Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
My domain is: dev-acme.revmed.com
I ran this command: sudo certbot renew --dry-run
It produced this output:
2023-04-12 00:18:12,712:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2023-04-12 00:18:13,014:DEBUG:certbot._internal.main:certbot version: 2.5.0
2023-04-12 00:18:13,014:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/2913/bin/certbot
2023-04-12 00:18:13,014:DEBUG:certbot._internal.main:Arguments: ['--dry-run', '-v', '--preconfigured-renewal']
2023-04-12 00:18:13,014:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2023-04-12 00:18:13,038:DEBUG:certbot._internal.log:Root logging level set at 20
2023-04-12 00:18:13,039:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/dev-acme.revmed.com.conf
2023-04-12 00:18:13,067:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x7faaaf8168e0> and installer <certbot._internal.cli.cli_utils._Default object at 0x7faaaf8168e0>
2023-04-12 00:18:13,067:DEBUG:certbot._internal.cli:Var dry_run=True (set by user).
2023-04-12 00:18:13,067:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user).
2023-04-12 00:18:13,067:DEBUG:certbot._internal.cli:Var dry_run=True (set by user).
2023-04-12 00:18:13,067:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user).
2023-04-12 00:18:13,067:DEBUG:certbot._internal.cli:Var account={'server'} (set by user).
2023-04-12 00:18:13,093:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2023-04-12 00:18:13,251:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2023-04-12 00:18:13,252:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/dev-acme.revmed.com/cert1.pem is signed by the certificate's issuer.
2023-04-12 00:18:13,253:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/dev-acme.revmed.com/cert1.pem is: OCSPCertStatus.GOOD
2023-04-12 00:18:13,256:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-04-28 09:14:19 UTC.
2023-04-12 00:18:13,257:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing...
2023-04-12 00:18:13,257:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2023-04-12 00:18:13,260:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * manual
Description: Manual configuration or run your own shell scripts
Interfaces: Authenticator, Plugin
Entry point: manual = certbot._internal.plugins.manual:Authenticator
Initialized: <certbot._internal.plugins.manual.Authenticator object at 0x7faaaf81ac70>
Prep: True
2023-04-12 00:18:13,260:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.manual.Authenticator object at 0x7faaaf81ac70> and installer None
2023-04-12 00:18:13,260:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator manual, Installer None
2023-04-12 00:18:13,311:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-staging-v02.api.letsencrypt.org/acme/acct/85686773', new_authzr_uri=None, terms_of_service=None), a98cc3f62165e183bff0019a3e082701, Meta(creation_dt=datetime.datetime(2023, 1, 31, 18, 58, 56, tzinfo=), creation_host='dev-acme', register_to_eff=None))>
2023-04-12 00:18:13,312:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory.
2023-04-12 00:18:13,313:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443
2023-04-12 00:18:13,495:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830
2023-04-12 00:18:13,496:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 12 Apr 2023 00:18:13 GMT
Content-Type: application/json
Content-Length: 830
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"cKalLDBlFpo": "Adding random entries to the directory",
"keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
"website": "Staging Environment - Let's Encrypt"
},
"newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
"renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/",
"revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
}
2023-04-12 00:18:13,498:DEBUG:certbot._internal.display.obj:Notifying user: Simulating renewal of an existing certificate for dev-acme.revmed.com
2023-04-12 00:18:14,102:DEBUG:acme.client:Requesting fresh nonce
2023-04-12 00:18:14,102:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce.
