR) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(dns-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': '8fmaVFQsnFpj', 'expires': 1631404488, 'type': 'dns-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization': 'tFYSnVk9kTwR', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:tFYSnVk9kTwR) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new(tls-alpn-01) | |
generate_random_string() | |
DBStore.challenge_add({'name': 'JnQrkNkuI38g', 'expires': 1631404488, 'type': 'tls-alpn-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization': 'tFYSnVk9kTwR', 'status': 2}) | |
DBStore.authorization_lookup(column:name, pattern:tFYSnVk9kTwR) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore.authorization_lookup() ended | |
DBStore.challenge_add() ended | |
Challenge._new_set returned ([{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx'}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/8fmaVFQsnFpj', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx'}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/JnQrkNkuI38g', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx'}]) | |
Authorization._authz_info() returns: {"expires": "2021-09-11T23:54:48Z", "status": "pending", "identifier": {"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/8fmaVFQsnFpj", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/JnQrkNkuI38g", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}]} | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 43c94001a4cd41e28c063637fd8611d4 | |
DBStore.nonce_add(43c94001a4cd41e28c063637fd8611d4) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:43c94001a4cd41e28c063637fd8611d4 | |
Authorization.new_post() returns: {"data": {"expires": "2021-09-11T23:54:48Z", "status": "pending", "identifier": {"type": "dns", "value": "grafana.csd-monitor.ais.foo.com"}, "challenges": [{"type": "http-01", "url": "http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}, {"type": "dns-01", "url": "http://acme.ais.foo.com/acme/chall/8fmaVFQsnFpj", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}, {"type": "tls-alpn-01", "url": "http://acme.ais.foo.com/acme/chall/JnQrkNkuI38g", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx"}]}, "code": 200, "header": {"Replay-Nonce": "43c94001a4cd41e28c063637fd8611d4"}} | |
192.168.252.148 /acme/authz/tFYSnVk9kTwR {'data': {'expires': '2021-09-11T23:54:48Z', 'status': 'pending', 'identifier': {'type': 'dns', 'value': 'grafana.csd-monitor.ais.foo.com'}, 'challenges': [{'type': 'http-01', 'url': 'http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP', 'token': '- modified - '}, {'type': 'dns-01', 'url': 'http://acme.ais.foo.com/acme/chall/8fmaVFQsnFpj', 'token': '- modified - '}, {'type': 'tls-alpn-01', 'url': 'http://acme.ais.foo.com/acme/chall/JnQrkNkuI38g', 'token': '- modified - '}]}, 'code': 200, 'header': {'Replay-Nonce': '- modified -'}} | |
[pid: 18|app: 0|req: 7/16] 192.168.252.148 () {36 vars in 535 bytes} [Fri Sep 10 23:54:48 2021] POST /acme/authz/tFYSnVk9kTwR => generated 526 bytes in 239 msecs (HTTP/1.1 200) 2 headers in 104 bytes (1 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(43c94001a4cd41e28c063637fd8611d4) | |
DBStore.nonce_check(43c94001a4cd41e28c063637fd8611d4) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(43c94001a4cd41e28c063637fd8611d4) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/MKhF9QgwVKen | |
Message._name_get() returns: MKhF9QgwVKen | |
Signature.check(MKhF9QgwVKen) | |
check signature against account key | |
Signature._jwk_load(MKhF9QgwVKen) | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP) | |
parse_url(http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP) | |
Challenge._info(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'status': 'pending', 'validated': 0} | |
Challenge._info(LFS7lRbJdNsP) ended | |
