echo: write error on stdout
-
Hi everyone, I'm having a problem validating the SSL certificate on the Let's Encrypt production server with the pfSense Acme client using "Standalone http server". However, I have the same settings in the certificate that I test on the Let's Encrypt test server and it does work great.
The output of testSSL Renew is this and it is correct.
testSSL
Renewing certificate
account: test
server: letsencrypt-staging-2/usr/local/pkg/acme/acme.sh --issue --domain 'www.nidaval.com' --standalone --listen-v4 --httpport '8080' --domain 'nidaval.com' --standalone --listen-v4 --httpport '8080' --home '/tmp/acme/testSSL/' --accountconf '/tmp/acme/testSSL/accountconf.conf' --force --reloadCmd '/tmp/acme/testSSL/reloadcmd.sh' --log-level 3 --log '/tmp/acme/testSSL/acme_issuecert.log'
Array
(
[path] => /etc:/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin/
[PATH] => /etc:/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin/
[port] => 8080
[ipv6] =>
)
[Wed May 10 00:47:11 CEST 2023] Using CA: https://acme-staging-v02.api.letsencrypt.org/directory
[Wed May 10 00:47:11 CEST 2023] Standalone mode.
[Wed May 10 00:47:11 CEST 2023] Standalone mode.
[Wed May 10 00:47:11 CEST 2023] Multi domain='DNS:www.nidaval.com,DNS:nidaval.com'
[Wed May 10 00:47:11 CEST 2023] Getting domain auth token for each domain
[Wed May 10 00:47:14 CEST 2023] Getting webroot for domain='www.nidaval.com'
[Wed May 10 00:47:14 CEST 2023] Getting webroot for domain='nidaval.com'
[Wed May 10 00:47:14 CEST 2023] www.nidaval.com is already verified, skip http-01.
[Wed May 10 00:47:14 CEST 2023] nidaval.com is already verified, skip http-01.
[Wed May 10 00:47:14 CEST 2023] Verify finished, start to sign.
[Wed May 10 00:47:14 CEST 2023] Lets finalize the order.
[Wed May 10 00:47:14 CEST 2023] Le_OrderFinalize='https://acme-staging-v02.api.letsencrypt.org/acme/finalize/100777814/8665388574'
[Wed May 10 00:47:16 CEST 2023] Order status is processing, lets sleep and retry.
[Wed May 10 00:47:16 CEST 2023] Retry after: 3
[Wed May 10 00:47:19 CEST 2023] Polling order status: https://acme-staging-v02.api.letsencrypt.org/acme/order/100777814/8665388574
[Wed May 10 00:47:19 CEST 2023] Downloading cert.
[Wed May 10 00:47:19 CEST 2023] Le_LinkCert='https://acme-staging-v02.api.letsencrypt.org/acme/cert/faef45479be9ef7a676a86d4dfbc85e973a5'
[Wed May 10 00:47:20 CEST 2023] Cert success.
-----BEGIN CERTIFICATE-----
MIIFYDCCBEigAwIBAgITAPrvRUeb6e96Z2qG1N+8helzpTANBgkqhkiG9w0BAQsF
ADBZMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXKFNUQUdJTkcpIExldCdzIEVuY3J5
cHQxKDAmBgNVBAMTHyhTVEFHSU5HKSBBcnRpZmljaWFsIEFwcmljb3QgUjMwHhcN
MjMwNTA5MjE0NzI0WhcNMjMwODA3MjE0NzIzWjAaMRgwFgYDVQQDEw93d3cubmlk
YXZhbC5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDsm6ryArmz
ygkYnIBcYFwwBDTtRYYb/EPhRJwdT8VLve5+85MlIWCgQO3rHiRrUuDafjsOghJv
S6bEAsccV/zRltXyLuvP+pT2H6AhQcr/2pQs3wsS974qFi7BcFIJx5n9BL+lFl4A
8vnXTF/592UMp3zWIJC9t6gxxSbRIDPYnclpwyTC/1raGTfi1bQtAAXecYf9I2MB
PITkFHwtfJYmtGWLWmQXis1BPCE37qpKNIWP3QFY44RO4Rekn6bFxHibrKA2kreo
RHaOSmVd6DAICZzlN6OsWGE5mMnSw4GZLJ8G3IU2SPYGZ2XNO6PUJisOiUCkTWBp
idPHTC1w+m4PAgMBAAGjggJeMIICWjAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYw
FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFLvK
UPh8/s90zziDdPnmK2i6ul+/MB8GA1UdIwQYMBaAFN5yekjfMcOmUN+fhSPfVzdL
XS5lMF0GCCsGAQUFBwEBBFEwTzAlBggrBgEFBQcwAYYZaHR0cDovL3N0Zy1yMy5v
LmxlbmNyLm9yZzAmBggrBgEFBQcwAoYaaHR0cDovL3N0Zy1yMy5pLmxlbmNyLm9y
Zy8wJwYDVR0RBCAwHoILbmlkYXZhbC5jb22CD3d3dy5uaWRhdmFsLmNvbTBMBgNV
HSAERTBDMAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpo
dHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCCAQMGCisGAQQB1nkCBAIEgfQEgfEA
7wB1AO2rnR3dg3OVn/UqiORrtLzDxMxNdopgzP9ONi1/uNZoAAABiAKyrZ0AAAQD
AEYwRAIgEqhvD+4yINQfOrT0WgkMEqG1hpIrkraMz17zG+QlfeMCIAw9dQTmvlDu
3205xJ11YA5FYdU9xNfq223pOzTy5nkkAHYAsMyD5aX5fWuvfAnMKEkEhyrH6IsT
LGNQt8b9JuFsbHcAAAGIArKtkwAABAMARzBFAiEA9TcKMJd1+/mNtfGZJs++EfAw
nJ1DVTZnoIJRwOyUK6QCIESxYTGFh/pHNFMY4t3FdsCYItk2lNQLAXVaKGxaMAIu
MA0GCSqGSIb3DQEBCwUAA4IBAQCwxJJnL1EaDPwTsBG22xSrxKia7zXdvYXEyHDO