2023-04-12 00:18:14,128:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2023-04-12 00:18:14,129:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 12 Apr 2023 00:18:14 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 4994llGN3GckXPs2yv8zXYfAD3JRHta2-SJg6rxHxL9DaIw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
2023-04-12 00:18:14,129:DEBUG:acme.client:Storing nonce: 4994llGN3GckXPs2yv8zXYfAD3JRHta2-SJg6rxHxL9DaIw
2023-04-12 00:18:14,129:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "dev-acme.revmed.com"\n }\n ]\n}'
2023-04-12 00:18:14,133:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order:
2023-04-12 00:18:14,189:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355
2023-04-12 00:18:14,189:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Wed, 12 Apr 2023 00:18:14 GMT
Content-Type: application/json
Content-Length: 355
Connection: keep-alive
Boulder-Requester: 85686773
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/85686773/8223259574
Replay-Nonce: 8F05lEs7bavGhhLwZ-gh2A4MvE2qVx-mEyb5-4CXsuL8Wco
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"status": "pending",
"expires": "2023-04-19T00:18:14Z",
"identifiers": [
{
"type": "dns",
"value": "dev-acme.revmed.com"
}
],
"authorizations": [
"https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6086368534"
],
"finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/85686773/8223259574"
}
2023-04-12 00:18:14,190:DEBUG:acme.client:Storing nonce: 8F05lEs7bavGhhLwZ-gh2A4MvE2qVx-mEyb5-4CXsuL8Wco
2023-04-12 00:18:14,190:DEBUG:acme.client:JWS payload:
b''
2023-04-12 00:18:14,192:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6086368534:
2023-04-12 00:18:14,222:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6086368534 HTTP/1.1" 200 821
2023-04-12 00:18:14,223:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 12 Apr 2023 00:18:14 GMT
Content-Type: application/json
Content-Length: 821
Connection: keep-alive
Boulder-Requester: 85686773
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: A272C6unhIskwsgWk5OFP-tkfmDZ078Di54DUf8aTKqM9TI
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "dev-acme.revmed.com"
},
"status": "pending",
"expires": "2023-04-19T00:18:14Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/mismaw",
"token": "UmuAshryIpii3RxMKvEob8Ux19q6ihH-x108LeS26Oo"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/hef9Cg",
"token": "UmuAshryIpii3RxMKvEob8Ux19q6ihH-x108LeS26Oo"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/8mvYHQ",
"token": "UmuAshryIpii3RxMKvEob8Ux19q6ihH-x108LeS26Oo"
}
]
}
2023-04-12 00:18:14,223:DEBUG:acme.client:Storing nonce: A272C6unhIskwsgWk5OFP-tkfmDZ078Di54DUf8aTKqM9TI
2023-04-12 00:18:14,223:INFO:certbot._internal.auth_handler:Performing the following challenges:
2023-04-12 00:18:14,223:INFO:certbot._internal.auth_handler:dns-01 challenge for dev-acme.revmed.com
2023-04-12 00:18:14,224:INFO:certbot.compat.misc:Running manual-auth-hook command: /etc/letsencrypt/acme-dns-auth.py
2023-04-12 00:18:14,555:WARNING:certbot.display.ops:Hook '--manual-auth-hook' for dev-acme.revmed.com reported error code 1
2023-04-12 00:18:14,555:WARNING:certbot.display.ops:Hook '--manual-auth-hook' for dev-acme.revmed.com ran with error output:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/urllib3/connection.py", line 159, in _new_conn
conn = connection.create_connection(
File "/usr/lib/python3/dist-packages/urllib3/util/connection.py", line 84, in create_connection
raise err
File "/usr/lib/python3/dist-packages/urllib3/util/connection.py", line 74, in create_connection
sock.connect(sa)
ConnectionRefusedError: [Errno 111] Connection refused
