Failed authorization procedure with The key authorization did not match this challenge"

My domain is: mydomoticz.ovh

I ran this command: sudo certbot certonly --standalone

It produced this output: Failed authorization procedure. mydomoticz.ovh (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: The key authorization file from the server did not match this challenge "f52IBGP5aKzusROEvpLk9jLKNKK_ycKgOQQElKnBjwM.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg" != "f52IBGP5aKzusROEvpLk9jLKNKK_ycKgOQQElKnBjwM.4E3VCTFsySjUrqnCg0ooULx-3kbdPBygi0aWkvg5Gd8"

My web server is (include version): Apache ?? i don't know exactly, but i 'm sur is'nt Nginx.

The operating system my web server runs on is (include version): Debian 10 on Rpi4 with boot SSD

My hosting provider, if applicable, is: my own home server for Domoticz

I can login to a root shell on my machine (yes or no, or I don't know): Yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): No

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot): Certbot

Hi guys,

Sorry for my poor english school, i'm french. i'm a newbie

I have no knowledge of this, so I need details in order to fully understand what to do.
A few days ago my Domoticz server with a let's encrypt key via cerbot auto was working fine. But here is the key has not regenerated. I followed the Domoticz wiki, but the one using Certbot auto, I ended up with the message: "Your system is not supported by certbot-auto".
So I decided to delete my config files 1 by 1 manually in relation to the certificate in my raspberry, because I noticed that I could get 1 key by ovh, but I couldn't do it operating, I did not understand how to do the api token.
So I went back to a classic installation with Certbot, but it doesn't work and I still have an error.

I saw here a post dealing with ipv6, so I supercharged the ipv6 services on my raspberry and also on my OVH account, but the error is still present.
Can you help me ?

[/url]My Check Website

My letsencrypt.log in /var/log/letsencrypt:

2021-02-15 18:38:51,819:DEBUG:certbot.main:certbot version: 0.31.0
2021-02-15 18:38:51,819:DEBUG:certbot.main:Arguments: ['--standalone']
2021-02-15 18:38:51,820:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2021-02-15 18:38:51,855:DEBUG:certbot.log:Root logging level set at 20
2021-02-15 18:38:51,859:INFO:certbot.log:Saving debug log to /var/log/letsencrypt/letsencrypt.log
2021-02-15 18:38:51,863:DEBUG:certbot.plugins.selection:Requested authenticator standalone and installer None
2021-02-15 18:38:52,337:DEBUG:certbot.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot.plugins.standalone:Authenticator
Initialized: <certbot.plugins.standalone.Authenticator object at 0xb549b470>
Prep: True
2021-02-15 18:38:52,338:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.standalone.Authenticator object at 0xb549b470> and installer None
2021-02-15 18:38:52,338:INFO:certbot.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2021-02-15 18:38:52,348:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/112843201', new_authzr_uri=None, terms_of_service=None), affec6755fe3e9dd3cca2dfa6477d1f9, Meta(creation_dt=datetime.datetime(2021, 2, 15, 14, 45, 48, tzinfo=), creation_host='Domoticz45'))>
2021-02-15 18:38:52,349:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2021-02-15 18:38:52,353:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2021-02-15 18:38:52,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2021-02-15 18:38:52,966:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 15 Feb 2021 17:38:52 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"0CrLQEUedV0": "Adding random entries to the directory",
"keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
"meta": {
"caaIdentities": [
"letsencrypt.org"
],
"termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
"website": "https://letsencrypt.org"
},
"newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
"newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
"newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
"revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2021-02-15 18:38:52,967:DEBUG:certbot.display.ops:No installer, picking names manually
2021-02-15 18:39:00,397:INFO:certbot.main:Obtaining a new certificate
2021-02-15 18:39:04,850:DEBUG:certbot.crypto_util:Generating key (2048 bits): /etc/letsencrypt/keys/0011_key-certbot.pem
2021-02-15 18:39:04,861:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0011_csr-certbot.pem
2021-02-15 18:39:04,863:DEBUG:acme.client:Requesting fresh nonce
2021-02-15 18:39:04,864:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2021-02-15 18:39:05,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2021-02-15 18:39:05,023:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 15 Feb 2021 17:39:04 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0103W5cKlCD-38ZXqoUbc4edbnPeHtfzU0187Gfc8N4dqMk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

