Certificates have been expired since 90 days passed. And renewing certificates are now impossible. Please help

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:
anago.harima.riken.jp

The last certificate was issued on 10:49, 24th, Feb. 2024, and expired on 10:49, 24th, May.
Recently, I found the certificate was already expired by accessing my web page by myself.

I ran two commands.
The first command is "# certbot -v renew"
After this command failed, I removed "/etc/letsencrypt", and did the second command.
"# certbot certonly --webroot -w /var/www -d anago.harima.riken.jp -m ytanaka@riken.jp -v --agree-tos -n".

The first output is
Saving debug log to /var/log/letsencrypt/letsencrypt.log


Processing /etc/letsencrypt/renewal/anago.harima.riken.jp.conf


Certificate is due for renewal, auto-renewing...
Plugins selected: Authenticator webroot, Installer None
Renewing an existing certificate for anago.harima.riken.jp
Performing the following challenges:
http-01 challenge for anago.harima.riken.jp
Using the webroot path /var/www for all unmatched domains.
Waiting for verification...
Challenge failed for domain anago.harima.riken.jp
http-01 challenge for anago.harima.riken.jp

Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: anago.harima.riken.jp
Type: connection
Detail: 134.160.193.39: Fetching http://anago.harima.riken.jp/.well-known/acme-challenge/tUZSPkOd_R7MAjE0E0kfZk44RohP9UuesI_dAVRp8gU: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that f
iles created there can be downloaded from the internet.

Cleaning up challenges
Failed to renew certificate anago.harima.riken.jp with error: Some challenges have failed.


All renewals failed. The following certificates could not be renewed:
/etc/letsencrypt/live/anago.harima.riken.jp/fullchain.pem (failure)


1 renew failure(s), 0 parse failure(s)
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.

Let me skip the FIRST LOG, because the length is out of the length limit.

THE OUTPUT of the SECOND COMMAND is

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Requesting a certificate for anago.harima.riken.jp
Performing the following challenges:
http-01 challenge for anago.harima.riken.jp
Using the webroot path /var/www for all unmatched domains.
Waiting for verification...
Challenge failed for domain anago.harima.riken.jp
http-01 challenge for anago.harima.riken.jp

Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: anago.harima.riken.jp
Type: connection
Detail: 134.160.193.39: Fetching http://anago.harima.riken.jp/.well-known/acme-challenge/gqnm3VOFc8jJT75zloKRvdbC37DV-M9zoHccDndjGkw: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

Cleaning up challenges
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.

AND THE SECOND LOG is:

2024-06-16 14:12:04,437:DEBUG:certbot._internal.main:certbot version: 2.1.0
2024-06-16 14:12:04,437:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot
2024-06-16 14:12:04,437:DEBUG:certbot._internal.main:Arguments: ['--webroot', '-w', '/var/www', '-d', 'anago.harima.riken.jp', '-m', 'ytanaka@riken.jp', '-v', '--agree-tos', '-n']
2024-06-16 14:12:04,437:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-06-16 14:12:04,443:DEBUG:certbot._internal.log:Root logging level set at 20
2024-06-16 14:12:04,443:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
2024-06-16 14:12:04,443:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7f6e10014bd0>
Prep: True
2024-06-16 14:12:04,444:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7f6e10014bd0> and installer None
2024-06-16 14:12:04,444:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2024-06-16 14:12:04,549:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-06-16 14:12:04,550:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-06-16 14:12:05,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-06-16 14:12:05,054:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:04 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"SPxhkYIzpxg": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-06-16 14:12:05,055:DEBUG:acme.client:Requesting fresh nonce
2024-06-16 14:12:05,055:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-06-16 14:12:05,218:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-06-16 14:12:05,219:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:05 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp83T5JVjt_dpLDleiP0kHfHDilcEcf0z4sNKD8XT734MvM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

