Certificate Authority failed to verify the temporary Apache configuration

I don't know whether it might help, but I copy the content of the letscencrypt log after running the command with the debug flag:

2021-06-17 09:28:33,760:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2021-06-17 09:28:34,173:DEBUG:certbot._internal.main:certbot version: 1.16.0
2021-06-17 09:28:34,174:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/1201/bin/certbot
2021-06-17 09:28:34,174:DEBUG:certbot._internal.main:Arguments: ['-d', 'chat.ixeo-conseil.com', '--apache', '--debug-challenge', '-v', '--preconfigured-renewal']
2021-06-17 09:28:34,174:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2021-06-17 09:28:34,191:DEBUG:certbot._internal.log:Root logging level set at 20
2021-06-17 09:28:34,193:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-17 09:28:34,409:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.29
2021-06-17 09:28:34,895:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_debian.DebianConfigurator object at 0x7f5fd06da0a0>
Prep: True
2021-06-17 09:28:34,897:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_debian.DebianConfigurator object at 0x7f5fd06da0a0>
Prep: True
2021-06-17 09:28:34,897:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_debian.DebianConfigurator object at 0x7f5fd06da0a0> and installer <certbot_apache._internal.override_debian.DebianConfigurator object at 0x7f5fd06da0a0>
2021-06-17 09:28:34,897:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2021-06-17 09:28:34,905:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/64864045', new_authzr_uri=None, terms_of_service=None), 56d86e3729642acc606892b4575c7978, Meta(creation_dt=datetime.datetime(2019, 9, 2, 13, 46, 31, tzinfo=), creation_host='servessai', register_to_eff=None))>
2021-06-17 09:28:34,906:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2021-06-17 09:28:34,908:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2021-06-17 09:28:35,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2021-06-17 09:28:35,395:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 17 Jun 2021 07:28:35 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
"xhVk6IAsFxM": "Adding random entries to the directory"
}
2021-06-17 09:28:35,431:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-17 09:28:35,440:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2021-06-17 09:28:35,471:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2021-06-17 09:28:35,473:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/chat.ixeo-conseil.com/cert3.pem is signed by the certificate's issuer.
2021-06-17 09:28:35,481:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/chat.ixeo-conseil.com/cert3.pem is: OCSPCertStatus.GOOD
2021-06-17 09:28:35,484:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2021-07-12 20:06:58 UTC.
2021-06-17 09:28:35,484:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2021-06-17 09:28:35,484:DEBUG:certbot.display.util:Notifying user: Renewing an existing certificate for chat.ixeo-conseil.com
2021-06-17 09:28:35,647:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0194_key-certbot.pem
2021-06-17 09:28:35,651:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0194_csr-certbot.pem
2021-06-17 09:28:35,651:DEBUG:acme.client:Requesting fresh nonce
2021-06-17 09:28:35,651:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2021-06-17 09:28:35,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2021-06-17 09:28:35,775:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 17 Jun 2021 07:28:35 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 01039BuFG2X6UruPMG1TN_FHzuqdpl6XWihUPGHO1BfYJNw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

2021-06-17 09:28:35,775:DEBUG:acme.client:Storing nonce: 01039BuFG2X6UruPMG1TN_FHzuqdpl6XWihUPGHO1BfYJNw
2021-06-17 09:28:35,776:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "chat.ixeo-conseil.com"\n }\n ]\n}'
2021-06-17 09:28:35,778:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjQ4NjQwNDUiLCAibm9uY2UiOiAiMDEwMzlCdUZHMlg2VXJ1UE1HMVROX0ZIenVxZHBsNlhXaWhVUEdITzFCZllKTnciLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
"signature": "JNQRF3mvr1x4HiCuIVeHDavNi3uL8yv8Ts4_HvWng3Mv8Of4yvsKynCj--8_i0V-sZ2_1IZruDLjUojos8CHAt8Hz1GvKooE8uAZglpPcWqiaEWo-S-gbSJU3dzJtI5Ko6nOqiXW-qqaUYHRBCVMLg9VmfFYxOneApx0EGAEBHe0rjGMzCqYu2TaA_4N_gyxCNrQpRVEGOysr2jEUbr8vJ1X9M2k92BGy9GvkT7I11eqTbXO1R3dbWxDHZzN9qrjnhyLsky7zmshXCg_HfltcyY3WkaOBnbrFDVx0Z4yu8ikROTYHU7F5Nb7aFUaAve6VVLluwMtQLKwKlDrKrTBsA",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNoYXQuaXhlby1jb25zZWlsLmNvbSIKICAgIH0KICBdCn0"
}
2021-06-17 09:28:35,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 343
2021-06-17 09:28:35,933:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 17 Jun 2021 07:28:35 GMT
Content-Type: application/json
Content-Length: 343
Connection: keep-alive
Boulder-Requester: 64864045
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/64864045/10451538920
Replay-Nonce: 0104B-Bp6X98GX2AgXNdK0IZxv_5X-794LoFpsWNxhxlYns
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"status": "pending",
"expires": "2021-06-24T07:28:35Z",
"identifiers": [
{
"type": "dns",
"value": "chat.ixeo-conseil.com"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/14048939153"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/64864045/10451538920"
}
2021-06-17 09:28:35,933:DEBUG:acme.client:Storing nonce: 0104B-Bp6X98GX2AgXNdK0IZxv_5X-794LoFpsWNxhxlYns
2021-06-17 09:28:35,933:DEBUG:acme.client:JWS payload:
b''
2021-06-17 09:28:35,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/14048939153:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjQ4NjQwNDUiLCAibm9uY2UiOiAiMDEwNEItQnA2WDk4R1gyQWdYTmRLMElaeHZfNVgtNzk0TG9GcHNXTnhoeGxZbnMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzE0MDQ4OTM5MTUzIn0",
"signature": "mlYVI_1WLpa6egpcnS4n8nzCxEvKo8mveHDwJvzRjFbAjLTKwFgWKXMBfQJ8ToWS2zDRlCgGLZsb1DbHCIjGnRwpdbUqb6tnTa-v0ksppPp9bnz0JHB4GvpEF9l7l-ajsqLAZMmQkRVsVv5Z-RYORji-fpTiBOXVwBfS7H7kqe3n-dHpdU_hOXCI8Egn_S3NALY4oK6wowHGYbFXQ0zF6DccH_b-3iWfGn1fOXztlbNp5sAe1A3XonZToFTJGxHYC-Nm73VNpABMrEd_h2-qBK2oNneypcUYFTjVlKvOfvitX62kjtoeiyKU6dbyhr6y-EfoLTIcTvtzYBF2PuJtHw",
"payload": ""
}
2021-06-17 09:28:36,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/14048939153 HTTP/1.1" 200 802
2021-06-17 09:28:36,068:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 17 Jun 2021 07:28:36 GMT
Content-Type: application/json
Content-Length: 802
Connection: keep-alive
Boulder-Requester: 64864045
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0103jPmYfx3rDJ-nsF4DqDKx3GgPMjMkmBjAEPto17wlfXc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "chat.ixeo-conseil.com"
},
"status": "pending",
"expires": "2021-06-24T07:28:35Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/Kthu-Q",
"token": "-tDzGeTYH7VuwLHqEW-YEOGTTC-UlwCeq3RdFJXLUJM"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/dstNvg",
"token": "-tDzGeTYH7VuwLHqEW-YEOGTTC-UlwCeq3RdFJXLUJM"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/lzc8ng",
"token": "-tDzGeTYH7VuwLHqEW-YEOGTTC-UlwCeq3RdFJXLUJM"
}
]
}
2021-06-17 09:28:36,068:DEBUG:acme.client:Storing nonce: 0103jPmYfx3rDJ-nsF4DqDKx3GgPMjMkmBjAEPto17wlfXc
2021-06-17 09:28:36,069:INFO:certbot._internal.auth_handler:Performing the following challenges:
2021-06-17 09:28:36,070:INFO:certbot._internal.auth_handler:http-01 challenge for chat.ixeo-conseil.com
2021-06-17 09:28:36,085:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: chat.ixeo-conseil.com in: /etc/apache2/sites-enabled/chat.ixeo-conseil.com.conf
2021-06-17 09:28:36,085:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: chat.ixeo-conseil.com in: /etc/apache2/sites-enabled/chat.ixeo-conseil.com.conf
2021-06-17 09:28:36,085:DEBUG:certbot_apache.internal.http_01:writing a pre config file with text:
RewriteEngine on
RewriteRule ^/.well-known/acme-challenge/([A-Za-z0-9-
=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]

