From: "=?utf-8?q?Dan_Napier=2C_MS=2C_CIH=2C_CAC?=" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTP id 10572373 for ecs-isp@2rosenthals.com; Mon, 12 Aug 2024 00:36:42 -0400 Received: from secmgr-va.randr ([192.168.200.201]:54366 helo=mail2.2rosenthals.com) by mail.2rosenthals.com with esmtp (Exim 4.97.1) (envelope-from ) id 1sdMnQ-0000000049j-1jIj for ecs-isp@2rosenthals.com; Mon, 12 Aug 2024 00:36:41 -0400 Received: from kaliss.dnacih.com ([47.180.217.131]:37528) by mail2.2rosenthals.com with esmtp (Exim 4.97.1) (envelope-from ) id 1sdMnG-000000006Px-0ail for ecs-isp@2rosenthals.com; Mon, 12 Aug 2024 00:36:30 -0400 X-SASI-Hits: BODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, DATE_TZ_NA 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, FROM_NAME_PHRASE 0.000000, HTML_NO_HTTP 0.100000, INVALID_MSGID_NO_FQDN 0.000000, INVOICE_ATTACHMENT 0.100000, IN_REP_TO 0.000000, LEGITIMATE_SIGNS 0.000000, MSG_THREAD 0.000000, REFERENCES 0.000000, REPLYTO_SAMEAS_FROM 0.000000, SENDER_NO_AUTH 0.000000, SUPERLONG_LINE 0.050000, SUSP_DH_NEG 0.000000, TO_IN_SUBJECT 0.500000, TXT_ATTACHED 0.000000, USER_AGENT 0.000000, __ANY_URI 0.000000, __ATTACHMENT_NOT_IMG 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __BODY_VOICEMAIL 0.000000, __BOUNCE_CHALLENGE_SUBJ 0.000000, __BOUNCE_NDR_SUBJ_EXEMPT 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __FRAUD_BODY_WEBMAIL 0.000000, __FRAUD_WEBMAIL 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FROM_UTF_Q 0.000000, __FUR_HEADER 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_REFERENCES 0.000000, __HAS_REPLYTO 0.000000, __HELO_LOCALHOST 0.000000, __HELO_LOCALHOST2 0.000000, __HIGHBIT_ASCII_MIX 0.000000, __HTTPS_URI 0.000000, __INVOICE_MULTILINGUAL 0.000000, __IN_REP_TO 0.000000, __MAIL_CHAIN 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_DOMAIN_NOT_IN_HDRS 0.000000, __MULTIPLE_URI_TEXT 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_PHRASE1_A 0.000000, __REFERENCES 0.000000, __REPLYTO_SAMEAS_FROM_ACC 0.000000, __REPLYTO_SAMEAS_FROM_ADDY 0.000000, __REPLYTO_SAMEAS_FROM_DOMAIN 0.000000, __RUS_OBFU_PHONE 0.000000, __SANE_MSGID 0.000000, __SCAN_D_NEG 0.000000, __SCAN_D_NEG2 0.000000, __SCAN_D_NEG_HEUR 0.000000, __SCAN_D_NEG_HEUR2 0.000000, __STOCK_CRUFT 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_ALPHA_NEGATE 0.000000, __SUBJ_REPLY 0.000000, __TAG_EXISTS_HTML 0.000000, __TO_IN_SUBJECT2 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_IN_BODY_HTTP_X10 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __USER_AGENT 0.000000, __UTF8_SUBJ 0.000000, __X_VIRUS_SCANNED 0.000000 X-SASI-Probability: 10% X-SASI-RCODE: 200 X-SASI-Version: Antispam-Engine: 5.1.4, AntispamData: 2024.8.12.40617 X-SASI-Hits: BODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, DATE_TZ_NA 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, FROM_NAME_PHRASE 0.000000, HTML_NO_HTTP 0.100000, INVALID_MSGID_NO_FQDN 0.000000, INVOICE_ATTACHMENT 0.100000, IN_REP_TO 0.000000, LEGITIMATE_SIGNS 0.000000, MSG_THREAD 0.000000, REFERENCES 0.000000, REPLYTO_SAMEAS_FROM 0.000000, SENDER_NO_AUTH 0.000000, SUPERLONG_LINE 0.050000, SUSP_DH_NEG 0.000000, TO_IN_SUBJECT 0.500000, TXT_ATTACHED 0.000000, USER_AGENT 0.000000, __ANY_URI 0.000000, __ATTACHMENT_NOT_IMG 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __BODY_VOICEMAIL 0.000000, __BOUNCE_CHALLENGE_SUBJ 0.000000, __BOUNCE_NDR_SUBJ_EXEMPT 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __FRAUD_BODY_WEBMAIL 0.000000, __FRAUD_WEBMAIL 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FROM_UTF_Q 0.000000, __FUR_HEADER 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_REFERENCES 0.000000, __HAS_REPLYTO 0.000000, __HELO_LOCALHOST 0.000000, __HELO_LOCALHOST2 0.000000, __HIGHBIT_ASCII_MIX 0.000000, __HTTPS_URI 0.000000, __INVOICE_MULTILINGUAL 0.000000, __IN_REP_TO 0.000000, __MAIL_CHAIN 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_DOMAIN_NOT_IN_HDRS 0.000000, __MULTIPLE_URI_TEXT 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_PHRASE1_A 0.000000, __REFERENCES 0.000000, __REPLYTO_SAMEAS_FROM_ACC 0.000000, __REPLYTO_SAMEAS_FROM_ADDY 0.000000, __REPLYTO_SAMEAS_FROM_DOMAIN 0.000000, __RUS_OBFU_PHONE 0.000000, __SANE_MSGID 0.000000, __SCAN_D_NEG 0.000000, __SCAN_D_NEG2 0.000000, __SCAN_D_NEG_HEUR 0.000000, __SCAN_D_NEG_HEUR2 0.000000, __STOCK_CRUFT 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_ALPHA_NEGATE 0.000000, __SUBJ_REPLY 0.000000, __TAG_EXISTS_HTML 0.000000, __TO_IN_SUBJECT2 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_IN_BODY_HTTP_X10 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __USER_AGENT 0.000000, __UTF8_SUBJ 0.000000, __X_VIRUS_SCANNED 0.000000 X-SASI-Probability: 10% X-SASI-RCODE: 200 X-SASI-Version: Antispam-Engine: 5.1.4, AntispamData: 2024.8.12.40617 X-ASG-Debug-ID: 1723437383-101376704f5b7d0001-4YkuuC Received: from scotty.dnacih.com (scotty.dnacih.com [64.60.60.125]) by kaliss.dnacih.com with ESMTP id aKouiOFQGJIle2lk for ; Sun, 11 Aug 2024 21:36:24 -0700 (PDT) X-Barracuda-Envelope-From: dan@cihcsp.com X-Barracuda-Effective-Source-IP: scotty.dnacih.com[64.60.60.125] X-Barracuda-Apparent-Source-IP: 