cmGbbaNrHnZEyAXIVZ6ybeYhaOCPRVC41RK1IMEsP3FRWueQp+7KW003JHR2BZOx
m/7yu3qu6GvXbtyhjl+w7Bpq+NACFiuB1qv+nRubUZmjfiSXX4Uu9nwZ8rN6Dhaf
B2gygP3phQA3pAyRM6horNRngp8+QZpNFjfZc6VzyrHhPXkzESINDwP0jzxiIibh
V3PKr+Z4ZAxlkLE6bGQMeMgf2vLn2Ls5xjHdtpCmPz3TzvmLB2ghPT2Eyt95k72X
m8oCu6xB/UyTuftj/LQCWSPXWxTatZqgXUrNZEa3Zj3bXc2Q
-----END CERTIFICATE-----
[Wed May 10 00:47:20 CEST 2023] Your cert is in: /tmp/acme/testSSL//www.nidaval.com/www.nidaval.com.cer
[Wed May 10 00:47:20 CEST 2023] Your cert key is in: /tmp/acme/testSSL//www.nidaval.com/www.nidaval.com.key
[Wed May 10 00:47:20 CEST 2023] The intermediate CA cert is in: /tmp/acme/testSSL//www.nidaval.com/ca.cer
[Wed May 10 00:47:20 CEST 2023] And the full chain certs is there: /tmp/acme/testSSL//www.nidaval.com/fullchain.cer
[Wed May 10 00:47:20 CEST 2023] Run reload cmd: /tmp/acme/testSSL/reloadcmd.shIMPORT CERT testSSL, /tmp/acme/testSSL/www.nidaval.com/www.nidaval.com.key, /tmp/acme/testSSL/www.nidaval.com/www.nidaval.com.cer
update cert![Wed May 10 00:47:21 CEST 2023] Reload successThe output of NidavalSSL Renew is this and it is not correct.
NidavalSSL
Renewing certificate
account: Produccion
server: letsencrypt-production-2/usr/local/pkg/acme/acme.sh --issue --domain 'www.nidaval.com' --standalone --listen-v4 --httpport '8080' --domain 'nidaval.com' --standalone --listen-v4 --httpport '8080' --home '/tmp/acme/NidavalSSL/' --accountconf '/tmp/acme/NidavalSSL/accountconf.conf' --force --reloadCmd '/tmp/acme/NidavalSSL/reloadcmd.sh' --log-level 3 --log '/tmp/acme/NidavalSSL/acme_issuecert.log'
Array
(
[path] => /etc:/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin/
[PATH] => /etc:/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin/
[port] => 8080
[ipv6] =>
)
[Wed May 10 12:14:47 CEST 2023] Using CA: https://acme-v02.api.letsencrypt.org/directory
[Wed May 10 12:14:47 CEST 2023] Standalone mode.
[Wed May 10 12:14:47 CEST 2023] Standalone mode.
[Wed May 10 12:14:48 CEST 2023] Multi domain='DNS:www.nidaval.com,DNS:nidaval.com'
[Wed May 10 12:14:48 CEST 2023] Getting domain auth token for each domain
[Wed May 10 12:14:54 CEST 2023] Getting webroot for domain='www.nidaval.com'
[Wed May 10 12:14:54 CEST 2023] Getting webroot for domain='nidaval.com'
[Wed May 10 12:14:54 CEST 2023] Verifying: www.nidaval.com
[Wed May 10 12:14:54 CEST 2023] Standalone mode server
[Wed May 10 12:15:00 CEST 2023] Pending, The CA is processing your order, please just wait. (1/30)
2023/05/10 12:14:56 socat[27152] E write(6, 0x800add000, 20): Broken pipe
echo: write error on stdout
printf: write error on stdout
2023/05/10 12:14:58 socat[37713] E write(6, 0x800add000, 17): Broken pipe
echo: write error on stdout
echo: write error on stdout
printf: write error on stdout
2023/05/10 12:15:00 socat[38507] E write(6, 0x800add000, 17): Broken pipe
echo: write error on stdout
echo: write error on stdout
printf: write error on stdout
2023/05/10 12:15:02 socat[49811] E write(6, 0x800add000, 17): Broken pipe
echo: write error on stdout
echo: write error on stdout
printf: write error on stdout
2023/05/10 12:15:04 socat[59603] E write(6, 0x800add000, 17): Broken pipe
echo: write error on stdout
echo: write error on stdout
printf: write error on stdout
2023/05/10 12:15:06 socat[60651] E write(6, 0x800add000, 17): Broken pipe
echo: write error on stdout
echo: write error on stdout
printf: write error on stdout
[Wed May 10 12:15:07 CEST 2023] www.nidaval.com:Verify error:88.26.16.154: Invalid response from http://www.nidaval.com/.well-known/acme-challenge/JgQLrsY3qPf292dqb4Zbsf9r1qj6e69JAnJiZ6NMZuk: 503
[Wed May 10 12:15:07 CEST 2023] Please check log file for more details: /tmp/acme/NidavalSSL/acme_issuecert.logYou have the configuration of both certificates in the image ...
... and you have the HAProxy frontend configuration in the image.
The versions on my system are:
pfSense v2.6.0
acme v0.7.3- pecl-ssh2 v1.3.1
- socat 1.7.4.2
- php74 v7.4.26
HAProxy v0.61_7
Could you help me?
-
Did you ever get this sorted? I have a similar issue.