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 665, in urlopen
httplib_response = self._make_request(
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 376, in _make_request
self._validate_conn(conn)
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 996, in _validate_conn
conn.connect()
File "/usr/lib/python3/dist-packages/urllib3/connection.py", line 314, in connect
conn = self._new_conn()
File "/usr/lib/python3/dist-packages/urllib3/connection.py", line 171, in _new_conn
raise NewConnectionError(
urllib3.exceptions.NewConnectionError: <urllib3.connection.VerifiedHTTPSConnection object at 0x7ff427de5730>: Failed to establish a new connection: [Errno 111] Connection refused
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/requests/adapters.py", line 439, in send
resp = conn.urlopen(
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 719, in urlopen
retries = retries.increment(
File "/usr/lib/python3/dist-packages/urllib3/util/retry.py", line 436, in increment
raise MaxRetryError(_pool, url, error or ResponseError(cause))
urllib3.exceptions.MaxRetryError: HTTPSConnectionPool(host='dev-acme.revmed.com', port=443): Max retries exceeded with url: /register (Caused by NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection object at 0x7ff427de5730>: Failed to establish a new connection: [Errno 111] Connection refused'))
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/etc/letsencrypt/acme-dns-auth.py", line 144, in
account = client.register_account(ALLOW_FROM)
File "/etc/letsencrypt/acme-dns-auth.py", line 46, in register_account
res = requests.post(self.acmedns_url+"/register")
File "/usr/lib/python3/dist-packages/requests/api.py", line 116, in post
return request('post', url, data=data, json=json, **kwargs)
File "/usr/lib/python3/dist-packages/requests/api.py", line 60, in request
return session.request(method=method, url=url, **kwargs)
File "/usr/lib/python3/dist-packages/requests/sessions.py", line 533, in request
resp = self.send(prep, **send_kwargs)
File "/usr/lib/python3/dist-packages/requests/sessions.py", line 646, in send
r = adapter.send(request, **kwargs)
File "/usr/lib/python3/dist-packages/requests/adapters.py", line 516, in send
raise ConnectionError(e, request=request)
requests.exceptions.ConnectionError: HTTPSConnectionPool(host='dev-acme.revmed.com', port=443): Max retries exceeded with url: /register (Caused by NewConnectionError('<urllib3.connection.VerifiedHTTPSConnection object at 0x7ff427de5730>: Failed to establish a new connection: [Errno 111] Connection refused'))
2023-04-12 00:18:14,557:DEBUG:acme.client:JWS payload:
b'{}'
2023-04-12 00:18:14,559:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/hef9Cg:
2023-04-12 00:18:14,590:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/6086368534/hef9Cg HTTP/1.1" 200 192
2023-04-12 00:18:14,591:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 12 Apr 2023 00:18:14 GMT
Content-Type: application/json
Content-Length: 192
Connection: keep-alive
Boulder-Requester: 85686773
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index", https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6086368534;rel="up"
Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/hef9Cg
Replay-Nonce: 4994R-1Awj6gg7TVxn1UEo6DV0y50ab4HGN9mphtQbZSBVw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/hef9Cg",
"token": "UmuAshryIpii3RxMKvEob8Ux19q6ihH-x108LeS26Oo"
}
2023-04-12 00:18:14,591:DEBUG:acme.client:Storing nonce: 4994R-1Awj6gg7TVxn1UEo6DV0y50ab4HGN9mphtQbZSBVw
2023-04-12 00:18:14,592:INFO:certbot._internal.auth_handler:Waiting for verification...