64.60.60.125 Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPA id 669076C048D for ; Sun, 11 Aug 2024 21:36:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cihcsp.com; s=dkim; t=1723437379; h=from:reply-to:subject:date:message-id:to:mime-version:content-type: in-reply-to:references; bh=OBX4g2t5h/57ly5AKsDLd3H5NRRG0ipKpAHyvs3jytA=; b=QCtBQMhccJQ0IhrOUWMqJgAX2/vs95ETBrsu0caC8YfKZZ1YzK6fhtOuKrXfLa8fNqpcGq fRZJDMmMcgmh9c5HJOY3txXXPkQelToWCJBz/4GgkwTl6mOlJSfOiKH1QOoYQkECj5YMvg T3EpheP/0IcHHV2tqY/HG+w9bq+PcQH3VkDFiCwtmwXqqlzFoLZAF1C6P3pqTnRwdKo8sm W0KQn8pCPNtttUa8zKTNQ5789Ibt2tGcDTiI7vN+bdXh+E7d3VNH9ed7ei8bksXoj0z711 88ne1Tr2EfOWTMkpCo5KDnnRtItTUlrcAVBGhmYsMb9+dJJsGwMEzx54OrqpdA== Content-Type: multipart/mixed; boundary="----=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596532-1------" In-Reply-To: Reply-To: dan@cihcsp.com References: Date: Sun, 11 Aug 2024 21:36:17 -0700 To: "eCS ISP Mailing List" MIME-Version: 1.0 Message-ID: <32f5e4-66b99180-1-6d544100@31246524> Subject: =?utf-8?q?Re=3A?= [eCS-ISP] Apache HTTPS User-Agent: SOGoMail 5.10.0 X-ASG-Orig-Subj: =?utf-8?q?Re=3A?= [eCS-ISP] Apache HTTPS X-Last-TLS-Session-Version: None X-Barracuda-Connect: scotty.dnacih.com[64.60.60.125] X-Barracuda-Start-Time: 1723437383 X-Barracuda-URL: https://47.180.217.131:443/cgi-mod/mark.cgi X-Barracuda-BRTS-Status: 1 X-Virus-Scanned: by bsmtpd at dnacih.com X-Barracuda-Scan-Msg-Size: 8503 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=7.0 tests=HTML_MESSAGE X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.128918 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 HTML_MESSAGE BODY: HTML included in message ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596532-1------ Content-Type: multipart/alternative; boundary="----=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596311-0------" ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596311-0------ Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Length: 4122 --=C2=A0 Certified Industrial Hygienist Certified Asbestos Consultant Dan Napier, MS, CIH, CAC 92-0614 8/24/24 2520 Artesia Boulevard Redondo Beach, CA 90278-3210 310-644-1924 x 103 CSLB 773462I have the same issue Lewis, I have no idea how these certs work.=C2=A0 But I understand that= I will have to buy a cert for every url.=C2=A0 www.dummies.com wtf.dum= mies.com free.dummies.com=C2=A0 or does the cert cover the entire domai= n?=C2=A0 *.dummies.com I get the same failure that Steve is seeing. I think I made all the directories, but where did all the stuff come fr= om? Should I be eliciting the command from the domain directory.[ns1:c:= \mptn\etc\ssl\uacme\ns1.dnacih.com]uacme -v new uacme.exe: version 1.0.19 starting on Sun, 11 Aug 2024 21:27:14 uacme.exe: loading key from /etc/ssl/uacme/private/key.pem uacme.exe: fetching directory at https://acme-v02.api.letsencrypt.org/d= irectory uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: acme=5Fget: curl=5Fget failed uacme.exe: failed to fetch directory at https://acme-v02.api.letsencryp= t.org/directory On Sunday, August 11, 2024 19:28 PDT, "Steven Levine" wrote: =C2=A0In , on 07/23/24 at 12:20 PM, "Massimo S." said: Hi Massimo, Running: 10-03-19 3:26 2,223,572 124 uacme.exe >uacme --version uacme.exe: version 1.0.19 What's causing curl to fail here? >uacme -v new uacme.exe: version 1.0.19 starting on Sun, 11 Aug 2024 19:30:36 uacme.e= xe: loading key from /etc/ssl/uacme/private/key.pem uacme.exe: /etc/ssl/uacme/private/key.pem not found uacme.exe: generating new 2048-bit RSA key uacme.exe: key saved to /etc/ssl/uacme/private/key.pem uacme.exe: fetching directory at https://acme-v02.api.letsencrypt.org/directory uacme.exe: curl=5Fget: G= ET https://acme-v02.api.letsencrypt.org/directory failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) >curl https://acme-v02.api.letsencrypt.org/directory works as expected. Am I missing a required subdirectory? Thanks, Steven -- ---------------------------------------------------------------------- "Steven Levine" Warp/DIY/BlueLion etc. www.scoug.com www.arcanoae.com www.warpcave.com ---------------------------------------------------------------------- =3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D= -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D This message is sent to you because you are subscribed to the mailing list . To unsubscribe, E-mail to: To switch to the DIGEST mode, E-mail to To switch to the INDEX mode, E-mail to Send administrative queries to To subscribe (new addresses), E-mail to: a= nd reply to the confirmation email. Web archives are publicly available at: http://lists.2rosenthals.com This list is hosted by Rosenthal & Rosenthal, LLC P.O. Box 281, Deer Park, NY 11729-0281. Non- electronic communications related to content contained in these messages should be directed to the above address. (CAN-SPAM Act of 2003) =3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D= -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D =C2=A0 ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596311-0------ Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Length: 4821