Challenge._validate(LFS7lRbJdNsP: {}) | |
Challenge._check(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'status': 'pending', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization': 'tFYSnVk9kTwR', 'authorization__type': 'dns', 'authorization__value': 'grafana.csd-monitor.ais.foo.com', 'authorization__token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization__order__account__name': 'MKhF9QgwVKen'} | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
jwk_thumbprint_get() | |
jwk_thumbprint_get() ended with: 5Bbn2I3n54bBpfMAG8debFBbMvqYaEuWRU9QRRAKpE4 | |
Challenge._validate_http_challenge(LFS7lRbJdNsP:grafana.csd-monitor.ais.foo.com:2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx) | |
fqdn_resolve() ended with: None/True | |
Challenge._validate_http_challenge() ended with: False/True | |
challenge._check() ended with: False/True | |
Challenge._update({'name': 'LFS7lRbJdNsP', 'status': 'invalid'}) | |
DBStore.challenge_update({'name': 'LFS7lRbJdNsP', 'status': 'invalid'}) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore._status_search(column:name, pattern:invalid) | |
DBStore._status_search() ended | |
DBStore.challenge_update() ended | |
Challenge._update() ended | |
Challenge._update_authz(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'authorization': 'tFYSnVk9kTwR'} | |
DBStore.authorization_update({'status': 'invalid', 'name': 'tFYSnVk9kTwR'}) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore._status_search(column:name, pattern:invalid) | |
DBStore._status_search() ended | |
DBStore.authorization_update() ended | |
Challenge._update_authz() ended | |
Challenge._validate() ended with:False | |
Challenge._info(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'status': 'invalid', 'validated': 0} | |
Challenge._info(LFS7lRbJdNsP) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 505007296e7a43a1931c1a13b6f67ae7 | |
DBStore.nonce_add(505007296e7a43a1931c1a13b6f67ae7) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:505007296e7a43a1931c1a13b6f67ae7 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx", "status": "invalid", "url": "http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "505007296e7a43a1931c1a13b6f67ae7"}, "code": 200} | |
192.168.252.148 /acme/chall/LFS7lRbJdNsP {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'invalid', 'url': 'http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 22|app: 0|req: 7/17] 192.168.252.148 () {36 vars in 535 bytes} [Fri Sep 10 23:54:49 2021] POST /acme/chall/LFS7lRbJdNsP => generated 144 bytes in 204 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) | |
_config_load() | |
Challenge._config_load() | |
Challenge._config_load() ended. | |
Challenge.parse() | |
Message.check() | |
decode_message() | |
Nonce.check_nonce() | |
Nonce.nonce._check_and_delete(505007296e7a43a1931c1a13b6f67ae7) | |
DBStore.nonce_check(505007296e7a43a1931c1a13b6f67ae7) | |
DBStore.nonce_check() ended | |
DBStore.nonce_delete(505007296e7a43a1931c1a13b6f67ae7) | |
DBStore.nonce_delete() ended | |
Nonce._check_and_delete() ended with:200 | |
Nonce.check_nonce() ended with:200 | |
Message._name_get() | |
kid: http://acme.ais.foo.com/acme/acct/MKhF9QgwVKen | |
Message._name_get() returns: MKhF9QgwVKen | |
Signature.check(MKhF9QgwVKen) | |
check signature against account key | |
Signature._jwk_load(MKhF9QgwVKen) | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
signature_check(False) | |
Signature.check() ended with: True:None | |
Message.check() ended with:200 | |
Challenge.get_name(http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP) | |
parse_url(http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP) | |
Challenge._info(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'status': 'invalid', 'validated': 0} | |
Challenge._info(LFS7lRbJdNsP) ended | |
Challenge._validate(LFS7lRbJdNsP: {}) | |
