Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is:partsmaxinc.co
I ran this command:certbot certonly --standalone
It produced this output:2023-03-16 13:18:33,722:DEBUG:certbot._internal.main:certbot version: 2.2.0
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Location of certbot entry point: C:\Program Files\Certbot\bin\certbot.exe
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Arguments: ['--dry-run', '-v', '--preconfigured-renewal']
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-03-16 13:18:33,805:DEBUG:certbot._internal.log:Root logging level set at 20
2023-03-16 13:18:33,815:DEBUG:certbot._internal.plugins.selection:Requested authenticator None and installer None
2023-03-16 13:18:33,820:DEBUG:certbot._internal.plugins.selection:Multiple candidate plugins: * standalone
Description: Spin up a temporary webserver
Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x000001C3DF29DCA0>
Prep: True
- webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x000001C3DF29DBB0>
Prep: True
2023-03-16 13:18:36,188:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x000001C3DF29DCA0> and installer None
2023-03-16 13:18:36,189:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2023-03-16 13:18:36,232:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-staging-v02.api.letsencrypt.org/acme/acct/93504474', new_authzr_uri=None, terms_of_service=None), ed55f43f1b64903b5f38ca0840984c74, Meta(creation_dt=datetime.datetime(2023, 3, 16, 18, 4, 51, tzinfo=), creation_host='SBPMS.SandBox.Dom', register_to_eff=None))>
2023-03-16 13:18:36,255:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory.
2023-03-16 13:18:36,257:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443
2023-03-16 13:18:36,528:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830
2023-03-16 13:18:36,528:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:18:58 GMT
Content-Type: application/json
Content-Length: 830
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
"website": "Staging Environment - Let's Encrypt"
},
"newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
"qh06eXq4tQU": "Adding random entries to the directory",
"renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/",
"revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-03-16 13:18:36,529:DEBUG:certbot.display.ops:No installer, picking names manually
2023-03-16 13:18:40,274:DEBUG:certbot._internal.display.obj:Notifying user: Simulating a certificate request for partsmaxinc.co
2023-03-16 13:18:40,282:DEBUG:acme.client:Requesting fresh nonce
2023-03-16 13:18:40,283:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce.
2023-03-16 13:18:40,368:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-03-16 13:18:40,368:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: BEB9FMfRcgIkVU6jWKHXeeK2BpTbnTY1wJ1OEpLdnA99omY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2023-03-16 13:18:40,369:DEBUG:acme.client:Storing nonce: BEB9FMfRcgIkVU6jWKHXeeK2BpTbnTY1wJ1OEpLdnA99omY
2023-03-16 13:18:40,369:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "partsmaxinc.co"\n }\n ]\n}'
2023-03-16 13:18:40,372:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJCRUI5Rk1mUmNnSWtWVTZqV0tIWGVlSzJCcFRiblRZMXdKMU9FcExkbkE5OW9tWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"signature": "EIocb2tKSCEciIK198OYiQlb_7O1coevgNBq0djnnwkhXM1qf1nSVxrEg_qdj5cDbJDrb6gEZK4c8AgL0bC4ujIoabC8e1c1XgVcb0lZBqF1NzUjEMmjGKFMEtwBBUxSsxlyuKbmklhRwzbuIB1DUKd-QIxzxF2yt7Yfamv3NhNs6hI-8ucrUAyayCJogfIHaAgXDA63WR2AzOZGQwCFi9ZjmiTzBomT-V-WCFVwtXC4SI8uSfWvkuiwdVBq8AgCMEwg4VImlF6tmz4onCQFYjqqHIaLGirqJu3Pu3FiIMW_lST6aJ7TaadglHv0fSw4h1QvTTxGMRZBiHYFwOTJig",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInBhcnRzbWF4aW5jLmNvIgogICAgfQogIF0KfQ"
}