2024-06-16 14:12:05,219:DEBUG:acme.client:Storing nonce: I4RLVp83T5JVjt_dpLDleiP0kHfHDilcEcf0z4sNKD8XT734MvM
2024-06-16 14:12:05,220:DEBUG:acme.client:JWS payload:
b'{\n "contact": [\n "mailto:ytanaka@riken.jp"\n ],\n "termsOfServiceAgreed": true\n}'
2024-06-16 14:12:05,228:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-acct:
{
"protected": "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",
"signature": "hXr585E9aVXAdJBTO0_ugnazj6v2mvRn_W3XqdTVLdRNCBhtzyyGpY0INIGP0rxs-VYcOBTCjHoAO-lSha3V7htSdd9R9nVJ9N_y1pO0r9o5IOaW8WtOMvxTmKefa0W1oepSPlJTiCpM6uZjrk2odfij3tyNe6EzHb6jtm0kVEoGXjdU0kxh1IfoewEqfKJPdWPI_M0yXfgkBcZPKTtZfL3fybfqz2RfVnJ0fpbHBpQ7Lp7r4xoxkHOVk1De_friNCEyTAcqdiuePW1Pik90mlORSK-N-5Clr-Md2bsYw5fikDVsUj5VIPDDJH-f0A7gK2NZ3icR0pYWsQqb3P8yAQ",
"payload": "ewogICJjb250YWN0IjogWwogICAgIm1haWx0bzp5dGFuYWthQHJpa2VuLmpwIgogIF0sCiAgInRlcm1zT2ZTZXJ2aWNlQWdyZWVkIjogdHJ1ZQp9"
}
2024-06-16 14:12:05,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-acct HTTP/1.1" 201 560
2024-06-16 14:12:05,434:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 16 Jun 2024 05:12:05 GMT
Content-Type: application/json
Content-Length: 560
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf;rel="terms-of-service"
Location: https://acme-v02.api.letsencrypt.org/acme/acct/1784832707
Replay-Nonce: I4RLVp83jmzO_wqWEtf0HMzSbzNdxdUblVepV6jvCFXujGgLQok
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"key": {
"kty": "RSA",
"n": "qSPE_zybPyy4gRxsHUdwowlL3aQqVcRhNYYmigHB2abn2UQ6YxUaNwW6_NH59SDS6qJf99sVoNFdKlxWMJD_AMItX092Jj4L5wjUpqx16Pl9mTtv6qtKA1D_3d8FgTlZQLPf_7yu7_CzXNFfIf1Jo2Mr5iUmgB9ss-Iv9kyVgd1z2PsvaV-KBErrKBYTZzMWvYI_a8hSAliUAKf9pCQOtiWz2ul6Kunp7Z0Nf6LIjROmK1zSaw_9vBSLi2SuKGMLfL6DHgvCTyk7jxvwZeOliAw5A_OHqPOkbFI1DQf71qj1rRCOL7C0pCcTW8RUpJ06ZRFAuzr8Es2YamBNae9I8w",
"e": "AQAB"
},
"contact": [
"mailto:ytanaka@riken.jp"
],
"initialIp": "134.160.193.39",
"createdAt": "2024-06-16T05:12:05.328911705Z",
"status": "valid"
}
2024-06-16 14:12:05,435:DEBUG:acme.client:Storing nonce: I4RLVp83jmzO_wqWEtf0HMzSbzNdxdUblVepV6jvCFXujGgLQok
2024-06-16 14:12:05,438:DEBUG:certbot._internal.display.obj:Notifying user: Account registered.
2024-06-16 14:12:05,439:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x7f6e10007dd0>)>), contact=('mailto:ytanaka@riken.jp',), agreement=None, status='valid', terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/1784832707', new_authzr_uri=None, terms_of_service='https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf'), b477cce5d6755207fe5de7c8afef2e4e, Meta(creation_dt=datetime.datetime(2024, 6, 16, 5, 12, 5, tzinfo=), creation_host='anago.harima.riken.jp', register_to_eff=None))>
2024-06-16 14:12:05,440:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for anago.harima.riken.jp
2024-06-16 14:12:05,446:DEBUG:certbot.crypto_util:Generating ECDSA key (2048 bits): /etc/letsencrypt/keys/0000_key-certbot.pem
2024-06-16 14:12:05,452:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0000_csr-certbot.pem
2024-06-16 14:12:05,455:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "anago.harima.riken.jp"\n }\n ]\n}'
2024-06-16 14:12:05,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4M2ptek9fd3FXRXRmMEhNelNiek5keGRVYmxWZXBWNmp2Q0ZYdWpHZ0xRb2siLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL25ldy1vcmRlciJ9",
"signature": "cFt-jeOvE1bBaBKWUOmtetMqMuNKH5MRVctJnnFVcAxjDzcINkOoufqCrxoN9xme3-rMM_ve-NrHGJx0oMJdD-KNXf46dtrrfgDQfrQHbdqfDgqD_xTJ1B0SGDMRkIBVQsK-I9K9zQDa3A2g_suZiNjJjHt_OuJtiQj3kVoU5YMWPE9okZsHscBXxPp_Sj08Op68RTziSHj-4PGkkk4ZU77PgZlVdBwZ2fMUQc57RZT81jr0ykXlvc-RsHvWiuzzQ5Bd8AEqvcIzFAF3geBu9vT0UNQcokUx5gHzlA_h7kYgLRkF5X9sAEt9iw62TtP8hojBvSISrbUehcqiLFcqng",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFuYWdvLmhhcmltYS5yaWtlbi5qcCIKICAgIH0KICBdCn0"
}