2021-02-15 18:39:05,023:DEBUG:acme.client:Storing nonce: 0103W5cKlCD-38ZXqoUbc4edbnPeHtfzU0187Gfc8N4dqMk
2021-02-15 18:39:05,024:DEBUG:acme.client:JWS payload:
b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "mydomoticz.ovh"\n }\n ]\n}'
2021-02-15 18:39:05,033:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyODQzMjAxIiwgIm5vbmNlIjogIjAxMDNXNWNLbENELTM4Wlhxb1ViYzRlZGJuUGVIdGZ6VTAxODdHZmM4TjRkcU1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
"signature": "BLDv9RhP_ie0Brtzg9X3_vBgY8mERG9wTs5oZExL_1iWk3FyKzfvnuM1U9mak6O4UAWynj8FjmhNx7XizZNReZuj4JQsLUqJdKuo3sTXoS60Bu5WOdIC1RwqPhsqfBAcCPLdzzoZBKUD2vtKWxnPsufTJdJ-Fc4SJE3NN2sYsGfl_CQJ6XQNdfaKZs0fQ4wCt3woUriMVoN_uyANegy2RfCE6pyUYx_px1KfiO1mKlL3MnPQoD2GSEBkDhv-iJ5tsbBgxUd-XeC7DopvxeRWvbg8CqmJtUoK6QWHCZ5Deq0YurlBnbD8EOsQZ7KQ94gv8oelTVioaGNzuv_PNkdhlw",
"payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm15ZG9tb3RpY3oub3ZoIgogICAgfQogIF0KfQ"
}
2021-02-15 18:39:05,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 336
2021-02-15 18:39:05,227:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 15 Feb 2021 17:39:05 GMT
Content-Type: application/json
Content-Length: 336
Connection: keep-alive
Boulder-Requester: 112843201
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/112843201/7927507998
Replay-Nonce: 0104H1WLnxrq77dfBYTAc02PL1Jsr8Ojykb5DFO8Aw3pgVQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"status": "pending",
"expires": "2021-02-22T17:35:36Z",
"identifiers": [
{
"type": "dns",
"value": "mydomoticz.ovh"
}
],
"authorizations": [
"https://acme-v02.api.letsencrypt.org/acme/authz-v3/10895521467"
],
"finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/112843201/7927507998"
}
2021-02-15 18:39:05,227:DEBUG:acme.client:Storing nonce: 0104H1WLnxrq77dfBYTAc02PL1Jsr8Ojykb5DFO8Aw3pgVQ
2021-02-15 18:39:05,228:DEBUG:acme.client:JWS payload:
b''
2021-02-15 18:39:05,237:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/10895521467:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyODQzMjAxIiwgIm5vbmNlIjogIjAxMDRIMVdMbnhycTc3ZGZCWVRBYzAyUEwxSnNyOE9qeWtiNURGTzhBdzNwZ1ZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xMDg5NTUyMTQ2NyJ9",
"signature": "bDjo6X6qIbDpMPSpluRS-h6ZUU5f_oYCfIHLnR64N5lLw-XEiHLEirYf9nKwplAMbGA5CL5NWKFT0lDjrvrFzCUXP44jTayUqaFgd3oY_17Wq9irEMIzp_MA60AY0D5UrT2Cq9aIpHYZtzwSo6C-JGBtI3x3PZHNuVDVi0VgicziGkQlNYnRMHTKDr6F6ieStNIvoc6_StWarYIc7S88gDsDJvbZBqotlBexQI8SsGmhslH7rA-BknqPpPNN_VCySvFomBdflF4FwP8EEqh6Q2ji83VW8rO9fLmU68iETcnlN8LKF1SEHTKAkZV6_swl7UrmT_cVBYX6EgozHKjgJA",
"payload": ""
}
2021-02-15 18:39:05,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/10895521467 HTTP/1.1" 200 795
2021-02-15 18:39:05,454:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 15 Feb 2021 17:39:05 GMT
Content-Type: application/json
Content-Length: 795
Connection: keep-alive
Boulder-Requester: 112843201
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 010325WdM8S04fzkq-D9_WqS6DB70PqlqXVcADnJSoaWE7k
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "mydomoticz.ovh"
},
"status": "pending",
"expires": "2021-02-22T17:35:36Z",
"challenges": [
{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/YLbXDg",
"token": "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw"
},
{
"type": "dns-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/lHCFIA",
"token": "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw"
},
{
"type": "tls-alpn-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/D7IYRg",