2023-03-16 13:18:40,483:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-03-16 13:18:40,484:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/93504474/7780141234
Replay-Nonce: 4994Z6dAZHaHYDWn4dzQ0FYa95qmBhXRWOsfUXhYKMaav8k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2023-03-23T18:18:25Z",
"identifiers": [
{
"type": "dns",
"value": "partsmaxinc.co"
}
],
"authorizations": [
"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824"
],
"finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/93504474/7780141234"
}
2023-03-16 13:18:40,485:DEBUG:acme.client:Storing nonce: 4994Z6dAZHaHYDWn4dzQ0FYa95qmBhXRWOsfUXhYKMaav8k
2023-03-16 13:18:40,485:DEBUG:acme.client:JWS payload:
b''
2023-03-16 13:18:40,486:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICI0OTk0WjZkQVpIYUhZRFduNGR6UTBGWWE5NXFtQmhYUldPc2ZVWGhZS01hYXY4ayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NzUyMzgzODI0In0",
"signature": "c1CfX1J1kkXsypXZbFYxplT0dTsWDlg29lvpy5pF3IMuiKVN3KogrVlemdHZaHq08VgUo7w0PNzJDRNQPSKdAuByedPFGgxVHEmLmSArqI3Md25_fJKH5S3orN_RNh_PabCVvX3V3rpK8__KnbBoHD7vImQRUEMH75bzrT6jQvYIQEtBygGePWEm9Y8ATtrB3eElpQ8GfG7nbwY6fqvpPre4uYrc1NPOc6al79GA8VhlZkhXnMFk27mnV9ehnBl9-tYCE0rUIvbEp07bTBlPYy3n5p-xQMY-N0HhF_0bN0xJflPmBylozC-UTstNU8_fYtHrFxyqWb0g6FGQ5FqeQg",
"payload": ""
}
2023-03-16 13:18:40,579:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5752383824 HTTP/1.1" 200 816
2023-03-16 13:18:40,580:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 816
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: BEB9kuQMDwNagBgSFeNPKdvz2ogRH4ZIG8_DZChbBs9_mWs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "partsmaxinc.co"
},
"status": "pending",
"expires": "2023-03-23T18:18:25Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/q1kGkA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/ILU8hg",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
}
]
}
2023-03-16 13:18:40,580:DEBUG:acme.client:Storing nonce: BEB9kuQMDwNagBgSFeNPKdvz2ogRH4ZIG8_DZChbBs9_mWs
2023-03-16 13:18:40,581:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-03-16 13:18:40,582:INFO:certbot._internal.auth_handler:http-01 challenge for partsmaxinc.co
2023-03-16 13:18:40,586:DEBUG:acme.standalone:Successfully bound to :80 using IPv6
2023-03-16 13:18:40,587:DEBUG:acme.standalone:Successfully bound to :80 using IPv4
2023-03-16 13:18:40,589:DEBUG:acme.client:JWS payload:
b'{}'
2023-03-16 13:18:40,591:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJCRUI5a3VRTUR3TmFnQmdTRmVOUEtkdnoyb2dSSDRaSUc4X0RaQ2hiQnM5X21XcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My81NzUyMzgzODI0L01hVGdFQSJ9",
"signature": "YP5IUbm5gCwhO71unJ38tu-vS0GcR03ycW_6VqRhqIYrEOT0vbGh6D1Eczq-2yuv2HImqocphXA5O9CIJAhmi68uVqiDjFd0Nf4V5MzVC80kkX0dn4RikWBgMoXW2lkfDh9orcF2XD8O8OUOyo8cEAuLMDmmCsfUGApeTjfMmPpe79TBZ_Op_FN4ONdVUdVB7816vLD3qoxdtcjkZZ63Sf53n31oAXB3gaQzzmIsNgluz15Y54Qi3ZxY13a-CCAXpl3B5plUx0kX7hlJ_Lw6jK56Yj8a-lLlSrKf1cZraWm5Mj9KfGqccSOpSybAcY-71g0qANJOEQWgqfhNX1euMg",
"payload": "e30"
}
2023-03-16 13:18:40,687:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/5752383824/MaTgEA HTTP/1.1" 200 193
2023-03-16 13:18:40,688:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 193
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index", https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824;rel="up"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA
Replay-Nonce: A272qu0ms4BYgFXZE6jZDUbGIhvIZ4GqNYNo-2RkokByFBM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "http-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
}
2023-03-16 13:18:40,688:DEBUG:acme.client:Storing nonce: A272qu0ms4BYgFXZE6jZDUbGIhvIZ4GqNYNo-2RkokByFBM
2023-03-16 13:18:40,689:INFO:certbot._internal.auth_handler:Waiting for verification...
2023-03-16 13:18:41,690:DEBUG:acme.client:JWS payload:
b''
2023-03-16 13:18:41,691:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJBMjcycXUwbXM0QllnRlhaRTZqWkRVYkdJaHZJWjRHcU5ZTm8tMlJrb2tCeUZCTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NzUyMzgzODI0In0",
"signature": "ZOzFbwEwKB8dcKwApBEBjnJOnz5qPLJlQUMScASQb4HgBgikTgf7CrclzN7MjmRazDSarQA8__gxwaeI1PQ6M-GMtDzp5dOBKdU9OCe_X8B5SpiIBv6F1bRa-S-zUBUOipPA3N2DNVY2CBWQvSnb5TuQYRZF0R7mAkqsPcZs5jyhUx_RisZGi8Z51yi07i0s40XV1PGSU6ZNBBmxaoiyoqJ0d4_YWpxf-_HB4zOFypJeLRxIaIqJeZp18BCgz92caqRr6lH3m7gKMhvtM_4gCBKTE0Lxo6ged0pdatbrcpyPeZaeI1-VRlD9qOY7qruo2DnvURrOb4gba8pMrafxPg",
"payload": ""
}
2023-03-16 13:18:41,776:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5752383824 HTTP/1.1" 200 1033
2023-03-16 13:18:41,777:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:03 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 4994DvCYb2nUxpka9ObYxGM2iVovU1kaDHU2EUWVKiWMKhE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "partsmaxinc.co"
},
"status": "invalid",
"expires": "2023-03-23T18:18:25Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "162.17.104.113: Invalid response from http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q: 404",
"status": 403
},
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q",
"validationRecord": [
{
"url": "http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q",
"hostname": "partsmaxinc.co",
"port": "80",
"addressesResolved": [
"162.17.104.113"
],
"addressUsed": "162.17.104.113"
}
],
"validated": "2023-03-16T18:19:02Z"
}
]
}
2023-03-16 13:18:41,777:DEBUG:acme.client:Storing nonce: 4994DvCYb2nUxpka9ObYxGM2iVovU1kaDHU2EUWVKiWMKhE
2023-03-16 13:18:41,777:INFO:certbot._internal.auth_handler:Challenge failed for domain partsmaxinc.co
2023-03-16 13:18:41,778:INFO:certbot._internal.auth_handler:http-01 challenge for partsmaxinc.co
2023-03-16 13:18:41,779:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
Domain: partsmaxinc.co
Type: unauthorized
Detail: 162.17.104.113: Invalid response from http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q: 404
Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.
2023-03-16 13:18:41,780:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-03-16 13:18:41,781:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-03-16 13:18:41,783:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-03-16 13:18:41,784:DEBUG:certbot._internal.plugins.standalone:Stopping server at :::80...
2023-03-16 13:18:41,784:DEBUG:certbot._internal.plugins.standalone:Stopping server at 0.0.0.0:80...
2023-03-16 13:18:42,589:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "runpy.py", line 197, in _run_module_as_main
File "runpy.py", line 87, in run_code
File "C:\Program Files\Certbot\bin\certbot.exe_main.py", line 29, in
sys.exit(main())
File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
return internal_main.main(cli_args)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 1736, in main
return config.func(config, plugins)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 1590, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 138, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 516, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-03-16 13:18:42,591:ERROR:certbot._internal.log:Some challenges have failed.
My web server is (include version):
The operating system my web server runs on is (include version):Windows 2016 server
My hosting provider, if applicable, is:GoDaddy
I can login to a root shell on my machine (yes or no, or I don't know):I don't know.
I'm using a control panel to manage my site (no, or provide the name and version of the control panel):
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot):Certbot 2.2.0
So I do apologize ahead here, I am brand new to this and am learning as I go. When running this command i get Challenges failed. I'm at a loss. If any info is needed, ask and I will try to deliver. The current set up is the 2016 server with IIS on a VM. Communications have to pass a firewall.