2024-06-16 14:12:05,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-06-16 14:12:05,755:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 16 Jun 2024 05:12:05 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1784832707/278815764917
Replay-Nonce: prJkcjKS_dzekirbe3tQ6U4925CNZKL8F52VSI37tRnvv-U4grE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"identifiers": [
{
"type": "dns",
"value": "anago.harima.riken.jp"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1784832707/278815764917"
}
2024-06-16 14:12:05,755:DEBUG:acme.client:Storing nonce: prJkcjKS_dzekirbe3tQ6U4925CNZKL8F52VSI37tRnvv-U4grE
2024-06-16 14:12:05,758:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:05,759:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJwckprY2pLU19kemVraXJiZTN0UTZVNDkyNUNOWktMOEY1MlZTSTM3dFJudnYtVTRnckUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "GXb6bz2s2ghbqqiEjoEAhpE3eOkfo2mJIXb5mln6Az1PJBmItj8BCDQ8S6gj-lweTDQFCY8MnEY5oVAYkYkY0T0RSuKHp27zwqvZopC63xieBf5Y9UYFUcU5d8rc7OErSTpm6pJ_Y-BJ50yEAfPcJZaA25eDJEh_s9-8Q7ix-zObEXzYVULSSt7JboP8KM0BhaamonGxzZy-I49SrvUA_akPRT8Zt22oO6eUShCwNcrmuEbw6_XuYeg_X6nJdRO-r1bPKPIzlkDVYq8kRszTPz1CgHzl647fqa1nMFG0J1PgjCqvueH3VJ9IHF7oN04-C8z9csmtOlpyJcMf1FV9hA",
"payload": ""
}
2024-06-16 14:12:05,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 805
2024-06-16 14:12:05,930:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:05 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: prJkcjKS60vEv4gjwZzr5w93TyOU2nYLUOLyu9DadGRjiLZZ1I0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/Ercvxg",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/CDY-Dw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
]
}
2024-06-16 14:12:05,930:DEBUG:acme.client:Storing nonce: prJkcjKS60vEv4gjwZzr5w93TyOU2nYLUOLyu9DadGRjiLZZ1I0
2024-06-16 14:12:05,931:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-06-16 14:12:05,932:INFO:certbot._internal.auth_handler:http-01 challenge for anago.harima.riken.jp
2024-06-16 14:12:05,932:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www for all unmatched domains.
2024-06-16 14:12:05,932:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/.well-known/acme-challenge
2024-06-16 14:12:05,935:DEBUG:certbot.internal.plugins.webroot:Attempting to save validation to /var/www/.well-known/acme-challenge/3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is
2024-06-16 14:12:05,935:DEBUG:acme.client:JWS payload:
b'{}'
2024-06-16 14:12:05,939:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJwckprY2pLUzYwdkV2NGdqd1p6cjV3OTNUeU9VMm5ZTFVPTHl1OURhZEdSamlMWloxSTAiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2NoYWxsLXYzLzM2NDU2OTU4NzEzNy9ITjhQTHcifQ",
"signature": "d2oIn1CSgQoIW0IW6bWLCSH4ZJsu0pYmKaZp40qLu9tksrIg8ZeaHIkj02hsHjzpUq5fl4tAOmRqPwrLi-3UvyiN8mZJN_nsWRFIc9a3lQkwIeXnCSsblPlj1o_GAx422bOR
-YOiZT5lxH_DVPNI_hsR-Etu8OxBZC7B624Gj2SWOzzcWF_f2r1tyn3Rh6uKtzLmfpE6uWfhbw-VVDv-wWQsGnza3KzebcgKh4Iu64xH0NJ7CTQo075p_bybp17sYgG2fRdvafPc_XPKZhHttiiTrBwKsZMZ4Tu_82-dC2ATUkV3YAQambUwfzFogCTAb4kzdxJnkeDah6X-51FmA",
"payload": "e30"
}
2024-06-16 14:12:06,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/364569587137/HN8PLw HTTP/1.1" 200 187
2024-06-16 14:12:06,121:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:06 GMT
Content-Type: application/json
Content-Length: 187
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw
Replay-Nonce: I4RLVp8316SSkpEwAveB_zxWHayzbxOOV6SPPdccn0HVbVCoft4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
2024-06-16 14:12:06,121:DEBUG:acme.client:Storing nonce: I4RLVp8316SSkpEwAveB_zxWHayzbxOOV6SPPdccn0HVbVCoft4
2024-06-16 14:12:06,122:INFO:certbot._internal.auth_handler:Waiting for verification...
2024-06-16 14:12:07,123:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:07,126:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4MzE2U1NrcEV3QXZlQl96eFdIYXl6YnhPT1Y2U1BQZGNjbjBIVmJWQ29mdDQiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "YlGqnU5TES5enSB40sMPFZvUKveCbqPAcXqi4A64-QNtB3juHZXGVwTOSyDDB3k6QrI6FE8GqgPIn6AdOitrL1ngtpd8XBbkijMGuMDIZ6Gjcwt2fNA5-fQV-V09m1l2lD4JL7mx-zwRbfs4xXkWWj463czRhhgNLB14KHyEKG7x-icI8BRMqivPJwV365t93STzMhvbix31WZx4jlpXQyamTN4PguNRzHNoE_Wr7b34y7T2CK_ltet-JB-w4ZZVeXiSIISTIeqXjhhbppCL31abYcJAFUjAwek2joTnIaMimxAGc_KYnzO3adeJ4HghOVK43a7h5W7NyR1tLPT_tQ",
"payload": ""
}
2024-06-16 14:12:07,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 805
2024-06-16 14:12:07,294:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:07 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp83hDfwuR3GkU-1-kcjppWtzjr2U6Dk0uGbblG2C-T4a9c
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/Ercvxg",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/CDY-Dw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
]
}
2024-06-16 14:12:07,295:DEBUG:acme.client:Storing nonce: I4RLVp83hDfwuR3GkU-1-kcjppWtzjr2U6Dk0uGbblG2C-T4a9c
2024-06-16 14:12:10,296:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:10,298:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4M2hEZnd1UjNHa1UtMS1rY2pwcFd0empyMlU2RGswdUdiYmxHMkMtVDRhOWMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "T2R6D9Jjv5J3AHwh7jsmfyBqGwVzwLMBk9Kr6mgeHtX0bEf0gZFG92WvhJ99A2f2FNtOXt7rjIlDh_ehj8NU6-KGNeMs_BvZPLrVj4BALNjmrN9sQkPEd97pKDvNGmXJ3jC7Ck4cvuRZe9SQFprlo2KsrEnKd7d0YfbKlLpOocfxnP_5kMSPfcUMOK6Zh5C02YZLSNdO2DDrDNzz9Z2vbhQZltYl6HdQCkzs_P3YmkjpJacDUTFSKkSgimQ4oAtdjgzQKBIHwrxSigvF1WjqWHv5y8Iv8f5R6frl2Jyyd2gD9pfRcCgxTS4fGrZGd7Ww61LE3c2YiqLtW5TEuDyM5Q",
"payload": ""
}
2024-06-16 14:12:10,484:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 805
2024-06-16 14:12:10,485:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:10 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp83jaZ5rkB7KyN0fE_PaJnBplky5Y2ie5TyabrKOfKa_ns
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/Ercvxg",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/CDY-Dw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
]
}
2024-06-16 14:12:10,485:DEBUG:acme.client:Storing nonce: I4RLVp83jaZ5rkB7KyN0fE_PaJnBplky5Y2ie5TyabrKOfKa_ns
2024-06-16 14:12:13,487:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:13,491:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4M2phWjVya0I3S3lOMGZFX1BhSm5CcGxreTVZMmllNVR5YWJyS09mS2FfbnMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "ajwccJoEpySLw7dxDk2h4KHPZSpcLODFeJEqTIPjzp8Jz4ROBv2ymRrHtRsm5uLWRWmVP5PKC0nKFMa7eU7CFk8_MowDWlKp2oYajJTP8pfL7EoR9Z_-GfXg2-UkA54bUYTFk51nuwsRXQfC_tQzpKc4Kft7sVNFkhwrm43Loz6V3oWh6rAVIh04LNRDFuADLAkUeTo-hH_0A83-d3A2Ug5y84zEkXNr81U9-93t9c0-IJEq4j30OdKhmLFnbUAzxSo8A6k9EBBtLvtdJYJ5Ip_fDujQLGSkRfFwYx8u1u9i32uh1kjBzPVX0ElcfZkRYviGf82aBcePt_N_TWZAJQ",
"payload": ""
}
2024-06-16 14:12:13,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 805
2024-06-16 14:12:13,661:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:13 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp837kV95mgUnY5JXGBDY6Z5ScTH0tuU3H4RsEHHK_dGtbU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/Ercvxg",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/CDY-Dw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
]
}
2024-06-16 14:12:13,661:DEBUG:acme.client:Storing nonce: I4RLVp837kV95mgUnY5JXGBDY6Z5ScTH0tuU3H4RsEHHK_dGtbU
2024-06-16 14:12:16,662:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:16,666:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4MzdrVjk1bWdVblk1SlhHQkRZNlo1U2NUSDB0dVUzSDRSc0VISEtfZEd0YlUiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "MMcS1QB9XJmwJNnKs6lSauM0iowM6uS0SlyiOqUH5_Y8KBSBR9_qWOM5aR8Oc5vUO6wsW48AyXd8qPD4YA-2csfc58hpbnvtRDU_eYco4eD-u0qXtVNYygZaZlEqq3TogEOlJIkD_BnwY7dZgSmzvD-HjKXGOOO7_djIZUcvTJC04c0yg_FQTzUjLMGiQJ3KWzmuPYRcBO0HCuVeuhSlWNSgs6G0tCQPZWNn7EQuLht4x9lmsT0ctEdzTszF3mv8g-rKt4uoB1QZjSFrYjjMlIxYePSlN1Kt8Wdw8QYfgYTOFnPvou4OUCWgrVCsHMJi1OT0mX1xil8pap4E-d2xXA",
"payload": ""
}
2024-06-16 14:12:16,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 805
2024-06-16 14:12:16,840:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:16 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp83wEDJS7PZphmZl3fJy2qK8BRxumY7KbN2CmWrkJKXIhs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "pending",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "dns-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/Ercvxg",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
},
{
"type": "tls-alpn-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/CDY-Dw",
"status": "pending",
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is"
}
]
}
2024-06-16 14:12:16,840:DEBUG:acme.client:Storing nonce: I4RLVp83wEDJS7PZphmZl3fJy2qK8BRxumY7KbN2CmWrkJKXIhs
2024-06-16 14:12:19,842:DEBUG:acme.client:JWS payload:
b''
2024-06-16 14:12:19,846:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/364569587137:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTc4NDgzMjcwNyIsICJub25jZSI6ICJJNFJMVnA4M3dFREpTN1BacGhtWmwzZkp5MnFLOEJSeHVtWTdLYk4yQ21XcmtKS1hJaHMiLCAidXJsIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2F1dGh6LXYzLzM2NDU2OTU4NzEzNyJ9",
"signature": "hs9C2OZmvD8CfDTSzgHVikBl_gfbwDaiEIivGkAsrK_ub3lh4AHVq5nIHTbeN5n-jrqH6SRAHAjlQkO0F8z5gv5JseZd8aZ5iLb44FzfW38H0IfOh2p_CaMsHG7xyH_7GElmuC8uPDGm628sicvZgkWD9pAcw686DDfxGr6bs9BIcn7lNKmt07s2vhVi4Jg4AABg9JtGFNHFO6aWOVG_W97T5PXniyVAxHHS91YBXFmOLw93tp4zhKtx4Dxlmhh2RmIpB1OP2ZslU-abfXgmcMkVbcA1Arh6NsJDu5qbUaqVAuChYnZNQ2M7FE7YdYeq2TdaXnD3MTT3V-S5OVzCJw",
"payload": ""
}
2024-06-16 14:12:20,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/364569587137 HTTP/1.1" 200 1085
2024-06-16 14:12:20,009:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 16 Jun 2024 05:12:19 GMT
Content-Type: application/json
Content-Length: 1085
Connection: keep-alive
Boulder-Requester: 1784832707
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: I4RLVp83A-7BLKTD3UOGd_Co2IlcZNOI9wOdZU6uT8fd8irclz4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "anago.harima.riken.jp"
},
"status": "invalid",
"expires": "2024-06-23T05:12:05Z",
"challenges": [
{
"type": "http-01",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/364569587137/HN8PLw",
"status": "invalid",
"validated": "2024-06-16T05:12:06Z",
"error": {
"type": "urn:ietf:params:acme:error:connection",
"detail": "134.160.193.39: Fetching http://anago.harima.riken.jp/.well-known/acme-challenge/3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is: Timeout during connect (likely firewall problem)",
"status": 400
},
"token": "3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is",
"validationRecord": [
{
"url": "http://anago.harima.riken.jp/.well-known/acme-challenge/3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is",
"hostname": "anago.harima.riken.jp",
"port": "80",
"addressesResolved": [
"134.160.193.39"
],
"addressUsed": "134.160.193.39"
}
]
}
]
}
2024-06-16 14:12:20,010:DEBUG:acme.client:Storing nonce: I4RLVp83A-7BLKTD3UOGd_Co2IlcZNOI9wOdZU6uT8fd8irclz4
2024-06-16 14:12:20,010:INFO:certbot._internal.auth_handler:Challenge failed for domain anago.harima.riken.jp
2024-06-16 14:12:20,011:INFO:certbot._internal.auth_handler:http-01 challenge for anago.harima.riken.jp
2024-06-16 14:12:20,011:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: anago.harima.riken.jp
Type: connection
Detail: 134.160.193.39: Fetching http://anago.harima.riken.jp/.well-known/acme-challenge/3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

2024-06-16 14:12:20,013:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 106, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 206, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2024-06-16 14:12:20,013:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-06-16 14:12:20,013:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-06-16 14:12:20,013:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/.well-known/acme-challenge/3JEjpxLRLd0eEJ1tE7pSx_e18IYdVgeFF1lyeIMe2Is
2024-06-16 14:12:20,014:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
2024-06-16 14:12:20,014:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 33, in
sys.exit(load_entry_point('certbot==2.1.0', 'console_scripts', 'certbot')())
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1736, in main
return config.func(config, plugins)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 1590, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/main.py", line 138, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 516, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 106, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, best_effort)
File "/usr/lib/python3/dist-packages/certbot/_internal/auth_handler.py", line 206, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2024-06-16 14:12:20,018:ERROR:certbot._internal.log:Some challenges have failed.

My web server is (include version):
Server version: Apache/2.4.59 (Debian)

The operating system my web server runs on is (include version):
"Debian GNU/Linux 12 (bookworm)"

My hosting provider, if applicable, is:
I don't have a provider.

I can login to a root shell on my machine (yes or no, or I don't know):
Yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
I don't know about a control panel. I usually use terminal commands.

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
certbot 2.1.0

Thank you very much in advance.

2 Likes

I briefly see Apache default page before redirected to /wpmain it looks like webserver replies twice with 200 and 301 for main page : not sure it matters as this isn't timeout but may cause validator to confused with unexpected traffic

2 Likes

If there was a firewall/other connectivity issue earlier, it seems to be gone now. Let's Debug gives an "All good" result currently.