2021-06-17 09:28:36,085:DEBUG:certbot_apache._internal.http_01:writing a post config file with text:
<Directory /var/lib/letsencrypt/http_challenges>
Require all granted

<Location /.well-known/acme-challenge>
Require all granted

2021-06-17 09:28:36,108:DEBUG:certbot.reverter:Creating backup of /etc/apache2/sites-enabled/chat.ixeo-conseil.com.conf
2021-06-17 09:28:39,450:DEBUG:certbot.display.util:Notifying user: Challenges loaded. Press continue to submit to CA. Pass "-v" for more info about
challenges.
2021-06-17 09:28:46,056:DEBUG:acme.client:JWS payload:
b'{}'
2021-06-17 09:28:46,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/Kthu-Q:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjQ4NjQwNDUiLCAibm9uY2UiOiAiMDEwM2pQbVlmeDNyREotbnNGNERxREt4M0dnUE1qTWttQmpBRVB0bzE3d2xmWGMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzE0MDQ4OTM5MTUzL0t0aHUtUSJ9",
"signature": "Exg2eSJkJI3l6QQvrL5SATlPbiEJZ_a2RTAE94o8xxmq5d8rNQKawJEkM_Pj8sTA0LXdhiQKKgkvq0Cqy78mKs8BezcxZ2VBxDB1mzfKQlWuynyPK_Yiz_hW54PoyCaNxpmXIpWA9rAUjvYjwfucG2Nix1cItsvT0VOE-GsCkD6hnYX5YLWD40eEBT1fr1BrpaZb1FK1WmAuU9yFnAB74-KDDAm7LIaJWA012ti3EqcjRPaE0LowZaUaZmU-Y_xIk-FcBmPV5QgCoFJ0db3mO3V8NYB1imCpZWh7ktF8ZUSJWeZU-UboR0-ZHYupK8iUleUFxXJ_MVb600U6yPT4Gg",
"payload": "e30"
}
2021-06-17 09:28:46,199:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/14048939153/Kthu-Q HTTP/1.1" 200 186
2021-06-17 09:28:46,201:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 17 Jun 2021 07:28:46 GMT
Content-Type: application/json
Content-Length: 186
Connection: keep-alive
Boulder-Requester: 64864045
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz-v3/14048939153;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/Kthu-Q
Replay-Nonce: 0103kdfzosYswB2SyXZHj6t7mxMapOezWj4W2TAaiNjtyO0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/Kthu-Q",
"token": "-tDzGeTYH7VuwLHqEW-YEOGTTC-UlwCeq3RdFJXLUJM"
}
2021-06-17 09:28:46,201:DEBUG:acme.client:Storing nonce: 0103kdfzosYswB2SyXZHj6t7mxMapOezWj4W2TAaiNjtyO0
2021-06-17 09:28:46,203:INFO:certbot.internal.auth_handler:Waiting for verification...
2021-06-17 09:28:47,205:DEBUG:acme.client:JWS payload:
b''
2021-06-17 09:28:47,208:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/14048939153:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvNjQ4NjQwNDUiLCAibm9uY2UiOiAiMDEwM2tkZnpvc1lzd0IyU3lYWkhqNnQ3bXhNYXBPZXpXajRXMlRBYWlOanR5TzAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzE0MDQ4OTM5MTUzIn0",
"signature": "ntA1QqhqOWCkahthprrXdnrFPK811HYk3Mr
-3JuyyQOjm4GxBGNDWOz0m3p5jxI6jNzfoQEWjymh3_bTdZDmBvWdkcvx2DUHI-DJy_ip3EJiObjEdyogRZQLIjemxrRUg6Nq9r2oUoBqX8ag80JdC4pDHSvc-fxfCrtuZ7grr15NKpyk0HnR0VhIqKYcRb6XLONtawVQiDYQovtdlRZZ-FGRTq7y52Q3L1KaS5aaU2Ak79Eunwd8F0vqPpJtP2nj8UF7YbqrvKoDGLZjFTJP8KjrkVh1HcvY7T0DqDTWqB5waPXVU2zrcAktls4j691kY4qO3A3fkHOFD9dgxTr5A",
"payload": ""
}
2021-06-17 09:28:47,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/14048939153 HTTP/1.1" 200 1386
2021-06-17 09:28:47,340:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 17 Jun 2021 07:28:47 GMT
Content-Type: application/json
Content-Length: 1386
Connection: keep-alive
Boulder-Requester: 64864045