Challenge._check(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'status': 'invalid', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization': 'tFYSnVk9kTwR', 'authorization__type': 'dns', 'authorization__value': 'grafana.csd-monitor.ais.foo.com', 'authorization__token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'authorization__order__account__name': 'MKhF9QgwVKen'} | |
DBStore.jwk_load(MKhF9QgwVKen) | |
DBStore._account_search(column:name, pattern:MKhF9QgwVKen) | |
DBStore._account_search() ended with: True | |
DBStore.jwk_load() ended with: {'e': 'AQAB', 'kty': 'RSA', 'n': '4QuH2E9FUhWNcNMGR7TGHfisT9ATpYqC4Kq3OCco3c8TBuPXOVx4eXwnSNDvAfU8zNj5p04C9xJeKlOiIKeov1e6StaVpJtA3W_0JPDcNRrYuC4ffo7Ez0qE6i-j4d4ktUBBJQ7cQxcdrt8-PSowlHHBdm06KKgc6KJbmyBcs79ygFcB77ODHweoI-cwH9LO9_ZmMBII7ryVTnkcSVqKSQ0nRvA-ViQMiflutYnbe33MmrVCldk7nsqyTLyr6p2pEZqIB7SngS16IlNcd7iuhP-tofRGiyPYaG2JEgmEbRbBMq4X16VqZNtTyN6teseSvCaSSchiZ497jnLlclExjQ', 'alg': 'RS256'} | |
jwk_thumbprint_get() | |
jwk_thumbprint_get() ended with: 5Bbn2I3n54bBpfMAG8debFBbMvqYaEuWRU9QRRAKpE4 | |
Challenge._validate_http_challenge(LFS7lRbJdNsP:grafana.csd-monitor.ais.foo.com:2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx) | |
fqdn_resolve() ended with: None/True | |
Challenge._validate_http_challenge() ended with: False/True | |
challenge._check() ended with: False/True | |
Challenge._update({'name': 'LFS7lRbJdNsP', 'status': 'invalid'}) | |
DBStore.challenge_update({'name': 'LFS7lRbJdNsP', 'status': 'invalid'}) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore._status_search(column:name, pattern:invalid) | |
DBStore._status_search() ended | |
DBStore.challenge_update() ended | |
Challenge._update() ended | |
Challenge._update_authz(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'authorization': 'tFYSnVk9kTwR'} | |
DBStore.authorization_update({'status': 'invalid', 'name': 'tFYSnVk9kTwR'}) | |
DBStore._authorization_search(column:name, pattern:tFYSnVk9kTwR) | |
rename name to authorization.name | |
DBStore._authorization_search() ended | |
DBStore._status_search(column:name, pattern:invalid) | |
DBStore._status_search() ended | |
DBStore.authorization_update() ended | |
Challenge._update_authz() ended | |
Challenge._validate() ended with:False | |
Challenge._info(LFS7lRbJdNsP) | |
DBStore.challenge_lookup(name:LFS7lRbJdNsP) | |
DBStore._challenge_search(column:name, pattern:LFS7lRbJdNsP) | |
DBStore._challenge_search() ended | |
DBStore.challenge_lookup() ended with:{'type': 'http-01', 'token': '2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx', 'status': 'invalid', 'validated': 0} | |
Challenge._info(LFS7lRbJdNsP) ended | |
Message.prepare_response() | |
Nonce.nonce_generate_and_add() | |
Nonce.nonce__new() | |
got nonce: 0202385a0fac4dfe9b913a2636fb46a8 | |
DBStore.nonce_add(0202385a0fac4dfe9b913a2636fb46a8) | |
DBStore.nonce_add() ended | |
Nonce.generate_and_add() ended with:0202385a0fac4dfe9b913a2636fb46a8 | |
challenge.parse() returns: {"data": {"type": "http-01", "token": "2IDKVPcJBFkPfGseFxVM8TZQkoOPJzCx", "status": "invalid", "url": "http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP"}, "header": {"Link": "<http://acme.ais.foo.com/acme/authz/>;rel=\"up\"", "Replay-Nonce": "0202385a0fac4dfe9b913a2636fb46a8"}, "code": 200} | |
192.168.252.148 /acme/chall/LFS7lRbJdNsP {'data': {'type': 'http-01', 'token': '- modified -', 'status': 'invalid', 'url': 'http://acme.ais.foo.com/acme/chall/LFS7lRbJdNsP'}, 'header': {'Link': '<http://acme.ais.foo.com/acme/authz/>;rel="up"', 'Replay-Nonce': '- modified -'}, 'code': 200} | |
[pid: 18|app: 0|req: 8/18] 192.168.252.148 () {36 vars in 535 bytes} [Fri Sep 10 23:54:49 2021] POST /acme/chall/LFS7lRbJdNsP => generated 144 bytes in 162 msecs (HTTP/1.1 200) 3 headers in 159 bytes (1 switches on core 0) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment