Challenge failed on Windows2016 for SSL

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:partsmaxinc.co

I ran this command:certbot certonly --standalone

It produced this output:2023-03-16 13:18:33,722:DEBUG:certbot._internal.main:certbot version: 2.2.0
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Location of certbot entry point: C:\Program Files\Certbot\bin\certbot.exe
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Arguments: ['--dry-run', '-v', '--preconfigured-renewal']
2023-03-16 13:18:33,723:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-03-16 13:18:33,805:DEBUG:certbot._internal.log:Root logging level set at 20
2023-03-16 13:18:33,815:DEBUG:certbot._internal.plugins.selection:Requested authenticator None and installer None
2023-03-16 13:18:33,820:DEBUG:certbot._internal.plugins.selection:Multiple candidate plugins: * standalone
Description: Spin up a temporary webserver
Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x000001C3DF29DCA0>
Prep: True

  • webroot
    Description: Place files in webroot directory
    Interfaces: Authenticator, Plugin
    Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
    Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x000001C3DF29DBB0>
    Prep: True
    2023-03-16 13:18:36,188:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x000001C3DF29DCA0> and installer None
    2023-03-16 13:18:36,189:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
    2023-03-16 13:18:36,232:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-staging-v02.api.letsencrypt.org/acme/acct/93504474', new_authzr_uri=None, terms_of_service=None), ed55f43f1b64903b5f38ca0840984c74, Meta(creation_dt=datetime.datetime(2023, 3, 16, 18, 4, 51, tzinfo=), creation_host='SBPMS.SandBox.Dom', register_to_eff=None))>
    2023-03-16 13:18:36,255:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory.
    2023-03-16 13:18:36,257:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443
    2023-03-16 13:18:36,528:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830
    2023-03-16 13:18:36,528:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Thu, 16 Mar 2023 18:18:58 GMT
    Content-Type: application/json
    Content-Length: 830
    Connection: keep-alive
    Cache-Control: public, max-age=0, no-cache
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800

{
"keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
"website": "Staging Environment - Let's Encrypt"
},
"newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
"qh06eXq4tQU": "Adding random entries to the directory",
"renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/",
"revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-03-16 13:18:36,529:DEBUG:certbot.display.ops:No installer, picking names manually
2023-03-16 13:18:40,274:DEBUG:certbot._internal.display.obj:Notifying user: Simulating a certificate request for partsmaxinc.co
2023-03-16 13:18:40,282:DEBUG:acme.client:Requesting fresh nonce
2023-03-16 13:18:40,283:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce.
2023-03-16 13:18:40,368:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-03-16 13:18:40,368:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: BEB9FMfRcgIkVU6jWKHXeeK2BpTbnTY1wJ1OEpLdnA99omY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

2023-03-16 13:18:40,369:DEBUG:acme.client:Storing nonce: BEB9FMfRcgIkVU6jWKHXeeK2BpTbnTY1wJ1OEpLdnA99omY
2023-03-16 13:18:40,369:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "partsmaxinc.co"\n }\n ]\n}'
2023-03-16 13:18:40,372:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJCRUI5Rk1mUmNnSWtWVTZqV0tIWGVlSzJCcFRiblRZMXdKMU9FcExkbkE5OW9tWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"signature": "EIocb2tKSCEciIK198OYiQlb_7O1coevgNBq0djnnwkhXM1qf1nSVxrEg_qdj5cDbJDrb6gEZK4c8AgL0bC4ujIoabC8e1c1XgVcb0lZBqF1NzUjEMmjGKFMEtwBBUxSsxlyuKbmklhRwzbuIB1DUKd-QIxzxF2yt7Yfamv3NhNs6hI-8ucrUAyayCJogfIHaAgXDA63WR2AzOZGQwCFi9ZjmiTzBomT-V-WCFVwtXC4SI8uSfWvkuiwdVBq8AgCMEwg4VImlF6tmz4onCQFYjqqHIaLGirqJu3Pu3FiIMW_lST6aJ7TaadglHv0fSw4h1QvTTxGMRZBiHYFwOTJig",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInBhcnRzbWF4aW5jLmNvIgogICAgfQogIF0KfQ"
}
2023-03-16 13:18:40,483:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2023-03-16 13:18:40,484:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/93504474/7780141234
Replay-Nonce: 4994Z6dAZHaHYDWn4dzQ0FYa95qmBhXRWOsfUXhYKMaav8k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"status": "pending",
"expires": "2023-03-23T18:18:25Z",
"identifiers": [
{
"type": "dns",
"value": "partsmaxinc.co"
}
],
"authorizations": [
"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824"
],
"finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/93504474/7780141234"
}
2023-03-16 13:18:40,485:DEBUG:acme.client:Storing nonce: 4994Z6dAZHaHYDWn4dzQ0FYa95qmBhXRWOsfUXhYKMaav8k
2023-03-16 13:18:40,485:DEBUG:acme.client:JWS payload:
b''
2023-03-16 13:18:40,486:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICI0OTk0WjZkQVpIYUhZRFduNGR6UTBGWWE5NXFtQmhYUldPc2ZVWGhZS01hYXY4ayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NzUyMzgzODI0In0",
"signature": "c1CfX1J1kkXsypXZbFYxplT0dTsWDlg29lvpy5pF3IMuiKVN3KogrVlemdHZaHq08VgUo7w0PNzJDRNQPSKdAuByedPFGgxVHEmLmSArqI3Md25_fJKH5S3orN_RNh_PabCVvX3V3rpK8__KnbBoHD7vImQRUEMH75bzrT6jQvYIQEtBygGePWEm9Y8ATtrB3eElpQ8GfG7nbwY6fqvpPre4uYrc1NPOc6al79GA8VhlZkhXnMFk27mnV9ehnBl9-tYCE0rUIvbEp07bTBlPYy3n5p-xQMY-N0HhF_0bN0xJflPmBylozC-UTstNU8_fYtHrFxyqWb0g6FGQ5FqeQg",
"payload": ""
}
2023-03-16 13:18:40,579:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5752383824 HTTP/1.1" 200 816
2023-03-16 13:18:40,580:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 816
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: BEB9kuQMDwNagBgSFeNPKdvz2ogRH4ZIG8_DZChbBs9_mWs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "partsmaxinc.co"
},
"status": "pending",
"expires": "2023-03-23T18:18:25Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/q1kGkA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/ILU8hg",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
}
]
}
2023-03-16 13:18:40,580:DEBUG:acme.client:Storing nonce: BEB9kuQMDwNagBgSFeNPKdvz2ogRH4ZIG8_DZChbBs9_mWs
2023-03-16 13:18:40,581:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-03-16 13:18:40,582:INFO:certbot._internal.auth_handler:http-01 challenge for partsmaxinc.co
2023-03-16 13:18:40,586:DEBUG:acme.standalone:Successfully bound to :80 using IPv6
2023-03-16 13:18:40,587:DEBUG:acme.standalone:Successfully bound to :80 using IPv4
2023-03-16 13:18:40,589:DEBUG:acme.client:JWS payload:
b'{}'
2023-03-16 13:18:40,591:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJCRUI5a3VRTUR3TmFnQmdTRmVOUEtkdnoyb2dSSDRaSUc4X0RaQ2hiQnM5X21XcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My81NzUyMzgzODI0L01hVGdFQSJ9",
"signature": "YP5IUbm5gCwhO71unJ38tu-vS0GcR03ycW_6VqRhqIYrEOT0vbGh6D1Eczq-2yuv2HImqocphXA5O9CIJAhmi68uVqiDjFd0Nf4V5MzVC80kkX0dn4RikWBgMoXW2lkfDh9orcF2XD8O8OUOyo8cEAuLMDmmCsfUGApeTjfMmPpe79TBZ_Op_FN4ONdVUdVB7816vLD3qoxdtcjkZZ63Sf53n31oAXB3gaQzzmIsNgluz15Y54Qi3ZxY13a-CCAXpl3B5plUx0kX7hlJ_Lw6jK56Yj8a-lLlSrKf1cZraWm5Mj9KfGqccSOpSybAcY-71g0qANJOEQWgqfhNX1euMg",
"payload": "e30"
}
2023-03-16 13:18:40,687:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/5752383824/MaTgEA HTTP/1.1" 200 193
2023-03-16 13:18:40,688:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:02 GMT
Content-Type: application/json
Content-Length: 193
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index", https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824;rel="up"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA
Replay-Nonce: A272qu0ms4BYgFXZE6jZDUbGIhvIZ4GqNYNo-2RkokByFBM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"type": "http-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q"
}
2023-03-16 13:18:40,688:DEBUG:acme.client:Storing nonce: A272qu0ms4BYgFXZE6jZDUbGIhvIZ4GqNYNo-2RkokByFBM
2023-03-16 13:18:40,689:INFO:certbot._internal.auth_handler:Waiting for verification...
2023-03-16 13:18:41,690:DEBUG:acme.client:JWS payload:
b''
2023-03-16 13:18:41,691:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5752383824:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MzUwNDQ3NCIsICJub25jZSI6ICJBMjcycXUwbXM0QllnRlhaRTZqWkRVYkdJaHZJWjRHcU5ZTm8tMlJrb2tCeUZCTSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NzUyMzgzODI0In0",
"signature": "ZOzFbwEwKB8dcKwApBEBjnJOnz5qPLJlQUMScASQb4HgBgikTgf7CrclzN7MjmRazDSarQA8__gxwaeI1PQ6M-GMtDzp5dOBKdU9OCe_X8B5SpiIBv6F1bRa-S-zUBUOipPA3N2DNVY2CBWQvSnb5TuQYRZF0R7mAkqsPcZs5jyhUx_RisZGi8Z51yi07i0s40XV1PGSU6ZNBBmxaoiyoqJ0d4_YWpxf-_HB4zOFypJeLRxIaIqJeZp18BCgz92caqRr6lH3m7gKMhvtM_4gCBKTE0Lxo6ged0pdatbrcpyPeZaeI1-VRlD9qOY7qruo2DnvURrOb4gba8pMrafxPg",
"payload": ""
}
2023-03-16 13:18:41,776:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5752383824 HTTP/1.1" 200 1033
2023-03-16 13:18:41,777:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Thu, 16 Mar 2023 18:19:03 GMT
Content-Type: application/json
Content-Length: 1033
Connection: keep-alive
Boulder-Requester: 93504474
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 4994DvCYb2nUxpka9ObYxGM2iVovU1kaDHU2EUWVKiWMKhE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "partsmaxinc.co"
},
"status": "invalid",
"expires": "2023-03-23T18:18:25Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "162.17.104.113: Invalid response from http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q: 404",
"status": 403
},
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5752383824/MaTgEA",
"token": "nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q",
"validationRecord": [
{
"url": "http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q",
"hostname": "partsmaxinc.co",
"port": "80",
"addressesResolved": [
"162.17.104.113"
],
"addressUsed": "162.17.104.113"
}
],
"validated": "2023-03-16T18:19:02Z"
}
]
}
2023-03-16 13:18:41,777:DEBUG:acme.client:Storing nonce: 4994DvCYb2nUxpka9ObYxGM2iVovU1kaDHU2EUWVKiWMKhE
2023-03-16 13:18:41,777:INFO:certbot._internal.auth_handler:Challenge failed for domain partsmaxinc.co
2023-03-16 13:18:41,778:INFO:certbot._internal.auth_handler:http-01 challenge for partsmaxinc.co
2023-03-16 13:18:41,779:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: standalone). The Certificate Authority reported these problems:
Domain: partsmaxinc.co
Type: unauthorized
Detail: 162.17.104.113: Invalid response from http://partsmaxinc.co/.well-known/acme-challenge/nFZmexoKte_qVe1Gr_vtGkfeEJLJ1JIfhP29OZHGC1Q: 404

Hint: The Certificate Authority failed to download the challenge files from the temporary standalone webserver started by Certbot on port 80. Ensure that the listed domains point to this machine and that it can accept inbound connections from the internet.

2023-03-16 13:18:41,780:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.

2023-03-16 13:18:41,781:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-03-16 13:18:41,783:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-03-16 13:18:41,784:DEBUG:certbot._internal.plugins.standalone:Stopping server at :::80...
2023-03-16 13:18:41,784:DEBUG:certbot._internal.plugins.standalone:Stopping server at 0.0.0.0:80...
2023-03-16 13:18:42,589:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "runpy.py", line 197, in _run_module_as_main
File "runpy.py", line 87, in run_code
File "C:\Program Files\Certbot\bin\certbot.exe_main
.py", line 29, in
sys.exit(main())
File "C:\Program Files\Certbot\pkgs\certbot\main.py", line 19, in main
return internal_main.main(cli_args)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 1736, in main
return config.func(config, plugins)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 1590, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "C:\Program Files\Certbot\pkgs\certbot_internal\main.py", line 138, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 516, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "C:\Program Files\Certbot\pkgs\certbot_internal\client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "C:\Program Files\Certbot\pkgs\certbot_internal\auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-03-16 13:18:42,591:ERROR:certbot._internal.log:Some challenges have failed.

My web server is (include version):

The operating system my web server runs on is (include version):Windows 2016 server

My hosting provider, if applicable, is:GoDaddy

I can login to a root shell on my machine (yes or no, or I don't know):I don't know.

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):Certbot 2.2.0

So I do apologize ahead here, I am brand new to this and am learning as I go. When running this command i get Challenges failed. I'm at a loss. If any info is needed, ask and I will try to deliver. The current set up is the 2016 server with IIS on a VM. Communications have to pass a firewall.

Hello @TechTester001, welcome to the Let's Encrypt community. :slightly_smiling_face:

However when I check your site it is giving a response; --standalone should need Port 80 for itself;
did you stop the SonicWALL Server prior to issuing the command?

$ curl -Ii http://partsmaxinc.co/.well-known/acme-challenge/sometestfile
HTTP/1.0 404 Not Found
Server: SonicWALL
Expires: -1
Cache-Control: no-cache
Content-type: text/html;charset=UTF-8
X-Content-Type-Options: nosniff

Although I do see this

Is your router send Port 80 to your Windows2016?

1 Like

That's actually a firewall [not a server].

3 Likes

Hello and thanks for responses. I have not tried to stop the firewall, I've been asked to keep the IIS server behind the firewall. Through the sonicwall I am also looking into redirecting from the sonicwall to the IIS server(Windows 2016 server). I did use netstat -pant TCP and confirmed that I am not using port 80 during the command use.

netstat -pant TCP output:
Proto Local Address Foreign Address State Offload State

TCP 0.0.0.0:135 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:5985 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:8081 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:8082 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:8083 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49681 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49690 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49691 0.0.0.0:0 LISTENING InHost
TCP 0.0.0.0:49708 0.0.0.0:0 LISTENING InHost
TCP 127.0.0.1:50049 127.0.0.1:50050 ESTABLISHED InHost
TCP 127.0.0.1:50050 127.0.0.1:50049 ESTABLISHED InHost
TCP 127.0.0.1:50051 127.0.0.1:50052 ESTABLISHED InHost
TCP 127.0.0.1:50052 127.0.0.1:50051 ESTABLISHED InHost
TCP 192.168.1.33:139 0.0.0.0:0 LISTENING InHost
TCP 192.168.1.33:50048 52.159.126.152:443 ESTABLISHED InHost
TCP 192.168.1.33:50062 44.238.73.182:443 ESTABLISHED InHost
TCP 192.168.1.33:50224 64.71.144.203:443 ESTABLISHED InHost
TCP 192.168.1.33:50240 52.159.126.152:443 ESTABLISHED InHost
TCP 192.168.1.33:50249 108.156.83.13:443 ESTABLISHED InHost
C:\Users\Administrator.SANDBOX>

Sorry @TechTester001, I wasn't aware that the SonicWALL Server was the firewall.
Not asking you to stop a firewall. However that mean Port 80 is going to SonicWALL
and not the web server. You need to have the Public Facing Port 80 available for the
web server and if needed move SonicWALL to another port.

1 Like

Don't do that.
Why does the firewall need/use HTTP?
[does it also obtain certificates via ACME?]
You just need the firewall to forward the HTTP ACME requests to IIS.

3 Likes

I will look into this and try to figure that out. I will post here again if I make any progress or not.

2 Likes

UPDATE: I did port forward and it worked. I had to set up the objects and rules to do so from SonicWall. Not sure the policy on links so I wont pot source unless someone confirms its ok to.

All in all if anyone ever somehow needs this post, short answer: PORT FOWARDING.
Thanks all who assisted o7

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.