-- 
Certified Industrial Hygienist
Cer= tified Asbestos Consultant

Dan Napier, MS, CIH, CAC
92-= 0614 8/24/24
2520 Artesia Boulevard
Redondo Beach, CA 90278-3= 210
310-644-1924 x 103
CSLB 773462I have the same issue
= Lewis, I have no idea how these certs work.  But I understand that= I will have to buy a cert for every url.  www.dummies.com wtf.dum= mies.com free.dummies.com  or does the cert cover the entire domai= n?  *.dummies.com
I get the same failure that Steve is seeing= .
I think I made all the directories, but where did all the stuff = come from? Should I be eliciting the command from the domain directory.=
[ns1:c:\mptn\etc\ssl\uacme\ns1.dnacih.com]uacme -v new
uacme.exe: version 1.0.19 starting on Sun, 11 Aug 2024 21:27:14
uacme.exe: loading key from /etc/ssl/uacme/private/key.pem
uacme.exe: fetching directory at https://acme-v02.api.letsencrypt.org/d=
irectory
uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo=
ry failed:
Problem with the SSL CA cert (path? access rights?)
uacme.exe: curl=5Fget: waiting 5 seconds before retrying
uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo=
ry failed:
Problem with the SSL CA cert (path? access rights?)
uacme.exe: curl=5Fget: waiting 5 seconds before retrying
uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo=
ry failed:
Problem with the SSL CA cert (path? access rights?)
uacme.exe: curl=5Fget: waiting 5 seconds before retrying
uacme.exe: acme=5Fget: curl=5Fget failed
uacme.exe: failed to fetch directory at https://acme-v02.api.letsencryp=
t.org/directory