"token": "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw"
}
]
}
2021-02-15 18:39:05,455:DEBUG:acme.client:Storing nonce: 010325WdM8S04fzkq-D9_WqS6DB70PqlqXVcADnJSoaWE7k
2021-02-15 18:39:05,456:INFO:certbot.auth_handler:Performing the following challenges:
2021-02-15 18:39:05,457:INFO:certbot.auth_handler:http-01 challenge for mydomoticz.ovh
2021-02-15 18:39:05,458:DEBUG:acme.standalone:Successfully bound to :80 using IPv6
2021-02-15 18:39:05,458:DEBUG:acme.standalone:Certbot wasn't able to bind to :80 using IPv4, this is often expected due to the dual stack nature of IPv6 socket implementations.
2021-02-15 18:39:05,467:INFO:certbot.auth_handler:Waiting for verification...
2021-02-15 18:39:05,468:DEBUG:acme.client:JWS payload:
b'{\n "resource": "challenge",\n "type": "http-01"\n}'
2021-02-15 18:39:05,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/YLbXDg:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyODQzMjAxIiwgIm5vbmNlIjogIjAxMDMyNVdkTThTMDRmemtxLUQ5X1dxUzZEQjcwUHFscVhWY0FEbkpTb2FXRTdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My8xMDg5NTUyMTQ2Ny9ZTGJYRGcifQ",
"signature": "a4HiG35pJlPUzgP72Kp2Dvx-dwdJs8v8IR0ZjPEdXq0ykNFyLpZ_xSsoNoE2sGW8_w8Z6M9JVEIsdDC7phZ6iMjyiImvihpDPJQ36iYuMMP7kHhrwm_KOlK82fYz10fg5JSly3CuE9Wb7gyWW_gc2diIXSVA6PDNqmMkxEGAUZqglz-50yD7Z4nQLT-SiCPSFIsp7hHktKUemTE3rAoujsU4iTqaruhp2uGNI2ghGT7TaMzZt3saZR43i_5DY6kiOpczNoU7S92o15aejog7nhH68D52vM9OlmFzfQa83b5_dHy1ZhGhkLUEvicPpLSvk7LJVa7gQHH1feRcPQNq8g",
"payload": "ewogICJyZXNvdXJjZSI6ICJjaGFsbGVuZ2UiLAogICJ0eXBlIjogImh0dHAtMDEiCn0"
}
2021-02-15 18:39:05,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/10895521467/YLbXDg HTTP/1.1" 200 186
2021-02-15 18:39:05,635:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 15 Feb 2021 17:39:05 GMT
Content-Type: application/json
Content-Length: 186
Connection: keep-alive
Boulder-Requester: 112843201
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index", https://acme-v02.api.letsencrypt.org/acme/authz-v3/10895521467;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/YLbXDg
Replay-Nonce: 0103HXBb25I6FgbZ3JtTOunBhkujUMvJr_KiK4JngWL7Gyk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"type": "http-01",
"status": "pending",
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/YLbXDg",
"token": "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw"
}
2021-02-15 18:39:05,636:DEBUG:acme.client:Storing nonce: 0103HXBb25I6FgbZ3JtTOunBhkujUMvJr_KiK4JngWL7Gyk
2021-02-15 18:39:06,577:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:06,578:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "GET /api/488/config/wifi/ HTTP/1.1" 404 -
2021-02-15 18:39:06,701:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:06,701:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:06,702:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:06,741:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:06,742:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:06,742:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:06,791:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:06,792:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:06,793:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:06,820:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:06,820:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:06,821:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:08,006:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:08,008:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "GET /api/488/config/wifi/ HTTP/1.1" 404 -
2021-02-15 18:39:08,126:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:08,127:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:08,127:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:08,166:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:08,167:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:08,168:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:08,217:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:08,218:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:08,218:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:08,245:DEBUG:acme.standalone:::ffff:127.0.0.1 - - Incoming request
2021-02-15 18:39:08,246:DEBUG:acme.standalone:::ffff:127.0.0.1 - - code 501, message Unsupported method ('PUT')
2021-02-15 18:39:08,246:DEBUG:acme.standalone:::ffff:127.0.0.1 - - "PUT /api/488/config/wifi/updated HTTP/1.1" 501 -
2021-02-15 18:39:08,640:DEBUG:acme.client:JWS payload:
b''
2021-02-15 18:39:08,649:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/10895521467:
{
"protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvMTEyODQzMjAxIiwgIm5vbmNlIjogIjAxMDNIWEJiMjVJNkZnYlozSnRUT3VuQmhrdWpVTXZKcl9LaUs0Sm5nV0w3R3lrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8xMDg5NTUyMTQ2NyJ9",
"signature": "TsfYv3aaorXCwBQACd9TwZ3gqWoEjruI0vuYGvRvjotWs2S6WFRW-zEC1ywI5daXzwPHKIa30EGJf0DojeiOwIrhTJ-myR3iCsFTz_0xizGvN_PdDbOQyKlzd__x6rmrN9r27iV17EaA708tCSvmzDIXgvymWBJJ91LodFlzNXcTqCXTDs9hFTXy4Y0d57xvix-_yVmIf6_htxRsSk2iAWS92v9pzNNGfecamJQu-QDvYvT8VN_9sULizEFBcVkhNOEkLRqSRwpXaFYbxFLS8rbqwwbDZSMrE0rtk_T7_IMs7yIgnZA7aaTQNmJN7TvpQtkfXkB7VBmKhWjNqNRT8A",
"payload": ""
}
2021-02-15 18:39:08,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/10895521467 HTTP/1.1" 200 1104
2021-02-15 18:39:08,835:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 15 Feb 2021 17:39:08 GMT
Content-Type: application/json
Content-Length: 1104
Connection: keep-alive
Boulder-Requester: 112843201
Cache-Control: public, max-age=0, no-cache
Link: https://acme-v02.api.letsencrypt.org/directory;rel="index"
Replay-Nonce: 0104nhjoA8vPTJ0sPJ_0a-jgnXWLIQ-UWIppsMiMP1UBqt4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
"identifier": {
"type": "dns",
"value": "mydomoticz.ovh"
},
"status": "invalid",
"expires": "2021-02-22T17:35:36Z",
"challenges": [
{
"type": "http-01",
"status": "invalid",
"error": {
"type": "urn:ietf:params:acme:error:unauthorized",
"detail": "The key authorization file from the server did not match this challenge "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg" != "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.4E3VCTFsySjUrqnCg0ooULx-3kbdPBygi0aWkvg5Gd8"",
"status": 403
},
"url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/10895521467/YLbXDg",
"token": "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw",
"validationRecord": [
{
"url": "http://mydomoticz.ovh/.well-known/acme-challenge/h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw",
"hostname": "mydomoticz.ovh",
"port": "80",
"addressesResolved": [
"51.91.236.255"
],
"addressUsed": "51.91.236.255"
}
]
}
]
}
2021-02-15 18:39:08,836:DEBUG:acme.client:Storing nonce: 0104nhjoA8vPTJ0sPJ_0a-jgnXWLIQ-UWIppsMiMP1UBqt4
2021-02-15 18:39:08,838:DEBUG:certbot.reporter:Reporting to user: The following errors were reported by the server:

Domain: mydomoticz.ovh
Type: unauthorized
Detail: The key authorization file from the server did not match this challenge "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg" != "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.4E3VCTFsySjUrqnCg0ooULx-3kbdPBygi0aWkvg5Gd8"

To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.
2021-02-15 18:39:08,840:DEBUG:certbot.error_handler:Encountered exception:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. mydomoticz.ovh (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: The key authorization file from the server did not match this challenge "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg" != "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.4E3VCTFsySjUrqnCg0ooULx-3kbdPBygi0aWkvg5Gd8"

2021-02-15 18:39:08,841:DEBUG:certbot.error_handler:Calling registered functions
2021-02-15 18:39:08,841:INFO:certbot.auth_handler:Cleaning up challenges
2021-02-15 18:39:08,843:DEBUG:certbot.plugins.standalone:Stopping server at :::80...
2021-02-15 18:39:09,249:DEBUG:certbot.log:Exiting abnormally:
Traceback (most recent call last):
File "/usr/bin/certbot", line 11, in
load_entry_point('certbot==0.31.0', 'console_scripts', 'certbot')()
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1365, in main
return config.func(config, plugins)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 1250, in certonly
lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
File "/usr/lib/python3/dist-packages/certbot/main.py", line 121, in _get_and_save_cert
lineage = le_client.obtain_and_enroll_certificate(domains, certname)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 410, in obtain_and_enroll_certificate
cert, chain, key, _ = self.obtain_certificate(domains)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 353, in obtain_certificate
orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
File "/usr/lib/python3/dist-packages/certbot/client.py", line 389, in _get_order_and_authorizations
authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 82, in handle_authorizations
self._respond(aauthzrs, resp, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 168, in _respond
self._poll_challenges(aauthzrs, chall_update, best_effort)
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 239, in _poll_challenges
raise errors.FailedChallenges(all_failed_achalls)
certbot.errors.FailedChallenges: Failed authorization procedure. mydomoticz.ovh (http-01): urn:ietf:params:acme:error:unauthorized :: The client lacks sufficient authorization :: The key authorization file from the server did not match this challenge "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg" != "h58daPEYlWD9RMjIhJhKEo4hwCzthmbA3Q2kXbjoEIw.4E3VCTFsySjUrqnCg0ooULx-3kbdPBygi0aWkvg5Gd8"

Hi @Xavier45

see your check - https://check-your-website.server-daten.de/?q=mydomoticz.ovh

There is a running Apache.

So why do you use --standalone? Normally, I would expect an error: Port 80 blocked - because your port 80 has the running Apache.

Do you run Certbot on the wrong machine?

Your error says:

There is an answer - but with the wrong key. Normally that happens if the hoster has an own Letsencrypt client and manages /.well-known/acme-challenge to create Letsencrypt certificates.

Or you use a control panel that manages Letsencrypt certificates.

But the check of

http://mydomoticz.ovh/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

has the expected answer

Not Found The requested URL was not found on this server.

instead of something like

check-your-website-dot-server-daten-dot-de.iiT_JD8lRnVBMVTTQ2V0xw3To4BOZ3oGIjWYEjLOqQg

Filename + dot + hash of the account key.

Hi JuergenAuer,

Thanks for your reponse, i search where is my error and for information, I didn't find anything because I have neither apache or apache2 installed and nothing is running on port 80.
I run Certbot on the good machine.
I normally uninstalled everything I could find and which concerned cerbot let's encrypt and snapd (cmd remove, purge, etc) .
I will do a new installation and I will come back to tell you what it is.

Thansk for your help

Best Regards
Xavier

I thinks know where is a problem.

On the OVH interface i see an error , now i search how is possible to delete this.

mydomotich.cluster029.hosting.ovh.net

domotich (domoticz) = it's not good and I don't want this site, I don't know how it was created . I search a solution to delete this.

Thanks for your help, my problem had coming since a bad site creat on OVH.
I have terminated the domain name to create a new one and everything is OK now.
I made mistakes for lack of knowledge, oups !!!

Best Regards
Xavier

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.