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0104UCQJ8tIroCj-6sShqyMAj9HKw4acke-taAlqj6bVKS0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "chat.ixeo-conseil.com"
},
"status": "invalid",
"expires": "2021-06-24T07:28:35Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Invalid response from Mattermost [2001:4b98:dc0:41:216:3eff:fefb:5963]: "\u003c!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\"\u003e\n\u003chtml\u003e\u003chead\u003e\n\u003ctitle\u003e404 Not Found\u003c/title\u003e\n\u003c/head\u003e\u003cbody\u003e\n\u003ch1\u003eNot Found\u003c/h1\u003e\n\u003cp"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/14048939153/Kthu-Q",
"token": "-tDzGeTYH7VuwLHqEW-YEOGTTC-UlwCeq3RdFJXLUJM",
"validationRecord": [
{
"url": "Mattermost",
"hostname": "chat.ixeo-conseil.com",
"port": "80",
"addressesResolved": [
"92.243.9.115",
"2001:4b98:dc0:41:216:3eff:fefb:5963"
],
"addressUsed": "2001:4b98:dc0:41:216:3eff:fefb:5963"
}
],
"validated": "2021-06-17T07:28:46Z"
}
]
}
2021-06-17 09:28:47,340:DEBUG:acme.client:Storing nonce: 0104UCQJ8tIroCj-6sShqyMAj9HKw4acke-taAlqj6bVKS0
2021-06-17 09:28:47,341:INFO:certbot._internal.auth_handler:Challenge failed for domain chat.ixeo-conseil.com
2021-06-17 09:28:47,341:INFO:certbot._internal.auth_handler:http-01 challenge for chat.ixeo-conseil.com
2021-06-17 09:28:47,341:DEBUG:certbot.display.util:Notifying user:
Certbot failed to authenticate some domains (authenticator: apache). The Certificate Authority reported these problems:
Domain: chat.ixeo-conseil.com
Type: unauthorized
Detail: Invalid response from Mattermost [2001:4b98:dc0:41:216:3eff:fefb:5963]: "\n\n404 Not Found\n\n

Not Found

\n<p"

Hint: The Certificate Authority failed to verify the temporary Apache configuration changes made by Certbot. Ensure that the listed domains point to this Apache server and that it is accessible from the internet.

2021-06-17 09:28:47,342:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 93, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 181, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2021-06-17 09:28:47,343:DEBUG:certbot._internal.error_handler:Calling registered functions
2021-06-17 09:28:47,343:INFO:certbot._internal.auth_handler:Cleaning up challenges
2021-06-17 09:28:47,815:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/1201/bin/certbot", line 8, in
sys.exit(main())
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/main.py", line 15, in main
return internal_main.main(cli_args)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1552, in main
return config.func(config, plugins)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1414, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 117, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 333, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 375, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 425, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 93, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 181, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2021-06-17 09:28:47,817:ERROR:certbot._internal.log:Some challenges have failed.

1 Like