2023-04-12 00:18:15,593:DEBUG:acme.client:JWS payload:
b''
2023-04-12 00:18:15,595:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/6086368534:
2023-04-12 00:18:15,624:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/6086368534 HTTP/1.1" 200 664
2023-04-12 00:18:15,624:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Wed, 12 Apr 2023 00:18:15 GMT
Content-Type: application/json
Content-Length: 664
Connection: keep-alive
Boulder-Requester: 85686773
Cache-Control: public, max-age=0, no-cache
Link: https://acme-staging-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: B37CLTf19W7IMa5-IeNoXDLhVNO7lvJZqJ9IzW60Ijc2X7s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800
{
"identifier": {
"type": "dns",
"value": "dev-acme.revmed.com"
},
"status": "invalid",
"expires": "2023-04-19T00:18:14Z",
"challenges": [
{
"type": "dns-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "Incorrect TXT record "0_wnRNnBZ_BILZ2jiSUXhIOuj4TMsmA2wb3faPQASW4" found at _acme-challenge.dev-acme.revmed.com",
"status": 403
},
"url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/6086368534/hef9Cg",
"token": "UmuAshryIpii3RxMKvEob8Ux19q6ihH-x108LeS26Oo",
"validated": "2023-04-12T00:18:14Z"
}
]
}
2023-04-12 00:18:15,625:DEBUG:acme.client:Storing nonce: B37CLTf19W7IMa5-IeNoXDLhVNO7lvJZqJ9IzW60Ijc2X7s
2023-04-12 00:18:15,625:INFO:certbot._internal.auth_handler:Challenge failed for domain dev-acme.revmed.com
2023-04-12 00:18:15,625:INFO:certbot._internal.auth_handler:dns-01 challenge for dev-acme.revmed.com
2023-04-12 00:18:15,626:DEBUG:certbot._internal.display.obj:Notifying user:
Certbot failed to authenticate some domains (authenticator: manual). The Certificate Authority reported these problems:
Domain: dev-acme.revmed.com
Type: unauthorized
Detail: Incorrect TXT record "0_wnRNnBZ_BILZ2jiSUXhIOuj4TMsmA2wb3faPQASW4" found at _acme-challenge.dev-acme.revmed.com
Hint: The Certificate Authority failed to verify the DNS TXT records created by the --manual-auth-hook. Ensure that this hook is functioning correctly and that it waits a sufficient duration of time for DNS propagation. Refer to "certbot --help manual" and the Certbot User Guide.
2023-04-12 00:18:15,626:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-04-12 00:18:15,627:DEBUG:certbot._internal.error_handler:Calling registered functions
2023-04-12 00:18:15,627:INFO:certbot._internal.auth_handler:Cleaning up challenges
2023-04-12 00:18:15,627:ERROR:certbot._internal.renewal:Failed to renew certificate dev-acme.revmed.com with error: Some challenges have failed.
2023-04-12 00:18:15,630:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 533, in handle_renewal_request
main.renew_cert(lineage_config, plugins, renewal_candidate)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/main.py", line 1547, in renew_cert
renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/main.py", line 129, in _get_and_save_cert
renewal.renew_cert(config, domains, le_client, lineage)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 395, in renew_cert
new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/client.py", line 428, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
raise errors.AuthorizationError('Some challenges have failed.')
certbot.errors.AuthorizationError: Some challenges have failed.
2023-04-12 00:18:15,631:DEBUG:certbot._internal.display.obj:Notifying user:
2023-04-12 00:18:15,632:ERROR:certbot._internal.renewal:All simulated renewals failed. The following certificates could not be renewed:
2023-04-12 00:18:15,632:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/dev-acme.revmed.com/fullchain.pem (failure)
2023-04-12 00:18:15,632:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2023-04-12 00:18:15,633:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
File "/snap/certbot/2913/bin/certbot", line 8, in
sys.exit(main())
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/main.py", line 19, in main
return internal_main.main(cli_args)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/main.py", line 1864, in main
return config.func(config, plugins)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/main.py", line 1636, in renew
renewal.handle_renewal_request(config)
File "/snap/certbot/2913/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 559, in handle_renewal_request
raise errors.Error(
certbot.errors.Error: 1 renew failure(s), 0 parse failure(s)
2023-04-12 00:18:15,633:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)
My web server is (include version): Apache Tomcat 10.0.27
The operating system my web server runs on is (include version): Ubuntu 20.04.5 LTS
My DNS hosting provider, if applicable, is: godaddy
I can login to a root shell on my machine (yes or no, or I don't know): yes
I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no
The version of my client is (e.g. output of certbot --version
or certbot-auto --version
if you're using Certbot): 2.5.0
Note: This is an internal server with a split-dns. My understanding is that the acme client calls out to Letsencrypt's servers that make the DNS record verification from their servers so this shouldn't be an issue, but I could be mistaken.