On Sunday, August 11, 2024 19:28 PD= T, "Steven Levine" <ecs-isp@2rosenthals.com> wrote:
 In <l= ist-10352942@2rosenthals.com>, on 07/23/24
at 12:20 PM, "Massim= o S." <ecs-isp@2rosenthals.com> said:

Hi Massimo,

Running:

10-03-19 3:26 2,223,572 124 uacme.exe
<= br />>uacme --version
uacme.exe: version 1.0.19

What= 's causing curl to fail here?

>uacme -v new
uacme.ex= e: version 1.0.19 starting on Sun, 11 Aug 2024 19:30:36 uacme.exe:
loading key from /etc/ssl/uacme/private/key.pem
uacme.exe: /etc/s= sl/uacme/private/key.pem not found
uacme.exe: generating new 2048-= bit RSA key
uacme.exe: key saved to /etc/ssl/uacme/private/key.pem=
uacme.exe: fetching directory at
https://acme-v02.api.letsen= crypt.org/directory uacme.exe: curl=5Fget: GET
https://acme-v02.ap= i.letsencrypt.org/directory failed: Problem with the
SSL CA cert (= path? access rights?)
uacme.exe: curl=5Fget: waiting 5 seconds bef= ore retrying
uacme.exe: curl=5Fget: GET https://acme-v02.api.letse= ncrypt.org/directory
failed: Problem with the SSL CA cert (path? a= ccess rights?)

>curl https://acme-v02.api.letsencrypt.org= /directory

works as expected.

Am I missing a requ= ired subdirectory?

Thanks,

Steven

---------------------------------------------------------------------= ---
"Steven Levine" <steve53@earthlink.net> Warp/DIY/BlueLio= n etc.
www.scoug.com www.arcanoae.com www.warpcave.com
------= ----------------------------------------------------------------
<= br />
=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-= =3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D=
This message is sent to you because you are subscribed to
th= e mailing list <ecs-isp@2rosenthals.com>.
To unsubscribe, E-= mail to: <ecs-isp-off@2rosenthals.com>
To switch to the DIGE= ST mode, E-mail to <ecs-isp-digest@2rosenthals.com>
To switc= h to the INDEX mode, E-mail to <ecs-isp-index@2rosenthals.com>Send administrative queries to <ecs-isp-request@2rosenthals.com&g= t;
To subscribe (new addresses), E-mail to: <ecs-isp-on@2rosent= hals.com> and reply to the confirmation email.
Web archives are= publicly available at: http://lists.2rosenthals.com

This li= st is hosted by Rosenthal & Rosenthal, LLC
P.O. Box 281, Deer = Park, NY 11729-0281. Non-
electronic communications related to con= tent
contained in these messages should be directed
to the ab= ove address. (CAN-SPAM Act of 2003)

=3D-=3D-=3D-=3D-=3D-=3D-= =3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D= -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D
  ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596311-0-------- ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596532-1------ Content-Type: text/plain Content-Disposition: attachment; filename="prob.txt" Content-Transfer-Encoding: quoted-printable Content-Length: 991 [ns1:c:\mptn\etc\ssl\uacme\ns1.dnacih.com]uacme -v new uacme.exe: version 1.0.19 starting on Sun, 11 Aug 2024 21:27:14 uacme.exe: loading key from /etc/ssl/uacme/private/key.pem uacme.exe: fetching directory at https://acme-v02.api.letsencrypt.org/d= irectory uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: curl=5Fget: GET https://acme-v02.api.letsencrypt.org/directo= ry failed: Problem with the SSL CA cert (path? access rights?) uacme.exe: curl=5Fget: waiting 5 seconds before retrying uacme.exe: acme=5Fget: curl=5Fget failed uacme.exe: failed to fetch directory at https://acme-v02.api.letsencryp= t.org/dir ectory ------=_=-_OpenGroupware_org_NGMime-3339748-1723437377.596532-1--------