Please provide is with additional information about any current error you're having if you're still unable to get a certificate issued.

2 Likes

orangepizza

Thank you for your reply.
As you pointed out, I changed the page to jumps to https://anago.harima.riken.jp/wpmain.
Here I suppose you can see that the certificate was already expired on 24th, in May, 2024.

1 Like

I found two type of 404 from while fiddling about on there, one Apache default one and other that single line txt that says File not found: and it looks like something ban IP if it saw too much 404 from it:

Dear Osiris,

Thank you for your reply.
I repeated the same job.
This time I removed the directories "/etc/letsencrypt/live" and "/etc/letsencrypt/archive" from the previous "/etc/letsencrypt", and repeat the command "certbot certonly --webroot -w /var/www -d anago.harima.riken.jp -m ytanaka@riken.jp -v --agree-tos -n".

However, the result is the same as:Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Requesting a certificate for anago.harima.riken.jp
Performing the following challenges:
http-01 challenge for anago.harima.riken.jp
Using the webroot path /var/www for all unmatched domains.
Waiting for verification...
Challenge failed for domain anago.harima.riken.jp
http-01 challenge for anago.harima.riken.jp

Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
Domain: anago.harima.riken.jp
Type: connection
Detail: 134.160.193.39: Fetching http://anago.harima.riken.jp/.well-known/acme-challenge/DYWugYevmsxoQURMu64UMTwAq14WqK70TdQ0DW_66No: Timeout during connect (likely firewall problem)

Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.

Cleaning up challenges
Some challenges have failed.
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details."

I guess that the problem is that port 80 is forbidden by the firewall set by my institute. However it is strange that if you can read my page "http://anago.harima.riken.jp". It goes through port 80, doesn't it?

Dear orangepizza,

Thank you for your reply.
As long as I use old "Safari" 13.1.2, I could read the page even if the certificate is expired. However recently, I tried "Google Chrome 116.0.5845.187" and found that I could not read my web site. Once I accept the expired certificate, I can read the page with warning that it is not safe.
The problem is that the certificate has been expired. And I am trying to renew the certificate.

1 Like

lets look if other CA can see it: try certbot command with --server 'https://api.buypass.com/acme/directory' :

2 Likes

I made a mistake. Port 80 has been open in the firewall. I confirmed it.

Dear orangepizza,

I am sorry I cannot understand.
What is the command "certbot --server 'https://api.buypass.com/acme/directory'"?

certbot renew --server something

2 Likes

Dear orangepizza,

Thank you very much.
Finally, it is successful.
I really appreciate you for giving me your precious help.

anago:~# certbot certonly --server 'https://api.buypass.com/acme/directory' --webroot -w /var/www -d anago.harima.riken.jp -m ytanaka@riken.jp -v --agree-tos -n
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
Account registered.
Requesting a certificate for anago.harima.riken.jp
Performing the following challenges:
http-01 challenge for anago.harima.riken.jp
Using the webroot path /var/www for all unmatched domains.
Waiting for verification...
Cleaning up challenges

Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/anago.harima.riken.jp-0001/fullchain.pem
Key is saved at: /etc/letsencrypt/live/anago.harima.riken.jp-0001/privkey.pem
This certificate expires on 2024-12-13.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.


If you like Certbot, please consider supporting our work by:


anago:~#

1 Like

I have a question.
Now the certificate is valid.
However, somehow, Google Chrome says that the connection is not protected. Is it because "CN", "O", and "OU" are empty?

because it made new dir /anago.harima.riken.jp-0001 you'd need to update Apaches config to new paths

never mind, you already did

2 Likes

Thank you, but, I updated file "ssl.conf", and restarted by "systemctl reload apache2.service".
However, Google Chrome says, "the certificate is valid, but "this connection is not protected, don't use passwd, or credit number".

1 Like

thats because you never redirect http page to https

1 Like

my page is https://anago.harima.riken.jp/wpmain/.
do i need close Chrome once?

Dear orangepizza.
Thank you very much. It is okay now.

2 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.